EP3789207A1 - Papier de sécurité et document de sécurité protégés contre la coupure - Google Patents

Papier de sécurité et document de sécurité protégés contre la coupure Download PDF

Info

Publication number
EP3789207A1
EP3789207A1 EP20020394.1A EP20020394A EP3789207A1 EP 3789207 A1 EP3789207 A1 EP 3789207A1 EP 20020394 A EP20020394 A EP 20020394A EP 3789207 A1 EP3789207 A1 EP 3789207A1
Authority
EP
European Patent Office
Prior art keywords
main surface
weakness
carrier substrate
line
security
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
EP20020394.1A
Other languages
German (de)
English (en)
Other versions
EP3789207B1 (fr
Inventor
Rudolf Seidler
Dirk Essmann
André Gregarek
Patrick ENGELMANN
Annett Bähr
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Giesecke and Devrient Currency Technology GmbH
Original Assignee
Giesecke and Devrient Currency Technology GmbH
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Giesecke and Devrient Currency Technology GmbH filed Critical Giesecke and Devrient Currency Technology GmbH
Publication of EP3789207A1 publication Critical patent/EP3789207A1/fr
Application granted granted Critical
Publication of EP3789207B1 publication Critical patent/EP3789207B1/fr
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • BPERFORMING OPERATIONS; TRANSPORTING
    • B42BOOKBINDING; ALBUMS; FILES; SPECIAL PRINTED MATTER
    • B42DBOOKS; BOOK COVERS; LOOSE LEAVES; PRINTED MATTER CHARACTERISED BY IDENTIFICATION OR SECURITY FEATURES; PRINTED MATTER OF SPECIAL FORMAT OR STYLE NOT OTHERWISE PROVIDED FOR; DEVICES FOR USE THEREWITH AND NOT OTHERWISE PROVIDED FOR; MOVABLE-STRIP WRITING OR READING APPARATUS
    • B42D25/00Information-bearing cards or sheet-like structures characterised by identification or security features; Manufacture thereof
    • B42D25/30Identification or security features, e.g. for preventing forgery
    • B42D25/346Perforations
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B42BOOKBINDING; ALBUMS; FILES; SPECIAL PRINTED MATTER
    • B42DBOOKS; BOOK COVERS; LOOSE LEAVES; PRINTED MATTER CHARACTERISED BY IDENTIFICATION OR SECURITY FEATURES; PRINTED MATTER OF SPECIAL FORMAT OR STYLE NOT OTHERWISE PROVIDED FOR; DEVICES FOR USE THEREWITH AND NOT OTHERWISE PROVIDED FOR; MOVABLE-STRIP WRITING OR READING APPARATUS
    • B42D25/00Information-bearing cards or sheet-like structures characterised by identification or security features; Manufacture thereof
    • B42D25/40Manufacture
    • B42D25/405Marking
    • B42D25/41Marking using electromagnetic radiation

Definitions

  • the invention relates to a security paper for producing a document of value, a document of value, in particular a bank note, and a method for producing the security paper and the document of value.
  • the security paper and the value document are designed in such a way that if there is a split in the plane of the paper, at least one of the surfaces of the security paper or the value document is damaged.
  • Counterfeiters often try to upgrade their counterfeits by combining them with part of a corresponding genuine document of value. For example, an attempt is often made to split a bank note into an upper half and a lower half and to combine the two halves with a counterfeit bank note half to form a complete bank note. So you get two counterfeit banknotes from a real banknote, which, because of their real content, have a very good chance of no longer being recognized as forgeries. Splitting a genuine document of value, in particular a very thin document of value such as a bank note, is difficult, but quite feasible, for example with the aid of organic solvents.
  • the security paper of the present invention does not have a film composite substrate, but the carrier substrate is a paper substrate, preferably a pure paper substrate.
  • a paper substrate is understood to mean any sheet-like substrate based on paper that is not embedded between two film layers that cover the entire surface of the substrate.
  • a pure paper substrate is not completely covered by a film on either of its two surfaces (main surfaces). Both the paper substrate and the pure paper substrate can, however, have a single-layer or multi-layer design.
  • the security paper according to the invention has the paper substrate, i.e. the carrier substrate, and at least one security feature (also referred to as a security element or authenticity feature) on or in the carrier substrate, by means of which it can be checked for authenticity. It can have further security features on or in the carrier substrate and / or further elements which serve purposes other than authenticity identification, for example name imprints or electronic components.
  • the security paper can have the dimensions of the document of value to be produced therefrom or it can be in the form of a web or a sheet with numerous individual uses. It can be used specifically for the production of a certain value document or it can be the basis for the production of several different value documents which have in common that they have at least one security feature that is identical.
  • Documents of value within the meaning of the present invention are, for example, banknotes, shares, bonds, certificates, vouchers, checks, lottery tickets, high-quality admission tickets, passports, other ID cards, credit cards, authorization cards and other flat objects of value, for example packaging for high-quality products.
  • the object of the present invention is to provide such a security paper or document of value with a paper substrate as the carrier substrate that cannot be split in the plane of the paper without damaging at least one of the partial layers resulting from the split in such a way that it is unusable for forgery purposes.
  • a paper substrate as the carrier substrate that cannot be split in the plane of the paper without damaging at least one of the partial layers resulting from the split in such a way that it is unusable for forgery purposes.
  • both of the sub-layers formed during the cleavage should be unusable for counterfeiting purposes.
  • the object of the present invention is also to provide a method for producing such a security paper or document of value.
  • the invention is based on the idea that the partial layers of a value document substrate produced during a split can only be used for a forgery if the security feature or the security features contained on or in the partial layers are undamaged.
  • the invention therefore aims to design documents of value in such a way that when the substrate is split, at least one security feature on or in a sub-layer of the document of value, preferably at least one security feature on or in each of the sub-layers of the document of value, is inevitably destroyed.
  • this is achieved in that the paper substrate is provided with lines of weakness which emanate from one of the main surfaces (surfaces) of the paper substrate and extend a certain distance essentially perpendicularly into the volume of the paper substrate, in the direction of the opposite main surface (surface). of the paper substrate.
  • the lines of weakness must not extend through the entire thickness of the paper substrate, as the substrate would otherwise become too destabilized or fall apart.
  • the security feature is arranged on the main surface (surface) of the value document substrate from which the weakening lines start or in the volume of the paper substrate that it at least partially overlaps the weakening lines. If an attempt is made to split the paper substrate, the lines of weakness will tear. A security feature whose adhesive strength on the paper substrate is greater than its tear strength then also tears, with the result that, after the cleavage, it is partly on (or in volume) of one substrate sublayer and partly on (or in volume) of the other substrate sublayer. Tear-resistant security features and / or security features with inadequate adhesive properties can be designed as "puzzles", i.e. they consist of security feature parts that adjoin one another in the area of the weakening lines and, in their entirety, result in the security feature.
  • the lines of weakness can be produced in various ways, for example by embossing the paper substrate during its production in the wet state in the paper machine or shortly afterwards.
  • the lines of weakness can be generated on the "finished" paper substrate, for example by laser cutting, laser ablation, water jet cutting, compressed air cutting, mechanical cutting - in particular with cutting plates or - cylinders, or one-sided punching.
  • the preferred method for generating the weakening lines is laser cutting.
  • the weakening lines generated - preferably by means of a laser - are generally at least 10 ⁇ m or preferably at least 20 ⁇ m wide.
  • Typical lines of weakness generated by means of lasers have a width in the range from 50 to 200 ⁇ m and have a height variation of more than 2% of the substrate depth at the edge. So you are noticeably frayed at the edge.
  • Gas lasers in particular a CO 2 laser, or a solid-state laser, in particular an Nd: YAG laser, are preferably used as lasers.
  • the laser power is preferably in the range from about 250 W to about 500 W, and preferred laser wavelengths are in the range between 9 ⁇ m and 11 ⁇ m.
  • Exemplary cutting speeds are from 2000 mm / s to 20,000 mm / s, preferably from 5,000 to 12,000 mm / s.
  • the depth of the weakening lines cannot be specified in the form of an absolute number range, since it depends on the substrate thickness. It also plays a role whether the lines of weakness extend into the volume of the substrate only starting from one main surface, or starting from both main surfaces, and which arrangement has lines of weakness starting from both main surfaces. Lines of weakness starting from both main surfaces, which are arranged offset, can be deeper than lines of weakness starting from both main surfaces, which run towards one another or almost run towards one another.
  • a weakening line depth can be used as a guideline from 30 to 90% of the thickness of the paper substrate, preferably from 33 to 66% of the thickness of the paper substrate.
  • the thickness of the paper substrate is the distance between the two opposite major surfaces of the paper substrate.
  • the lines of weakness emanating from a main surface of a paper substrate can be the same or different with regard to their depth and / or width and / or length and / or their shape in a plan view of the main surface and have the same or different distances from one another.
  • the weakening lines can be identical or differ from main surface to main surface in terms of depth and / or width and / or length and / or shape.
  • each line of weakness viewed from above on a main surface of the paper substrate, is in principle arbitrary, for example straight, curved, angled, spiral, crossing, continuous or with interruptions.
  • the more complex and angular the shape of the weakening line or the weakening lines the more difficult it is to split the paper substrate.
  • weakening lines with a closed shape a shape in which the "beginning" and "end” coincide
  • the areas of paper surrounded by the line with the security feature located thereon remain open when splitting one of the two substrate sub-layers formed, while a hole is created in the other substrate sub-layer at the corresponding point.
  • a security paper or a value document can, however, additionally contain one or more further weakening lines that are not necessarily combined with a security feature, but for which the same applies to the weakening lines combined with a security feature with regard to their shape, arrangement and manufacture.
  • additional weakening lines are preferably provided at those points of a value document at which attempts to split the document usually begin, namely at the edges and in particular at the corners of a value document.
  • weakening lines at the edges and / or corners of a value document can also be combined with a security feature, or weakening lines which are not combined with a security feature can be provided in an inner main surface area of the value document.
  • a single line of weakness can be very long and have a course that extends over any large area of the security paper or the value document. Therefore, a single line of weakness, in multiple tortuous form, can have the same effect as numerous short lines of weakness.
  • the lines of weakness are (also) adapted to a non-central and / or partial-position-independent cleavage of the substrate.
  • the weakening lines are selected accordingly in terms of their depth and / or width and / or their shape and / or arrangement (relative to one another or relative to the main surfaces).
  • the substrate would essentially be divided into two substrate sublayers of equal thickness. It was found, however, that a non-central cleavage of the substrate, in which one of the two substrate sublayers comprises less than 40% of the substrate thickness, is possible and can be taken into account by appropriate selection of the above-mentioned parameters of the weakening lines.
  • the lines of weakness are preferably also adapted to a split which is independent of the sub-layers and which is not based on the sub-layers.
  • Lines of weakness in a paper substrate can usually be recognized by an observer at least in transmitted light, and from a certain line width and depth also in incident light. Visibility can be desirable and advantageous.
  • lines of weakness can also serve as design elements.
  • the lines of weakness can therefore be adapted in order to be recognizable for the viewer either only in transmitted light or in reflected light and in transmitted light. It can then be particularly advantageous when lasering the weakening lines to produce a discoloration that can be seen in transmitted light and / or reflected light.
  • the laser wavelength, power, cutting speed and substrate can be matched to one another in order to produce the discoloration in the weakening line.
  • a substrate with ammonium octamolybdate is particularly suitable here.
  • a corresponding discoloration then occurs at a laser wavelength of 10.6 ⁇ m, a laser power of 4000 watts and a cutting speed of 6000 mm / s.
  • Alternative combinations of parameters for simultaneous coloring and cutting are sufficiently known, for example from WO 2010/072329 A1 .
  • weakening lines in the present sense are not cutting lines that extend completely through the substrate, as are used, for example, in the cited document to represent recognizable motifs.
  • the lines of weakness can be provided with a camouflage. Conspicuously structured and / or opaque and / or strongly colored security features or imprints come into consideration as such camouflage.
  • the lines of weakness can be filled, for example with a lacquer or an ink-accepting layer.
  • the lines of weakness can be kept or camouflaged in an easily recognizable manner, at least in incident light, by filling them. Camouflaging in transmitted light, on the other hand, requires a much more precise coordination of the filler material, with regard to color and opacity, to the substrate.
  • the filling is expediently carried out before the security feature is provided.
  • Water-based or solvent-based paints physically drying paints (by evaporation paints that dry out of the solvent) and hardening paints are equally suitable.
  • at least 20 percent by volume of the weakening lines should be filled, with fillings of more than 50 percent by volume being preferred.
  • fillings of more than 50 percent by volume being preferred.
  • a filling of 100 percent by volume is therefore most preferred if the weakening lines should be as difficult to see as possible.
  • At least some of the weakening lines are combined with at least one security feature (authenticity feature).
  • the sections can then either be arranged in such a way that they directly adjoin one another, so that a security feature arranged over a weakening line hides the weakening line from a viewer, or they can be arranged at a distance from one another so that a security feature arranged over a weakening line does not cover the weakening line , which is why it may be recognizable to a viewer.
  • Machine-detectable security features and visually recognizable security features are equally suitable.
  • machine-detectable security features are electrically conductive metallic structures and magnetic security features.
  • visually recognizable security features are colored areas, fluorescent features, metallizations, diffractive structures, matt structures, holograms.
  • security features that can be applied, for example printed, to a surface of a work document in the form of a liquid composition such as an ink. These include, for example, magnetic inks, color inks and inks with fluorescent pigments that fluoresce when irradiated with light of a certain wavelength.
  • Security features that are combined with one or more lines of weakness can be arranged on one or on both main surfaces of the carrier substrate and / or in the volume of the carrier substrate.
  • the security features can be divided so as to be recognizable for a viewer or, in the case of machine-detectable features, be recognizable for a detection unit.
  • Papers made of cellulose fibers and / or cotton fibers are of course suitable as the paper substrate.
  • a paper substrate is to be understood as meaning flat materials made of any type of paper or paper-like material.
  • paper substrates can therefore also contain a proportion of plastic fibers or even consist entirely of plastic fibers.
  • Preferred plastic fibers are polyester or polyamide fibers.
  • a paper substrate can be single-ply or multi-ply.
  • the individual layers can consist of the same or different types of paper.
  • the thickness of the paper substrates depends on the type of document of value that is to be produced from it. Regardless of the absolute thickness of the paper substrates, this thickness is essentially identical over the entire extent of a paper substrate. Furthermore, in the case of the paper substrates to be used according to the invention, both main surfaces (surfaces) are essentially planar.
  • a security paper according to the invention is produced by providing a carrier substrate with a first main surface and a second main surface, forming at least one weakening line in the first main surface which extends into the carrier substrate but does not reach the second main surface, and attaching at least of a security feature on the first main surface in such a way that it at least partially overlaps the line of weakness.
  • At least one line of weakness is also formed on the second main surface and a security feature is attached to the second main surface in such a way that it at least partially overlaps the line of weakness on the second main surface.
  • the lines of weakness are preferably formed by means of laser cutting.
  • a security feature is first applied to the first main surface, preferably also on the second main surface, and then the weakening lines are formed, again preferably by laser cutting.
  • the security feature or the security features should be in a structured form, ie it should be linear Have interruptions, the course of which the laser follows when cutting the weakening lines in the carrier substrate.
  • the lines of weakness are formed in one or both main surfaces of the carrier substrate during the production of the carrier substrate. Thereafter, a security feature is applied to the first main surface and possibly also a security feature on the second main surface in such a way that it at least partially overlaps the weakening line or the weakening lines.
  • the security feature is introduced into the paper substrate during the manufacture of the paper substrate.
  • the lines of weakness in one of the two main surfaces or in both main surfaces can also be formed during the production of the paper substrate or, alternatively, after completion of the paper substrate with the security feature located therein, can be formed in one or both main surfaces of the paper substrate, for example by laser cutting.
  • a value document is then produced from the security paper in that the security paper is provided with further security features, imprints or other elements which are characteristic of a specific value document and is cut to the desired shape and size.
  • Fig. 1 shows a value document 2 according to the invention in a plan view of the first main surface 4 of the carrier substrate.
  • Carrier substrates are flat structures that naturally have two main surfaces, which are usually referred to as the top and bottom. In the following, the top is also referred to as the first main surface, while the bottom is referred to as the second main surface. It is expressly pointed out, however, that it is ultimately arbitrary which of the main surfaces is designated as the first main surface and which of the main surfaces is designated as the second main surface.
  • a main area of the carrier substrate or of the paper substrate or simply of the “substrate” is at the same time a main area of the security paper and the document of value.
  • the document of value 2 shown has two security features 20, 23 which are located on the surface, ie the first main surface of the carrier substrate.
  • the security feature 20 is an imprint of the value number 100, the imprint containing fluorescent pigments which fluoresce when irradiated with light of a specific wavelength.
  • Each of the digits is surrounded on its outer circumference by a line of weakness which extends from the first main surface perpendicularly into the carrier substrate, but does not extend through the entire carrier substrate.
  • the security feature 23 is a metallized hologram which is arranged over an intertwined weakening line 22, which likewise extends from the first main surface of the carrier substrate a certain distance into the volume of the carrier substrate.
  • lines of weakness are located on the edges and on the corners of the document of value 2.
  • the lines of weakness 24, 25 on the edges and the lines of weakness 26, 27, 28, 29 at the corners of the document of value are preferably each formed and extend on both main surfaces of the carrier substrate in each case from one main surface to the opposite main surface.
  • the lines of weakness can have any shape, as indicated by the different shapes of the in Fig. 1 shown weakening lines is indicated. Angled or nested lines of weakness or generally lines of weakness with a complex course are preferred, since the more complex the course of the weakening lines, the more difficult a split is.
  • Lines of weakness can either be designed so that they are visible to a viewer or so that they are not visible to a viewer. If a value document has numerous weakening lines, an attempt will usually be made to make at least some of these weakening lines invisible, if only in order not to overload the value document. This is useful, for example, for weakening lines on corners and edges. Lines of weakness, the sole purpose of which is to destroy a security feature in an unpredictable manner when attempting to split the document of value, are advantageously made invisible.
  • the weakening lines can also be designed to be particularly conspicuous, for example by being filled with a printing ink, and thus at the same time serve as an authenticity feature of the document of value.
  • Such a variant is provided by the lines of weakness 21 in the first main surface 4 of the FIG Fig. 1 represented document of value 2. In an attempt to split, at least one of the resulting partial layers and part of the printing ink tears, and thus the security feature is lost.
  • Fig. 2 shows a cross section through a carrier substrate 3 with an upper side (first main surface or first surface) 4 and an opposite underside (second main surface or second surface) 5.
  • first main surface or first surface first main surface
  • second main surface or second surface second main surface or second surface
  • the dash-dotted line 10 illustrates the plane in which the carrier substrate 3 would be split in the event of a cleavage attack, indicated by the arrows to the left and right of the carrier substrate.
  • the dash-dotted line 10 is here and also in the following figures only in the middle of the thickness of the substrate. In principle, however, a cleavage attack can also be carried out off-center, for example at a height of 20%, 30% or 40% of the substrate thickness.
  • Fig. 3 such a split attack is illustrated.
  • the carrier substrate 3 is split into a first substrate sublayer 11 and a second substrate sublayer 12, a first gap area 13 being created on the first substrate sublayer 11 and a second gap area 14 being created on the second substrate sublayer 12.
  • the depth of the line of weakness 31 for the cleavage attack shown is not sufficient to lead to the carrier substrate 3 tearing. If, however, the cleavage continues up to the point at which the line of weakness 32 is located, the first partial substrate layer 11 tears at the corresponding point, and the attempt at cleavage has thus failed.
  • An attempt to split the carrier substrate 3 from the opposite side, in Fig. 3 indicated by the arrow pointing to the carrier substrate, would likewise lead to the failure of the cleavage attempt, since in this case the first partial substrate layer 11 would tear at the line of weakness 33.
  • the weakening lines 32 and 33 thus act against the - shown central - splitting attempt, although only the weakening line 33 extends with its depth in or through the cleavage plane 10.
  • a security feature (not shown here) initially arranged on the surface 4 (or arranged in the volume of the upper half of the substrate) is, after the attempt at cleavage, through the weakening lines 32, 33 that is partly on (or in) the first partial substrate layer 11 and partly on (or in) of the second substrate sublayer 12.
  • Fig. 3 it is not shown separately that the first substrate sublayer 11 does not have to end at the weakening line 32, but can continue, for example, behind the second weakening line 33.
  • Fig. 4 some exemplary widths and depths of weakening lines 34a to 34f are shown.
  • Narrow lines of weakness such as lines of weakness 34a, 34b and 34c have a width of less than 20 ⁇ m.
  • Such narrow lines of weakness are easier to hide from the human eye than broad lines of weakness, such as lines 34d, 34e and 34f.
  • the lines of weakness 34e, 34f have a width of more than 50 ⁇ m and are preferably produced by laser cutting or laser ablation.
  • the lines of weakness 34a, 34c may not be deep enough to lead to tearing of the carrier substrate in the event of a cleavage attack (indicated by the arrows pointing to the carrier substrate 3).
  • lines of weakness with a depth like the lines of weakness 34d, 34e can lead to a destabilization of the carrier substrate 3.
  • the depth of the lines of weakness which emanate from one of the surfaces of the substrate is therefore approximately 33 to 66% of the distance between the two surfaces of the substrate.
  • a wider weakening line 34f is slightly more effective than a narrower weakening line 34a of identical depth.
  • the broader line of weakness 34f will initially lead to tearing.
  • destabilization of the carrier substrate can be prevented by applying in the area of the endangered points one of the two surfaces the carrier substrate stabilizing film patches are attached or the areas of the endangered areas are coated with a stabilizing composition such as a tough lacquer.
  • a stabilizing composition such as a tough lacquer.
  • Fig. 5 shows a partial area of a carrier substrate 3 with weakening lines 35, 36 in the first main surface 4 of the carrier substrate.
  • the line of weakness 35 is a continuous line of varying depth, while the line of weakness 36 is discontinuous, ie has interruptions.
  • Fig. 6 is a cross section through the in Fig. 5 shows the carrier substrate 3 shown along the line AA.
  • the locations of the line of weakness 35 at the intersection of the carrier substrate are denoted by 35a, 35b, 35c, 35d and 35e.
  • the discontinuous weakening line 36 has an interruption in the area of the section line AA. Lines of weakness of varying depth and lines of weakness with interruptions can easily be produced by laser cutting by varying the power and / or the cutting speed of the laser or by switching the laser on and off periodically.
  • the Figures 7 and 8 show partial areas of carrier substrates 3 in cross section, with weakening lines being formed in each case in both surfaces of the carrier substrates.
  • the lines of weakness 37a to 37f formed in the first main surface 4 are of different widths and depths
  • the lines of weakness 57a to 57f formed in the second main surface 5 are of different depths.
  • the lines of weakness 37c, 37d and 37e formed in the first main surface 4 are opposite the lines of weakness 57c, 57d and 57e formed in the second main surface 5, which is why their depth must be less than that of the other lines of weakness, which are offset.
  • the weakening lines 37f and 57f which are arranged offset to one another, but are comparatively deep and come close to one another in the lateral direction, could lead to a destabilization of the carrier substrate in the corresponding area. It is therefore preferred, in the case of lines of weakness of greater depth, which extend from both opposite main surfaces of the carrier substrate, to ensure an offset arrangement with sufficient spacings between the lines of weakness.
  • a sufficient distance is at least 20%, preferably at least 50% of the thickness of the carrier substrate.
  • Such an arrangement is exemplified in Fig. 8 shown.
  • lines of weakness that start from the same main surface must also be spaced from one another so far that the carrier substrate is not destabilized.
  • the weakening lines 38a to 38e are formed in the first main surface 4 and the weakening lines 58a to 58d are formed in the second main surface 5. All lines of weakness extend into the volume of the carrier substrate 3 for a distance which is approximately 60% of the substrate thickness. However, the individual lines of weakness are spaced so far apart that no destabilization of the carrier substrate 3 occurs. Which weakening line depths, widths and distances a certain carrier substrate tolerates can easily be determined by means of a few orienting experiments.
  • Carrier substrates that have weakening lines on both main surfaces cannot even then be split into partial substrate layers, at least one of which has an undamaged surface, if a forger succeeds in splitting off the center.
  • the carrier substrate would then not be split in a plane that lies approximately in the middle between the two opposing surfaces, but the split plane would be strongly shifted in the direction of one of the two surfaces.
  • FIGS. 9 to 12 each show a partial area of a security paper 1 according to the invention in cross section.
  • the security paper 1 shown has weakening lines 39a to 39e in the area shown only in the first main surface 4 of the carrier substrate 3.
  • the weakening lines are filled, for example with a lacquer 6 in the color of the security paper.
  • the lines of weakness 39c, 39d and 39e are additionally equipped with a security feature in the form of an imprint 7.
  • the carrier substrate tears at the weakening lines and thereby destroys the imprint 7.
  • the splitting attempt does not result in a partial substrate layer with a complete imprint 7 due to the weakening lines, but only a partial substrate layer with parts of the security feature.
  • the weakening lines are largely invisible to a viewer, not only in incident light but also in transmitted light, including the weakening lines 39a, 39b that are not overprinted.
  • the illustrated embodiment of a security paper 1 according to the invention also has weakening lines only on one main surface of the carrier substrate 3, the weakening lines 41a to 41e.
  • the area of the weakening lines is printed with an ink acceptance layer 8 which at least partially penetrates the volume of the weakening lines 41a to 41e and at least partially fills them.
  • a printing layer 7 is printed on the ink-accepting layer 8 and is destroyed if the carrier substrate 3 tears at one or more of the weakening lines 41a to 41e during an attempt to split. In this case, only part of the printing layer 7 remains on the upper partial substrate layer, while the remainder of the printing layer 7 after the split together with the newly created one second gap 14 forms the surface of the lower substrate sub-layer.
  • the weakening lines 41a to 41e cannot be perceived by a viewer, since they are printed on the one hand with the security feature 7 and on the other hand are at least partially filled with the ink-accepting layer 8. The more complete the filling, the more invisible a line of weakness becomes to an observer.
  • the security feature 7 is not recognizable for a viewer divided, is in the in Fig. 11 illustrated security paper 1, this security feature is divided into areas 7a to 7f so that it is easily recognizable for a viewer.
  • the division is made by the weakening lines 42a to 42e, which are shown in FIG Fig. 11
  • the embodiment shown are not filled, and are thus easily recognizable for a viewer. If these lines of weakness tear, the security feature is divided into areas that are located on the first substrate sublayer and areas that are located on the second substrate sublayer.
  • the lines of weakness 42b and 42d act, so that after the attempt to cleave, the areas 7a, 7b, 7e and 7f (and 7c) of the security feature on the upper partial substrate layer and the areas 7c and 7d (or 7d) of the security feature lie on the lower partial substrate layer.
  • Fig. 12 shows a partial area of a security paper 1 according to the invention in cross section, which, in addition to a security feature 7 that is visible to a viewer, also has a machine-readable security feature 16.
  • the security feature 7 is a thin, transparent lacquer layer with luminescent pigments which luminesce when irradiated with light of a defined wavelength. The lacquer layer is visible to an observer because of its transparency barely noticeable under ambient light.
  • the machine-detectable security feature 16 is a thin, electrically conductive metallization which is divided into subregions 16a to 16d by the weakening lines 43c, 43d and 43e.
  • the weakening lines 43c, 43d and 43e are filled as completely as possible with an electrically non-conductive paint 6 with a similar color to the metallization 16, so that a viewer cannot see the division of the metallization 16. For the machine detection of the electrical conductivity, the division of the metallization into segments 16a to 16d remains detectable.
  • the line of weakness 43a is not filled, and the line of weakness 43b is partially filled with the transparent imprint 7. These lines of weakness remain clearly recognizable for a viewer, at least in transmitted light, while the other lines of weakness cannot be recognized by a viewer either in incident light or in transmitted light.
  • the carrier substrate 3 tears at the weakening lines, which means that, after splitting, a part of the metallization 16 and the luminescent layer 7 is located on each of the two substrate sub-layers that have been created.
  • both the visually recognizable security feature and the machine-detectable security feature were therefore destroyed.
  • FIGS. 13 and 14 illustrate, by way of example, a security paper 1 in which the security feature is not located on a surface of the carrier substrate 3, but in the volume of the carrier substrate 3.
  • Fig. 13 shows a part of a corresponding security paper 1 in plan view
  • Fig. 14 shows this area in cross section along the line BB of the illustration of FIG Fig. 13 .
  • the carrier substrate 3 of the security paper 1 has a magnetic security element 17, which is divided into segments 17a, 17b, 17c and 17d in a manner that can be detected by a machine.
  • the segments 17a to 17d are shown by dotted lines.
  • lines of weakness 44a and 44b which are formed in the first main surface 4 of the carrier substrate 3, as well as lines of weakness 59a and 59b, which are in the second main surface 5 of the carrier substrate 3 are formed.
  • Lines of weakness 44a and 59a surround segment 17a
  • lines of weakness 44b and 59b surround segment 17c.
  • the weakening lines are arranged in such a way that 2 weakening lines are exactly opposite each other.
  • the distance between two opposing lines of weakness is preferably about 20 to 40% of the thickness of the carrier substrate 3.
  • Fig. 15 shows an area of a security paper 1 according to the invention which has a security feature combined with weakening lines both on the first main surface and on the second main surface, in a plan view of the first main surface of the carrier substrate or of the security paper.
  • Fig. 16 shows a cross section through the in Fig. 15 shown area of the security paper along the line CC.
  • the Figures 17 to 22 each show top views of pairs of sub-layers that were found in an attempt to split the in Fig. 15 represented security paper can arise, and the Figures 23 to 26 show the respective crack locations in the carrier substrate 3.
  • the security paper 1 shown has on its first main surface 4 a security feature 30 in the form of the printed number “100” and on its second main surface 5 a security feature 50 in the form of a likewise printed value “100”.
  • the imprints are applied so that they partially overlap.
  • the number 100 on the first main surface 4 is shown with solid lines, while the number 100 on the second main surface 5 is shown in dotted lines.
  • the security feature 30 consists of the segments 30a, 30b and 30c
  • the security feature 50 consists of the segments 50a, 50b and 50c. How out Fig. 15 As can be seen, the segments 30c and 50c are congruent.
  • Fig. 16 shows a cross section through the in Fig. 15 illustrated area of the security paper 1 along the line CC. How out Fig. 16 As can be seen, each of the security feature segments 30a, 30b, 30c and the security feature segments 50a, 50b, 50c is surrounded by a line of weakness which runs directly on the outer circumference of the respective security feature segment. If one tries to split such a security paper in a plane 10 which runs between the first main surface and the second main surface of the security paper in order to obtain two sub-layers 11, 12, one finds that none of the sub-layers obtained is suitable for this purpose to be combined with a counterfeit banknote to give it the appearance of authenticity. Some of the possible splitting outcomes are illustrated below.
  • FIG. 23 to 26 are representations as in Fig. 16 However, the lines of weakness are designated more precisely and possible cracks are shown as blackened areas.
  • the segment 30a is surrounded by the line of weakness 45a, 45a '
  • the segment 30b is surrounded by the line of weakness 45b, 45b'
  • the segment 30c is surrounded by the line of weakness 45c, 45c '
  • the segment 50a is surrounded by the weakening line 55a, 55a '
  • the segment 50b is surrounded by the weakening line 55b, 55b'
  • the segment 50c is surrounded by the weakening line 55c, 55c '.
  • the parallel dashed areas between the ends of the weakening lines and the dash-dotted cleavage plane each designate the areas whose cracking is to be expected in the event of a cleavage.
  • the Figures 17 and 18 show the security feature 30 after the cleavage of the security paper into a first partial substrate layer 11 and a second partial substrate layer 12. Top views of the first main surface 4 and the second main surface 14 resulting from the cleavage are shown in each case (cf. Fig. 3 ).
  • Each of the security feature segments 30a, 30b, 30c is surrounded by a closed line of weakness. Regardless of the direction from which one approaches this line of weakness during splitting, it will always tear, which means that the security feature segment in question cannot be separated from the other sublayer together with the sublayer surrounding the segment. Rather, the segments 30a, 30b, 30c remain on the second partial layer 12, as in the plan view of the second gap area 14 in FIG Fig. 18 is shown.
  • In the first Partial layer 11 results in holes 18a, 18b, 18c at the corresponding locations, as shown in FIG Fig. 17 can be seen, which shows a plan view of the first main surface 4 of the first partial layer 11.
  • FIG. 25 Another alternative crack variant is in Fig. 25 shown.
  • the carrier substrate 3 tears in the area of the security feature segments 30c, 50c at the weakening lines 45c, 55c, and the result is in FIG Fig. 19 indicated.
  • only part of the segment 30c would remain on the first partial layer 11, namely that in FIG Fig. 19 to the right of the dashed line.
  • the area to the left of the dashed line would be on the second partial layer 12 after the cleavage.
  • Another alternative variant is a completely uncontrolled tearing of the carrier substrate 3 in the area of the weakening lines 45c, 45c ', 55c, 55c', as in FIG Fig. 26 is indicated.
  • three partial areas of the segment 30c could be found on the first partial layer 11, and the remaining partial areas of the segment 30c could be found on the second partial layer 12.
  • the segment 30c would then be incomplete both on the first partial layer and on the second partial layer (denoted by 30d), that is to say with holes 18d.
  • Fig. 27 shows a partial area of a security paper 1 according to the invention in a plan view of the first main surface 4.
  • Fig. 28 represents a cross-section through the in Fig. 7 shown area of the security paper 1 along the line DD.
  • the security paper 1 has a carrier substrate 3, the first main surface 4 of which is equipped with weakening lines 46a, 46b, 46c, 46d, which extend into the volume of the carrier substrate 3 and the word " VOID "form.
  • the weakening lines are arranged in an area which has a conspicuous imprint 7 which hides the weakening lines from a viewer.
  • the imprint 7 is in Fig. 27 indicated by hatching.
  • Fig. 29 is a representation as in Fig. 28 , but after the cleavage of the carrier substrate 3 into a first sublayer 11 and a second sublayer 12. Since the letters V, O, I, D are each surrounded by a closed line that tears when splitting, they are when the first sublayer 11 is separated from of the second partial layer 12 detached from the first partial layer and remain on the second partial layer 12.
  • the imprint 7 tears at the weakening lines, ie the second partial layer 12 formed is labeled "VOID", formed from the areas 7a between the weakening line 46a, 7b between the weakening line 46b, 7c between the weakening line 46c and 7d between the weakening line 46d, as in FIG Fig. 31 shown.
  • the first partial layer 11 has the holes 19a, 19b, 19c, 19d at the corresponding locations, as in FIG Fig. 30 shown.

Landscapes

  • Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • Electromagnetism (AREA)
  • General Health & Medical Sciences (AREA)
  • Toxicology (AREA)
  • Engineering & Computer Science (AREA)
  • Manufacturing & Machinery (AREA)
  • Credit Cards Or The Like (AREA)
EP20020394.1A 2019-09-04 2020-09-01 Papier de sécurité et document de sécurité protégés contre la coupure Active EP3789207B1 (fr)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
DE102019006255.8A DE102019006255A1 (de) 2019-09-04 2019-09-04 Gegen Spaltung geschütztes Sicherheitspapier und Wertdokument

Publications (2)

Publication Number Publication Date
EP3789207A1 true EP3789207A1 (fr) 2021-03-10
EP3789207B1 EP3789207B1 (fr) 2022-08-10

Family

ID=72355737

Family Applications (1)

Application Number Title Priority Date Filing Date
EP20020394.1A Active EP3789207B1 (fr) 2019-09-04 2020-09-01 Papier de sécurité et document de sécurité protégés contre la coupure

Country Status (4)

Country Link
EP (1) EP3789207B1 (fr)
DE (1) DE102019006255A1 (fr)
ES (1) ES2926592T3 (fr)
PL (1) PL3789207T3 (fr)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050067497A1 (en) * 2003-09-26 2005-03-31 Robert Jones Optically variable security features having covert forensic features
EP1854641A2 (fr) 2006-05-12 2007-11-14 Giesecke & Devrient GmbH Billet de banque
WO2010072329A1 (fr) 2008-12-22 2010-07-01 Giesecke & Devrient Gmbh Support de données à zone transparente
DE102010053052A1 (de) * 2010-12-01 2012-06-06 Giesecke & Devrient Gmbh Datenträger mit Kennzeichnung
DE102010054852A1 (de) 2010-12-17 2012-06-21 Giesecke & Devrient Gmbh Mehrschichtiges Substrat, Verfahren zum Herstellen desselben und Wertdokument
EP3363652A1 (fr) * 2017-02-17 2018-08-22 Giesecke+Devrient Currency Technology GmbH Matériau de transfert d'éléments de sécurité et son procédé de fabrication

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7753262B2 (en) * 2006-04-28 2010-07-13 Blackhawk Network, Inc. Transaction card package assembly having enhanced security
DE102007050495A1 (de) * 2007-10-19 2009-04-23 Pav Card Gmbh Ausweisdokument
DE102008019092A1 (de) * 2008-04-16 2009-10-22 Giesecke & Devrient Gmbh Verfahren zur Herstellung eines Sicherheits- oder Wertdokuments
US8312655B2 (en) * 2009-12-01 2012-11-20 An-Hsia Liu Sticker with security arrangement
WO2014197573A1 (fr) * 2013-06-05 2014-12-11 Haemonetics Corporation Étiquette rfid cassante et procédé de production associé

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050067497A1 (en) * 2003-09-26 2005-03-31 Robert Jones Optically variable security features having covert forensic features
EP1854641A2 (fr) 2006-05-12 2007-11-14 Giesecke & Devrient GmbH Billet de banque
WO2010072329A1 (fr) 2008-12-22 2010-07-01 Giesecke & Devrient Gmbh Support de données à zone transparente
DE102010053052A1 (de) * 2010-12-01 2012-06-06 Giesecke & Devrient Gmbh Datenträger mit Kennzeichnung
DE102010054852A1 (de) 2010-12-17 2012-06-21 Giesecke & Devrient Gmbh Mehrschichtiges Substrat, Verfahren zum Herstellen desselben und Wertdokument
EP3363652A1 (fr) * 2017-02-17 2018-08-22 Giesecke+Devrient Currency Technology GmbH Matériau de transfert d'éléments de sécurité et son procédé de fabrication

Also Published As

Publication number Publication date
ES2926592T3 (es) 2022-10-27
DE102019006255A1 (de) 2021-03-04
PL3789207T3 (pl) 2022-10-03
EP3789207B1 (fr) 2022-08-10

Similar Documents

Publication Publication Date Title
EP1503903B1 (fr) Element de securite comprenant des couches metalliques
EP1432576B1 (fr) Papier de surete
EP1744899B1 (fr) Document de valeur
EP1458577B1 (fr) Element de securite et procede de fabrication associe
EP1458575B2 (fr) Element de securite pour papiers de secret et documents de valeur
EP2271501B1 (fr) Procédé de fabrication d un document de sécurité ou de valeur
DE10163381A1 (de) Sicherheitspapier sowie Verfahren und Vorrichtung zu seiner Herstellung
EP0998396A1 (fr) Document de securite
EP3075562A1 (fr) Élément de sécurité avec microstructure
DE10226116A1 (de) Sicherheitselement und Verfahren zu seiner Herstellung
WO2011154112A1 (fr) Support de données présentant une zone caractéristique
EP3215371A1 (fr) Support de données comprenant un élément de sécurité transparent
EP2753754B2 (fr) Procédé de fabrication d'un papier de sécurité et fil à microlentilles
EP2465703B1 (fr) Elément de sécurité à couleur variable structuré
EP3124284B1 (fr) Structures tactiles sur des objets de valeur
EP3789207B1 (fr) Papier de sécurité et document de sécurité protégés contre la coupure
EP2439074B1 (fr) Papier de sécurité doté de filigranes
EP3279006A1 (fr) Procédé de fabrication d'un élément de sécurité
EP1668606B1 (fr) Element de securite et son procede de production
DE102019007105A1 (de) Geschütztes Wertdokument und Verfahren zu seiner Herstellung
EP4219185A1 (fr) Film, bande de film, document de valeur et procédé de fabrication
WO2023078582A1 (fr) Matériau d'élément de sécurité de transfert et document de valeur comprenant un élément de sécurité
WO2024027883A1 (fr) Élément de sécurité pour document de valeur, présentant un motif de surface primaire optiquement variable et un motif de surface secondaire dissimulé, et son procédé de production
EP3231625A1 (fr) Traitement laser d'un revêtement comprenant des pigments à effets

Legal Events

Date Code Title Description
PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text: ORIGINAL CODE: 0009012

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: THE APPLICATION HAS BEEN PUBLISHED

AK Designated contracting states

Kind code of ref document: A1

Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR

AX Request for extension of the european patent

Extension state: BA ME

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: REQUEST FOR EXAMINATION WAS MADE

17P Request for examination filed

Effective date: 20210910

RBV Designated contracting states (corrected)

Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR

GRAP Despatch of communication of intention to grant a patent

Free format text: ORIGINAL CODE: EPIDOSNIGR1

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: GRANT OF PATENT IS INTENDED

INTG Intention to grant announced

Effective date: 20220310

GRAS Grant fee paid

Free format text: ORIGINAL CODE: EPIDOSNIGR3

GRAA (expected) grant

Free format text: ORIGINAL CODE: 0009210

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: THE PATENT HAS BEEN GRANTED

AK Designated contracting states

Kind code of ref document: B1

Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR

REG Reference to a national code

Ref country code: AT

Ref legal event code: REF

Ref document number: 1510241

Country of ref document: AT

Kind code of ref document: T

Effective date: 20220815

Ref country code: CH

Ref legal event code: EP

REG Reference to a national code

Ref country code: IE

Ref legal event code: FG4D

Free format text: LANGUAGE OF EP DOCUMENT: GERMAN

REG Reference to a national code

Ref country code: DE

Ref legal event code: R096

Ref document number: 502020001471

Country of ref document: DE

REG Reference to a national code

Ref country code: NL

Ref legal event code: FP

REG Reference to a national code

Ref country code: SE

Ref legal event code: TRGR

REG Reference to a national code

Ref country code: ES

Ref legal event code: FG2A

Ref document number: 2926592

Country of ref document: ES

Kind code of ref document: T3

Effective date: 20221027

REG Reference to a national code

Ref country code: LT

Ref legal event code: MG9D

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: RS

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20220810

Ref country code: PT

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20221212

Ref country code: NO

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20221110

Ref country code: LV

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20220810

Ref country code: LT

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20220810

Ref country code: FI

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20220810

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: IS

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20221210

Ref country code: HR

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20220810

Ref country code: GR

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20221111

RAP4 Party data changed (patent owner data changed or rights of a patent transferred)

Owner name: GIESECKE+DEVRIENT CURRENCY TECHNOLOGY GMBH

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: SM

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20220810

Ref country code: RO

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20220810

Ref country code: DK

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20220810

Ref country code: CZ

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20220810

REG Reference to a national code

Ref country code: DE

Ref legal event code: R097

Ref document number: 502020001471

Country of ref document: DE

REG Reference to a national code

Ref country code: BE

Ref legal event code: MM

Effective date: 20220930

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: SK

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20220810

Ref country code: MC

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20220810

Ref country code: EE

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20220810

PLBE No opposition filed within time limit

Free format text: ORIGINAL CODE: 0009261

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: NO OPPOSITION FILED WITHIN TIME LIMIT

P01 Opt-out of the competence of the unified patent court (upc) registered

Effective date: 20230520

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: LU

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20220901

Ref country code: AL

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20220810

26N No opposition filed

Effective date: 20230511

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: IE

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20220901

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: SI

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20220810

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: BE

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20220930

PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code: NL

Payment date: 20230920

Year of fee payment: 4

PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code: SE

Payment date: 20230921

Year of fee payment: 4

Ref country code: PL

Payment date: 20230823

Year of fee payment: 4

Ref country code: FR

Payment date: 20230918

Year of fee payment: 4

Ref country code: DE

Payment date: 20230930

Year of fee payment: 4

PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code: ES

Payment date: 20231019

Year of fee payment: 4

PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code: IT

Payment date: 20230930

Year of fee payment: 4

Ref country code: CH

Payment date: 20231001

Year of fee payment: 4

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: CY

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20220810

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: MK

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20220810

Ref country code: HU

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT; INVALID AB INITIO

Effective date: 20200901

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: TR

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20220810