EP3789207B1 - Gegen spaltung geschütztes sicherheitspapier und wertdokument - Google Patents

Gegen spaltung geschütztes sicherheitspapier und wertdokument Download PDF

Info

Publication number
EP3789207B1
EP3789207B1 EP20020394.1A EP20020394A EP3789207B1 EP 3789207 B1 EP3789207 B1 EP 3789207B1 EP 20020394 A EP20020394 A EP 20020394A EP 3789207 B1 EP3789207 B1 EP 3789207B1
Authority
EP
European Patent Office
Prior art keywords
main surface
carrier substrate
security
substrate
weakening line
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
EP20020394.1A
Other languages
German (de)
English (en)
French (fr)
Other versions
EP3789207A1 (de
Inventor
Rudolf Seidler
Dirk Essmann
André Gregarek
Patrick ENGELMANN
Annett Bähr
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Giesecke and Devrient Currency Technology GmbH
Original Assignee
Giesecke and Devrient Currency Technology GmbH
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Giesecke and Devrient Currency Technology GmbH filed Critical Giesecke and Devrient Currency Technology GmbH
Publication of EP3789207A1 publication Critical patent/EP3789207A1/de
Application granted granted Critical
Publication of EP3789207B1 publication Critical patent/EP3789207B1/de
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • BPERFORMING OPERATIONS; TRANSPORTING
    • B42BOOKBINDING; ALBUMS; FILES; SPECIAL PRINTED MATTER
    • B42DBOOKS; BOOK COVERS; LOOSE LEAVES; PRINTED MATTER CHARACTERISED BY IDENTIFICATION OR SECURITY FEATURES; PRINTED MATTER OF SPECIAL FORMAT OR STYLE NOT OTHERWISE PROVIDED FOR; DEVICES FOR USE THEREWITH AND NOT OTHERWISE PROVIDED FOR; MOVABLE-STRIP WRITING OR READING APPARATUS
    • B42D25/00Information-bearing cards or sheet-like structures characterised by identification or security features; Manufacture thereof
    • B42D25/30Identification or security features, e.g. for preventing forgery
    • B42D25/346Perforations
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B42BOOKBINDING; ALBUMS; FILES; SPECIAL PRINTED MATTER
    • B42DBOOKS; BOOK COVERS; LOOSE LEAVES; PRINTED MATTER CHARACTERISED BY IDENTIFICATION OR SECURITY FEATURES; PRINTED MATTER OF SPECIAL FORMAT OR STYLE NOT OTHERWISE PROVIDED FOR; DEVICES FOR USE THEREWITH AND NOT OTHERWISE PROVIDED FOR; MOVABLE-STRIP WRITING OR READING APPARATUS
    • B42D25/00Information-bearing cards or sheet-like structures characterised by identification or security features; Manufacture thereof
    • B42D25/40Manufacture
    • B42D25/405Marking
    • B42D25/41Marking using electromagnetic radiation

Definitions

  • the invention relates to a security paper for producing a document of value, a document of value, in particular a banknote, and a method for producing the security paper and the document of value.
  • the security paper and the value document are designed in such a way that at least one of the surfaces of the security paper or the value document is damaged in the event of a split in the plane of the paper.
  • foil composite banknotes ie banknotes which have a paper layer embedded between two plastic layers
  • foil composite banknotes which have a paper layer embedded between two plastic layers
  • Such thin areas are created during papermaking by suction of the former web. It is disclosed that when the foil composite banknotes are attempted to be split, these foil composite banknotes tear in an undefined manner, so that no usable banknote halves are produced.
  • the DE 10 2010 053 052 A1 discloses a security paper according to the preamble of claim 1.
  • the security paper of the present invention does not have a film composite substrate, but the carrier substrate is a paper substrate, preferably a pure paper substrate.
  • a paper substrate within the meaning of this invention is understood to mean any flat substrate based on paper which is not embedded between two film layers covering the entire surface of the substrate.
  • a pure paper substrate is not completely covered by a film on either of its two surfaces (main surfaces).
  • both the paper substrate and the pure paper substrate can have a single-ply or multi-ply design.
  • the security paper according to the invention has the paper substrate, i.e. the carrier substrate, and at least one security feature (also referred to as a security element or authenticity feature) on or in the carrier substrate, by means of which it can be checked for authenticity. It can have further security features on or in the carrier substrate and/or further elements which serve purposes other than the identification of authenticity, for example imprinted names or electronic components.
  • the security paper can have the dimensions of the document of value to be produced from it or be in the form of a web or a sheet with numerous individual copies. It can be used specifically for the production of a specific value document or it can be the basis for the production of several different value documents which have in common that they have at least one security feature that is identical.
  • Value documents within the meaning of the present invention are, for example, banknotes, stocks, bonds, certificates, vouchers, checks, lottery tickets, high-value entry tickets, passports, other identity cards, credit cards, authorization cards and other flat objects of value, such as packaging for high-quality products.
  • the object of the present invention is to provide such a security paper or document of value with a paper substrate as the carrier substrate, which cannot be split in the plane of the paper without damaging at least one of the partial layers formed during the splitting so that it is unusable for counterfeiting purposes. Both sub-layers produced during the cleavage should preferably be unusable for counterfeiting purposes.
  • the object of the present invention is also to provide a method for producing such a security paper or document of value.
  • the objects are achieved by the security paper, the document of value and the method for producing the security paper or document of value with the features as specified in claims 1, 12, 13, 15 and 16.
  • the invention is based on the idea that the sub-layers of a value-document substrate produced during a split can only be used for counterfeiting if the security feature contained on or in the sub-layers or the security features are undamaged.
  • the invention therefore aims to design documents of value in such a way that when the substrate is split, at least one security feature on or in a partial layer of the document of value, preferably at least one security feature on or in each of the partial layers of the document of value, is inevitably destroyed.
  • the paper substrate is provided with lines of weakness which emanate from one of the main faces (surfaces) of the paper substrate and extend a certain distance essentially perpendicularly into the volume of the paper substrate towards the opposite main face (surface). of the paper substrate.
  • the lines of weakness must not extend through the entire thickness of the paper substrate the substrate would otherwise become too destabilized or fall apart.
  • the security feature is arranged on the main area (surface) of the value-document substrate from which the lines of weakness emanate, or in the volume of the paper substrate, in such a way that it at least partially overlaps the lines of weakness. If a split is attempted, the paper substrate tears at the lines of weakness. A security feature whose adhesion to the paper substrate is greater than its tear strength then also tears, with the result that after the cleavage it is partly on (or in the volume of) one substrate sublayer and partly on (or in the volume) of the other substrate sublayer. Tear-resistant security features and/or security features with insufficient adhesion properties can be designed as a "puzzle", i.e. they consist of security feature parts that adjoin one another in the area of the weakening lines and form the security feature in their entirety.
  • the lines of weakness can be produced in various ways, for example by embossing the paper substrate during its manufacture in the wet state on the paper machine or shortly thereafter.
  • the weakening lines can be produced on the “finished” paper substrate, for example by laser beam cutting, laser beam ablation, water jet cutting, compressed air cutting, mechanical cutting—in particular with cutting plates or cylinders, or one-sided punching.
  • the preferred method for producing the weakening lines is laser beam cutting.
  • the lines of weakness produced are generally at least 10 ⁇ m, or preferably at least 20 ⁇ m, wide.
  • Typical lines of weakness produced by laser have a width in the range of 50 to 200 ⁇ m and have a height variation of more than 2% of the substrate depth at the edge. So they are clearly frayed at the edge.
  • Gas lasers in particular a CO 2 laser, or a solid-state laser, in particular an Nd:YAG laser, are preferably used as the laser.
  • Laser power preferably ranges from about 250 W to about 500 W, and preferred laser wavelengths range between 9 ⁇ m and 11 ⁇ m.
  • Exemplary cutting speeds are 2000 mm/s to 20,000 mm/s, preferably 5,000 to 12,000 mm/s.
  • the depth of the weakening lines cannot be specified in the form of an absolute number range, since it depends on the substrate thickness. It also plays a role whether the weakening lines extend into the volume of the substrate only starting from one main surface or starting from both main surfaces, and what arrangement relative to one another have weakening lines starting from both main surfaces. Lines of weakness emanating from both main surfaces, which are arranged offset, can be deeper than lines of weakness emanating from both main surfaces, which converge or almost converge.
  • the lines of weakness must be sufficiently deep to ensure that the paper substrate will tear at the lines of weakness if attempted to cleave, but not so deep as to result in destabilization of the paper substrate.
  • a weakening line depth can be used as a guideline from 30 to 90% of the thickness of the paper substrate, preferably from 33 to 66% of the thickness of the paper substrate.
  • the caliper of the paper substrate is the distance between the two opposite major surfaces of the paper substrate.
  • the lines of weakness emanating from a main surface of a paper substrate can be the same or different in terms of their depth and/or width and/or length and/or their shape in plan view of the main surface and have the same or different distances from one another.
  • the weakening lines can be of identical design or differ from one main surface to the next in terms of depth and/or width and/or length and/or shape.
  • each weakening line in plan view of a main surface of the paper substrate, is in principle arbitrary, for example straight, curved, angled, spiral, crossing, continuous or with interruptions.
  • the more complex and angled the shape of the weakening line or lines of weakness the more difficult it is to split the paper substrate.
  • closed-shape lines of weakness a shape where "start” and "end” coincide
  • the areas of paper surrounded by the line with the security feature thereon remain open upon cleaving one of the two substrate sub-layers formed, while a hole is formed at the corresponding point in the other substrate sub-layer.
  • a security paper or a document of value can, however, additionally contain one or more further weakening lines which are not necessarily combined with a security feature, but for which the same applies with regard to their shape, arrangement and manufacture as for the weakening lines combined with a security feature.
  • Such additional lines of weakness are preferably provided at those points on a document of value where attempts to split usually begin, namely at the edges and in particular at the corners of a document of value.
  • weakening lines on edges and/or corners of a value document can also be combined with a security feature, or weakening lines which are not combined with a security feature can be provided in an inner main surface area of the value document.
  • All weakening lines are very narrow compared to their length, ie they are real lines, not flat areas.
  • a single weakening line can be very long and have a course that extends over any large area of the security paper or document of value. Therefore, a single line of weakness, in a multiple tortuous form, can have the same effect as numerous short lines of weakness.
  • the weakening lines are (also) adapted to a non-central and/or sub-layer-independent splitting of the substrate.
  • the weakening lines are chosen appropriately in terms of their depth and/or width and/or their shape and/or arrangement (to one another or to the main surfaces).
  • the substrate would essentially be divided into two sub-layers of substrate of equal thickness.
  • a non-central splitting of the substrate ie in which one of the two partial substrate layers covers less than 40% of the substrate thickness, is possible and can be taken into account by appropriate selection of the above parameters of the weakening lines.
  • the weakening lines are preferably also adapted to a partial layer-independent cleavage that is not based on the partial layers.
  • Weakening lines in a paper substrate are usually recognizable to an observer at least in transmitted light, from a certain line width and depth also in reflected light. Visibility can be desirable and beneficial.
  • lines of weakness can also serve as design elements. The lines of weakness can thus be adapted in order to be recognizable to the viewer either only in transmitted light or in reflected light and in transmitted light. It can then be particularly advantageous to produce a discoloration during the lasering of the weakening lines, which can be seen in transmitted light and/or reflected light.
  • the laser wavelength, power, cutting speed and substrate can be coordinated to produce the discoloration in the weakened line.
  • a substrate with ammonium octamolybdate is particularly suitable here.
  • a corresponding discoloration then occurs at a laser wavelength of 10.6 ⁇ m, a laser power of 4000 watts and a cutting speed of 6000 mm/s.
  • Alternative combinations of parameters for simultaneous staining and cutting are well known, for example from WO 2010/072329 A1 .
  • weakening lines in the present sense are not cutting lines that extend completely through the substrate, as are used, for example, in the document mentioned to represent recognizable motifs.
  • weakening lines In most cases, however, it is rather undesirable for an observer to recognize the position and shape of weakening lines. Rather, it can be desirable to form weakening lines in such a way that they are not perceived by an observer in reflected light (from both sides of the document of value), in particular neither in reflected light nor in transmitted light. Such invisibility can be achieved by making the lines of weakness very narrow, i.e., with a width that is below the resolution limit of the human eye. The resolution limit of the human eye is around 50 ⁇ m. In the ideal case, the lines of weakness are not only designed in such a way that they are not perceived by the viewer, but that they are not recognizable to the viewer even if they are aware of their existence (and their position).
  • the weakening lines can be equipped with camouflage. Conspicuously structured and/or opaque and/or brightly colored security features or imprints come into consideration as such camouflage.
  • the weakening lines can be filled, for example with a lacquer or an ink acceptance layer.
  • the weakening lines can be kept easily recognizable or camouflaged by filling, at least in reflected light.
  • camouflage in transmitted light requires a much more precise matching of the filling material to the substrate in terms of color and opacity.
  • the filling is expediently carried out before the security feature is provided.
  • Water-based or solvent-based paints paints that dry physically (by evaporation of the solvent drying paints) and hardening paints are equally suitable.
  • at least 20% by volume of the lines of weakness should be filled, with more than 50% by volume fill being preferred.
  • the recognisability of the weakening lines is all the more reduced the more completely the weakening lines are filled.
  • a filling of 100 percent by volume is therefore most preferred if the lines of weakness are to be as difficult to detect as possible.
  • At least some of the weakening lines are combined with at least one security feature (authentication feature).
  • security features known for ensuring the authenticity of documents of value can be used, although care must be taken that the security feature does not, or at least not significantly, impede the tearing of the paper substrate in the event of an attempt at cleavage. Therefore, security features that contain comparatively tear-resistant foils or tough lacquers are not suitable for the purpose of the invention unless they are used in a structured form.
  • structured form means that the relevant security features are composed of sections whose contours are at least partially congruent with the course of the weakening lines.
  • the sections can then either be arranged so that they are immediately adjacent to each other so that a security feature arranged over a line of weakness hides the line of weakness from an observer, or they can be arranged spaced apart so that a security feature arranged over a line of weakness does not cover the line of weakness , which is why it may be recognizable to a viewer.
  • Machine-detectable security features and visually recognizable security features are equally suitable.
  • machine-detectable security features are electrically conductive metallic structures and magnetic security features.
  • visually recognizable security features are colored areas, fluorescent features, metallization, diffractive structures, matt structures, holograms.
  • Security features that are applied in the form of a liquid composition such as an ink to a surface of a work document, for example printed on, are particularly advantageous. These include, for example, magnetic inks, colored inks and inks with fluorescent pigments that fluoresce when exposed to light of a specific wavelength.
  • Security features combined with one or more lines of weakness can be arranged on one or both main surfaces of the carrier substrate and/or in the volume of the carrier substrate.
  • the security features can be subdivided in a way that is recognizable to an observer or, in the case of machine-detectable features, can be subdivided in a way that is recognizable for a detection unit.
  • paper substrates are suitable as the paper substrate.
  • a paper substrate is to be understood as meaning flat materials made of any type of paper or paper-like material.
  • Paper substrates can therefore, in addition to fibers made from cotton and/or cellulose, also contain a proportion of plastic fibers or even consist entirely of plastic fibers.
  • Preferred synthetic fibers are polyester or polyamide fibers.
  • a paper substrate can be single-ply or multi-ply.
  • the individual layers can consist of the same or different types of paper.
  • the thickness of the paper substrate depends on the type of document of value that is to be produced from it. Regardless of the absolute thickness of the paper substrates, this thickness is essentially identical over the entire extent of a paper substrate. Furthermore, in the case of the paper substrates to be used according to the invention, both main faces (surfaces) are essentially planar.
  • a security paper according to the invention is produced by providing a carrier substrate with a first main surface and a second main surface, forming at least one weakening line in the first main surface, which line extends into the carrier substrate but does not reach the second main surface, and attaching at least a security feature on the first major surface such that it at least partially overlaps the line of weakness.
  • At least one weakening line is preferably also formed on the second main surface and a security feature is applied to the second main surface in such a way that it at least partially overlaps the weakening line on the second main surface.
  • the lines of weakness are preferably formed by means of laser cutting.
  • a security feature is first applied to the first main surface, preferably also to the second main surface, and then the lines of weakness are formed, again preferably by laser cutting.
  • the security feature or security features should be in a structured form, ie it should be linear Have interruptions, the course of which follows the laser when cutting the weakening lines in the carrier substrate.
  • the weakening lines are formed in one or in both main surfaces of the carrier substrate during the production of the carrier substrate. Thereafter, a security feature is applied to the first main surface and possibly also a security feature to the second main surface in such a way that it at least partially overlaps the line of weakness or the lines of weakness.
  • the security feature is introduced into the paper substrate during the production of the paper substrate.
  • the lines of weakness in one of the two main surfaces or in both main surfaces can also be formed during manufacture of the paper substrate or alternatively formed in one or both main surfaces of the paper substrate after completion of the paper substrate with the security feature therein, for example by laser cutting.
  • a document of value is then produced from the security paper in that the security paper is provided with further security features, imprints or other elements that are characteristic of a specific document of value and is cut to the desired shape and size.
  • Carrier substrates are flat structures that naturally have two main surfaces, which are usually referred to as the top and bottom.
  • the upper side is also referred to as the first main surface, while the lower side is referred to as the second main surface.
  • a main surface of the carrier substrate or of the paper substrate or simply of the "substrate” is at the same time a main surface of the security paper and the document of value.
  • This in 1 Value document 2 shown has two security features 20, 23 which are located on the surface, ie the first main surface of the carrier substrate.
  • the security feature 20 is an imprint of the value number 100, the imprint containing fluorescent pigments which fluoresce when irradiated with light of a specific wavelength.
  • Each of the digits is surrounded on its outer circumference by a weakening line which extends perpendicularly into the carrier substrate from the first main surface but does not extend through the entire carrier substrate.
  • the security feature 23 is a metalized hologram which is arranged over a tortuous line of weakness 22 which also extends from the first main surface of the carrier substrate a certain distance into the volume of the carrier substrate.
  • the weakening lines 24, 25 on the edges and the weakening lines 26, 27, 28, 29 on the corners of the value document are preferably each formed on both main surfaces of the carrier substrate and extend each from one major surface to the opposite major surface.
  • the lines of weakness can have any shape, as indicated by the different shapes of the in 1 shown weakening lines is indicated. Angled or nested lines of weakness or lines of weakness in general with a complex course are preferred, since the more complex the course of the lines of weakness, the more difficult it is to split.
  • Lines of weakness can be made either visible to a viewer or invisible to a viewer. If a value document has numerous weakening lines, an attempt will usually be made to make at least some of these weakening lines invisible, if only so as not to overload the value document. This is useful, for example, for weakening lines on corners and edges. Weakening lines, the sole purpose of which is to destroy a security feature in an unpredictable manner when the document of value is attempted to be split, are also advantageously made invisible.
  • the weakening lines can also be designed to be particularly conspicuous, for example by being filled with a printing ink, and thus at the same time serve as an authenticity feature of the document of value.
  • Such a variant is represented by the weakening lines 21 in the first main surface 4 of the in 1 illustrated document of value 2 represents. In an attempt to split at least one of the resulting sub-layers and part of the ink tears, and thus the security feature is lost.
  • the dot-dash line 10 illustrates the plane in which the carrier substrate 3 would be split in the event of a cleavage attack, indicated by the arrows to the left and right of the carrier substrate.
  • the dash-dotted line 10 is only in the middle of the thickness here and also in the following figures of the substrate. In principle, however, a cleavage attack can also be carried out off-centre, for example at a height of 20%, 30% or 40% of the substrate thickness.
  • the carrier substrate 3 is split into a first partial substrate layer 11 and a second partial substrate layer 12 , a first cleavage surface 13 being formed on the first partial substrate layer 11 and a second cleavage surface 14 being formed on the second partial substrate layer 12 .
  • the depth of the weakening line 31 is not sufficient for the cleavage attack shown to lead to the carrier substrate 3 tearing.
  • the first partial substrate layer 11 tears at the corresponding point, and the attempt at cleavage has therefore failed.
  • An attempt to split the carrier substrate 3 from the opposite side, in 3 indicated by the arrow pointing to the carrier substrate, would also lead to failure of the attempt at cleavage, since in this case the first partial substrate layer 11 would tear at the weakening line 33 .
  • the weakening lines 32 and 33 thus act against the attempt at cleavage--shown here in the middle--although only the weakening line 33 extends with its depth into or through the cleavage plane 10.
  • FIG. A security feature (not shown here) initially arranged on the surface 4 (or arranged in the volume of the upper substrate half) is thus partly on (or in) the first partial substrate layer 11 and partly on (or in) of the second substrate sub-layer 12 lie.
  • the first substrate sub-layer 11 does not have to end at the weakening line 32, but can continue behind the second weakening line 33, for example.
  • Narrow lines of weakness such as lines of weakness 34a, 34b and 34c have a width of less than 20 ⁇ m. Such narrow lines of weakness are easier to hide from the human eye than wide lines of weakness such as lines 34d, 34e and 34f.
  • the lines of weakness 34e, 34f have a width of more than 50 ⁇ m and are preferably produced by laser cutting or laser ablation.
  • the weakening lines 34a, 34c may not be deep enough to result in the carrier substrate tearing in the event of a cleavage attack (indicated by the arrows pointing to the carrier substrate 3).
  • weakening lines with a depth like the weakening lines 34d, 34e can lead to a destabilization of the carrier substrate 3. According to a particularly preferred embodiment, therefore, the depth of the lines of weakness emanating from one of the surfaces of the substrate is about 33 to 66% of the distance between the two surfaces of the substrate.
  • destabilization of the carrier substrate can be prevented by using in the area of the endangered points one of the two surfaces Stabilizing foil patches are attached to the carrier substrate or the areas of the vulnerable areas are coated with a stabilizing composition such as a tough paint.
  • a stabilizing composition such as a tough paint.
  • figure 5 shows a portion of a carrier substrate 3 with weakening lines 35, 36 in the first main surface 4 of the carrier substrate.
  • Line of weakness 35 is a continuous line of varying depth
  • line of weakness 36 is discontinuous, ie, has breaks. This is over 6 can be seen showing a cross-section through the in figure 5 illustrated carrier substrate 3 shows along the line AA.
  • the locations of the weakening line 35 at the cutting line of the carrier substrate are denoted by 35a, 35b, 35c, 35d and 35e.
  • the discontinuous weakening line 36 has an interruption in the area of the cutting line AA. Weakening lines of varying depth as well as weakening lines with interruptions can easily be produced by laser cutting by varying the power and/or the cutting speed of the laser or by periodically switching the laser on and off.
  • the Figures 7 and 8 12 show partial areas of carrier substrates 3 in cross section, weakening lines being formed in each case on both surfaces of the carrier substrates.
  • the weakening lines 37a to 37f formed in the first main surface 4 have different widths and different depths
  • the weakening lines 57a to 57f formed in the second main surface 5 have different depths.
  • the lines of weakness 37c, 37d and 37e formed in the first main surface 4 are opposite to the lines of weakness 57c, 57d and 57e formed in the second main surface 5, so their depth must be less than that of the other lines of weakness, which are staggered.
  • the lines of weakness 37f and 57f which are arranged offset to one another, but are comparatively deep and come close to each other in the lateral direction, could lead to destabilization of the carrier substrate in the corresponding area. It is therefore preferred, in the case of weakening lines of greater depth which emanate from both opposite main surfaces of the carrier substrate, to ensure an offset arrangement with sufficient distances between the weakening lines.
  • a sufficient distance is at least 20%, preferably at least 50%, of the thickness of the carrier substrate.
  • Such an arrangement is exemplified in 8 shown.
  • weakening lines originating from the same main surface must also be spaced far enough apart that the carrier substrate is not destabilized.
  • the weakening lines 38a to 38e are formed in the first main surface 4 and the weakening lines 58a to 58d are formed in the second main surface 5. All weakening lines extend into the volume of the carrier substrate 3 by a distance which is approximately 60% of the substrate thickness. However, the individual weakening lines are spaced far enough from one another that the carrier substrate 3 is not destabilized. The weakening line depths, widths and distances tolerated by a specific carrier substrate can easily be determined by means of a few preliminary tests.
  • Support substrates that have lines of weakness on both major surfaces cannot be cleaved into substrate sublayers, at least one of which has an intact surface, even if a counterfeiter were to succeed in splitting off-center.
  • the carrier substrate would then not be cleaved in a plane which lies approximately in the middle between the two opposite surfaces, but the cleavage plane would be strongly shifted in the direction of one of the two surfaces.
  • FIGS 9 to 12 each show a partial area of a security paper 1 according to the invention in cross section.
  • the security paper 1 shown has weakening lines 39a to 39e in the illustrated area only in the first main surface 4 of the carrier substrate 3.
  • the weakening lines are filled, for example with a varnish 6 in the color of the security paper.
  • the weakening lines 39c, 39d and 39e are additionally equipped with a security feature in the form of an imprint 7.
  • the carrier substrate tears at the weakening lines and thereby destroys the imprint 7.
  • the cleavage attempt does not result in a partial substrate layer with a complete imprint 7 due to the weakening lines, but only a partial substrate layer with parts of the security feature.
  • the weakening lines are largely invisible to an observer, not only in reflected light but also in transmitted light, including the weakening lines 39a, 39b that are not overprinted.
  • the illustrated embodiment of a security paper 1 according to the invention also has weakening lines only on one main surface of the carrier substrate 3, the weakening lines 41a to 41e.
  • the area of the weakening lines is printed with an ink acceptance layer 8, which penetrates at least partially into the volume of the weakening lines 41a to 41e and at least partially fills them.
  • a print layer 7 is printed onto the ink acceptance layer 8 and is destroyed if the carrier substrate 3 tears at one or more of the weakened lines 41a to 41e during an attempt to split. In this case, only part of the printed layer 7 remains on the upper sub-layer of the substrate, while the rest of the printed layer 7 after the cleavage together with the newly created one second gap surface 14 forms the surface of the lower substrate part layer.
  • the weakening lines 41a to 41e cannot be perceived by an observer since they are printed with the security feature 7 and are at least partially filled with the ink-accepting layer 8 . The more complete the fill, the more invisible a line of weakness becomes to a viewer.
  • the security feature 7 is not recognizable to an observer divided, in 11 illustrated security paper 1 this security feature for an observer divided into the areas 7a to 7f easily recognizable.
  • the division is carried out by the weakening lines 42a to 42e, which are shown in FIG 11 illustrated embodiment are not filled, and are therefore easily recognizable for an observer. If these weakening lines tear, the security feature is divided into areas that are located on the first substrate sublayer and areas that are located on the second substrate sublayer.
  • the weakening lines 42b and 42d act so that after the attempt at cleavage the areas 7a, 7b, 7e and 7f (and 7c) of the security feature on the upper substrate sublayer and the areas 7c and 7d (or 7d) of the security feature lie on the lower substrate sub-layer.
  • the security feature 7 is a thin, transparent lacquer layer with luminescent pigments that luminesce when irradiated with light of a defined wavelength. Because of its transparency, the lacquer layer is from a viewer barely perceptible under ambient light.
  • the machine-detectable security feature 16 is a thin, electrically conductive metallization that is divided into partial areas 16a to 16d by the weakening lines 43c, 43d and 43e.
  • the weakening lines 43c, 43d and 43e are filled as completely as possible with an electrically non-conductive paint 6 with a similar shade to the metallization 16, so that an observer cannot see the division of the metallization 16.
  • the division of the metallization into segments 16a to 16d remains detectable for the mechanical detection of the electrical conductivity.
  • the line of weakness 43a is not filled, and the line of weakness 43b is partially filled with the transparent imprint 7 .
  • These weakened lines remain easily recognizable for an observer, at least in transmitted light, while the other weakened lines are not recognizable for an observer either in incident light or in transmitted light.
  • the carrier substrate 3 tears at the weakening lines, which means that after the splitting, a part of the metallization 16 and the luminescence layer 7 is located on each of the two substrate sublayers that have formed. Both the visually recognizable security feature and the machine-detectable security feature were therefore destroyed by the cleavage attempt.
  • the Figures 13 and 14 illustrate a security paper 1 in which the security feature is not located on a surface of the carrier substrate 3 but in the volume of the carrier substrate 3 .
  • 13 shows a portion of a corresponding security paper 1 in supervision, and 14 shows this area in cross-section along the line BB of the illustration of FIG 13 .
  • the carrier substrate 3 of the security paper 1 has a magnetic security element 17 which is divided into segments 17a, 17b, 17c and 17d in a machine-detectable manner.
  • the segments 17a to 17d are represented by dotted lines.
  • weakening lines 44a and 44b which are formed in the first main surface 4 of the carrier substrate 3
  • weakening lines 59a and 59b which are formed in the second main surface 5 of the carrier substrate 3 are formed.
  • Lines of weakness 44a and 59a surround segment 17a
  • lines of weakness 44b and 59b surround segment 17c.
  • the weakening lines are arranged in such a way that 2 weakening lines are exactly opposite each other.
  • the distance between two opposite weakening lines is preferably about 20 to 40% of the thickness of the carrier substrate 3.
  • 15 shows a region of a security paper 1 according to the invention, which has a security feature combined with weakening lines both on the first main surface and on the second main surface, in a plan view of the first main surface of the carrier substrate or security paper.
  • 16 shows a cross section through the in 15 illustrated area of the security paper along line CC.
  • the Figures 17 to 22 each show top views of pairs of sub-layers, which in an attempt to split the in 15 illustrated security paper can arise, and the Figures 23 to 26 show the respective crack locations in the carrier substrate 3.
  • the security paper 1 shown has a security feature 30 in the form of the printed value number "100" on its first main surface 4 and a security feature 50 in the form of a value number "100" that is also printed on it. In the illustrated embodiment, the prints are applied so that they partially overlap.
  • the denomination 100 on the first main surface 4 is shown with solid lines, while the denomination 100 on the second main surface 5 is shown in dotted lines.
  • Security feature 30 consists of segments 30a, 30b and 30c and security feature 50 consists of segments 50a, 50b and 50c. How out 15 As can be seen, segments 30c and 50c are congruent.
  • each of the security feature segments 30a, 30b, 30c and the security feature segments 50a, 50b, 50c is surrounded by a weakening line that runs directly on the outer circumference of the respective security feature segment. If one tries to split such a security paper in a plane 10, which runs between the first main surface and the second main surface of the security paper, in order to obtain two partial layers 11, 12, one finds that none of the partial layers obtained is suitable for to be combined with a counterfeit banknote to give it the appearance of authenticity. Some possible cleavage outcomes are illustrated below.
  • Figures 23 to 26 are representations as in 16 , but the weakening lines are more precisely identified and possible tear points are marked as blackened areas.
  • the segment 30a is surrounded by the line of weakness 45a, 45a'
  • the segment 30b is surrounded by the line of weakness 45b, 45b'
  • the segment 30c is surrounded by the line of weakness 45c, 45c'
  • the segment 50a is surrounded by the weakening line 55a, 55a'
  • the segment 50b is surrounded by the weakening line 55b, 55b'
  • the segment 50c is surrounded by the weakening line 55c, 55c'.
  • the parallel dashed areas between the ends of the weakening lines and the cleavage plane drawn in by dot-dash lines denote the areas whose tearing is to be expected in the event of a cleavage.
  • a cleavage can result in cracks at the weakening lines 45a, 45a', 45b, 45b', 45c, 45c', 55a, 55a' and 55b, 55b' ( 23 ).
  • the resulting substrate layers are in the Figures 17 and 18 shown.
  • FIGs 17 and 18 show the security feature 30 after the security paper has been split into a first partial substrate layer 11 and a second partial substrate layer 12.
  • Top views of the first main surface 4 and the second main surface 14 resulting from the splitting are shown (cf. 3 ).
  • Each of the security feature segments 30a, 30b, 30c is surrounded by a closed line of weakness. Irrespective of the direction from which this weakening line is approached during splitting, it will always tear, with the result that the relevant security feature segment cannot be separated from the other partial layer together with the partial layer surrounding the segment. Rather, the segments 30a, 30b, 30c remain on the second partial layer 12, as in the plan view of the second gap surface 14 in 18 is shown.
  • holes 18a, 18b, 18c are formed at the corresponding points, as shown in FIG 17 can be seen, which shows a top view of the first main surface 4 of the first partial layer 11 .
  • Another alternative crack variant is in 25 shown.
  • the carrier substrate 3 tears in the area of the security feature segments 30c, 50c at the weakening lines 45c, 55c, and the result is in 19 implied.
  • only part of the segment 30c would remain on the first sub-layer 11, namely the in 19 area to the right of the dashed line.
  • the area to the left of the dashed line would be on the second sub-layer 12 after cleavage.
  • a further alternative variant is a completely uncontrolled tearing of the carrier substrate 3 in the area of the weakening lines 45c, 45c', 55c, 55c', as in 26 is indicated. This would give cleavage results as exemplified in the Figures 21 and 22 are shown. For example, three portions of the segment 30c could be found on the first sublayer 11 after the split, and the remaining portions of the segment 30c could be found on the second sublayer 12. The segment 30c would then be incomplete (designated 30d) on both the first sub-layer and the second sub-layer, ie with holes 18d.
  • FIG. 27 shows a portion of a security paper 1 according to the invention in a plan view of the first main surface 4.
  • 28 represents a cross-section through the in 7 represented area of the security paper 1 along the line DD.
  • the security paper 1 has a carrier substrate 3, whose first main surface 4 is equipped with weakening lines 46a, 46b, 46c, 46d, which extend into the volume of the carrier substrate 3 and the word " form VOID".
  • the lines of weakness are located in an area having prominent printing 7 which hides the lines of weakness from an observer.
  • the imprint 7 is in 27 indicated by hatching.
  • the carrier substrate 3 tears at the weakening lines 46a, 46b, 46c, 46d, and the counterfeiter receives partial layers 11, 12, as shown in 29 are shown.
  • V, O, I, D are each surrounded by a closed line that tears when splitting, they become detached when the first partial layer 11 is separated from of the second partial layer 12 are detached from the first partial layer and remain on the second partial layer 12.
  • the imprint 7 tears at the weakening lines, i.e. the second partial layer 12 formed bears the inscription "VOID", formed by the areas 7a between the line of weakness 46a, 7b between the line of weakness 46b, 7c between the line of weakness 46c and 7d between the line of weakness 46d, as in FIG 31 shown.
  • the first partial layer 11, on the other hand has the holes 19a, 19b, 19c, 19d at the corresponding points, as shown in FIG 30 shown.
  • Cleavage tests were carried out on documents of value according to the invention, which were manufactured by methods and with materials used in the manufacture of genuine banknotes.
  • the cleavage tests have shown that by cleavage of documents of value that are equipped with lines of weakness according to the invention, no partial layers can be obtained that can be used for counterfeiting purposes.

Landscapes

  • Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • Electromagnetism (AREA)
  • General Health & Medical Sciences (AREA)
  • Toxicology (AREA)
  • Engineering & Computer Science (AREA)
  • Manufacturing & Machinery (AREA)
  • Credit Cards Or The Like (AREA)
EP20020394.1A 2019-09-04 2020-09-01 Gegen spaltung geschütztes sicherheitspapier und wertdokument Active EP3789207B1 (de)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
DE102019006255.8A DE102019006255A1 (de) 2019-09-04 2019-09-04 Gegen Spaltung geschütztes Sicherheitspapier und Wertdokument

Publications (2)

Publication Number Publication Date
EP3789207A1 EP3789207A1 (de) 2021-03-10
EP3789207B1 true EP3789207B1 (de) 2022-08-10

Family

ID=72355737

Family Applications (1)

Application Number Title Priority Date Filing Date
EP20020394.1A Active EP3789207B1 (de) 2019-09-04 2020-09-01 Gegen spaltung geschütztes sicherheitspapier und wertdokument

Country Status (4)

Country Link
EP (1) EP3789207B1 (es)
DE (1) DE102019006255A1 (es)
ES (1) ES2926592T3 (es)
PL (1) PL3789207T3 (es)

Family Cites Families (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7389939B2 (en) * 2003-09-26 2008-06-24 Digimarc Corporation Optically variable security features having covert forensic features
US7753262B2 (en) * 2006-04-28 2010-07-13 Blackhawk Network, Inc. Transaction card package assembly having enhanced security
DE102006022703A1 (de) * 2006-05-12 2007-11-15 Giesecke & Devrient Gmbh Banknote
DE202007019197U1 (de) * 2007-10-19 2011-01-20 Pav Card Gmbh Ausweisdokument
DE102008019092A1 (de) * 2008-04-16 2009-10-22 Giesecke & Devrient Gmbh Verfahren zur Herstellung eines Sicherheits- oder Wertdokuments
DE102009011424A1 (de) * 2008-12-22 2010-07-01 Giesecke & Devrient Gmbh Datenträger mit Durchsichtsbereich
US8312655B2 (en) * 2009-12-01 2012-11-20 An-Hsia Liu Sticker with security arrangement
DE102010053052A1 (de) * 2010-12-01 2012-06-06 Giesecke & Devrient Gmbh Datenträger mit Kennzeichnung
DE102010054852A1 (de) * 2010-12-17 2012-06-21 Giesecke & Devrient Gmbh Mehrschichtiges Substrat, Verfahren zum Herstellen desselben und Wertdokument
WO2014197573A1 (en) * 2013-06-05 2014-12-11 Haemonetics Corporation Frangible rfid tag and method of producing same
DE102017001598A1 (de) * 2017-02-17 2018-08-23 Giesecke+Devrient Currency Technology Gmbh Sicherheitselement-Transfermaterial und Verfahren zum Herstellen desselben

Also Published As

Publication number Publication date
PL3789207T3 (pl) 2022-10-03
DE102019006255A1 (de) 2021-03-04
EP3789207A1 (de) 2021-03-10
ES2926592T3 (es) 2022-10-27

Similar Documents

Publication Publication Date Title
EP1503903B1 (de) Sicherheitselement mit metallbeschichtungen
EP1432576B1 (de) Sicherheitspapier
EP1744899B1 (de) Wertdokument
EP2271501B1 (de) Verfahren zur herstellung eines sicherheits- oder wertdokuments
EP1458577B1 (de) Sicherheitselement und verfahren seiner herstellung
EP1458575B2 (de) Sicherheitselement für sicherheitspapiere und wertdokumente
DE10163381A1 (de) Sicherheitspapier sowie Verfahren und Vorrichtung zu seiner Herstellung
EP0998396A1 (de) Sicherheitsdokument
DE10226116A1 (de) Sicherheitselement und Verfahren zu seiner Herstellung
EP2342084A1 (de) Verfahren zur herstellung eines sicherheits- oder wertdokuments
EP3215371A1 (de) Datenträger mit durchsichtssicherheitselement
EP2753754B2 (de) Verfahren zur herstellung eines sicherheitspapiers und mikrolinsenfaden
EP1748905A1 (de) Wert-und sicherheitsdokument und verfahren zu seiner herstellung
EP2465703B1 (de) Strukturiertes Colorshift-Sicherheitselement
EP3124284B1 (de) Taktile strukturen auf wertgegenständen
EP3789207B1 (de) Gegen spaltung geschütztes sicherheitspapier und wertdokument
EP2439074B1 (de) Sicherheitspapier mit Wasserzeichen
EP3279006A1 (de) Verfahren zum herstellen eines sicherheitselementes
EP1668606B1 (de) Sicherheitselement und verfahren zur herstellung desselben
EP4219185A1 (de) Folie, folienbahn, wertdokument und verfahren zur herstellung der solchen
DE102019007105A1 (de) Geschütztes Wertdokument und Verfahren zu seiner Herstellung
EP3231625A1 (de) Laserung einer beschichtung mit effektpigmenten

Legal Events

Date Code Title Description
PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text: ORIGINAL CODE: 0009012

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: THE APPLICATION HAS BEEN PUBLISHED

AK Designated contracting states

Kind code of ref document: A1

Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR

AX Request for extension of the european patent

Extension state: BA ME

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: REQUEST FOR EXAMINATION WAS MADE

17P Request for examination filed

Effective date: 20210910

RBV Designated contracting states (corrected)

Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR

GRAP Despatch of communication of intention to grant a patent

Free format text: ORIGINAL CODE: EPIDOSNIGR1

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: GRANT OF PATENT IS INTENDED

INTG Intention to grant announced

Effective date: 20220310

GRAS Grant fee paid

Free format text: ORIGINAL CODE: EPIDOSNIGR3

GRAA (expected) grant

Free format text: ORIGINAL CODE: 0009210

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: THE PATENT HAS BEEN GRANTED

AK Designated contracting states

Kind code of ref document: B1

Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR

REG Reference to a national code

Ref country code: AT

Ref legal event code: REF

Ref document number: 1510241

Country of ref document: AT

Kind code of ref document: T

Effective date: 20220815

Ref country code: CH

Ref legal event code: EP

REG Reference to a national code

Ref country code: IE

Ref legal event code: FG4D

Free format text: LANGUAGE OF EP DOCUMENT: GERMAN

REG Reference to a national code

Ref country code: DE

Ref legal event code: R096

Ref document number: 502020001471

Country of ref document: DE

REG Reference to a national code

Ref country code: NL

Ref legal event code: FP

REG Reference to a national code

Ref country code: SE

Ref legal event code: TRGR

REG Reference to a national code

Ref country code: ES

Ref legal event code: FG2A

Ref document number: 2926592

Country of ref document: ES

Kind code of ref document: T3

Effective date: 20221027

REG Reference to a national code

Ref country code: LT

Ref legal event code: MG9D

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: RS

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20220810

Ref country code: PT

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20221212

Ref country code: NO

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20221110

Ref country code: LV

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20220810

Ref country code: LT

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20220810

Ref country code: FI

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20220810

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: IS

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20221210

Ref country code: HR

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20220810

Ref country code: GR

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20221111

RAP4 Party data changed (patent owner data changed or rights of a patent transferred)

Owner name: GIESECKE+DEVRIENT CURRENCY TECHNOLOGY GMBH

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: SM

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20220810

Ref country code: RO

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20220810

Ref country code: DK

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20220810

Ref country code: CZ

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20220810

REG Reference to a national code

Ref country code: DE

Ref legal event code: R097

Ref document number: 502020001471

Country of ref document: DE

REG Reference to a national code

Ref country code: BE

Ref legal event code: MM

Effective date: 20220930

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: SK

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20220810

Ref country code: MC

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20220810

Ref country code: EE

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20220810

PLBE No opposition filed within time limit

Free format text: ORIGINAL CODE: 0009261

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: NO OPPOSITION FILED WITHIN TIME LIMIT

P01 Opt-out of the competence of the unified patent court (upc) registered

Effective date: 20230520

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: LU

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20220901

Ref country code: AL

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20220810

26N No opposition filed

Effective date: 20230511

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: IE

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20220901

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: SI

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20220810

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: BE

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20220930

PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code: NL

Payment date: 20230920

Year of fee payment: 4

PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code: SE

Payment date: 20230921

Year of fee payment: 4

Ref country code: PL

Payment date: 20230823

Year of fee payment: 4

Ref country code: FR

Payment date: 20230918

Year of fee payment: 4

Ref country code: DE

Payment date: 20230930

Year of fee payment: 4

PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code: ES

Payment date: 20231019

Year of fee payment: 4

PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code: IT

Payment date: 20230930

Year of fee payment: 4

Ref country code: CH

Payment date: 20231001

Year of fee payment: 4

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: CY

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20220810