KR20170025856A - Manufacturing method for a overlap security pattern and a printed article manufactured by the same method - Google Patents

Manufacturing method for a overlap security pattern and a printed article manufactured by the same method Download PDF

Info

Publication number
KR20170025856A
KR20170025856A KR1020150122918A KR20150122918A KR20170025856A KR 20170025856 A KR20170025856 A KR 20170025856A KR 1020150122918 A KR1020150122918 A KR 1020150122918A KR 20150122918 A KR20150122918 A KR 20150122918A KR 20170025856 A KR20170025856 A KR 20170025856A
Authority
KR
South Korea
Prior art keywords
security pattern
background
notation
security
latent
Prior art date
Application number
KR1020150122918A
Other languages
Korean (ko)
Inventor
지우행
김명용
최병규
Original Assignee
한국조폐공사
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 한국조폐공사 filed Critical 한국조폐공사
Priority to KR1020150122918A priority Critical patent/KR20170025856A/en
Publication of KR20170025856A publication Critical patent/KR20170025856A/en

Links

Images

Classifications

    • BPERFORMING OPERATIONS; TRANSPORTING
    • B42BOOKBINDING; ALBUMS; FILES; SPECIAL PRINTED MATTER
    • B42DBOOKS; BOOK COVERS; LOOSE LEAVES; PRINTED MATTER CHARACTERISED BY IDENTIFICATION OR SECURITY FEATURES; PRINTED MATTER OF SPECIAL FORMAT OR STYLE NOT OTHERWISE PROVIDED FOR; DEVICES FOR USE THEREWITH AND NOT OTHERWISE PROVIDED FOR; MOVABLE-STRIP WRITING OR READING APPARATUS
    • B42D25/00Information-bearing cards or sheet-like structures characterised by identification or security features; Manufacture thereof
    • B42D25/40Manufacture
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B41PRINTING; LINING MACHINES; TYPEWRITERS; STAMPS
    • B41MPRINTING, DUPLICATING, MARKING, OR COPYING PROCESSES; COLOUR PRINTING
    • B41M3/00Printing processes to produce particular kinds of printed work, e.g. patterns
    • B41M3/14Security printing
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B42BOOKBINDING; ALBUMS; FILES; SPECIAL PRINTED MATTER
    • B42DBOOKS; BOOK COVERS; LOOSE LEAVES; PRINTED MATTER CHARACTERISED BY IDENTIFICATION OR SECURITY FEATURES; PRINTED MATTER OF SPECIAL FORMAT OR STYLE NOT OTHERWISE PROVIDED FOR; DEVICES FOR USE THEREWITH AND NOT OTHERWISE PROVIDED FOR; MOVABLE-STRIP WRITING OR READING APPARATUS
    • B42D25/00Information-bearing cards or sheet-like structures characterised by identification or security features; Manufacture thereof
    • B42D25/20Information-bearing cards or sheet-like structures characterised by identification or security features; Manufacture thereof characterised by a particular use or purpose
    • B42D25/23Identity cards
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B42BOOKBINDING; ALBUMS; FILES; SPECIAL PRINTED MATTER
    • B42DBOOKS; BOOK COVERS; LOOSE LEAVES; PRINTED MATTER CHARACTERISED BY IDENTIFICATION OR SECURITY FEATURES; PRINTED MATTER OF SPECIAL FORMAT OR STYLE NOT OTHERWISE PROVIDED FOR; DEVICES FOR USE THEREWITH AND NOT OTHERWISE PROVIDED FOR; MOVABLE-STRIP WRITING OR READING APPARATUS
    • B42D25/00Information-bearing cards or sheet-like structures characterised by identification or security features; Manufacture thereof
    • B42D25/20Information-bearing cards or sheet-like structures characterised by identification or security features; Manufacture thereof characterised by a particular use or purpose
    • B42D25/29Securities; Bank notes
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B42BOOKBINDING; ALBUMS; FILES; SPECIAL PRINTED MATTER
    • B42DBOOKS; BOOK COVERS; LOOSE LEAVES; PRINTED MATTER CHARACTERISED BY IDENTIFICATION OR SECURITY FEATURES; PRINTED MATTER OF SPECIAL FORMAT OR STYLE NOT OTHERWISE PROVIDED FOR; DEVICES FOR USE THEREWITH AND NOT OTHERWISE PROVIDED FOR; MOVABLE-STRIP WRITING OR READING APPARATUS
    • B42D25/00Information-bearing cards or sheet-like structures characterised by identification or security features; Manufacture thereof
    • B42D25/30Identification or security features, e.g. for preventing forgery

Abstract

The method of manufacturing an overlaid security pattern according to the present invention and the latent image printed matter produced by the method include a first security pattern forming step of forming a first security pattern on one side of a substrate 100, A superimposed security pattern forming step of superimposing the first and second security patterns on each other to form an overlapping security pattern, and a superimposed security pattern forming step of forming a superimposed security pattern on one side of the substrate 100, And a latent image identification step of identifying a first security pattern and a second security pattern by contacting a dedicated filter on the first security pattern.

Description

Technical Field [0001] The present invention relates to a method of manufacturing a superimposed security pattern and a latent image print produced by the same,

BACKGROUND OF THE INVENTION 1. Field of the Invention [0001] The present invention relates to a method of manufacturing an overlaid security pattern and a latent image printed thereon, and more particularly to a method of manufacturing an overlaid security pattern in which a security pattern is not visually recognized, .

Various special methods have been applied to products that require security such as banknotes, checks, coins, securities, bonds, passports, various ID cards and secret documents in order to prevent forgery and falsification.

However, according to recent developments in IT technology, there is a demand for security products such as banknotes, checks, certificates, and security documents in accordance with the improvement of resolution and reproducibility of computers, scanners, printers, multifunctional apparatuses, The crime that is easily copied or reproduced is increasing.

In order to solve such a problem, various methods for preventing forgery and falsification have been developed. Methods of using ultraviolet inks, infrared inks, magnetic inks, or holograms that can be easily identified visually have been attempted, which have various special functions, and in the case of coins, a serrated shape is formed on the outer surface, Method to prevent forgery and falsification.

In order to prevent forgery and falsification, a method of preventing forgery or falsification by using a halftone dot, a figure, a large halftone dot and a small halftone dot as a method of preventing latent images by copying or using moiré stripes by overlapping line grids And it is preventing forgery and falsification by checking a specific security pattern.

As a method for preventing forgery and falsification, Korean Patent Registration No. 1119653 discloses a method for authenticating a document and an article using a moire pattern by superimposing a base layer and an exposed layer on each other.

For example, the base layer has a pattern having a specific shape, and the exposed layer has an exposed line grating to form a moire pattern by superimposing the base layer and the exposed layer, and then comparing the reference moire pattern with the reference moire pattern to be.

In addition, in order to solve the above problems, Korean Patent Registration No. 1260723 discloses a method of forming a latent image on a latent image formed by a bottom background pattern and a plurality of halftone dots, which are arranged in a lattice pattern through a plurality of transverse longitudinal direction strips, A method for confirming whether or not falsification has occurred is described.

However, the conventional technologies have a certain security effect by forming a security pattern using a single pattern, but their functions are weakened in view of forgery and felony crimes that become increasingly sophisticated due to the rapid development of various office equipment and digital devices.

In order to create a security pattern by superimposing a plurality of security patterns to form a security pattern, it is impossible to easily identify by visual inspection, electronic devices such as a copying machine or a computer, There is a need for a method that can prevent forgery and falsification that can be reliably identified.

Korean Registered Patent No. 1119653 (March 16, 2012) Korean Patent No. 1260723 (Feb.

SUMMARY OF THE INVENTION Accordingly, the present invention has been made keeping in mind the above problems occurring in the prior art, and it is an object of the present invention to provide an overlay security pattern in which two or more security patterns are overlapped at the same position The present invention is intended to provide a method of manufacturing an overlaid security pattern capable of implementing a difficult security pattern and capable of distinguishing authenticity of a security pattern configured in a latent image print only through a dedicated filter and further enhancing security.

In order to accomplish the above object, there is provided a method of manufacturing an overlaid security pattern and a latent image printed thereon, the method comprising: forming a second security pattern on one surface of the base material; An overlapping security pattern forming step of overlapping the first security pattern and the second security pattern to form an overlapping security pattern; And a latent image identification step of identifying a first security pattern and a second security pattern by contacting a special filter on an overlapping security pattern formed on one surface of the base material 100. [

In the method of manufacturing an overlaid security pattern according to the first exemplary embodiment of the present invention and the latent image printed matter produced by the method, And a third security pattern forming step of forming a third security pattern.

In the method of manufacturing an overlapping security pattern according to the first embodiment of the present invention and the latent image printed matter produced by the method, the first security pattern forming step may include a step of forming the first security pattern, Wherein the second security pattern forming step includes the first latent space table and the second security pattern includes the second background notation table and the second latent space table, The pattern forming step overlaps the first background notation 110 and the second background notation 130 and overlaps the first latent space reference table 120 and the second latent space reference table 140 with each other. do.

In the method of manufacturing an overlapping security pattern according to the first embodiment of the present invention and the latent image printed matter produced thereby, the first background notation 110 of the first security pattern and the first latent non- Wherein the first background non-mark 110 of the first security pattern and the first latent image non-standard table 120 have the same screen angle and the same printing angle as each other, but are different from each other, 2 security pattern of the second background non-mark 130 and the second latent-phase non-mark 140 of the second security pattern are configured in the same shape, and the screen background of the second background non- The first security pattern and the second security pattern have different patterns and printing angles from each other.

In the method of manufacturing an overlapping security pattern according to the first embodiment of the present invention and the latent image printed matter produced thereby, the first background notation 110 of the first security pattern and the first background notation 110 of the second security pattern 2 background notation 130 is configured identically and the first latent space reference table 120 of the first security pattern and the second latent space reference table 140 of the second security pattern are configured differently .

Also, in the method of manufacturing an overlapping security pattern according to the first embodiment of the present invention and the latent image printed matter produced by the method, the third security pattern forming step may include: The third latent space table and the third latent space table include the third latent space table and the third latent space table, and the third latent space table and the third latent space table include the first latent space table and the first latent space table, (130) and the second latent image table (140) are constituted.

Also, in the method of manufacturing an overlaid security pattern according to the first exemplary embodiment of the present invention and the latent image printed matter produced thereby, the first security pattern, the second security pattern, and the third security pattern may be dot, line, , A character, and a picture.

Also, in the method of manufacturing an overlaid security pattern according to the first exemplary embodiment of the present invention and the latent image printed matter produced by the method, the dedicated filter may further include the first security pattern, the second security pattern, The first dedicated filter 200, the second dedicated filter 210 and the third dedicated filter 220,

In addition, in the method of manufacturing an overlaid security pattern according to the first embodiment of the present invention and the latent image printed matter produced thereby, the dedicated filter may include the first security pattern, the second security pattern, And a transparent film or a lenticular film having a polygonal grating on which line gratings capable of generating optical interference with the third security pattern are formed.

In addition, in the method of manufacturing an overlaid security pattern according to the first embodiment of the present invention and the latent image printed matter produced thereby, the base material 100 is made of any one selected from paper, film, plastic and metal .

In the method of manufacturing a superimposed security pattern according to the second embodiment of the present invention and the latent image printed matter produced thereby, it is preferable that the first security pattern is the first background pattern 110 in the first security pattern formation step Wherein the second security pattern includes the second latent image table 140 and the second latent image table 140 is formed by patterning only the outline shape of the non-table .

Also, in the method of manufacturing an overlaid security pattern according to the second embodiment of the present invention and the latent image printed matter produced thereby, in the second security pattern formation step, the second latent image table 140 partially or entirely Size, and shape, or two or more selected from among the two, in comparison with the first background notation 110 configured in the second security pattern.

In the method of manufacturing a superposed security pattern according to the second embodiment of the present invention and the latent image printed matter produced by the method, the second security pattern forming step may include a step of forming the second latent image non- 200), and the first dedicated filter (200) is formed in a structure corresponding to the remaining area of the substrate (100) except for the area where the first background special table (110) of the first security pattern is formed .

In addition, the latent image printing is produced by the method of producing an overlaid security pattern according to the present invention.

Thus, according to the present invention, by forming an overlapping security pattern in which two or more security patterns are superimposed on the same position on the latent-image printed matter, it is possible to implement a security pattern hard to be visually recognized, It can be identified only through a dedicated filter, and it has a higher-order and more security-enhancing effect.

1 is a perspective view showing a first background special table 110 according to a first embodiment of the present invention;
2 is a sectional view showing a first security pattern according to the first embodiment of the present invention
3 is a sectional view showing a second background special table 130 according to the first embodiment of the present invention
4 is a cross-sectional view showing a second security pattern according to the first embodiment of the present invention
5 is a cross-sectional view illustrating an overlapping security pattern according to the first embodiment of the present invention
FIG. 6 is a cross-sectional view illustrating the first security pattern according to the first embodiment of the present invention in contact with the first dedicated filter 200 to identify the latent image
FIG. 7 is a cross-sectional view showing the process of identifying a latent image by contacting a second dedicated filter 210 with a second security pattern according to the first embodiment of the present invention
8 is a cross-sectional view showing a third security pattern according to the first embodiment of the present invention
9 is a cross-sectional view showing the third security pattern according to the first embodiment of the present invention in contact with the third dedicated filter 220 to identify the latent image
10 is a side view showing a case 300 according to the first embodiment of the present invention.
11 is a side view showing one side of a case according to the first embodiment of the present invention
12 is a perspective view showing a first background special table 110 according to a second embodiment of the present invention.
13 is a perspective view showing a second security pattern according to the second embodiment of the present invention.
14 is a cross-sectional view showing an overlapping security pattern according to the second embodiment of the present invention
15 is a sectional view showing a modification of the second latent image reference table 140 according to the second embodiment of the present invention
16 is a sectional view showing a first dedicated filter 200 according to a second embodiment of the present invention
17 is a cross-sectional view showing the process of identifying the latent image by contacting the first dedicated filter 200 with the overlapping security pattern according to the second embodiment of the present invention

BEST MODE FOR CARRYING OUT THE INVENTION Hereinafter, a method of manufacturing an overlapped security pattern according to the present invention will be described in more detail with reference to the embodiments and the accompanying drawings.

The following embodiments and drawings are provided as examples for allowing a person skilled in the art to sufficiently convey the spirit of the present invention. Further, it is to be understood that, unless otherwise defined, technical terms and scientific terms used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this invention belongs. Descriptions of known functions and configurations that may be unnecessarily blurred are omitted.

(Method of Manufacturing Overlapped Security Pattern - First Embodiment)

A method of fabricating an overlaid security pattern according to a first exemplary embodiment of the present invention is directed to a method for fabricating an overlaid security pattern by superimposing a plurality of security patterns capable of utilizing moire interference phenomenon at the same position within a certain area of a substrate .

The Moire interference phenomenon is an interference fringe formed when two or more periodic patterns are overlapped. This is because the patterns formed on the first pattern layer and the patterns formed on the second pattern layer, based on the so-called beating phenomenon, This phenomenon is referred to as a moiré effect.

The method for fabricating the overlapping security pattern according to the first embodiment of the present invention includes a first security pattern formation step, a second security pattern formation step, an overlapping security pattern formation step, and a dedicated filter identification step.

The form of each security pattern forming the overlapping security pattern is composed of a layer type including a background nonvisual and a latent nonvisual.

In this case, the non-mark refers to a line or dot that is printed on the printed matter, and refers to a fine dot created by the screen printing process for reproducing a photograph or an illustration having a continuous gradation as a printed matter, (Tint).

The types of the background nonvisual table and the latent nonvisual table constituting the security pattern may be any one of a dot, a line, a graphic, a letter, and a picture.

However, the shape of the background non-standard and the shape of the latent non-standard to form each security pattern may be equal to each other so that the background non-standard and the latent non-standard may play a role of deceptive pattern, thereby increasing the hiding power of the security pattern.

Here, the security pattern refers to the ability to identify authenticity by applying to banknotes, checks, trust certificates, securities, identification cards, passports, documents, and product recognition methods.

In the first security pattern forming step, a first security pattern is formed on one side of the base material 100, and the first security pattern includes a first background non-mark 110 and a first latent image non-mark 120.

FIG. 1 shows the first background special table 110 according to the first embodiment of the present invention.

As shown in FIG. 1, a plurality of first background special marks 110 are arranged and printed in one direction on one side of the substrate 100.

Here, the substrate 100 is made of any one material selected from the group consisting of paper, film, plastic and metal.

In addition, printing is not limited to positioning the ink on the substrate 100, and may be accomplished by forming a pattern on the substrate 100, such as photolithography, exposure, etching, ink jet, pigment sublimation, And the present invention is not limited thereto.

In this case, although a plurality of first background special marks 110 are arranged and printed in one direction on one side of the substrate 100, the present invention is not limited thereto, and a plurality of The first background special table 110 of the first background can be arranged and printed in the left and right directions or in the directions inclined in the left and right directions.

In addition, the first background special marks 110 may be printed on one surface of the base material 100 in a direction perpendicular to the left-right direction.

2 is a cross-sectional view illustrating a first security pattern according to a first embodiment of the present invention.

2, a first latent image reference table 120 is formed on a predetermined area of the first background reference table 110 formed on one surface of the base 100, and the first background reference table 110 and the first background non- 1 < / RTI > latent-matter non-standard table (120).

As described above, the first background non-mark 110 and the first latent image non-mark 120 are formed in the same shape, so that the first background non-mark 110 and the first latent image non- 120) can play a role of deceptive pattern mutually.

At this time, the screen density of the first background non-mark 110 and the first latent image non-mark 120 and the printed angle between the first background non-mark 110 and the first latent image non-mark 120 may be designed to be the same, The first background non-reference mark 110 and the first latent mark non-mark 120 may be designed differently.

Here, the screen density refers to the density of lines and dots at the time of printing on the screen, and the line per inch (LPI) refers to the unit of the letter spacing in the vertical direction in the printer, Lt; / RTI >

In the second security pattern formation step, a second security pattern is formed on one side of the substrate 100 on which the first security pattern is formed.

The second security pattern includes a second background reference table 130 and a second latent image reference table 140.

FIG. 3 is a sectional view showing a second background special table 130 according to the first embodiment of the present invention, and FIG. 4 is a cross-sectional view illustrating a second security pattern according to the first embodiment of the present invention.

As shown in FIG. 3, a plurality of second background special marks 130 are arranged and printed in one direction on one side of the substrate 100.

4, a plurality of second latent space marks 140 are arranged and printed in a predetermined direction on a predetermined area of the second background non-mark 130 formed on one surface of the base 100 to form a second security pattern .

More specifically, a second background non-mark 130 is formed on the first security pattern, a second latent image non-mark 140 is formed on a predetermined area of the second background non-mark 130, The second latent image table 130 and the second latent image table 140 are formed.

The method for constructing the second background notation 130 and the second latent notation table 140 in the second security pattern comprises constructing the first background notation 110 and the first latent notation table 120 of the first security pattern May be the same as the method of FIG.

That is, the second background non-mark 120 and the second latent-phase non-mark 130 are formed in the same shape, and the screen density of the second background non-mark 130 and the second latent- The printed angle between the non-mark 120 and the second latent mark non-mark 140 may be designed to be the same, and the positions of the second non-mark mark 130 and the second latent mark non-mark 140 may be designed differently.

The first background notation 110 and the first latent space reference table 120 and the second background reference table 130 and the second latent space notation 140 of the first and second security patterns are the same It can be designed differently. However, in order to improve the hiding power, it is more preferable to design the same type of the background special table and the latent image special table of the security pattern. Here, the security pattern means the first security pattern and the second security pattern, respectively, but the present invention is not limited thereto.

The first background notation 110 of the first security pattern and the second background notation 130 of the second security pattern are designed to be the same but the first latent notation table 120 of the first security pattern And the second latent-phase reference table 140 of the second security pattern are designed differently.

The overlapping security pattern forming step forms an overlapping security pattern by overlapping the first security pattern and the second security pattern.

5 is a cross-sectional view illustrating an overlapping security pattern according to a first embodiment of the present invention.

The first background notation 110 and the first latent notation table 120 configured in the first security pattern are printed, the second background notation 130 and the second latent notation table 140 configured in the second security pattern, May be printed at different angles, preferably at an angle symmetrical to each other.

In the overlapping security pattern forming step, the second background notation 130 and the second latent notation table 140 of the second security pattern are set to the first background notation 110 and the first latent notation table 120 of the first security pattern, As shown in FIG.

The second background notation 130 of the second security pattern is formed between the first background notation 110 of the first security pattern and the second latent notation table 140 of the second security pattern is formed between the first background notation 110 and the second background non- And between the first latent image marks 120 of the first security pattern P1.

In the latent image identification step, an exclusive filter is contacted with the overlapping security pattern formed by overlapping the first and second security patterns to identify the first and second security patterns, respectively.

6 is a cross-sectional view showing that a first dedicated filter 200 is brought into contact with a first security pattern according to the first embodiment of the present invention to identify a latent image, and FIG. 7 is a cross- And the second dedicated filter 210 is contacted to the security pattern to identify the latent image.

As shown in FIGS. 6 to 7, the first dedicated filter 200 corresponding to the first security pattern may be contacted to identify the latent-image non-mark of the first security pattern, The corresponding second dedicated filter 210 may be contacted to identify the latent-image index of the second security pattern P2.

As described above, in the method of manufacturing an overlapping security pattern according to the first embodiment of the present invention, an overlapping security pattern in which two or more security patterns are superimposed on the same position of the base material 100 is formed, And each security pattern can be authenticated only through a dedicated filter, thereby enhancing security.

In addition, the method of manufacturing an overlapping security pattern according to the first embodiment of the present invention may further include a third security pattern forming step between the overlapping security pattern forming step and the latent image identifying step.

8 is a cross-sectional view illustrating a third security pattern according to the first embodiment of the present invention.

As shown in FIG. 8, the third security pattern forming step further forms a third security pattern on one side of the base material 100 in which the first and second security patterns are overlapped.

The third security pattern may include a third latent image table 150 formed on one surface of the base material 100 and a third latent image table 160 formed on a predetermined area of the third background non- .

The third background notation 150 and the third latent nottable 160 of the third security pattern may be constructed by combining the first background notation 110 and the first latent notation table 120 of the first security pattern, 2 security pattern of the second security pattern 140 and the second latent-phase non-security table 160 of FIG.

That is, the third background non-mark 150 and the third latent image non-mark 160 are formed in the same shape, and the screen densities of the third background non-mark 150 and the third latent image non- Same, but the players can be configured differently.

The third background non-standard table 150 and the third latent non-standard table 160 configured in the third security pattern may be the same as the first background non-standard table 110 and the first latent non- The non-mark 130 and the second latent mark non-mark 140).

In addition, the player of the third background notation 150 of the third security pattern is designed to be identical to the player of the background notation 110 of the first security pattern and the player of the second background notation 130 of the second security pattern , The player of the third latent flag table 160 of the third security pattern is different from the player of the first latent flag table 120 of the first security pattern and the player of the second latent flag table 140 of the second security pattern Can be designed.

The third background notation 150 and the third latent nottable 160 formed in the third security pattern are set so that the first background notation 110 and the first latent notation table 120 configured in the first security pattern are printed Angle and the angle at which the second background reference mark 130 and the second latent image reference 140 configured in the second security pattern are printed.

That is, when the superimposed security pattern is formed by superimposing the first security pattern, the second security pattern, and the third security pattern on one surface of the substrate 100, The second security pattern may be printed obliquely to the right symmetrically with the first security pattern and the third security pattern may be printed between the first security pattern and the second security pattern.

For example, if the first security pattern is printed on the base material 100 at an angle of 45 degrees, the second security pattern may be printed at a 135 degree angle symmetrically with respect to the printed angle of the first security pattern And the third security pattern may be printed in a 90-degree angle which is the center of the angle at which the first security pattern and the second security pattern are printed.

The third background non-standard table 150 and the third latent image non-standard table 160 configured in the third security pattern are formed in the first security pattern 110 and the first background non- May be designed to be in the same area or other area as the non-table 120 (or the second background notation 130 and the second latent notation table 140 of the second security pattern).

Also, a third background notation 150 of the third security pattern formed on one side of the base 100 is located between the first background notation 110 and the second background notation 130, The third latent image non-mark 160 of the pattern may be located between the first latent image non-mark 120 and the second latent image non-

The method of fabricating the overlapping security pattern according to the first exemplary embodiment of the present invention may further include forming at least one third security pattern as necessary to form an overlapping security pattern further comprising a plurality of third security patterns can do. The method of designing the third security pattern formed at this time may be the same as the designing method of the second security pattern and the third security pattern.

As described above, in the dedicated filter discrimination step, a dedicated filter is provided by the number of the configuration patterns (for example, the first security pattern, the second security pattern, and the third security pattern) configured in the overlapping security pattern, It is possible to identify a configuration pattern for forming the overlapping security pattern by contacting the overlapping security pattern formed on one surface of the substrate 100 with the dedicated filter.

The dedicated filter may include a first dedicated filter 200, a second dedicated filter 210, and a third dedicated filter 220 that respectively identify the first security pattern, the second security pattern, and the third security pattern. have.

In this case, each of the dedicated filters may be designed to have different angles with respect to the dedicated filters so that optical interference may occur by contacting the corresponding security patterns.

FIG. 9 is a cross-sectional view illustrating a process of identifying a latent image by contacting a third dedicated filter 220 to a third security pattern according to the first exemplary embodiment of the present invention.

As shown in FIG. 9, the third dedicated filter for identifying the third security pattern has a different structure from the first dedicated filter 200 and the second dedicated filter 210.

The latent image printed matter can be manufactured by pressing one side of the base material on which the overlaid security pattern according to the first preferred embodiment of the present invention is formed to the printed matter.

Accordingly, the present invention forms an overlapping security pattern in which two or more security patterns are superimposed on the same position on the substrate in the latent image printed matter, thereby realizing a security pattern that is hard to be visually recognized, and the authenticity of the security pattern configured in the latent- There is an effect that can be identified only through a dedicated filter.

Meanwhile, the case 300 having the latent image printed therein may be provided with the dedicated filter on one side of the case 300.

FIG. 10 is a side view showing the case 300 according to the first embodiment of the present invention, and FIG. 11 is a side view showing one side of the case 300 according to the first embodiment of the present invention. For example, as shown in FIGS. 10 to 11, a configuration pattern (e.g., the first security pattern, the second security pattern, and the third security pattern) for forming the overlapping security pattern formed on the latent- The first dedicated filter for identifying the first security pattern is formed outside the cover of the case 300 and the second dedicated filter for identifying the second security pattern is formed in the case 300 And the third dedicated filter for identifying the third security pattern may be formed under the case 300 to identify latent-image marks formed on each security pattern.

(Method of Manufacturing Overlapped Security Pattern - Second Embodiment)

The method for fabricating the overlaid security pattern according to the second preferred embodiment of the present invention is the same as the method for fabricating the overlaid security pattern according to the first preferred embodiment of the present invention, The security pattern may include a first background notation 110 and the second security pattern may include a second latent notation table 140 in the second security pattern forming step.

12 is a perspective view showing a first background special table 110 according to a second embodiment of the present invention.

As shown in FIG. 12, in the second security pattern forming step, the first background special marks 110 are arranged and printed in the entire area of one surface of the base 100, And forms a first security pattern including a non-standard.

13 is a perspective view showing a second latent image reference table 140 according to the second embodiment of the present invention.

13, in the second security pattern forming step according to the second embodiment of the present invention, a second latent image reference mark 140 is displayed on a surface of the base member 100 in a pattern of only the outline form of the non- And forms a second security pattern including the second latent-phase non-standard table 140.

14 is a cross-sectional view illustrating an overlapping security pattern according to a second embodiment of the present invention.

As shown in FIG. 14, in the overlapping security pattern forming step, an overlapping security pattern is formed by overlapping the first and second security patterns.

15 is a cross-sectional view showing a modification of the second latent image table 140 according to the second embodiment of the present invention.

As shown in FIG. 15, some or all of the second latent space reference table 140 configured in the second security pattern may be divided into a first background reference table 110 configured in the first security pattern, position, size, Two or more selected ones may be modified.

Also, in the overlapping security pattern forming step, the third security pattern may be additionally formed in the second security pattern to form an overlapping security pattern.

In the dedicated filter discrimination step, dedicated filters are provided as many as the number of security patterns forming the overlapping security pattern, and the first security pattern, the second security pattern and the third security pattern forming the overlapping security pattern are identified The dedicated filter is the first dedicated filter 200, the second dedicated filter 210, and the third dedicated filter 220, respectively, The latent image formed on the pattern can be confirmed.

16 is a cross-sectional view showing the first dedicated filter 200 according to the second embodiment of the present invention.

16, the dedicated filter is formed on one surface of the substrate 100 in the same area as the area where the first security pattern is formed, and the remaining area except the first security pattern is formed in the form of the dedicated filter . That is, the margin of the first security pattern corresponds to the area of the first dedicated filter 200.

FIG. 17 is a cross-sectional view illustrating the latent image by contacting the first dedicated filter 200 with the overlapping security pattern according to the second embodiment of the present invention.

As shown in FIG. 17, when the dedicated filter is brought into contact with the superimposed security pattern, the configuration patterns (for example, the first security pattern, the second security pattern, and the third security pattern) The exclusive filter identifies each of the first latent image non-mark 120, the second latent image non-mark 140 and the third latent image non-mark 160, thereby confirming whether the image is forged or not.

The latent image printed matter can be produced by printing according to the method of manufacturing the overlaid security pattern according to the second preferred embodiment of the present invention, and the manufacturing method can be the same as that of the first embodiment.

The case 300 may be provided with a dedicated filter for identifying the superimposed security pattern formed on the latent image printed matter on one side of the case 300 and may be provided together with the case 300, The method may be the same as the first embodiment.

Meanwhile, in the method of fabricating an overlapping security pattern according to the present invention, the overlapping security pattern can be formed by applying the design method of the first embodiment described above and the design method of the second embodiment together on one side of the substrate 100 have.

It will be understood by those skilled in the art that various changes in form and details may be made therein without departing from the spirit and scope of the invention as defined by the appended claims.

100: substrate
110: 1st background
120: 1st latent mark
130: The second background criterion
140: Second latent image mark
150: The third background mark
160: Third latent mark
200: First dedicated filter
201: first dedicated filter line
210: second dedicated filter
220: Third dedicated filter
300: Case

Claims (14)

Forming a first security pattern on one side of the substrate (100);
A second security pattern forming step of forming a second security pattern on one surface of the substrate 100;
An overlapping security pattern forming step of overlapping the first security pattern and the second security pattern to form an overlapping security pattern; And
A latent image identification step of identifying a first security pattern and a second security pattern by contacting a dedicated filter on an overlapping security pattern formed on one surface of the base material 100;
The method comprising the steps of:
The method according to claim 1,
A third security pattern formation step of forming a third security pattern on one side of the base material 100 between the overlapping security pattern formation step and the latent image identification step;
The method comprising the steps of:
The method according to claim 1,
The first security pattern forming step may include a step of, when the first security pattern includes the first background notation 110 and the first latent notation table 120,
In the second security pattern formation step, the second security pattern includes the second background notation 130 and the second latent notation table 140,
The superposition security pattern forming step overlaps the first background notation 110 and the second background notation 130 and overlaps the first latent space reference table 120 and the second latent space reference table 140 Wherein said method comprises the steps of:
The method of claim 3,
The first background notation 110 of the first security pattern and the first latent notation table 120 of the first security pattern are formed in the same shape as the first background notation 110 of the first security pattern, The screen densities of the non-marks 120 and the printing angles between them are the same but the players are configured differently,
The second background notation 130 and the second latent notation table 140 of the second security pattern are formed in the same shape and the second background notation 130 and the second latent non- The density and the printing angle between each other are the same but the athletes are configured differently,
Wherein the first security pattern and the second security pattern have different patterns and printing angles, respectively.
The method of claim 3,
Wherein the first background notation (110) of the first security pattern and the second background notation (130) of the second security pattern are configured identically and the first latent notation table (120) of the first security pattern ) And the second latent-phase non-mark (140) of the second security pattern are configured differently.
3. The method of claim 2,
In the third security pattern formation step, the third security pattern includes the third background notation 150 and the third latent notation table 160,
The third background special table and the third latent image special table may be formed by combining the first background special table 110, the first latent image reference table 120, the second background reference table 130, The method comprising the steps of:
3. The method of claim 2,
Wherein the first security pattern, the second security pattern, and the third security pattern are formed in a pattern of one of dot, line, figure, letter, and figure.
3. The method of claim 2,
The dedicated filter is a first dedicated filter 200, a second dedicated filter 210, and a third dedicated filter 220 that respectively identify the first security pattern, the second security pattern, and the third security pattern Wherein the method comprises the steps of:
3. The method of claim 2,
The dedicated filter is a transparent film or a lenticular film formed with a polygonal grating in which a line grating on which optical interference with the first, second and third security patterns formed on the substrate 100 is formed Wherein the method comprises the steps of:
3. The method of claim 2,
Wherein the base material (100) is made of one selected from the group consisting of paper, film, plastic, and metal.
The method according to claim 1,
In the first security pattern forming step, the first security pattern includes the first background notation 110,
The second security pattern includes the second latent image table 140 in the second security pattern forming step and the second latent image table 140 is formed by displaying only the outline form of the non-table in a pattern. A method of manufacturing an overlay security pattern.
12. The method of claim 11,
In the second security pattern forming step, the second latent image table 140 partially or entirely includes the position, size, and shape in comparison with the first background notation 110 configured in the first security pattern, or two Wherein the first pattern is formed by deforming the first pattern.
12. The method of claim 11,
In the latent image identification step, the second latent image table 140 is identified by the first dedicated filter 200,
Wherein the first dedicated filter (200) is formed in a structure corresponding to a remaining region of the base material (100) except for a region in which the first background special table (110) of the first security pattern is formed. ≪ / RTI >
A latent-image printed matter produced by the method for producing a superposed security pattern according to any one of claims 1 to 13.















KR1020150122918A 2015-08-31 2015-08-31 Manufacturing method for a overlap security pattern and a printed article manufactured by the same method KR20170025856A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
KR1020150122918A KR20170025856A (en) 2015-08-31 2015-08-31 Manufacturing method for a overlap security pattern and a printed article manufactured by the same method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
KR1020150122918A KR20170025856A (en) 2015-08-31 2015-08-31 Manufacturing method for a overlap security pattern and a printed article manufactured by the same method

Publications (1)

Publication Number Publication Date
KR20170025856A true KR20170025856A (en) 2017-03-08

Family

ID=58404526

Family Applications (1)

Application Number Title Priority Date Filing Date
KR1020150122918A KR20170025856A (en) 2015-08-31 2015-08-31 Manufacturing method for a overlap security pattern and a printed article manufactured by the same method

Country Status (1)

Country Link
KR (1) KR20170025856A (en)

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR101119653B1 (en) 2002-10-16 2012-03-16 에꼴 뽈리떼끄니끄 페데랄르 드 로잔느 Device and method for authenticating items selected from the group of documents and valuable articles
KR101260723B1 (en) 2011-01-27 2013-05-22 비지니스대양전산폼(주) Forgery prevention paper

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR101119653B1 (en) 2002-10-16 2012-03-16 에꼴 뽈리떼끄니끄 페데랄르 드 로잔느 Device and method for authenticating items selected from the group of documents and valuable articles
KR101260723B1 (en) 2011-01-27 2013-05-22 비지니스대양전산폼(주) Forgery prevention paper

Similar Documents

Publication Publication Date Title
US7367593B2 (en) Security documents and a method and apparatus for printing and authenticating such documents
JP4013450B2 (en) Dot pattern display medium and manufacturing method thereof
JP2003175664A (en) Collating element for printed matter
JP4441634B2 (en) Anti-counterfeit printed matter
KR101390942B1 (en) A printing matter using crisscross lines for preventing fabrication and interfering reproduction
KR101802804B1 (en) Printing matter with latent image for preventing counterfeit and manufacturing method thereof
JP5365133B2 (en) Image forming body and image making method
JP2009113392A (en) Latent image display medium
JP4840919B2 (en) Anti-counterfeit media
JP4832333B2 (en) Anti-counterfeit media
JP5652789B2 (en) 3D printed material
JP5527528B2 (en) Anti-counterfeit printed matter
KR20170025856A (en) Manufacturing method for a overlap security pattern and a printed article manufactured by the same method
JP4595068B2 (en) Authentic printed material
JP6120080B2 (en) Anti-counterfeit formed body and method of creating image data of anti-counterfeit formed body
JP4701730B2 (en) Copy check printed matter
JP6233806B2 (en) Anti-counterfeit printed matter
JP5736941B2 (en) Image forming body
JP4871109B2 (en) Anti-counterfeit media
JP2006051646A (en) Printed matter whose genuineness can be determined
JP5190621B2 (en) Anti-counterfeit printed matter with confidential information
JP4832330B2 (en) Anti-counterfeit media
JP3689784B2 (en) Method of creating copy protection pattern and printed matter
JP4940019B2 (en) Anti-counterfeit media
JP5060455B2 (en) Anti-counterfeit media