WO2009097979A2 - Sicherheitselement - Google Patents
Sicherheitselement Download PDFInfo
- Publication number
- WO2009097979A2 WO2009097979A2 PCT/EP2009/000450 EP2009000450W WO2009097979A2 WO 2009097979 A2 WO2009097979 A2 WO 2009097979A2 EP 2009000450 W EP2009000450 W EP 2009000450W WO 2009097979 A2 WO2009097979 A2 WO 2009097979A2
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- security element
- microreflectors
- detector
- security
- radiation
- Prior art date
Links
Classifications
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B42—BOOKBINDING; ALBUMS; FILES; SPECIAL PRINTED MATTER
- B42D—BOOKS; BOOK COVERS; LOOSE LEAVES; PRINTED MATTER CHARACTERISED BY IDENTIFICATION OR SECURITY FEATURES; PRINTED MATTER OF SPECIAL FORMAT OR STYLE NOT OTHERWISE PROVIDED FOR; DEVICES FOR USE THEREWITH AND NOT OTHERWISE PROVIDED FOR; MOVABLE-STRIP WRITING OR READING APPARATUS
- B42D25/00—Information-bearing cards or sheet-like structures characterised by identification or security features; Manufacture thereof
- B42D25/30—Identification or security features, e.g. for preventing forgery
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B42—BOOKBINDING; ALBUMS; FILES; SPECIAL PRINTED MATTER
- B42D—BOOKS; BOOK COVERS; LOOSE LEAVES; PRINTED MATTER CHARACTERISED BY IDENTIFICATION OR SECURITY FEATURES; PRINTED MATTER OF SPECIAL FORMAT OR STYLE NOT OTHERWISE PROVIDED FOR; DEVICES FOR USE THEREWITH AND NOT OTHERWISE PROVIDED FOR; MOVABLE-STRIP WRITING OR READING APPARATUS
- B42D25/00—Information-bearing cards or sheet-like structures characterised by identification or security features; Manufacture thereof
- B42D25/20—Information-bearing cards or sheet-like structures characterised by identification or security features; Manufacture thereof characterised by a particular use or purpose
- B42D25/29—Securities; Bank notes
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B42—BOOKBINDING; ALBUMS; FILES; SPECIAL PRINTED MATTER
- B42D—BOOKS; BOOK COVERS; LOOSE LEAVES; PRINTED MATTER CHARACTERISED BY IDENTIFICATION OR SECURITY FEATURES; PRINTED MATTER OF SPECIAL FORMAT OR STYLE NOT OTHERWISE PROVIDED FOR; DEVICES FOR USE THEREWITH AND NOT OTHERWISE PROVIDED FOR; MOVABLE-STRIP WRITING OR READING APPARATUS
- B42D25/00—Information-bearing cards or sheet-like structures characterised by identification or security features; Manufacture thereof
-
- G—PHYSICS
- G02—OPTICS
- G02B—OPTICAL ELEMENTS, SYSTEMS OR APPARATUS
- G02B5/00—Optical elements other than lenses
- G02B5/12—Reflex reflectors
- G02B5/122—Reflex reflectors cube corner, trihedral or triple reflector type
- G02B5/124—Reflex reflectors cube corner, trihedral or triple reflector type plural reflecting elements forming part of a unitary plate or sheet
-
- B42D2033/18—
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B42—BOOKBINDING; ALBUMS; FILES; SPECIAL PRINTED MATTER
- B42D—BOOKS; BOOK COVERS; LOOSE LEAVES; PRINTED MATTER CHARACTERISED BY IDENTIFICATION OR SECURITY FEATURES; PRINTED MATTER OF SPECIAL FORMAT OR STYLE NOT OTHERWISE PROVIDED FOR; DEVICES FOR USE THEREWITH AND NOT OTHERWISE PROVIDED FOR; MOVABLE-STRIP WRITING OR READING APPARATUS
- B42D25/00—Information-bearing cards or sheet-like structures characterised by identification or security features; Manufacture thereof
- B42D25/20—Information-bearing cards or sheet-like structures characterised by identification or security features; Manufacture thereof characterised by a particular use or purpose
Definitions
- the invention relates to optical security elements, their use for the identification and authentication of objects, as well as methods and devices for the identification and authentication of objects based on the optical security elements.
- Security elements are preferably inseparably connected to the objects to be protected. The attempt to separate the security elements from the object preferably leads to their destruction, so that the security elements can not be misused.
- the authenticity of an object can be verified by the presence of one or more security elements.
- Optical security elements such as e.g. Watermarks, specialty inks, guilloche patterns, micro-typefaces and holograms are established worldwide.
- An overview of optical security elements, which are particularly but not exclusively suitable for document protection, is published in the following book: Rudolf L. van Renesse, Optical Document Security, Third Edition, Artech House Boston / London, 2005 (pp 63-259).
- optical security elements can be divided into the following categories:
- Level 1 Visible ⁇ overi) - the security element is visible to the human eye and can therefore be checked easily and without any aids. Visible security elements allow each person in a first
- Level 2 Invisible (covert) - the security element is invisible to the human eye.
- a (simple) device is necessary.
- Level 3 Forensic - the authentication is done by special equipment.
- optically variable security elements that produce a different visual impression under different viewing angles.
- Such security elements have, for example, optical diffraction structures which reconstruct different images at different viewing angles. Such effects can not be reproduced with the normal and widely used copying and printing techniques.
- DOE diffractive optically variable image element
- Embossed holograms are characterized in that the light-diffracting structure is converted into a three-dimensional relief structure, which is transferred to a stamping mold.
- This embossing mold can be embossed as a master hologram in plastic films. This makes it possible to produce a large number of security elements cost.
- the disadvantage is that many products are not equipped with visible holograms for design or aesthetic reasons. Although perfume bottles are objects that are regularly and extensively counterfeited, there are no holograms on these products, as they do not seem to fit with the product's "image” for marketing purposes, so it would be desirable to have security features available. which can also be integrated into (design) products without adversely affecting the "image” of the product.
- a disadvantage of the embossing holograms described is further that they can not be detected by machine for authenticity. Complete coverage of the supply chain requires fast and reliable proof of authenticity at various points.
- optical codes such as e.g. Barcodes used. Barcodes are pure features for the recognition and tracking of an object, which have no security features. They are easy to copy / fake.
- a combination of product tracking features and anti-counterfeiting features provide RFID chips, but their use is limited because of their relatively high cost, slow read speed, and sensitivity to electromagnetic interference. It would therefore be desirable to have a security feature that is machine readable to allow for automated product tracking along the supply chain and to be able to perform a machine authenticity check.
- embossed holograms are not customizable according to the prior art.
- the embossed holograms are indistinguishable. This means, on the one hand, that a forger has to copy / forge only one master hologram in order to obtain a multitude of embossed holograms for counterfeit products.
- objects can not be individualized by the embossed holograms because of their indistinguishability. For reasons of better protection against counterfeiting and the possibility of tracking and recognizing individual objects, it is preferable to use security features which can be individualized, ie which have individual security features for each product to be protected.
- Individual characteristics are, for example, a serial number, the date of manufacture or, in the case of personal security documents, the name, an HD number or a biometric feature.
- An individualizable security element is described, for example, in EP 0896260 A3, in which the individualization is carried out during the production of the security element.
- Individuality is based on a deterministic process. The choice of parameters in the manufacture of the security element clearly and reproducibly determines the design of the security element. Deterministic individuality has the disadvantage that it can in principle be readjusted / copied, since there is a clear and reproducible method that generates the individual characteristics.
- the variability in a deterministic method is usually limited, ie only a limited number of individual features can be generated with a limited set of parameters, so that only a limited number of objects can be made distinguishable.
- the protection against counterfeiting and the number of distinguishable objects is generally higher for security elements which have random features than for security features with purely deterministic features.
- WO2005088533A1 a method is described in which objects that have a fibrous structure (eg paper) can be clearly recognized on the basis of their random surface properties.
- a laser beam is focused on the surface of the object, moved over the surface and detected by means of photodetectors at different points of the surface at different angles different degrees of scattered rays.
- the detected scattered radiation is characteristic of a variety of different materials and individually for each surface. It is very difficult to imitate because it is due to coincidence in the manufacture of the object.
- the scatter data for the individual objects are stored in a database in order to be able to authenticate the object at a later time. For this purpose, the object is measured again and the scatter data compared with the stored reference data.
- a disadvantage of the method described is that only objects that have a sufficiently large number of random scattering centers can be detected by this method. Furthermore, for an authenticity check always the application of the method and thus a corresponding device is required. It is any People who hold such an object in their hands, not possible to make an obvious assessment of the authenticity of the object.
- the task of providing a security element are implemented in the security features of different security levels side by side.
- security features of all the above-mentioned levels ⁇ overt, covert, forensic) are included.
- the security element should therefore allow both an obviousness check by a human without the aid of aids (devices) alone with his senses ⁇ overt), but at the same time also contain features of higher security levels ⁇ covert, forensic), which make a forgery more difficult and can be proven with the help of appropriate aids can.
- the security element should be machine-checkable and customizable.
- the security element should have at least one random character feature to provide maximum protection against counterfeiting while allowing a high number of objects to be differentiated.
- the security element should be inexpensive and connectable to a variety of objects without adversely affecting object design.
- the method for checking the authenticity and / or identifying the security element should be machine-executable and fast.
- the device for checking the authenticity and / or identification of the security element should be cost-effective and operable by anyone after a short introduction, without the need for special knowledge.
- a security element comprising at least one layer in which a multiplicity of randomly distributed and / or oriented microreflectors are contained.
- the subject of the present invention is therefore a security element comprising at least one transparent layer, in which a plurality of microreflectors are randomly distributed, characterized in that at least a part of the microreflectors has at least one reflecting surface which is not arranged parallel to the surface of the transparent layer ,
- the security element is characterized in that it comprises at least one layer that is transparent to electromagnetic radiation having at least one wavelength.
- Transparency is understood to mean that the proportion of the electromagnetic radiation having at least one wavelength which penetrates the layer is greater than the sum of the portions of the electromagnetic radiation having at least one wavelength which are absorbed by the layer or reflected at the boundary surfaces of the layer , The transmittance of the layer is thus greater than 50%, wherein the transmittance of the ratio of the intensity of electromagnetic radiation having at least one wavelength which passes through the layer, based on the intensity of the electromagnetic radiation having the at least one wavelength which impinges on the layer is to be understood.
- a transparent layer is referred to as a transparent layer.
- the transmittance of the transparent layer for at least one wavelength is preferably between 60% and 100%, particularly preferably between 80% and 100%.
- the at least one wavelength of the electromagnetic radiation for which the at least one layer of the security element according to the invention has the abovementioned property of transparency is preferably in the range between 300 nm and 1000 nm, particularly preferably between 400 nm and 800 nm.
- the transparent layer of the security element according to the invention has a transmittance of at least 60% for electromagnetic radiation with a wavelength between 400 and 800 nm.
- the transparent layer of the security element according to the invention has a thickness between 1 .mu.m and 1 cm.
- the layer thickness is preferably in the range between 1 ⁇ m and 1 mm, particularly preferably between 10 ⁇ m and 500 ⁇ m.
- the transparent layer is preferably made of glass, a ceramic or a plastic.
- the transparent layer is preferably a film formed from a varnish or a film.
- a film and a film are characterized in that one of the three spatial dimensions (thickness) is at least a factor of 10, preferably at least 100 times smaller than the two remaining spatial dimensions (length, width) of its body.
- a varnish is a liquid or powder coating material which is thinly applied to objects and built up into a continuous film by chemical or physical processes (for example, evaporation of the solvent, polymerization of paint-containing monomers or oligomers, or the like).
- a film is a solid body that has the ability to be wound on or around objects and to conform to their shape.
- thermoplastic material in the form of a film is used as the transparent layer.
- suitable films of thermoplastic materials are, for example, those of known thermoplastic aromatic polycarbonates Weight average molecular weights Mw of from 25,000 to 200,000, preferably from 30,000 to 120,000 and in particular from 30,000 to 80,000 (Mw determined via Eta rel in dichloromethane at 20 ° C and a concentration of 0.5 g per 100 ml) and those of known thermoplastic polyarylsulfones, which linear (see DE-OS 27 35 144) or branched (see DE-OS 27 35 092 and DE-OS 23 05 413) may be.
- thermoplastic cellulose esters thermoplastic polyvinyl chlorides, thermoplastic styrene-acrylonitrile copolymers and thermoplastic polyurethanes.
- Suitable cellulose esters are obtained by conventional processes by esterification of the cellulose with aliphatic monocarboxylic anhydrides, preferably acetic and butyric or acetic and propionic anhydrides.
- thermoplastics are e.g. Polypolyacrylates and copolyacrylates and poly- or copolymers of copolymethacrylate such as by way of example and preferably polymethyl methacrylate (PMMA), poly- or copolymers with styrene, such as by way of example and preferably transparent polystyrene (PS) or polystyrene-acrylonitrile (SAN), transparent thermoplastic polyurethanes, and polyolefins, such as by way of example and preferably transparent polypropylene types or polyolefins based on cyclic olefins (for example TOPAS®, Topas Advanced Polymers), poly- or copolycondensates of terephthalic acid, such as, by way of example and preferably, poly- or copolyethylene terephthalate (PET or CoPET) or glycol-modified PET (PETG ), Polyethylene glycol naphthenate (PEN), transparent polysulfones (PSU).
- Suitable linear polyaryl sulfones are all known aromatic polysulfones or polyethersulfones having Mw (weight average molecular weight measured, for example, by light scattering) between about 15,000 and about 55,000, preferably between about 20,000 and about 40,000.
- Mw weight average molecular weight measured, for example, by light scattering
- Suitable branched polyaryl sulfones are in particular the branched polyaryl ether sulfones according to DE-OS 23 05 413 or US Pat. No. 3,960,815, whose Mw (weight average molecular weight, measured, for example, by light scattering) is between about 15,000 and about 50,000, preferably between about 20,000 and 40 000 lie. (For more details see DE-AS 30 10 143).
- Suitable thermoplastic polyvinyl chlorides are, for example, the commercially available types of PVC.
- thermoplastic resins e.g. Styrene / acrylonitrile or alpha-methylstyrene / acrylonitrile copolymers
- the thermoplastic resins can be prepared by known methods, e.g. by bulk polymerization, solution polymerization, suspension polymerization and
- Cycloolefin copolymers are described in the patents of Mitsui-Chemicals US Pat. No. 5,912,070 or Ticona GmbH EP 765,909.
- films can be made to DE-OS 25 17 033 and DE-OS 25 31 240.
- Thermoplastic polyurethanes can also be used to produce the layers according to the invention.
- the foils can be matted on one side or structured on one side. This is e.g. achieved by the melt of the thermoplastic material is pressed through a slot die and the melt flag is withdrawn via a frosted or structured cooling roll.
- the thermoplastic layer can either be a single-layer layer of these plastics, or a multilayer plastic layer of individual layers of various plastics with a thickness of 0.001 to 1 mm.
- a security element according to the invention furthermore comprises a plurality of microreflectors, which are randomly distributed and / or oriented within the transparent layer.
- Random distribution and / or orientation means that the position of individual microreflectors and / or the orientation of individual microreflectors within the transparent layer can not be foreseen by the production process.
- the position and / or orientation of individual microreflectors is subject to random fluctuations in the manufacturing process.
- the location and / or orientation of individual microreflectors can therefore not easily reproduced. This fact is due to the high level of protection afforded by the security features according to the invention: they can only be adjusted at great expense.
- both the location (distribution of the microreflectors within the transparent layer) and their orientation are of a random nature. By chance, this is not meant to be strictly mathematical.
- Random means that there is a random component that makes it impossible to accurately predict the location and orientation of individual microreflectors.
- microreflectors have a preferred position and / or orientation. Around this position and / or orientation is a distribution, which can be determined by the manufacturing process. However, the position and / or orientation of individual microreflectors remains uncertain.
- a microreflector according to the invention is characterized in that it comprises at least one surface which reflects incident electromagnetic radiation in a characteristic manner.
- the characteristic reflection is characterized in that electromagnetic radiation having at least one wavelength is reflected in at least one direction predetermined by the angle of incidence, the proportion of the reflected radiation having the at least one wavelength being greater than the sum of the portions of the absorbed and transmitted radiation of at least a wavelength.
- the degree of reflection of the at least one surface is therefore greater than 50%, wherein the degree of reflection of the ratio of the intensity of the electromagnetic radiation having at least one wavelength which is reflected from the surface, based on the intensity of the electromagnetic radiation having the at least one wavelength on the surface hits, it is understood.
- a reflective surface is referred to as a reflective surface.
- the reflectance of the reflective surface of the microreflector for at least one wavelength is between 60% and 100%, more preferably between 80% and 100%.
- the at least one wavelength of the electromagnetic radiation for which the at least one surface of a microreflector of the security element according to the invention has the abovementioned property of reflectivity is preferably in the range between 300 nm and 1000 nm, particularly preferably between 400 nm and 800 nm.
- the reflective surface of a microreflector of the inventive security element has a reflectance of at least 60% for electromagnetic radiation having a wavelength between 400 and 800 nm.
- the reflection is preferably directed reflection and / or diffraction, ie the proportion of diffusely reflected radiation (scattering) is preferably less than 50%, particularly preferably less than 40%. Bent and directionally reflected radiation is referred to collectively as reflected radiation.
- the reflective surface of a microreflector has a size between l * 10 "14 m 2 and 1 * 10 " 5 m 2 .
- the size of the reflective surface is preferably in the range between 1 ⁇ 10 -12 m 2 and 1 ⁇ 10 -6 m 2 , more preferably between 1 ⁇ 10 -10 m 2 and 1 ⁇ 10 -7 m 2 .
- an area element of 1 cm 2 contains on average 1 to 1000 microreflectors, preferably between 10 and 100 microreflectors.
- the average distance between two micro-reflectors is preferably at least 5 times the average size of the reflective surface of the microreflectors In a particularly preferred embodiment, the average distance is between 10 and 50 times the average size of the reflective surface of the micro-reflectors and hereinafter the arithmetic mean of the corresponding magnitude.
- the reflective surface of a microreflector is flat or has a curvature.
- a parallel beam that impinges on the surface also reflected parallel back from the surface.
- a parallel beam impinging on the surface is reflected in the form of divergent (convex curvature) or convergent (concave curvature) jets.
- Flat surfaces have the advantage that sharp reflection bands occur in a narrow angular range (see, e.g., Figure 9).
- Curved surfaces have the advantage that reflections occur over a wider angular range, but show wide bands. Depending on the application, therefore, flat or curved reflective surfaces are preferred.
- the reflective surface may be flat or may include one or more structures that result in diffraction of electromagnetic radiation.
- the microreflectors may be approximately spherical, rod-shaped, cuboidal, polyhedron-shaped, platelet-shaped or have another conceivable shape.
- the microreflectors are platelet-shaped, where platelet-shaped is understood to mean that the spatial extent in two dimensions is approximately the same while the spatial extent Expansion in the third dimension by at least a factor of 4 is smaller than the spatial dimensions in the two remaining dimensions. Almost equal means that the spatial dimensions differ by a maximum of a factor of 2.
- the surface formed by the spatial extent of a microreflector in the two dimensions of approximately equal extension is preferably a reflective surface.
- platelet-shaped microreflectors have an orientation distribution which is particularly well suited for authentication and identification purposes when producing the security element by extrusion of a film containing a microplate.
- Platelet-shaped microreflectors assume a preferential orientation parallel to the surface of the transparent layer as a result of the extrusion process.
- the orientation of individual microplates continues to have a random component; however, the microreflectors are oriented in parallel rather than perpendicular to the surface of the transparent layer; the orientation of the microreflectors has a random distribution about the orientation parallel to the surface of the transparent layer.
- the microreflectors therefore have a preferred orientation, which is characterized in that their reflective surfaces are randomly oriented in an angular range of 0 to 60 ° relative to the surface of the transparent layer.
- the angle of inclination of the reflective surfaces with respect to the surface of the transparent layer is in the range between 0 and 50 °, more preferably between 0 and 30 °.
- the micro-reflectors have a maximum length of less than 200 microns and a thickness of 2-10 microns, with a round, elliptical, or n-square shape with n> 3.
- Elliptic is here and below not to be understood in the strict mathematical sense.
- a rectangle or parallelogram or trapezoid or generally n-corner with rounded corners is here and below also understood to be elliptical.
- the microreflectors contain at least one metallic component. It is preferably a metal from the series aluminum, copper, nickel, silver, gold, chromium, zinc, tin or an alloy of at least two of said metals.
- the microreflectors may be coated with a metal or alloy, or may be made entirely of a metal / alloy.
- metal identification platelets as described by way of example in WO 2005/078530 A1, are used as microreflectors. They have reflective surfaces. If a multiplicity of such metal identification platelets are randomly distributed and / or oriented in a transparent layer, a characteristic reflection pattern results upon irradiation of the transparent layer at different angles, which can be used for identification and authentication.
- the metal identification platelets are characterized by characteristics which can be visualized by means of magnification techniques (eg magnifying glass, microscope): the metal identification platelets can be printed and / or have diffractive structures (eg a hologram) or eg characterized by an arbitrarily formed through-hole.
- the tag is determined by its outer shape (triangle, square, hexagon, circle, ellipse, letter, number, character, pictogram, or other conceivable shapes).
- the microreflectors can be introduced into a transparent layer by known techniques. If the material from which the transparent layer is made, e.g. around a thermoplastic, it is e.g. possible, the thermoplastic with the micro-reflectors in one
- a step preferably occurs in which the microreflectors are sheared in a layer in order to achieve a random distribution with preferred orientation in the shear direction.
- the shearing direction is preferably parallel to the surface of the later transparent layer.
- the security element according to the invention may comprise further layers in addition to the transparent layer.
- one or more further layers are provided above and / or below the transparent layer.
- below the transparent layer to attach a so-called support layer, which gives the transparent layer a necessary rigidity and / or dimensional stability in order to handle the transparent layer with the micro-reflectors can.
- the transparent layer with the microreflectors a further transparent layer which ensures scratch resistance and / or UV resistance.
- the surface of the transparent layer and the surface of the security element are preferably arranged parallel to one another.
- the security element according to the invention is in the form of a foil which is e.g. can be connected via laminating and / or laminating and / or injection molding with other films.
- the security element can be easily connected to an object and is thus versatile and flexible use, eg as a security film in plastic cards and / or ID cards, as a label in or on packaging, as part of electronic boards, and much more.
- the security element preferably has a thickness of between 5 ⁇ m and 2 mm and a surface extent of at least 0.25 cm 2 and at most 100 cm 2 .
- the security element has the property that the microreflectors are randomly distributed and / or oriented in the transparent layer. Therefore, a security element that is tilted with respect to a light source will show reflections when viewed at different locations on the security element and / or at different tilt angles, depending on where the security element has a microreflector, its reflective surface at an angle to the radiation source and to the viewer is oriented, so that the law of reflection applies.
- This effect can not be imitated by means of printing technology of paints and pigments, since pigments applied to a carrier by printing technology have the same orientation and are not tilted with respect to the carrier.
- the present invention furthermore relates to the use of the security element according to the invention for the authentication and / or identification of objects, preferably for the individualized authentication and / or identification of objects.
- the inventive security element is preferably inseparably connected to an object to be protected.
- the attempt to remove the security element from the object destroys the security element and / or the object.
- the security element is in the form of a film, then the security element can be connected to the object via adhesion and / or lamination. It is known to the person skilled in the art of film processing how films must be bonded by means of adhesion and / or lamination, so that a composite arises, which can not be separated without destroying.
- the object to be authenticated and / or identified may be a personalized security or identification document.
- Identity documents, passports, driver's licenses, credit cards, bank cards, access control cards or other identity documents may be used as such security documents or identification documents, for example, without being restricted to these.
- the security element may be recognizable as an excellent area on or on an object. If the object is e.g. a badge, the security element could be in the form of an excellent area on the badge, e.g. Also, a hologram or a photo as an excellent area, in which it is immediately apparent that this area contains a corresponding element. In a preferred embodiment, the security element is integrated in the object in such a way that, as such, it is not conspicuous and / or obviously recognizable. If the object is e.g. an identity card in the form of a credit card, the security element extends in a preferred form over an entire page of the card or over both sides of the card. The security element is preferably linked to other functions. Thus, the security element may e.g.
- the integration of printing and security element has the advantage that the printed image or a part of the printed image for positioning the security element according to the invention in relation to a source of electromagnetic radiation and a detector can be used to identify and / or authenticate the object based on the security element make.
- the integration of print image and security element allows a simultaneous authentication / identification of the security element and a verification of the printed image (see also Example 4).
- the subject matter of the present invention is furthermore a method for authenticating (authenticity checking) the security element or an object to which the security element according to the invention is attached.
- Authentication is the process of verifying (verifying) an alleged identity.
- the authentication of objects, documents, persons or data is a statement that they are authentic - that is, they are unchanged, not copied and / or not faked originals.
- the authentication consists of an obviousness check, that is, an easy-to-check feature is used to examine whether or not the object under consideration is an obvious counterfeit.
- the security element according to the invention allows the authenticity check in various ways.
- the security element according to the invention is characterized in that it comprises a transparent layer in which a plurality of microreflectors are introduced, which can be seen with the naked eye.
- the micro-reflectors have the property that they reflect electromagnetic radiation of at least one wavelength when the arrangement of electromagnetic radiation source, at least one reflective surface of at least one microreflector and a detector for the reflected electromagnetic radiation obeys the law of reflection.
- the inventive method for authenticating an object based on the security element according to the invention comprises at least the following steps:
- the electromagnetic radiation may be mono- or polychromatic.
- the electromagnetic radiation preferably has at least one wavelength in the range from 300 nm to 1000 nm, particularly preferably in the range from 400 nm to 800 nm.
- a light source e.g. a laser, an LED, a halogen lamp, an incandescent lamp, a candle, the sun, or another source of electromagnetic radiation that emits electromagnetic radiation of at least one wavelength in the range 300 nm to 1000 nm.
- a laser is used.
- the irradiation can be flat, linear or punctiform, wherein under planar irradiation is understood that the irradiation of the security element, a majority of the security element is detected by the radiation, while punctiform irradiation is understood that only a small part of the security element of the radiation is detected.
- the beam profile may be determined by techniques known to those skilled in the art, e.g. the use of lenses or diffractive elements can be adjusted accordingly.
- the detection of the reflected radiation takes place with a sensor sensitive to the electromagnetic radiation used, for example a photodiode or a phototransistor (point sensor), a camera sensor (area sensor (CCD, CMOS)) or the like.
- a sensor sensitive to the electromagnetic radiation for example a photodiode or a phototransistor (point sensor), a camera sensor (area sensor (CCD, CMOS)) or the like.
- the advantage of the method according to the invention is that in its simplest embodiment (qualitatively) it can be performed by a human without the use of equipment.
- This embodiment is characterized in that as the source of electromagnetic radiation, the sun or a lamp or a candle or other light source is used and serves as a detector, the human eye.
- the security element is held by the viewer at an angle to the light source, so that individual micro-reflectors reflections.
- the observer can tilt the security element with respect to the light source so that the reflections extinguish and, if necessary, new reflections appear elsewhere in the security element. In this way, it can be easily verified by a human being that the microreflectors visible to the naked eye are not imitations produced by printing technology.
- a further advantage of the method according to the invention is that the method can be carried out by machine or can be supported mechanically and allows a quantitative evaluation.
- a machine execution or support allows the verification of a larger number of security elements or objects based on security elements in a shorter time and at a lower cost than a (purely) personal execution.
- machine execution or machine support allows comparison of reflection patterns with security elements that have been authenticated at different times.
- step (C) is carried out by machine.
- the object to be authenticated and / or a radiation source and / or at least one detector are moved relative to one another around the micro-reflectors flashing at different locations and / or at different orientation angles as a function of the relative position of the object (security element) with respect to the radiation source and Record detector.
- the process according to the invention accordingly comprises the further steps (D) and (E) following step (C):
- the security element and at least one detector can be held to one another rigidly (stationary) and to carry out a relative movement between the radiation source and the rigid arrangement of security element and detector.
- the change in position can be carried out so that the radiation source irradiates another part of the security element when the position changes; but it can also be carried out so that the same part of the security element is irradiated, but at a different angle. It is also conceivable to carry out the change in position so that the same part of the security element is irradiated at the same angle, but a detector detects the radiation reflected at a different angle. In all cases, another part of the microreflectors is detected when the position changes.
- the movement may be continuous at a constant rate, accelerating or decelerating, or discontinuous, i. e.g. gradually.
- steps (B), (C), (D) and (E) is carried out until a sufficient number of micro-reflectors has been detected for the respective application.
- the respective application includes an identification of the object based on the security element, it is necessary to detect so many microreflectors that a clear assignment of the reflection pattern to an object is possible. On the identification of an object based on the security element according to the invention will be discussed in more detail below.
- the security element is fastened in a first step on a carrier, which already has a predetermined Orientation towards a source of electromagnetic radiation and at least one detector.
- the carrier is designed in such a way and can be aligned with the radiation source and at least one detector or is already aligned so that after fixing the security element according to the invention on the carrier, a part of the microreflectors is arranged so that the arrangement of the part of the microreflectors, at least one Detector and the radiation source meets the law of reflection.
- the type and nature of the wearer is determined by the object that is to be authenticated on the basis of the security element associated with it.
- the object is, for example, a credit card format ID card
- the indentation clearly defines the position of the card on the carrier.
- the radiation source and the detector are respectively arranged around the carrier in such a way that the law of reflection for a part of the microreflectors is fulfilled.
- At least one laser is used as the radiation source.
- Laser light can be bundled very well and has a high intensity.
- a focused laser beam can be scanned over the security element.
- at least one laser and at least one detector are arranged rigidly relative to one another. The object is aligned relative to the rigid array of at least one laser and at least one detector so that the law of reflection for a portion of the microreflectors is met. The alignment can be facilitated by means of a carrier.
- the object is moved by means of a movably executed carrier with respect to the rigid arrangement of at least one laser and at least one detector.
- the movement is carried out in such a way that the movement causes various microreflectors to show successive reflections. It is conceivable to focus the laser beam on the security element and to drive the object past the laser beam. As a result, successive different areas of the security element are scanned by the laser beam. If the laser beam strikes a microreflector whose reflective surface is oriented so that the arrangement of reflective surface, radiation source and detector fulfills the law of reflection, this microreflector shows a reflection at the moment of the scan, which can be detected by the detector.
- the scanning laser beam has a defined profile on the security element. This profile can be round elliptical, linear, dumbbell or otherwise.
- the profile has a long and a short axis, e.g. given in an elliptical, linear or dumbbell-shaped profile.
- the length of the short axis is in the order of magnitude of the average size of the reflective surfaces of the microreflectors.
- the long axis is on the order of the mean distance between two microreflectors.
- the term order of magnitude here and below means that two variables differ or are equal to one another by a factor smaller than 10 and larger than 0.1.
- the long axis is slightly longer than the average distance between two microreflectors, more preferably its size is in the range between 1 and 10 times the mean distance between two microreflectors.
- the short axis is preferably slightly longer than the average size of the reflective surfaces of the microreflectors, more preferably its size is in the range of 1 to 10 times the mean size of the reflective surfaces of the microreflectors.
- a security element is illuminated areally and the beams reflected at different microreflectors under different angles are detected with the aid of a plurality of point sensors or with the aid of an area sensor.
- This embodiment has the advantage that microreflectors can be detected at different locations and with different orientations without requiring relative movement between the security element and / or radiation source and / or detector.
- the process according to the invention comprises the further steps (F) and (G) following step (C) or (E):
- steps (F) and (G) depends on the particular application. If the authentication is an obviousness check, it is checked whether there are micro-reflectors whose reflective surfaces are not arranged parallel to the surface of the transparent layer. Accordingly, the requirement (target pattern) is that individual reflections occur when the array of surface of the transparent layer, radiation source and detector does not meet the law of reflection.
- the notification as to whether or not the object is an obvious counterfeit can be made on the basis of a yes / no statement. It is possible, for example, to use a light signal for this: if there is no obvious forgery, a green light comes on, if it is an obvious counterfeit, a red light comes on.
- an acoustic signal or other message which can be detected by the human senses, conceivable.
- the authentication is to serve to verify the identity of a concrete object, then in step (F) a so-called 1: 1 comparison between the currently detected reference pattern and the reflection pattern of the presumed object (target pattern) is necessary.
- the reflection pattern represents the reflections of the security element or of a part of the security element detected as a function of the position of the object in relation to the radiation source and a detector.
- the reflection pattern therefore exists, for example, in the form of a number table in which the intensities measured at different angles at different locations the radiation reflected by the security element is detected. Such a number table can be directly compared with a target number table.
- the measured intensity distribution it is also possible to use the measured intensity distribution to create a different representation of a reflection pattern by means of mathematical operations before a comparison with a desired pattern is carried out.
- a Fourier transformation of the originally spatially dependent measured data is performed, since the Fourier-transformed data have a translational invariance and thus a higher positioning tolerance is given.
- the characteristic features represent a kind of fingerprint or signature of the security element.
- the signature is a digitally storable and machine processable representation of the security feature.
- the signature is unique, i. identical security elements result in the same signature; different security elements give different signatures.
- the reflection pattern mentioned in step (F) may be a signature.
- the comparison of the reflection pattern with at least one desired pattern can be made on the basis of the complete number table or on the basis of characteristic features from the number table.
- known pattern matching methods can be used, in which similarities between the data records is sought (see, for example, Image Analysis and Processing: 8th International Conference, ICIAP '95, San Remo, Italy, September 13-15, 1995. Proceedings ( Lecture Notes in Computer Science), WO 2005088533 (A1), WO2006016114 (A1), C. Demant, B. Streicher-Abel, P. Waszkewitz, Industrial Image Processing, Springer-Verlag, 1998, p. 133 ff, J. Rosenbaum, Barcode, Verlagtechnik Berlin, 2000, p. 84 ff, US Pat. No. 7333641 B2, DE10260642 A1, DE10260638 A1, EP1435586B1). A specific procedure is described in Example 4.
- At least steps (A) to (G) are carried out by machine.
- the following is an example of such a machine execution: A user places an object in a defined manner on a support and starts the mechanical execution by pressing a button.
- the carrier is e.g. moved by means of a stepping motor into a position in which the surface of the security element, a radiation source and a detector form an arrangement in which the law of reflection is not met, but the radiation source, the detector and a hypothetical plane which is opposite by an angle ⁇ the surface of the security element is inclined to form a law satisfying the law of reflection. If microreflectors are present in the security element that are in this hypothetical plane, they would show reflections if they were to be irradiated.
- the radiation source is e.g. activated by a control unit so that radiation falls on an area of the security element. If microreflectors with an orientation parallel to the said hypothetical plane are present in this region, reflections in the form of an increased intensity of incoming radiation are registered at the detector. About the stepping motor, the carrier can be further moved and / or tilted to detect more micro-reflectors with possibly different orientation. If no reflections are detected at the detector, it is obviously a fake object.
- reflections are detected, they can be stored via the control unit and / or a computer unit in the form of a reflection pattern as a function of the position of the object.
- a so-called rotary encoder is used, which triggers the measurement data acquisition.
- the rotary encoder detects the change in position and emits an impulse if there is an incremental change in position. In the case of an impulse, a measured value is recorded and stored by the detector. If the sensor is moved over a defined travel distance, the rotary encoder ensures that measuring points are distributed over the travel distance at a constant distance from one another.
- the currently detected reflection pattern can then, if appropriate after smoothing and / or filtering and / or mathematical transformation by means of the computer unit with at least one desired pattern, for example a reflection pattern of the object stored in a database connected to the computer unit, already at an earlier time has been compared.
- the Result of the comparison eg the degree of correspondence between the compared reflection patterns, is then output to the user in the form of a visible or audible message via an output unit connected to the control unit or the computer unit (monitor, printer, loudspeaker, oa).
- the present invention furthermore relates to a method for identifying a security element or an object according to the invention, which carries a security element according to the invention.
- Identification is understood as a process that serves to uniquely recognize a person or an object.
- the method according to the invention comprises at least the steps (A) to (C) and (F) to (G) already discussed in the method for authenticating an object in the embodiments discussed there, wherein in step (G) instead of a message about the
- Authenticity is a message about the identity of the object. Steps (D) and (E) are optional. If the security element, for example, illuminated areally and by means of a
- Area sensor as detector detects a number of micro-reflectors sufficient for the application, is a change in position and the detection of more
- the method for identifying an object based on the security element according to the invention therefore comprises at least the following steps:
- step (G) outputting a notification of the identity of the object depending on the result of the comparison in step (F).
- the steps (A) to (G) of the inventive method are carried out by machine.
- step (F) of the inventive method the reflection pattern of the observed object is compared with reflection patterns which have already been determined at an earlier time.
- identity of an object is determined by the reflection pattern and there is a comparison of the considered reflection pattern with all stored in a database reflection patterns already detected object (l: n-adjustment).
- the identity of the object on the basis of another feature, for example by means of a barcode associated with the object, and by the comparison between the currently measured reflection pattern and the reflection pattern associated with the identified object, the correctness of the object Assign assignment (authentication).
- the present invention furthermore relates to a device for identifying and / or authenticating an object based on a security element according to the invention, comprising at least a source of electromagnetic radiation, and a detector for detecting the radiation reflected by the security element.
- the source of electromagnetic radiation can emit monochromatic or polychromatic radiation. It preferably emits electromagnetic radiation having at least one wavelength in the range 300 nm to 1000 nm, particularly preferably in the range 400 nm to 800 nm.
- a laser is used.
- the detector used is a sensor which is sensitive to the electromagnetic radiation used, for example a photodiode or a phototransistor (point sensor), a camera sensor (area sensor (CCD, CMOS)) or the like.
- a carrier is further provided, on which an object can be fixed.
- the carrier facilitates the positioning of the security element with respect to the radiation source and / or the detector.
- the carrier comprises an area which is brought into contact with the object to be identified or authenticated.
- the object is either placed on the carrier, suspended in the carrier or otherwise connected to the carrier, so that the object assumes a defined and predictable orientation (location) in space.
- the security element which is connected to the object, either already in a law satisfying the law of reflection or it can be easily brought by movement of the carrier in such an arrangement.
- the carrier is, for example, a carriage which can be brought to a first position in which a connection of the object to the carriage is easily made possible by a user, and which can be brought to a second position in which Microreflectors in the security element, the radiation source and a detector form an arrangement that meets the law of reflection.
- the support is moveable so that the security element can be moved relative to the radiation source and / or the detector to irradiate different microreflectors at the same or different angles and the reflections from different microreflectors at the same or at different angles to be able to capture.
- a laser is used as radiation source and a phototransistor as detector.
- Laser and phototransistor are arranged rigidly to each other.
- the object to be authenticated and / or identified may be moved on a movable carrier in relation to the rigid array of laser and photodiode.
- the laser is arranged at an angle ⁇ to the normal of the surface of the security element.
- the detector is arranged at an angle ⁇ 'to the normal of the surface of the security element, where ⁇ ⁇ ⁇ '.
- the laser, the normals and the detector lie in one plane. This arrangement of laser, surface of the security element and detector does not fulfill the law of reflection because ⁇ ⁇ ⁇ '.
- microreflectors are detected which have a relative to the surface of the security element correspondingly inclined orientation of the reflective surface.
- the angle ⁇ is in the range of 0 ° to 80 °, preferably in the range of 0 ° to 60 °.
- the angle ⁇ ' is in the range of 0 ° to 80 °, preferably in the range of 0 ° to 60 °.
- the laser illuminates the security element with a defined spot profile.
- the profile preferably has a long and a short axis, as is given, for example, in the case of an elliptical, linear or dumbbell-shaped profile.
- the length of the short axis is in the order of magnitude of the average size of the reflective surfaces of the microreflectors.
- the long axis is on the order of the mean distance between two microreflectors.
- the long axis is slightly longer than the average distance between two microreflectors, more preferably its size is in the range between 1 and 10 times the mean distance between two microreflectors.
- the short axis is preferably slightly longer than the average size of the reflective surfaces of the microreflectors, more preferably its size is in the range of 1 to 10 times the mean size of the reflective surfaces of the microreflectors.
- the device further comprises a control unit, which is connected to a computing unit and a database.
- the control unit is used to control the radiation source, if necessary to control the movable carrier carried out in order to make a change in position of the object can and to detect the signals registered at the detector.
- the database stores reflection patterns of security elements that can be used for 1: 1 or 1: n reconciliation. With the arithmetic unit mathematical operations on records can be made and made a comparison between reflection patterns.
- arithmetic unit and control unit are suitable, e.g. Microprocessors.
- the device has at least one output via which the result of a comparison can be transferred to a user of the device in the form of a message.
- the output can e.g. a lamp that lights up when an obviousness check has revealed that the object is an obvious counterfeit.
- the output may be e.g. a screen indicating to what extent the reflection pattern of a currently detected security element matches a reflection pattern from a connected database.
- Other issues such as a printer, a loudspeaker or other devices serving as an interface between a machine (device) and a human (user) are conceivable.
- the security element according to the invention combines several security levels next to each other.
- the micro-reflectors are visible to the naked eye (overt), the The distribution and / or orientation of the individual microreflectors can be measured (covered) by means of the device according to the invention; the shape and / or the ability to acquire the microreflectors can be analyzed by means of a magnification unit ⁇ covert, forensic).
- the inventive security element offers a high protection against counterfeiting and / or imitation, since the random distribution and / or orientation of the
- Microreflectors is difficult to copy.
- the security element according to the invention allows an obviousness check, which can be carried out by any human without aids.
- the inventive security element allows an individualization of an object, since the random distribution and / or orientation of the microreflectors for each
- the security element according to the invention is inexpensive and can be connected to a large number of objects without it having a negative influence on the object design.
- Methods for identifying an object based on the security element according to the invention can be performed quickly and mechanically.
- the device according to the invention is also inexpensive and can be operated by people after the shortest introduction, who have no special knowledge.
- Figure 1 shows schematically an enlarged detail of a security element (1) according to the invention in the plan view comprising a transparent layer (2) in which micro-reflectors (3) are randomly distributed.
- the microreflectors have a hexagonal shape which can be visualized for authenticity testing by means of a magnification unit (e.g., magnifying glass, microscope).
- a magnification unit e.g., magnifying glass, microscope
- FIG. 2 shows schematically an enlarged section of a security element (1) according to the invention in the side view (cross section).
- the security element comprises a transparent layer (2) into which microreflectors (3) are introduced. These are randomly distributed and the reflective surface (4) of each microreflector has a random orientation.
- a source of electromagnetic radiation (5) the security element can be irradiated.
- rays (6) hit the reflecting surfaces and are thrown back (reflected).
- the reflected radiation (7) can be collected with a detector (8). Only those surfaces which have a certain orientation with respect to radiation source (5) and detector (8) lead to a signal at the detector (see FIG. 3).
- FIG. 3 illustrates the law of reflection on a microreflector (3).
- Electromagnetic radiation (6) impinges on the surface (4) of the microreflector (3) at an angle ⁇ relative to the surface normal (9) to the surface (4).
- the radiation is reflected and reflected back to the surface normal (9) at a failure angle ⁇ (7).
- the angles ⁇ and ⁇ are equal.
- the detector (8) attached to the appropriate position, the directionally reflected radiation can be collected.
- the surface of the microreflector contains diffraction structures, in addition to the directionally reflected beam (the so-called zero diffraction order), further rays occur at defined angles, which are dependent on the diffraction structures, around the directionally reflected beam (higher
- diffracted rays typically have a lower intensity than the directionally reflected radiation.
- the diffracted rays can also be detected
- FIG. 4 shows a photomicrograph of a product of the incorporation of microreflectors into a polymer (cylindrical granule grain from Example 1).
- FIG. 5 shows a light micrograph of the film from Example 2.
- FIG. 6 shows a light micrograph of a metal identification drawing plate in an identity card from Example 3.
- FIG. 7 shows an exemplary embodiment of the device according to the invention and of the method according to the invention for authenticating and / or identifying objects on the basis of a security element according to the invention.
- the device comprises a source (5) for electromagnetic radiation, a detector (8) for electromagnetic radiation, a control unit (10) for controlling the radiation source (5) and for processing the at the detector (8) measured signals, a computing unit (11) for performing mathematical operations and for comparing the currently detected reflection pattern of a security element (1) with at least one desired or reference pattern, a database (12), in the reference pattern and / or target pattern are stored for comparison and an output (13) via which the result of a comparison can be transmitted to a user.
- the units 5, 8, 10, 11, 12 and 13 are electrically, optically, via radio or another signal transmission channel interconnected (dashed lines).
- the device also includes an input unit via which a user can operate the device (not explicitly shown in FIG. 7).
- the input unit may be part of the control unit or the computer unit.
- Two or more of the units 10 to 13 may also be integrated in one unit. It is also possible to connect the output unit 13 directly to the control unit 10.
- the radiation source (5) and the detector are in a plane with the surface normal of the security element. They are arranged rigidly (immovably) to one another and form with the surface of the security element an arrangement which does not fulfill the law of reflection, i. Radiation falling on the security element (6) is reflected back from the surface of the security element and from the boundary layers between the transparent layer and possibly further layers of the security element (7 ") and does not get into the detector
- the detector (8) is rather tilted by an angle ⁇ with respect to the beam 7 "(the beams 7 'and 7" enclose the angle ⁇ .)
- the detector (8) detects reflections (7') of microreflectors whose reflective surface is opposite to the surface of the beam This ensures, on the one hand, that the security element is not an imitation in which microreflectors have been applied to the object by means of printing technology, on the other hand, no radiation reflected by the surface of the security element reaches the detector and causes it there an offset signal, the last point leads to a significant improvement the signal
- FIG. 8 shows the structure used in example 4 for authentication / identification of a security element (1) in the form of an identification card which is moved relative to a laser (5) and a detector (8) (direction of movement indicated by the thick arrow). During the movement, a part of the card is irradiated and the radiation reflected from this surface (14) is detected.
- FIG. 9 shows the intensity / of the radiation detected at the detector as a function of the travel path x of a security element from example 3 (see example 4).
- FIG. 10 shows the intensity / of the radiation detected at the detector as a function of the travel path x of a white ID card without microreflectors (see Example 4).
- FIG. 11 shows by way of example in a graphic representation the generation of zero crossings for storage and / or comparison with other data sets.
- the dotted curve (15) represents the originally measured intensity signal (possibly after filtering and smoothing) as a function of location. From this curve, averaging over the ⁇ 50 adjacent values for each individual point produces the arithmetic mean, represented by the dotted line Curve (16). At the intersections between the original data (15) and the averaged data (16) is a so-called zero crossing (solid curve (17)). The zero crossings as a function of the location are stored. They may be used for comparison with the corresponding records of other security features for identification and / or authentication purposes.
- Example 1 Preparation of a compound containing microreflectors
- the microreflectors used were hexagonal metal marking plates of the designation "OV Dot B” made of nickel with a thickness of 5 ⁇ m and a distance of the opposite sides of 100 ⁇ m.
- the platelets were printed, with some of the words “OVDot” to read.
- In the middle of the plates was a large “B” as Naturalgangsformbohrung.
- the clearance of the through-hole from the sides was 25 ⁇ m and accounted for 12.5% of the total area of the metal tag.
- a compound was made with the metal identification platelets.
- melt volume flow rate (MVR) is 6.0 cm 3 / (10 min) at 300 0 C and 1.2 kg load.
- the equipment used for the production of the films consists of
- a three-roll smoothing calender with horizontal roll arrangement wherein the third roll is pivotable by +/- 45 ° relative to the horizontal; • a roller conveyor;
- the compound from Example 1 was fed to the hopper of the extruder. In the respective plasticizing cylinder / screw of the extruder, the melting and conveying of the respective material took place. The material melt was then fed via the adapter to the smoothing calender whose rolls had the temperature stated in Table 1. On the smoothing calender (consisting of three rolls) was the final shaping and cooling of the film. To structure the film surfaces, a rubber roller (fine matt 2-sided surface) and a steel roller (matt 6-surface) were used. The rubber roller used for structuring the film surface is disclosed in US 4,368,240 to Nauta Roll Corporation, USA. Subsequently, the film was transported through a trigger. Thereafter, a protective film made of polyethylene can be applied on both sides and carried out a winding of the film.
- Makrolon® 3108 550115 PC from Bayer MaterialScience AG
- the metal identification platelets could be recognized as small dark hexagons.
- the metal identification platelets were evenly and randomly distributed over the entire film surface. Clumped agglomerated platelets could not be identified. There were no damaged or even destroyed platelets recognizable.
- the through hole "B" was undamaged. The shear resulted in the metal tags not being randomly oriented but randomly oriented by a preferred orientation parallel to the surface of the film. This random distribution around a preferred orientation is particularly advantageous in the inventive method for authentication and identification of objects, since a large part of the microreflectors are accessible to the method.
- Microreflectors which are oriented perpendicular to the surface of the transparent layer, show no reflections in the inventive method, since they lie in an angular range, which is not accessible to a reflection measurement. Such microreflectors have no purpose, they are not functional.
- a preferred orientation parallel to the surface of the transparent layer, as achieved in the present example, has a high proportion of functional microreflectors.
- the film can be used as a security element according to the invention. It can e.g. be laminated with other films to form a film composite can be punched out of the cards that can be used as ID cards (see Example 3).
- the security element is therefore an integral part of the object (ID card) and can not be removed from it intact.
- Example 3 Lamination of a film composite and production of a badge
- a composite film was laminated from the following films:
- the films were laminated in a press made by Bürkle at 10 bar and 180 ° C. Subsequently, a card the size of a credit card (format ID-I) was punched from the composite film. Thereafter, the metal detection platelets in the card were examined for their appearance by light microscopy.
- Example 4 Device and method for authentication and identification of an object (ID card) based on the security element according to the invention
- the radiation source used was a Flexpoint® FP-65/5 laser (wavelength 650 nm, maximum power 5 mW).
- the beam profile was line-shaped with a length of 2 mm and a width of 20 ⁇ m.
- the detector used was a Si NPN phototransistor type FT-30 from STM.
- the identification card generated in Example 3 was used.
- Laser and phototransistor were arranged rigidly to each other.
- the security element was compared to the rigid arrangement moved by one centimeter (see thick arrow in Figure 8). The speed was about 1 cm / second.
- the security element was irradiated continuously by laser light, wherein the longer side of the line-shaped beam profile was formed perpendicular to the direction of movement.
- 7,000 measured values (intensity of the reflected light) were detected by means of the phototransistor.
- FIG. 9 shows the result of the measurement in the form of a graphical representation.
- the intensity of the reflected light / is plotted against the travel x. There are clear reflections in
- Microreflectors those microreflectors oriented exactly such that the laser source, reflecting surface and phototransistor form a law satisfying the law of reflection show the highest intensity, while microreflectors having a slight deviation from the exact orientation have a smaller deviation corresponding to the deviation
- FIG. 10 shows a comparison of the result of a corresponding measurement on an identity card without microreflectors.
- the procedure is identical to the case described above. There are no sharp bands as in the case of Figure 9 can be seen.
- the curve shown in FIG. 9 represents a section of a characteristic reflection pattern of a security element.
- the raw data are usually smoothed and / or filtered. For example, it is possible to average for each value over a range of adjacent values to reduce noise. In the present case, averaging over ⁇ 5 adjacent values would be advantageous.
- a data reduction (signal approximation) takes place, ie the data is reduced to characteristic features.
- a special procedure will be briefly outlined here.
- the security element in addition to the microreflectors also has other optical features such as a print.
- the signals resulting from such optical features are superimposed on the signals by the micro-reflectors.
- other optical features e.g. to include a printed image in the analysis.
- the printed image can be used for position detection, on the one hand, and in addition to the microreflectors for authentication and / or identification, on the other hand.
- a printed image when exposed to light, produces a bright-dark distribution of the reflected light that can be detected by the detector.
- the light-dark distribution can be used as a reference indicating the relative position of microreflectors reflecting at defined angles.
- the presence of the characteristic Paoloscuro distribution can be used for authentication and / or identification.
Landscapes
- Business, Economics & Management (AREA)
- Accounting & Taxation (AREA)
- Finance (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Optics & Photonics (AREA)
- Credit Cards Or The Like (AREA)
- Inspection Of Paper Currency And Valuable Securities (AREA)
- Optical Elements Other Than Lenses (AREA)
- Lock And Its Accessories (AREA)
- Collating Specific Patterns (AREA)
Abstract
Description
Claims
Priority Applications (5)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US12/865,227 US20110031735A1 (en) | 2008-02-05 | 2009-01-24 | Security element |
EP09707424A EP2240333A2 (de) | 2008-02-05 | 2009-01-24 | Sicherheitselement |
CN2009801118972A CN102066125A (zh) | 2008-02-05 | 2009-01-24 | 安全元件 |
BRPI0907765A BRPI0907765A8 (pt) | 2008-02-05 | 2009-01-24 | Elemento de segurança |
JP2010545382A JP2011511322A (ja) | 2008-02-05 | 2009-01-24 | セキュリティエレメント |
Applications Claiming Priority (6)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
DE102008007731A DE102008007731B4 (de) | 2008-02-05 | 2008-02-05 | Verfahren und Vorrichtung zur Identifizierung und Authentifizierung von Objekten |
DE102008007731.3 | 2008-02-05 | ||
DE102008016803.3 | 2008-04-02 | ||
DE102008016803A DE102008016803A1 (de) | 2008-04-02 | 2008-04-02 | Authentifizierung von Objekten mittels Bilderkennung |
DE102008051409.8 | 2008-10-11 | ||
DE102008051409A DE102008051409A1 (de) | 2008-10-11 | 2008-10-11 | Sicherheitselement |
Publications (2)
Publication Number | Publication Date |
---|---|
WO2009097979A2 true WO2009097979A2 (de) | 2009-08-13 |
WO2009097979A3 WO2009097979A3 (de) | 2009-11-12 |
Family
ID=40873443
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/EP2009/000450 WO2009097979A2 (de) | 2008-02-05 | 2009-01-24 | Sicherheitselement |
Country Status (7)
Country | Link |
---|---|
US (1) | US20110031735A1 (de) |
EP (1) | EP2240333A2 (de) |
JP (1) | JP2011511322A (de) |
KR (1) | KR20100127748A (de) |
CN (1) | CN102066125A (de) |
BR (1) | BRPI0907765A8 (de) |
WO (1) | WO2009097979A2 (de) |
Cited By (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
DE102009023536A1 (de) | 2009-05-30 | 2010-12-02 | Bayer Technology Services Gmbh | Positionsgeber |
WO2011110799A1 (en) * | 2010-03-08 | 2011-09-15 | De La Rue International Limited | Improvements in security substrates for security documents |
WO2011128373A1 (de) | 2010-04-14 | 2011-10-20 | Bayer Technology Services Gmbh | Optischer scanner |
DE102010020810A1 (de) | 2010-05-18 | 2011-11-24 | Bayer Technology Services Gmbh | Identifizierung von Gegenständen |
WO2011147760A1 (de) | 2010-05-25 | 2011-12-01 | Bayer Technology Services Gmbh | Identifizierung von gegenständen |
WO2012080073A1 (de) * | 2010-12-13 | 2012-06-21 | Bayer Technology Services Gmbh | Positionserkennung |
JP2012121171A (ja) * | 2010-12-06 | 2012-06-28 | Dainippon Printing Co Ltd | 微粒子含有シートの製造方法 |
JP2015044409A (ja) * | 2014-09-29 | 2015-03-12 | 大日本印刷株式会社 | 微粒子含有シートの製造方法 |
JP2015166195A (ja) * | 2015-07-02 | 2015-09-24 | 大日本印刷株式会社 | 微粒子含有シートの製造方法 |
WO2024175150A1 (de) * | 2023-02-21 | 2024-08-29 | Giesecke+Devrient ePayments GmbH | Verfahren zum herstellen eines sicherheitsmerkmals für einen kartenförmigen datenträger und kartenförmiger datenträger |
Families Citing this family (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2011517971A (ja) * | 2008-03-25 | 2011-06-23 | オーソソフト インコーポレイテッド | 追跡装置および追跡方法 |
JP5651579B2 (ja) | 2008-03-25 | 2015-01-14 | オーソソフト インコーポレイテッド | 骨への変更を計画/誘導するための方法およびシステム |
US11224443B2 (en) | 2008-03-25 | 2022-01-18 | Orthosoft Ulc | Method and system for planning/guiding alterations to a bone |
EP3760151A1 (de) * | 2010-01-19 | 2021-01-06 | Orthosoft ULC | Tracking-system und -verfahren |
JP5589939B2 (ja) * | 2011-04-12 | 2014-09-17 | 大日本印刷株式会社 | 微粒子、粒子群、偽造防止用インク、偽造防止用トナー、偽造防止用シートおよび偽造防止媒体 |
JP5824878B2 (ja) * | 2011-05-31 | 2015-12-02 | 大日本印刷株式会社 | 偽装防止用粒子の製造方法 |
JP5729140B2 (ja) * | 2011-05-31 | 2015-06-03 | 大日本印刷株式会社 | 偽造防止用樹脂粒子の製造方法、偽造防止用インクの製造方法、偽造防止用シートの製造方法 |
EP2874822B2 (de) | 2012-07-17 | 2020-01-22 | Hewlett-Packard Indigo B.V. | Sichtbares sicherheitsmerkmal |
AT515845B1 (de) * | 2014-06-10 | 2017-05-15 | Hueck Folien Gmbh | Sicherheitselement und Verfahren zur Herstellung eines Sicherheitselements mit lichtstreuenden Strukturen |
US10385514B1 (en) | 2014-12-30 | 2019-08-20 | Idemia Identity & Security USA LLC | Identification document with dynamic window |
EP3374199A1 (de) * | 2015-11-13 | 2018-09-19 | Entrust Datacard Corporation | Optisch variables taktiles sicherheitsmerkmal |
WO2020173696A1 (en) * | 2019-02-28 | 2020-09-03 | Sicpa Holding Sa | Verifiable access credential |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5059245A (en) * | 1979-12-28 | 1991-10-22 | Flex Products, Inc. | Ink incorporating optically variable thin film flakes |
EP0668577A1 (de) * | 1994-02-04 | 1995-08-23 | De La Rue Giori S.A. | Qualitätskontroll-Anlage für gedruckte Blätter, insbesondere Wertpapiere |
EP1669213A1 (de) * | 2004-12-09 | 2006-06-14 | Sicpa Holding S.A. | Sicherheitselement mit einer Erscheinungsform abhängig von dem Betrachtungswinkel |
WO2006076616A2 (en) * | 2005-01-14 | 2006-07-20 | Cabot Corporation | Security features, their use, and processes for making them |
Family Cites Families (17)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US3365517A (en) * | 1965-04-08 | 1968-01-23 | Union Carbide Corp | Mixtures of polycarbonates and polyarylene polyethers |
DE2305413C2 (de) * | 1973-02-03 | 1982-05-13 | Bayer Ag, 5090 Leverkusen | Verzweigte aromatische Polyaryläthersulfone |
US4152367A (en) * | 1977-08-04 | 1979-05-01 | Bayer Aktiengesellschaft | Branched polyaryl-sulphone/polycarbonate mixtures and their use for the production of extruded films |
DE3010143C2 (de) * | 1980-03-15 | 1982-05-06 | Bayer Ag, 5090 Leverkusen | Kunststoffverbundlaminat, seine Herstellung und seine Verwendung |
US4368240A (en) * | 1981-07-27 | 1983-01-11 | Nauta Roll Corporation | High gloss rubber roll |
DE19536043A1 (de) * | 1995-09-28 | 1997-04-10 | Hoechst Ag | Polyolefinfolie mit Cycloolefinpolymer, Verfahren zu ihrer Herstellung und ihre Verwendung |
EP0800914B1 (de) * | 1996-04-11 | 2002-07-03 | Mitsui Chemicals, Inc. | Mehrschichtfolie und Verpackunsgmaterial |
DE10113268B4 (de) * | 2001-03-16 | 2021-06-24 | Bundesdruckerei Gmbh | Sensor für die Echtheitserkennung von Sicherheitsmerkmalen auf Wert und/oder Sicherheitsdokumenten |
DE10126342C1 (de) * | 2001-05-30 | 2003-01-30 | Hsm Gmbh | Optisches Element und Verfahren zu dessen Herstellung |
US6898943B2 (en) * | 2001-08-06 | 2005-05-31 | Yamatake Corporation | Method of controlling temperature/humidity or temperature and device for controlling temperature/humidity or temperature |
JP3947027B2 (ja) * | 2002-03-29 | 2007-07-18 | 株式会社東芝 | 認証システム及び認証方法 |
DE10232245B4 (de) * | 2002-07-17 | 2008-06-12 | Leonhard Kurz Gmbh & Co. Kg | Optisch variables Element mit variierender Distanzschicht-Dicke |
JP4030830B2 (ja) * | 2002-08-13 | 2008-01-09 | 日本電気株式会社 | 縞模様画像鑑定装置および縞模様画像鑑定方法 |
JP2004171109A (ja) * | 2002-11-18 | 2004-06-17 | Nippon Telegr & Teleph Corp <Ntt> | デバイス認証システム |
JP3719435B2 (ja) * | 2002-12-27 | 2005-11-24 | セイコーエプソン株式会社 | 指紋照合方法及び指紋照合装置 |
US7808706B2 (en) * | 2004-02-12 | 2010-10-05 | Tredegar Newco, Inc. | Light management films for displays |
DE102004045211B4 (de) * | 2004-09-17 | 2015-07-09 | Ovd Kinegram Ag | Sicherheitsdokument mit elektrisch gesteuertem Anzeigenelement |
-
2009
- 2009-01-24 KR KR1020107017377A patent/KR20100127748A/ko not_active Application Discontinuation
- 2009-01-24 CN CN2009801118972A patent/CN102066125A/zh active Pending
- 2009-01-24 EP EP09707424A patent/EP2240333A2/de not_active Withdrawn
- 2009-01-24 US US12/865,227 patent/US20110031735A1/en not_active Abandoned
- 2009-01-24 WO PCT/EP2009/000450 patent/WO2009097979A2/de active Application Filing
- 2009-01-24 BR BRPI0907765A patent/BRPI0907765A8/pt not_active IP Right Cessation
- 2009-01-24 JP JP2010545382A patent/JP2011511322A/ja active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5059245A (en) * | 1979-12-28 | 1991-10-22 | Flex Products, Inc. | Ink incorporating optically variable thin film flakes |
EP0668577A1 (de) * | 1994-02-04 | 1995-08-23 | De La Rue Giori S.A. | Qualitätskontroll-Anlage für gedruckte Blätter, insbesondere Wertpapiere |
EP1669213A1 (de) * | 2004-12-09 | 2006-06-14 | Sicpa Holding S.A. | Sicherheitselement mit einer Erscheinungsform abhängig von dem Betrachtungswinkel |
WO2006076616A2 (en) * | 2005-01-14 | 2006-07-20 | Cabot Corporation | Security features, their use, and processes for making them |
Cited By (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
DE102009023536A1 (de) | 2009-05-30 | 2010-12-02 | Bayer Technology Services Gmbh | Positionsgeber |
US8950679B2 (en) | 2010-03-08 | 2015-02-10 | De La Rue International Limited | Security substrates for security documents |
WO2011110799A1 (en) * | 2010-03-08 | 2011-09-15 | De La Rue International Limited | Improvements in security substrates for security documents |
EP2545489B1 (de) | 2010-03-08 | 2016-04-13 | De La Rue International Limited | Verbesserte sicherheitssubstrate für sicherheitsdokumente |
WO2011128373A1 (de) | 2010-04-14 | 2011-10-20 | Bayer Technology Services Gmbh | Optischer scanner |
DE102010015014A1 (de) | 2010-04-14 | 2011-10-20 | Bayer Technology Services Gmbh | Optischer Scanner |
DE102010020810A1 (de) | 2010-05-18 | 2011-11-24 | Bayer Technology Services Gmbh | Identifizierung von Gegenständen |
WO2011144533A1 (de) | 2010-05-18 | 2011-11-24 | Bayer Technology Services Gmbh | Identifizierung von gegenständen |
WO2011147760A1 (de) | 2010-05-25 | 2011-12-01 | Bayer Technology Services Gmbh | Identifizierung von gegenständen |
DE102010021380A1 (de) | 2010-05-25 | 2011-12-01 | Bayer Technology Services Gmbh | Identifizierung von Gegenständen |
JP2012121171A (ja) * | 2010-12-06 | 2012-06-28 | Dainippon Printing Co Ltd | 微粒子含有シートの製造方法 |
WO2012080073A1 (de) * | 2010-12-13 | 2012-06-21 | Bayer Technology Services Gmbh | Positionserkennung |
JP2015044409A (ja) * | 2014-09-29 | 2015-03-12 | 大日本印刷株式会社 | 微粒子含有シートの製造方法 |
JP2015166195A (ja) * | 2015-07-02 | 2015-09-24 | 大日本印刷株式会社 | 微粒子含有シートの製造方法 |
WO2024175150A1 (de) * | 2023-02-21 | 2024-08-29 | Giesecke+Devrient ePayments GmbH | Verfahren zum herstellen eines sicherheitsmerkmals für einen kartenförmigen datenträger und kartenförmiger datenträger |
Also Published As
Publication number | Publication date |
---|---|
BRPI0907765A8 (pt) | 2016-04-26 |
US20110031735A1 (en) | 2011-02-10 |
BRPI0907765A2 (pt) | 2015-07-14 |
CN102066125A (zh) | 2011-05-18 |
JP2011511322A (ja) | 2011-04-07 |
EP2240333A2 (de) | 2010-10-20 |
KR20100127748A (ko) | 2010-12-06 |
WO2009097979A3 (de) | 2009-11-12 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2009097979A2 (de) | Sicherheitselement | |
DE102008051409A1 (de) | Sicherheitselement | |
EP2867031B1 (de) | Sicherheitselement mit beugungsstrukturen aufweisenden mikrostrukturen sowie verfahren zur herstellung und verifikation | |
DE112009002538T5 (de) | Passerverfahren und Vorrichtung für geprägte und gedruckte Merkmale | |
WO2013156149A1 (de) | Optisch variables sicherheitselement | |
EP2991837A1 (de) | Optisch variables sicherheitselement | |
WO2012097463A1 (de) | Verfahren zur herstellung eines mehrschichtigen datenträgers sowie nach diesem verfahren hergestellter datenträger | |
WO2013064268A1 (de) | Optisch variables sicherheitselement | |
EP2259930A2 (de) | Sicherheitselement | |
DE202010017843U1 (de) | Positionsgeber | |
WO2009036878A1 (de) | Thermoplast mit metallkennzeichnungsplättchen | |
EP2239150B1 (de) | Sicherheitseinrichtung | |
EP3778255A2 (de) | Wert- oder sicherheitsprodukt, verfahren zu dessen herstellung und vorrichtung zur rekonstruktion und erfassung eines reflexionshologramms eines solchen | |
EP3972852A1 (de) | Sicherheitselement mit anamorph veränderter abbildung | |
DE102020133863B4 (de) | Wert- oder sicherheitsprodukt sowie verfahren zu dessen herstellung | |
EP3989007A1 (de) | Wert- oder sicherheitsprodukt sowie verfahren zu dessen verifikation | |
EP2558303B1 (de) | Selbstverifizierendes optisches sicherheitselement | |
EP3279003A1 (de) | Sicherheitselement und verfahren zur herstellung eines sicherheitselements | |
WO2024208714A1 (de) | Sicherheitsdokument und verfahren zur herstellung eines sicherheitsdokuments | |
EP4187512A1 (de) | Vorrichtung und verfahren zur optischen erfassung eines wert- oder sicherheitsprodukts | |
EP3989187A1 (de) | Verfahren zur echtheitsverifikation eines aus mehreren teilen gebildeten sicherheitsmerkmals eines wert- oder sicherheitsprodukts | |
EP2892728B1 (de) | Verbundkörper mit innenliegendem linsenarray | |
DE102015015407A1 (de) | Prägeverfahren zum Prägen von Mikro- oder Nanostrukturen | |
AT518766A2 (de) | Winkelabhängige Effekte erzeugende diffraktive Vorrichtung |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
WWE | Wipo information: entry into national phase |
Ref document number: 200980111897.2 Country of ref document: CN |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 09707424 Country of ref document: EP Kind code of ref document: A2 |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2009707424 Country of ref document: EP |
|
ENP | Entry into the national phase |
Ref document number: 20107017377 Country of ref document: KR Kind code of ref document: A |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2010545382 Country of ref document: JP |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
WWE | Wipo information: entry into national phase |
Ref document number: 12865227 Country of ref document: US |
|
ENP | Entry into the national phase |
Ref document number: PI0907765 Country of ref document: BR Kind code of ref document: A2 Effective date: 20100804 |