WO2009097980A2 - Sicherheitselement - Google Patents
Sicherheitselement Download PDFInfo
- Publication number
- WO2009097980A2 WO2009097980A2 PCT/EP2009/000451 EP2009000451W WO2009097980A2 WO 2009097980 A2 WO2009097980 A2 WO 2009097980A2 EP 2009000451 W EP2009000451 W EP 2009000451W WO 2009097980 A2 WO2009097980 A2 WO 2009097980A2
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- security element
- layer
- scattering
- element according
- area
- Prior art date
Links
- 230000003287 optical effect Effects 0.000 claims abstract description 49
- 238000000034 method Methods 0.000 claims abstract description 32
- 239000000853 adhesive Substances 0.000 claims abstract description 20
- 230000005670 electromagnetic radiation Effects 0.000 claims abstract description 19
- 239000010410 layer Substances 0.000 claims description 88
- 239000011241 protective layer Substances 0.000 claims description 25
- 239000012790 adhesive layer Substances 0.000 claims description 22
- 230000002427 irreversible effect Effects 0.000 claims description 10
- 238000003892 spreading Methods 0.000 claims description 5
- 230000001066 destructive effect Effects 0.000 claims description 4
- 238000004519 manufacturing process Methods 0.000 abstract description 8
- 230000006378 damage Effects 0.000 abstract description 7
- 238000004080 punching Methods 0.000 description 25
- 230000001070 adhesive effect Effects 0.000 description 14
- 239000000835 fiber Substances 0.000 description 11
- 239000000123 paper Substances 0.000 description 11
- 239000000976 ink Substances 0.000 description 10
- 238000000926 separation method Methods 0.000 description 9
- 230000005855 radiation Effects 0.000 description 8
- 238000001514 detection method Methods 0.000 description 7
- 238000009826 distribution Methods 0.000 description 5
- 239000002131 composite material Substances 0.000 description 4
- 239000002657 fibrous material Substances 0.000 description 4
- 239000000463 material Substances 0.000 description 4
- 239000011159 matrix material Substances 0.000 description 3
- 238000012015 optical character recognition Methods 0.000 description 3
- 239000000049 pigment Substances 0.000 description 3
- 238000012545 processing Methods 0.000 description 3
- WKBPZYKAUNRMKP-UHFFFAOYSA-N 1-[2-(2,4-dichlorophenyl)pentyl]1,2,4-triazole Chemical compound C=1C=C(Cl)C=C(Cl)C=1C(CCC)CN1C=NC=N1 WKBPZYKAUNRMKP-UHFFFAOYSA-N 0.000 description 2
- 235000000177 Indigofera tinctoria Nutrition 0.000 description 2
- GWEVSGVZZGPLCZ-UHFFFAOYSA-N Titan oxide Chemical compound O=[Ti]=O GWEVSGVZZGPLCZ-UHFFFAOYSA-N 0.000 description 2
- 239000000969 carrier Substances 0.000 description 2
- 238000002845 discoloration Methods 0.000 description 2
- 239000000975 dye Substances 0.000 description 2
- 230000007613 environmental effect Effects 0.000 description 2
- 238000009432 framing Methods 0.000 description 2
- 229940097275 indigo Drugs 0.000 description 2
- COHYTHOBJLSHDF-UHFFFAOYSA-N indigo powder Natural products N1C2=CC=CC=C2C(=O)C1=C1C(=O)C2=CC=CC=C2N1 COHYTHOBJLSHDF-UHFFFAOYSA-N 0.000 description 2
- 238000003475 lamination Methods 0.000 description 2
- -1 polyethylene Polymers 0.000 description 2
- 238000003860 storage Methods 0.000 description 2
- 238000012360 testing method Methods 0.000 description 2
- 239000011031 topaz Substances 0.000 description 2
- 229910052853 topaz Inorganic materials 0.000 description 2
- 238000002834 transmittance Methods 0.000 description 2
- NIXOWILDQLNWCW-UHFFFAOYSA-M Acrylate Chemical compound [O-]C(=O)C=C NIXOWILDQLNWCW-UHFFFAOYSA-M 0.000 description 1
- 239000004698 Polyethylene Substances 0.000 description 1
- 239000004743 Polypropylene Substances 0.000 description 1
- 230000032683 aging Effects 0.000 description 1
- 239000011111 cardboard Substances 0.000 description 1
- 239000012876 carrier material Substances 0.000 description 1
- 238000010276 construction Methods 0.000 description 1
- 238000012937 correction Methods 0.000 description 1
- 238000005336 cracking Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 230000018109 developmental process Effects 0.000 description 1
- 239000003292 glue Substances 0.000 description 1
- 238000010191 image analysis Methods 0.000 description 1
- 230000000670 limiting effect Effects 0.000 description 1
- 238000004806 packaging method and process Methods 0.000 description 1
- 230000036961 partial effect Effects 0.000 description 1
- 229920000573 polyethylene Polymers 0.000 description 1
- 229920001155 polypropylene Polymers 0.000 description 1
- 230000001681 protective effect Effects 0.000 description 1
- 230000002441 reversible effect Effects 0.000 description 1
- 230000008054 signal transmission Effects 0.000 description 1
- 230000035882 stress Effects 0.000 description 1
- 239000000758 substrate Substances 0.000 description 1
- 239000004753 textile Substances 0.000 description 1
- 239000004408 titanium dioxide Substances 0.000 description 1
- 238000012546 transfer Methods 0.000 description 1
- 230000000007 visual effect Effects 0.000 description 1
Classifications
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B42—BOOKBINDING; ALBUMS; FILES; SPECIAL PRINTED MATTER
- B42D—BOOKS; BOOK COVERS; LOOSE LEAVES; PRINTED MATTER CHARACTERISED BY IDENTIFICATION OR SECURITY FEATURES; PRINTED MATTER OF SPECIAL FORMAT OR STYLE NOT OTHERWISE PROVIDED FOR; DEVICES FOR USE THEREWITH AND NOT OTHERWISE PROVIDED FOR; MOVABLE-STRIP WRITING OR READING APPARATUS
- B42D25/00—Information-bearing cards or sheet-like structures characterised by identification or security features; Manufacture thereof
- B42D25/40—Manufacture
- B42D25/45—Associating two or more layers
- B42D25/465—Associating two or more layers using chemicals or adhesives
- B42D25/47—Associating two or more layers using chemicals or adhesives using adhesives
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B42—BOOKBINDING; ALBUMS; FILES; SPECIAL PRINTED MATTER
- B42D—BOOKS; BOOK COVERS; LOOSE LEAVES; PRINTED MATTER CHARACTERISED BY IDENTIFICATION OR SECURITY FEATURES; PRINTED MATTER OF SPECIAL FORMAT OR STYLE NOT OTHERWISE PROVIDED FOR; DEVICES FOR USE THEREWITH AND NOT OTHERWISE PROVIDED FOR; MOVABLE-STRIP WRITING OR READING APPARATUS
- B42D25/00—Information-bearing cards or sheet-like structures characterised by identification or security features; Manufacture thereof
- B42D25/20—Information-bearing cards or sheet-like structures characterised by identification or security features; Manufacture thereof characterised by a particular use or purpose
- B42D25/29—Securities; Bank notes
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B42—BOOKBINDING; ALBUMS; FILES; SPECIAL PRINTED MATTER
- B42D—BOOKS; BOOK COVERS; LOOSE LEAVES; PRINTED MATTER CHARACTERISED BY IDENTIFICATION OR SECURITY FEATURES; PRINTED MATTER OF SPECIAL FORMAT OR STYLE NOT OTHERWISE PROVIDED FOR; DEVICES FOR USE THEREWITH AND NOT OTHERWISE PROVIDED FOR; MOVABLE-STRIP WRITING OR READING APPARATUS
- B42D25/00—Information-bearing cards or sheet-like structures characterised by identification or security features; Manufacture thereof
Definitions
- the invention relates to a security element, the use of the security element for the identification and authentication of objects and for the protection against counterfeiting and a method for the identification and authentication of objects based on the security element according to the invention.
- a well-known representative of the bar codes is the code EAN 8, which is defined in the international standard ISO / TEC 15420. It encodes a sequence of 8 digits in the form of bars and gaps of different widths. Typically, the bars are coated with a black ink on a white support, e.g. the packaging of the object to be marked or printed on the object itself.
- bar codes In addition to the described code EAN 8, there are numerous other barcodes that encode not only numbers but also letters, special characters and control characters. Further, some codes contain error detection and error correction characters which allow to detect and in part even correct errors in the signal transmission.
- a further development of the bar codes represent the 2D codes, in which the information is not only one-dimensional, but optically coded in two dimensions. A subset of the 2D codes form the so-called matrix codes.
- a known representative is e.g. the Data Matrix Code defined in the International Standard ISO / IEC 16022.
- Optical codes can be created easily and at a very low cost (pressure) and are fast and robust in capturing. They are ideal for identifying objects suitable.
- optical codes are suitable for object tracking (track & trace).
- An object for example, is assigned a unique number so that the object can be identified at each station in the logistics chain and thus the movement of the object from one station in the logistics chain to another tracked.
- optical codes do not provide forgery protection because they are easy to copy and reproduce.
- Security elements are preferably inseparably connected to the objects to be protected. The attempt to separate the security elements from the object preferably leads to their destruction, so that the security elements can not be misused.
- the authenticity of an object can be verified by the presence of one or more security elements.
- the method of verifying the authenticity of an object is referred to herein as authentication.
- Optical security elements such as e.g. Watermarks, specialty inks, guilloche patterns, micro-typefaces and holograms are established worldwide.
- An overview of optical security elements, which are particularly but not exclusively suitable for document protection, is published in the following book: Rudolf L. van Renesse, Optical Document Security, Third Edition, Artech House Boston / London, 2005 (pp 63-259).
- WO2005088533 (A1) describes a method with which objects can be identified and authenticated on the basis of their characteristic surface structure. The method comes without additional means such as security elements that are connected to the objects from.
- a laser beam is focused on the surface of the object, across the surface moves (scanning) and detected by means of photodetectors at different points of the surface at different angles different degrees of scattered rays.
- the detected scattered radiation is characteristic of a variety of different materials and is very difficult to imitate because it is due to coincidences in the production of the object.
- paper-like objects have a production-related nature Fiber structure unique to each manufactured object.
- the scatter data for the individual objects are stored in a database in order to be able to authenticate the object at a later time. For this purpose, the object is measured again and the scatter data compared with the stored reference data.
- a disadvantage of the method is that an extensive database for the scatter data of all captured objects must be created.
- the database must have a high storage capacity in order to be able to store the large amount of data of scatter data of a large number of objects.
- the access time to the data in the database must be fast because the collected scatter data for authentication must be compared to all reference data in the database (1: n match) to find the correct record.
- not every object has a surface that is accessible to a method according to WO2005088533 (A1).
- the object is to provide a solution for identifying and authenticating objects that is applicable to a wide variety of different objects that are easy to implement existing IT infrastructures can be built, which ensures a high protection against counterfeiting and which is also still cost-effective.
- this object can be achieved by a security element which is irreversibly connected to an object and which comprises a code area and a scatter area, the code area being used to identify the object on the basis of an optical code and the scatter area for authenticating the object characteristic scattered radiation due to random characteristics is used.
- the subject of the present invention is therefore a security element in the form of a self-adhesive label for attaching the security element to an object, with
- the security element comprises a code area and a visually marked spreading area, the code area having an optical code and the spreading area having randomly distributed and / or oriented scattering centers which, upon irradiation of the Scattering with electromagnetic radiation for the
- Security element cause characteristic and unique scatter signal.
- Identification is the process that is used to uniquely recognize an object. If an object is uniquely recognized, it can be uniquely assigned or it can be uniquely assigned to the detected object. For example, An item (object) can be assigned a price or its destination. The identification takes place on the basis of characteristics characterizing the object and distinguishing from other objects.
- Authentication is the process of verifying (verifying) an alleged identity.
- the authentication of objects, documents, or data is the assertion that they are authentic - that is, they are unchanged, not copied or faked originals.
- the authentication also takes place on the basis of features characterizing the object and distinguishing from other objects.
- the features for identification and the features for authentication of an object are provided by the security element according to the invention.
- the code area includes the characteristics required for identification.
- the code area comprises at least one optical code, e.g. a barcode or 2D code or other optically machine readable code.
- the optical code preferably encodes a unique identification number for the security element. On the basis of the identification number, a unique association between the security element and e.g. an entry in a database, a file containing a characteristic scatter signal for reference, or any other real or virtual object.
- the optical code is preferably printed with a dark color on a light background. Likewise, an inverse representation is conceivable in which the optical code is printed in light color on a dark background.
- the size of the code area is determined by the size of the optical code used. Usually, the size of the code area is in the range between 50 mm 2 and 1000 mm 2 .
- the security element according to the invention comprises more than one code area and / or more than one optical code.
- the scattering range of the security element according to the invention is characterized in that it generates a characteristic scattered signal upon irradiation with electromagnetic radiation.
- Scattering is understood to mean that electromagnetic radiation impinging on a scattering area in the form of a bundle is reflected in different directions. While a parallel beam is reflected when hitting a plane mirror and is reflected back as a parallel beam at a defined angle, incident radiation in the case of the scattering range is reflected by a plurality of scattering centers in different directions.
- the scattering centers of the scattering range of a security element according to the invention are subject to a random distribution and / or orientation.
- Random distribution and / or orientation means that the position of individual scattering centers and / or the orientation of individual scattering centers can not be foreseen by the production process.
- the location and / or orientation of individual Scattering centers are subject to random fluctuations in the manufacturing process. The location and / or orientation of individual scattering centers can therefore not be easily reproduced. This fact is due to the high level of protection afforded by the security feature according to the invention: it can be adjusted only at great expense.
- the random distribution and / or orientation provides for individualization: each security element is unique (individual) due to the random distribution and / or orientation of the scattering centers, which manifests itself in a unique, characteristic scattered signal when irradiated with electromagnetic radiation.
- the scattering centers of a security element according to the invention preferably have a size of 1 square micrometer to 0.001 square millimeters.
- the scattering centers may be formed by pigments (e.g., titanium dioxide) or fibers (e.g., pulp).
- the scattering centers of a security element according to the invention are preferably provided by a fibrous material which has a production-related random fiber structure which causes a characteristic scattered radiation upon irradiation with electromagnetic radiation.
- a fiber structure is e.g. in paper, cardboard or textiles.
- a paper is used as the pulp.
- electromagnetic radiation having at least one wavelength in the range of 300 nm to 1000 nm is scattered by the scattering range of the security element according to the invention.
- the scattering area is visually identified in a preferred embodiment of the security element according to the invention. This makes it clear to a user at which point an authentication takes place based on the characteristic scatter signal. A user thus knows which location of the security element according to the invention must be presented to a device for automatic authentication.
- the visual identification is furthermore such that it can also be used by the device for machine authentication as a positioning mark for the detection of the scattering area.
- the scattering range can be made visually recognizable, for example, by framing with a solid line.
- the size of the scattering range is in the range between 50 mm 2 and 1000 mm 2 .
- the code area is preferably rectangular, with the corners being rounded. It is also conceivable to perform the scattering area square, round, elliptical, oval, triangular, pentagonal or generally n-shaped.
- code area and scatter area are spatially separated from one another. However, it is also conceivable that they overlap completely or partially or that one area completely covers the other.
- the security element according to the invention is preferably designed as a self-adhesive label in order to be able to be attached to a multiplicity of different objects.
- a self-adhesive label is understood to mean a flat composite which has an adhesive layer which allows a bond between the label and an object by means of adhesion.
- a flat body here means a body whose spatial extent (thickness) is smaller by at least a factor of 10, preferably at least by a factor of 50, than the two remaining spatial dimensions (length, width).
- Composite means a body of two or more interconnected materials. The connection between the materials preferably takes place via lamination and / or adhesion.
- the security element according to the invention has a layer structure of at least four layers: an adhesive layer, a fiber-containing layer, a print layer and a protective layer.
- the security element according to the invention is connected to an object.
- the adhesive layer is adapted to the material properties of the object in order to achieve a good connection between the security element and the object.
- the fibrous-containing layer comprises at least one fibrous material which serves for receiving printing ink (dyes, pigments) and at the same time provides randomly distributed and / or oriented scattering centers.
- the security element has a protective layer which is directed to the outside world and protects the lower layers from harmful environmental influences (moisture, mechanical stress, UV radiation, etc.).
- the protective layer is transparent to at least a portion of visible electromagnetic radiation to view the printing layer, to machine read the optical code and to irradiate the scattering area with electromagnetic radiation and to be able to receive a characteristic scattering signal.
- the protective layer for electromagnetic radiation having at least one wavelength in the range of 300 nm to 1000 nm is transparent.
- Transparency is understood to mean that the proportion of electromagnetic radiation having at least one wavelength which penetrates the layer is greater than the sum of
- Transmittance of the layer is thus greater than 50%, with transmittance the
- Ratio of the intensity of the electromagnetic radiation with at least one wavelength, which passes through the layer based on the intensity of the electromagnetic radiation with the at least one wavelength, which is incident on the layer to understand.
- the individual layers within the security element according to the invention do not necessarily extend over the entire security element. For example, not all areas of the pulp are printed. In particular, the spreading area is not printed.
- the printing layer thus does not extend over the entire cross-section of a security element according to the invention.
- the layers along the layer sequence are not necessarily spatially separated from one another. For example, the print layer will to a certain extent penetrate into the fiber structure of the pulp and form a layer comprising pulp and print layer.
- FIG. 1 An example of a layer sequence in a security element according to the invention is shown in FIG.
- the layer sequence shown is a lowermost adhesive protective layer, an adhesive layer, a fibrous-containing layer, a printing layer, a protective layer.
- a layer of adhesive protection is usually applied below the adhesive layer.
- This adhesive protective layer protects against unwanted adhesion of the adhesive layer with any objects.
- the adhesive protective layer is removed before attaching the security element according to the invention to an object.
- the adhesive protective layer usually also serves as a carrier material for one or more security elements.
- label-shaped security elements are held in large numbers on a support.
- the label-shaped security elements are held on a carrier tape which is rolled up into a roll. It is also conceivable to store a plurality of security elements on arched carriers. From the carriers, the security elements can be applied to objects by machine or manually.
- As a carrier films are usually used.
- the uniqueness of inventive security elements allows the individualization of objects with which they are connected. Therefore, the security element according to the invention preferably has features that prevent non-destructive detachment from an object.
- the attempt to remove a security element according to the invention from an object leads to the destruction of the security element, so that it becomes unusable. This prevents the security element, which gives an object measurable individuality, from being transferred to another object and thus misused.
- the security feature according to the invention has a separating layer.
- the adhesive layer for bonding to an object and the separation layer are matched to one another such that the forces which hold the separation layer together are weaker than the forces which hold the security element and an object together via the adhesive layer.
- the attempt to remove the security element from the object therefore, leads rather to a separation of the separation layer than to a detachment of the adhesive layer from the object.
- the separating layer accordingly represents a predetermined breaking point.
- the separating layer is formed from a fibrous material which irreversibly tears along the layer and thereby forms clear traces of crack indicating a separation attempt.
- the security element according to the invention has a layer which undergoes an irreversible color change on exceeding and / or falling below a certain temperature limit (color change layer).
- the irreversible color change occurs at least 5 Kelvin below the upper temperature limit of the effective adhesive area and / or at least 5 Kelvin above the lower temperature limit of the effective Kle area.
- the security element according to the invention has a color change layer, which makes the optical code illegible when it exceeds or falls below a certain temperature limit. It is conceivable, for example, for the color change layer to undergo discoloration when it exceeds or falls short of the temperature limit and corresponds to the hue of the optical code. Is the Color change layer attached below or above the optical code, the discoloration causes the optical code can not be discriminated from its environment, he is no longer mechanically detectable.
- optical code itself makes a change in color, which means that it no longer visually emphasizes its surroundings.
- the preferably combination of the irreversible color change when exceeding and / or falling below a temperature limit with the functionality of the optical code has the advantage that an attack attempt can be detected by machine during read operation of the optical code, without further means for the detection of an attack attempt are necessary.
- the security element according to the invention has punches which, in the case of a detachment attempt of the security element, lead from an object to a division of the security element. By punching thus a replacement of the security element as a whole of an object is difficult / prevented. Forces acting on the security element during a detachment attempt are purposefully channeled through the punches and lead to a division of the security element.
- the division of the security element is preferably irreversible, e.g. can be achieved that the punches do not lead through all layers of the security element, so that in a division, a layer in which no punching is present, through the division undergoes irreversible, recognizable separation (destruction).
- the security element according to the invention has a plurality of said features which prevent a reversible detachment of the security element from an object or indicate a detachment attempt.
- the security element according to the invention can be round, elliptical, oval or n-square. But it is also any other arbitrary form conceivable.
- the size of the inventive security element is between 100 mm 2 and 10,000 mm 2 .
- the security element according to the invention can be combined with further security features known from the prior art, such as, for example, watermarks, special inks, guilloche patterns, micro-typefaces and holograms.
- the security element according to the invention permits the use of the IT infrastructure already available for optical codes.
- the security element according to the invention is simple and intuitive to use, inexpensive and offers a high protection against counterfeiting.
- the present invention furthermore relates to the use of the security element according to the invention for the identification and / or authentication of objects and for the protection against counterfeiting.
- the security element according to the invention is connected by means of the adhesive layer with an object. Since the security element according to the invention is designed as a self-adhesive label, it can be connected to a large number of different objects. Thus, it also makes such objects accessible for identification / authentication by a method according to WO2005088533 (A1), which would otherwise not be suitable for a method according to WO2005088533 (A1) due to their surface condition.
- the mere presence of the security element according to the invention on an object indicates the authenticity of the corresponding object and thus serves to protect against counterfeiting. Based on the presence of the security element on the object, a human being can recognize that it is most likely an authentic object because the security element can not be removed from one object and transferred to another object.
- the security element according to the invention is used on an object for identifying and authenticating objects.
- the security element according to the invention is detected prior to attachment to an object.
- detection is meant that the characteristic scatter signal is determined by the scattering range of the security element according to the invention and stored in the form of an electronically and mechanically processable file, wherein before or after storage, a link between the file containing the characteristic scatter signal and the optical code or a by means of optical code printed on the security element identification number.
- the security element is registered. It carries an optical code associated with a file containing the characteristic scatter signal. This file is referred to here as a reference record.
- the reference data set may contain the entire characteristic scattering signal in digitized form; but it can also contain only a part, for example a characteristic pattern within the signal, a so-called fingerprint.
- the security element according to the invention After the security element according to the invention has been detected / registered, it is attached to an object. Since it can not be removed from the object without destroying it, it gives the object an individual identification number (optical code) and a unique characteristic for authentication (characteristic scatter signal).
- the use of the security element according to the invention for the identification and authentication as well as for the counterfeit protection of an object comprises at least the steps:
- steps (I) to (FV) are carried out in the order mentioned, wherein the order of steps (II) and (JS) can also be changed.
- step (I) the characteristic scattering signal of the security element according to the invention is determined. The determination takes place by irradiation of the scattering range with electromagnetic radiation having at least one wavelength in the range of 300 nm to 1000 nm and detection of part of the radiation reflected by the scattering range at different angles. The determination of the characteristic scattering signal preferably takes place by means of a method according to WO2005088533 (A1).
- the security elements can be detected quickly after their manufacture. Captured security elements can be generated and stored in advance and attached to an object as needed.
- the method for identifying and authenticating objects by means of the security element according to the invention is likewise an object of the present invention.
- the method according to the invention comprises at least the following steps:
- the identification and authentication of an object is preferably carried out by machine.
- Step (A) is for identifying the object based on the optical code.
- the reading of the optical code in step (A) can be done with a corresponding commercial scanner for the optical code used.
- the result is usually an identification number for the object.
- optical codes refer to the extensive literature on the decoding of optical codes (eg C. Demant, B. Streicher-Abel, P. Waszkewitz, Industrial Image Processing, Springer-Verlag, 1998, p. 133 ff, J. Rosenbaum, Barcode, Verlagtechnik Berlin, 2000, p. 84 ff).
- the characteristic scattering signal does not have to be compared with all the scattered signals of objects that have been detected at an earlier point in time.
- the information about the identity of the object can be used to selectively select one or more stray signals from previously detected objects.
- the reference data set comprises one or more selectively selected scatter signals, which has been determined at an earlier point in time and stored in the form of machine-processable data preferably in a database. Ideally, the reference data set includes only a single leakage signal.
- the determination of the reference data record can be effected, for example, by the identification number referring to one or more entries in a database in which the reference data record and / or individual scatter signals are stored.
- step (B) the characteristic scattering signal of the security element according to the invention is determined.
- the determination takes place by irradiation of the scattering range with electromagnetic radiation having at least one wavelength in the range from 300 nm to 1000 nm and detection of the radiation reflected from the scattering range at different angles.
- the determination of the characteristic scattering signal preferably takes place by means of a method according to WO2005088533 (A1).
- step (A) and step (B) can be reversed.
- step (C) the detected leakage signal is compared with all the leakage signals of the reference data set from step (A) (authentication). It is determined that scattering signal that is identical to the currently determined scatter signal in all probability. By identifying the object based on the optical code on the security element, the corresponding reference data set can be determined very quickly. The authentication can thus take place in a fast 1: n comparison of the currently recorded scatter data with the reference data record, where n preferably lies in the range from 1 to 1000.
- the characteristic leakage signal will not match 100% with a leakage signal from the reference data set. The reason for this is, for example, the fact that the security element according to the invention undergoes an aging process and the characteristic scattering signal changes as a result of environmental influences.
- a threshold value S is set. If the degree of correspondence between the characteristic scattering signal and a scatter signal of the reference data record is, for example, S or more, then a match is deemed to be given; if the degree of agreement is below S, the compared data records are considered different.
- the determined characteristic scattering signal is present in the same way as the scattering signals of the reference data record in machine-processable form, ie generally as a number table. The comparison of the data sets can be made on the basis of the complete number table or on the basis of characteristic features from the number table.
- step (D) a message is issued regarding the authenticity of the object depending on the result of the comparison in step (C).
- a message can be sent as to whether the object is an authentic object or a forgery. It is possible, for example, to use a light signal for this purpose: if the data sets compared in step (C) are in agreement, it is obviously not a forgery and, for example, a green light lights up; If the data sets compared in step (C) do not match, it is obviously a forgery and, for example, a red light comes on. Alternatively, an acoustic signal or other message which can be grasped with the human senses, conceivable. Furthermore, it is possible to output the degree of coincidence via a printer, monitor or the like.
- FIG. 1 shows schematically a preferred embodiment of the security element (1) according to the invention comprising a code region (2) and a scattering region (3).
- the code area (2) comprises an optical code in the form of a bar code printed in dark hue on a light background.
- the scattering area (3) is indicated by a frame of a solid line. Scatter area (3) and code area (2) are spatially separated.
- the security element according to the invention in FIG. 1 is round. The diameter in the present example is between 40 and 60 mm. In addition to the elements shown (scattering area, code area, framing), further elements are conceivable, in particular the printing with text, images and characters.
- FIG. 2 shows schematically the layer structure of a preferred embodiment of the security element according to the invention (a) in cross section, (b) in cross section in an exploded view.
- the layer sequence starting with the lowest layer is: an adhesive protection layer (10), an adhesive layer (11), a layer comprising a pulp (12), a print layer (13) and a protective layer (14).
- the fibrous layer (12) fulfills in the present case in addition to the provision of a predetermined breaking point in a separation attempt (separation layer) nor the function of providing randomly distributed and / or oriented scattering centers and the function of recording for the printing ink (printing layer).
- FIG 3 shows schematically the introduction of punched in a security element (1) according to the invention.
- punches there are three types of punches: radial safety punches (20) in the edge region of the security element, wavy safety punches (21) which run over the security element and an outer contour puncture (22) in the edge region of the security element.
- FIG. 4 shows schematically with reference to three examples which layers of a security element according to the invention can be affected by a punching. Further possibilities of punching are conceivable.
- the layer sequence from FIG. 2 serves as a layer sequence by way of example.
- the punching (31) runs through the protective layer, the print layer and the fibrous material layer. It is conceivable to perform the punching even through the adhesive layer.
- a punching on the type of punching (31) means that the security element can not be replaced as a whole of an object.
- a peel attempt would lead to the division of the security element along the punching lines.
- the punching (31) shown has the disadvantage that it passes through the protective layer. This could, for example, moisture penetrate into the layers below and cause damage.
- the punching (32) passes through the print layer, the fibrous layer and the adhesive layer.
- the protective layer is not affected and can therefore fully fulfill its function.
- the protective layer would rupture (irreversible damage), which would be recognizable and would indicate a detachment attempt.
- the punching (33) runs partially only through the fibrous layer. A peel test would be recognizable by the irreversible damage in the pulp and protective layer.
- FIG. 5 schematically shows the layer structure of the preferred embodiment of a security element according to the invention from example 1 (details see example 1).
- FIG. 6 shows the characteristic scattering signal of the preferred embodiment of a security element according to the invention from Example 1, measured according to the method described in Example 2.
- the lower area (41) is formed by the special paper 7110 from 3M (3M 7110 litho paper, white).
- This special paper is a composite material that already includes the layer sequence adhesive protective layer, adhesive layer and fibrous layer.
- the adhesive layer is a strongly adhering acrylate adhesive whose adhesion to the substrate (eg polyethylene or polypropylene) according to the manufacturer is higher than the strength of the fibrous layer.
- the fibrous layer acts as a release layer, which ruptures during a separation attempt.
- the special paper 7110 is temperature resistant in the range of -40 ° C to 175 ° C.
- the matt surface allows the printing and thus provides the surface for the
- the fiber structure of the fiber unique for each area of the specialty paper, ensures
- the primer (42) serves for better adhesion of printing ink.
- the primer used here was the product Indigo Topaz 10 Solution MPS-2056-42 from Hewlett Packard.
- the primer was applied over the entire surface of the special paper by known printing techniques (e.g., digital printing).
- a color change layer 43 and a print layer 44 are applied by known printing techniques (e.g., digital printing).
- the color change layer (43) consists of a temperature-sensitive envelope color, which causes an irreversible color change when a temperature of about 120 ° C from transparent to black is exceeded.
- the cover color used is commercially available under the name ThermaFlag W / B from the manufacturer Flexo & Gravure Ink.
- the envelope color is preferably printed only in the code area (unlike in FIG.
- the optical code is printed by known printing techniques (e.g., digital printing).
- the conclusion of the composite forms a protective layer (45).
- a PET Overlam RP35 laminate from UPM Raflatac was applied as a protective film by means of known lamination processes.
- FIG. 5 (a) shows the course of the punches in the security element (40).
- the radial security punches (22) and the outer contour punching (22) extend as schematically shown in Fig. 5 (a) through all the layers, with only the adhesive protective layer (lower part of area (41)) is excluded from the punching.
- the wave-shaped security punches (21) run only through the special paper, here too the adhesive protective layer is excluded from the punching.
- Example 2 Measuring the characteristic leakage signal of a security element according to the invention
- the characteristic scattering signal of the inventive security element from Example 1 was measured.
- the security element according to the invention had the shape, the dimensions and the spatial distribution of code area and scattering area according to FIG. 1 and punching according to FIG. 3, wherein the spreading area was not affected by punching.
- a device according to FIG. 1 from WO 2005088533 (A1) was used, with a Flexpoint® laser of the type FP-65/5 (wavelength 650 nm, maximum power 5 mW) and Si-NPN phototransistors of the type FT-65. 30 of the company STM as detectors.
- the beam profile of the laser on the security element was liminal with a length of 2 mm and a width of 20 ⁇ m.
- the rigid array of laser and detectors was guided at a constant speed (about 2 cm / second) across the long side of the beam profile over a range of 1.5 cm of the scattering area.
- FIG. 6 shows the intensity / of the scattered radiation detected at a detector (detector 16b from FIG. 1 of WO2005088533 (A1)) as a function of the travel path x in arbitrary units.
- the scatter signal is unique for each individual security element according to the invention and can therefore be used for authentication.
Landscapes
- Business, Economics & Management (AREA)
- Accounting & Taxation (AREA)
- Finance (AREA)
- Health & Medical Sciences (AREA)
- Chemical & Material Sciences (AREA)
- Chemical Kinetics & Catalysis (AREA)
- General Chemical & Material Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Toxicology (AREA)
- Engineering & Computer Science (AREA)
- Manufacturing & Machinery (AREA)
- Credit Cards Or The Like (AREA)
- Inspection Of Paper Currency And Valuable Securities (AREA)
- Laminated Bodies (AREA)
Abstract
Description
Claims
Priority Applications (7)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2009801043143A CN101939173B (zh) | 2008-02-05 | 2009-01-24 | 安全元件以及用其标识和鉴别对象的方法 |
BRPI0907479A BRPI0907479A2 (pt) | 2008-02-05 | 2009-01-24 | elemento de segurança |
MX2010008480A MX2010008480A (es) | 2008-02-05 | 2009-01-24 | Elemento de seguridad. |
JP2010545383A JP2011514548A (ja) | 2008-02-05 | 2009-01-24 | セキュリティエレメント |
US12/865,578 US20110018253A1 (en) | 2008-02-05 | 2009-01-24 | Security element |
EP09707754A EP2259930A2 (de) | 2008-02-05 | 2009-01-24 | Sicherheitselement |
RU2010136838/12A RU2493968C2 (ru) | 2008-02-05 | 2009-01-24 | Элемент безопасности |
Applications Claiming Priority (6)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
DE102008007731.3 | 2008-02-05 | ||
DE102008007731A DE102008007731B4 (de) | 2008-02-05 | 2008-02-05 | Verfahren und Vorrichtung zur Identifizierung und Authentifizierung von Objekten |
DE102008016803.3 | 2008-04-02 | ||
DE102008016803A DE102008016803A1 (de) | 2008-04-02 | 2008-04-02 | Authentifizierung von Objekten mittels Bilderkennung |
DE102008053798.5 | 2008-10-29 | ||
DE200810053798 DE102008053798A1 (de) | 2008-10-29 | 2008-10-29 | Sicherheitselement |
Publications (2)
Publication Number | Publication Date |
---|---|
WO2009097980A2 true WO2009097980A2 (de) | 2009-08-13 |
WO2009097980A3 WO2009097980A3 (de) | 2009-12-03 |
Family
ID=40886117
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/EP2009/000451 WO2009097980A2 (de) | 2008-02-05 | 2009-01-24 | Sicherheitselement |
Country Status (8)
Country | Link |
---|---|
US (1) | US20110018253A1 (de) |
EP (1) | EP2259930A2 (de) |
JP (1) | JP2011514548A (de) |
KR (1) | KR20100117597A (de) |
CN (1) | CN101939173B (de) |
BR (1) | BRPI0907479A2 (de) |
MX (1) | MX2010008480A (de) |
WO (1) | WO2009097980A2 (de) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2011128373A1 (de) | 2010-04-14 | 2011-10-20 | Bayer Technology Services Gmbh | Optischer scanner |
WO2011144533A1 (de) | 2010-05-18 | 2011-11-24 | Bayer Technology Services Gmbh | Identifizierung von gegenständen |
WO2011147760A1 (de) | 2010-05-25 | 2011-12-01 | Bayer Technology Services Gmbh | Identifizierung von gegenständen |
EP3154015A1 (de) * | 2015-10-09 | 2017-04-12 | Authentic Vision GmbH | Authentifizierungsverfahren für artikelidentifikatoren |
DE102021114841A1 (de) | 2021-06-09 | 2022-12-15 | Schreiner Group Gmbh & Co. Kg | Folienverbund mit Schutz vor Manipulation |
Families Citing this family (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
DE102009052538A1 (de) * | 2009-11-11 | 2011-05-12 | Giesecke & Devrient Gmbh | Herstellung eines mit gefärbten Mikrovertiefungen versehenen Sicherheitselementes |
US9436770B2 (en) | 2011-03-10 | 2016-09-06 | Fastechnology Group, LLC | Database systems and methods for consumer packaged goods |
US20150231896A1 (en) * | 2011-03-10 | 2015-08-20 | Fastechnology Group, LLC | Inverted codes on transparent packaging exterior |
US10832015B2 (en) | 2011-03-10 | 2020-11-10 | Joseph A. Hattrup Trust Dated July 16, 1996, As Amended | On-the-fly marking systems for consumer packaged goods |
JP2013190478A (ja) * | 2012-03-12 | 2013-09-26 | Toppan Printing Co Ltd | 偽造防止媒体、粘着ラベル、転写箔及びラベル付き物品 |
EP2878453A1 (de) * | 2013-11-28 | 2015-06-03 | Authentic Vision GmbH | Objektmarkierung zur optischen Authentifizierung und Verfahren zu deren Herstellung |
CN106585164B (zh) * | 2016-11-30 | 2018-01-19 | 东莞市天眼网络科技有限公司 | 一种生成防伪纹理的方法和防伪印刷品 |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4114032A (en) * | 1973-05-11 | 1978-09-12 | Dasy Inter S.A. | Documents having fibers which are coated with a magnetic or magnetizable material embedded therein and an apparatus for checking the authenticity of the documents |
WO1991019614A1 (en) * | 1990-06-15 | 1991-12-26 | Tel-Developments B.V. | Security of objects or documents |
GB2262501A (en) * | 1991-07-25 | 1993-06-23 | Ez Gabriel Ord | A security price or bar code label. |
WO1998057299A1 (de) * | 1997-06-11 | 1998-12-17 | Nova-Technik Entwicklung Von Und Handel Mit Medizinischen Geräten Gmbh | Dokument mit einem echtheitsmerkmal |
FR2765014A1 (fr) * | 1997-06-24 | 1998-12-24 | Rene Boulnois | Procede d'authentification d'un document en papier, document de securite en papier, et dispositif de controle de l'authenticite de documents en papier |
WO1999042980A1 (de) * | 1998-02-20 | 1999-08-26 | Schreiner Etiketten Und Selbstklebetechnik Gmbh & Co. Kg | Mehrlagiges etikett |
Family Cites Families (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPH08156473A (ja) * | 1994-12-06 | 1996-06-18 | Dainippon Printing Co Ltd | 金券類およびその偽造防止方法 |
JPH10241000A (ja) * | 1997-02-26 | 1998-09-11 | Ricoh Co Ltd | 特殊原稿判定装置,特殊原稿判定方法およびその方法をコンピュータに実行させるためのプログラムを記録した機械読み取り可能な記録媒体 |
US6904525B1 (en) * | 1997-07-01 | 2005-06-07 | Pitney Bowes Inc. | Method for preventing counterfeiting of articles of manufacture |
JP2000293108A (ja) * | 1999-04-02 | 2000-10-20 | Kuramoto Sangyo:Kk | 偽造防止用ラベル |
EP1153373B1 (de) * | 1999-12-08 | 2003-05-28 | Valentin Alexandrovich Mischenko | Verfahren und system zur authentifizierung von artikeln |
US6550685B1 (en) * | 2000-11-14 | 2003-04-22 | Hewlett-Packard Development Company Lp | Methods and apparatus utilizing visually distinctive barcodes |
JP4030830B2 (ja) * | 2002-08-13 | 2008-01-09 | 日本電気株式会社 | 縞模様画像鑑定装置および縞模様画像鑑定方法 |
CN2715245Y (zh) * | 2003-09-22 | 2005-08-03 | 兆日科技(深圳)有限公司 | 一种纹理密码标签 |
AU2005220385B2 (en) * | 2004-03-12 | 2010-07-15 | Ingenia Holdings Limited | Authenticity verification methods, products and apparatuses |
WO2005088517A1 (en) * | 2004-03-12 | 2005-09-22 | Ingenia Technology Limited | Methods and apparatuses for creating authenticatable printed articles and subsequently verifying them |
JP2006082481A (ja) * | 2004-09-17 | 2006-03-30 | Bridgestone Sports Co Ltd | ゴルフボール用箱又はゴルフボール用包装材への印刷方法及びゴルフボール用箱又はゴルフボール用包装材 |
JP2006235257A (ja) * | 2005-02-25 | 2006-09-07 | Nichiei Kako Kk | セキュリティ用ラベル |
US7624928B2 (en) * | 2005-11-18 | 2009-12-01 | Fuji Xerox Co., Ltd. | Method and apparatus for making tags, tag, and system for managing articles |
US20080129037A1 (en) * | 2006-12-01 | 2008-06-05 | Prime Technology Llc | Tagging items with a security feature |
-
2009
- 2009-01-24 WO PCT/EP2009/000451 patent/WO2009097980A2/de active Application Filing
- 2009-01-24 BR BRPI0907479A patent/BRPI0907479A2/pt not_active IP Right Cessation
- 2009-01-24 US US12/865,578 patent/US20110018253A1/en not_active Abandoned
- 2009-01-24 MX MX2010008480A patent/MX2010008480A/es unknown
- 2009-01-24 JP JP2010545383A patent/JP2011514548A/ja not_active Ceased
- 2009-01-24 KR KR1020107017453A patent/KR20100117597A/ko not_active Application Discontinuation
- 2009-01-24 CN CN2009801043143A patent/CN101939173B/zh not_active Expired - Fee Related
- 2009-01-24 EP EP09707754A patent/EP2259930A2/de not_active Withdrawn
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4114032A (en) * | 1973-05-11 | 1978-09-12 | Dasy Inter S.A. | Documents having fibers which are coated with a magnetic or magnetizable material embedded therein and an apparatus for checking the authenticity of the documents |
WO1991019614A1 (en) * | 1990-06-15 | 1991-12-26 | Tel-Developments B.V. | Security of objects or documents |
GB2262501A (en) * | 1991-07-25 | 1993-06-23 | Ez Gabriel Ord | A security price or bar code label. |
WO1998057299A1 (de) * | 1997-06-11 | 1998-12-17 | Nova-Technik Entwicklung Von Und Handel Mit Medizinischen Geräten Gmbh | Dokument mit einem echtheitsmerkmal |
FR2765014A1 (fr) * | 1997-06-24 | 1998-12-24 | Rene Boulnois | Procede d'authentification d'un document en papier, document de securite en papier, et dispositif de controle de l'authenticite de documents en papier |
WO1999042980A1 (de) * | 1998-02-20 | 1999-08-26 | Schreiner Etiketten Und Selbstklebetechnik Gmbh & Co. Kg | Mehrlagiges etikett |
Cited By (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2011128373A1 (de) | 2010-04-14 | 2011-10-20 | Bayer Technology Services Gmbh | Optischer scanner |
DE102010015014A1 (de) | 2010-04-14 | 2011-10-20 | Bayer Technology Services Gmbh | Optischer Scanner |
WO2011144533A1 (de) | 2010-05-18 | 2011-11-24 | Bayer Technology Services Gmbh | Identifizierung von gegenständen |
DE102010020810A1 (de) | 2010-05-18 | 2011-11-24 | Bayer Technology Services Gmbh | Identifizierung von Gegenständen |
WO2011147760A1 (de) | 2010-05-25 | 2011-12-01 | Bayer Technology Services Gmbh | Identifizierung von gegenständen |
DE102010021380A1 (de) | 2010-05-25 | 2011-12-01 | Bayer Technology Services Gmbh | Identifizierung von Gegenständen |
EP3154015A1 (de) * | 2015-10-09 | 2017-04-12 | Authentic Vision GmbH | Authentifizierungsverfahren für artikelidentifikatoren |
WO2017060438A1 (de) * | 2015-10-09 | 2017-04-13 | Authentic Vision Gmbh | Authentifizierungsverfahren für artikelidentifikatoren |
DE102021114841A1 (de) | 2021-06-09 | 2022-12-15 | Schreiner Group Gmbh & Co. Kg | Folienverbund mit Schutz vor Manipulation |
US12106684B2 (en) | 2021-06-09 | 2024-10-01 | Schreiner Group Gmbh & Co. Kg | Film composite with protection against tampering |
Also Published As
Publication number | Publication date |
---|---|
EP2259930A2 (de) | 2010-12-15 |
BRPI0907479A2 (pt) | 2019-02-26 |
CN101939173B (zh) | 2012-06-20 |
KR20100117597A (ko) | 2010-11-03 |
JP2011514548A (ja) | 2011-05-06 |
WO2009097980A3 (de) | 2009-12-03 |
MX2010008480A (es) | 2011-02-23 |
CN101939173A (zh) | 2011-01-05 |
US20110018253A1 (en) | 2011-01-27 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP2259930A2 (de) | Sicherheitselement | |
DE10162537A1 (de) | Verfahren zur Authentizitätssicherung von Dokumenten | |
DE10326983A1 (de) | Wertdokument mit einem maschinenlesbaren Echtheitskennzeichen | |
DE102008051409A1 (de) | Sicherheitselement | |
DE102012211077A1 (de) | Sicherheitselement mit Beugungsstrukturen aufweisenden Mikrostrukturen sowie Verfahren zur Herstellung und Verifikation | |
WO2011020537A1 (de) | Identifikationsdokument mit zwei sich überlagernden bildern | |
WO2010139396A1 (de) | Positonsmarkierung zur kennzeichnung eines oberflächenbereichs und verfahren zur identifizierung /authentifizierung auf der basis des markierten oberflächenbereichs | |
DE102016203609A1 (de) | Sicherheitsgegenstand mit dynamischem und statischem Fenstersicherheitsmerkmal und Verfahren zur Herstellung | |
EP2558304A1 (de) | Sicherheitselement mit einer lokal hinsichtlich ihrer lichtausbreitungseigenschaften modifizierten lichtleitenden struktur und verfahren zur herstellung eines solchen sicherheitselements | |
DE102014214548B4 (de) | Verfahren zur Herstellung eines Dokuments | |
DE102008030182A1 (de) | Wert- oder Sicherheitsdokument und Verfahren zum Bilden mindestens eines Sicherheitsmerkmals bei der Herstellung des Wert- oder Sicherheitsdokuments sowie Verfahren und Mittel zur Verifikation | |
DE102013218754B4 (de) | Manipulationsabgesichertes Wert- oder Sicherheitsprodukt und Verfahren zum Verifizieren der Echtheit des manipulationsabgesicherten Wert- oder Sicherheitsproduktes | |
EP3741580A1 (de) | Wert- oder sicherheitsdokument sowie verfahren zu dessen herstellung | |
DE102008053798A1 (de) | Sicherheitselement | |
AT517776A2 (de) | Sicherheitsdokument, umfassend eine Folie mit Interferenzeffekten, Verfahren zur Bestimmung der Echtheit eines solchen Dokuments und Vorrichtung zur Durchführung eines solchen Verfahrens | |
EP3922473A1 (de) | Verfahren zur herstellung eines gedruckten lichtbildes auf einem datenträger für ein sicherheits- oder wertdokument | |
EP4051509A1 (de) | Prüfung eines sicherheitsdokuments auf basis von tröpfchenmorphologien | |
DE102020133826A1 (de) | Verfahren zur Herstellung eines gedruckten Bildes auf einem Datenträger für ein Sicherheits- oder Wertdokument | |
DE102008016435A1 (de) | Haftetikett und Verfahren zum Kennzeichnen und zum Authentifizieren eines Gegenstandes mit Haftetiketten | |
DE102007008151A1 (de) | Sicherheitsmerkmal für die Echtheit eines Dokuments und Verfahren zur Prüfung seiner Echtheit | |
EP1954508B9 (de) | Verfahren und vorrichtung zur herstellung eines sicherheitsdokumentes | |
EP2896508B1 (de) | Erkennungssystem für Sicherheitscodierungen | |
EP3415339B1 (de) | Verfahren zum eineindeutigen identifizieren eines dokuments | |
WO2020182805A1 (de) | Sicherheitseinlage mit taktiler lackanordnung für ein ausweisdokument und verfahren zur herstellung einer solchen sicherheitseinlage | |
EP4187512A1 (de) | Vorrichtung und verfahren zur optischen erfassung eines wert- oder sicherheitsprodukts |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
WWE | Wipo information: entry into national phase |
Ref document number: 200980104314.3 Country of ref document: CN |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 09707754 Country of ref document: EP Kind code of ref document: A2 |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2009707754 Country of ref document: EP |
|
WWE | Wipo information: entry into national phase |
Ref document number: MX/A/2010/008480 Country of ref document: MX |
|
WWE | Wipo information: entry into national phase |
Ref document number: 5530/DELNP/2010 Country of ref document: IN |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2010545383 Country of ref document: JP |
|
ENP | Entry into the national phase |
Ref document number: 20107017453 Country of ref document: KR Kind code of ref document: A |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2010136838 Country of ref document: RU |
|
WWE | Wipo information: entry into national phase |
Ref document number: 12865578 Country of ref document: US |
|
ENP | Entry into the national phase |
Ref document number: PI0907479 Country of ref document: BR Kind code of ref document: A2 Effective date: 20100804 |