WO2009097980A2 - Sicherheitselement - Google Patents

Sicherheitselement Download PDF

Info

Publication number
WO2009097980A2
WO2009097980A2 PCT/EP2009/000451 EP2009000451W WO2009097980A2 WO 2009097980 A2 WO2009097980 A2 WO 2009097980A2 EP 2009000451 W EP2009000451 W EP 2009000451W WO 2009097980 A2 WO2009097980 A2 WO 2009097980A2
Authority
WO
WIPO (PCT)
Prior art keywords
security element
layer
scattering
element according
area
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Ceased
Application number
PCT/EP2009/000451
Other languages
German (de)
English (en)
French (fr)
Other versions
WO2009097980A3 (de
Inventor
Thomas Birsztejn
Markus Gerigk
Ludger BRÜLL
Andreas BÄCKER
Ralf IMHÄUSER
Simon Vougioukas
Nils Winkler
Rainer Mackowiak
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Bayer AG
Original Assignee
Bayer Technology Services GmbH
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from DE102008007731A external-priority patent/DE102008007731B4/de
Priority claimed from DE102008016803A external-priority patent/DE102008016803A1/de
Priority claimed from DE200810053798 external-priority patent/DE102008053798A1/de
Priority to CN2009801043143A priority Critical patent/CN101939173B/zh
Priority to JP2010545383A priority patent/JP2011514548A/ja
Priority to RU2010136838/12A priority patent/RU2493968C2/ru
Application filed by Bayer Technology Services GmbH filed Critical Bayer Technology Services GmbH
Priority to MX2010008480A priority patent/MX2010008480A/es
Priority to US12/865,578 priority patent/US20110018253A1/en
Priority to BRPI0907479A priority patent/BRPI0907479A2/pt
Priority to EP09707754A priority patent/EP2259930A2/de
Publication of WO2009097980A2 publication Critical patent/WO2009097980A2/de
Publication of WO2009097980A3 publication Critical patent/WO2009097980A3/de
Anticipated expiration legal-status Critical
Ceased legal-status Critical Current

Links

Classifications

    • BPERFORMING OPERATIONS; TRANSPORTING
    • B42BOOKBINDING; ALBUMS; FILES; SPECIAL PRINTED MATTER
    • B42DBOOKS; BOOK COVERS; LOOSE LEAVES; PRINTED MATTER CHARACTERISED BY IDENTIFICATION OR SECURITY FEATURES; PRINTED MATTER OF SPECIAL FORMAT OR STYLE NOT OTHERWISE PROVIDED FOR; DEVICES FOR USE THEREWITH AND NOT OTHERWISE PROVIDED FOR; MOVABLE-STRIP WRITING OR READING APPARATUS
    • B42D25/00Information-bearing cards or sheet-like structures characterised by identification or security features; Manufacture thereof
    • B42D25/40Manufacture
    • B42D25/45Associating two or more layers
    • B42D25/465Associating two or more layers using chemicals or adhesives
    • B42D25/47Associating two or more layers using chemicals or adhesives using adhesives
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B42BOOKBINDING; ALBUMS; FILES; SPECIAL PRINTED MATTER
    • B42DBOOKS; BOOK COVERS; LOOSE LEAVES; PRINTED MATTER CHARACTERISED BY IDENTIFICATION OR SECURITY FEATURES; PRINTED MATTER OF SPECIAL FORMAT OR STYLE NOT OTHERWISE PROVIDED FOR; DEVICES FOR USE THEREWITH AND NOT OTHERWISE PROVIDED FOR; MOVABLE-STRIP WRITING OR READING APPARATUS
    • B42D25/00Information-bearing cards or sheet-like structures characterised by identification or security features; Manufacture thereof
    • B42D25/20Information-bearing cards or sheet-like structures characterised by identification or security features; Manufacture thereof characterised by a particular use or purpose
    • B42D25/29Securities; Bank notes
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B42BOOKBINDING; ALBUMS; FILES; SPECIAL PRINTED MATTER
    • B42DBOOKS; BOOK COVERS; LOOSE LEAVES; PRINTED MATTER CHARACTERISED BY IDENTIFICATION OR SECURITY FEATURES; PRINTED MATTER OF SPECIAL FORMAT OR STYLE NOT OTHERWISE PROVIDED FOR; DEVICES FOR USE THEREWITH AND NOT OTHERWISE PROVIDED FOR; MOVABLE-STRIP WRITING OR READING APPARATUS
    • B42D25/00Information-bearing cards or sheet-like structures characterised by identification or security features; Manufacture thereof

Definitions

  • the invention relates to a security element, the use of the security element for the identification and authentication of objects and for the protection against counterfeiting and a method for the identification and authentication of objects based on the security element according to the invention.
  • a well-known representative of the bar codes is the code EAN 8, which is defined in the international standard ISO / TEC 15420. It encodes a sequence of 8 digits in the form of bars and gaps of different widths. Typically, the bars are coated with a black ink on a white support, e.g. the packaging of the object to be marked or printed on the object itself.
  • bar codes In addition to the described code EAN 8, there are numerous other barcodes that encode not only numbers but also letters, special characters and control characters. Further, some codes contain error detection and error correction characters which allow to detect and in part even correct errors in the signal transmission.
  • a further development of the bar codes represent the 2D codes, in which the information is not only one-dimensional, but optically coded in two dimensions. A subset of the 2D codes form the so-called matrix codes.
  • a known representative is e.g. the Data Matrix Code defined in the International Standard ISO / IEC 16022.
  • Optical codes can be created easily and at a very low cost (pressure) and are fast and robust in capturing. They are ideal for identifying objects suitable.
  • optical codes are suitable for object tracking (track & trace).
  • An object for example, is assigned a unique number so that the object can be identified at each station in the logistics chain and thus the movement of the object from one station in the logistics chain to another tracked.
  • optical codes do not provide forgery protection because they are easy to copy and reproduce.
  • Security elements are preferably inseparably connected to the objects to be protected. The attempt to separate the security elements from the object preferably leads to their destruction, so that the security elements can not be misused.
  • the authenticity of an object can be verified by the presence of one or more security elements.
  • the method of verifying the authenticity of an object is referred to herein as authentication.
  • Optical security elements such as e.g. Watermarks, specialty inks, guilloche patterns, micro-typefaces and holograms are established worldwide.
  • An overview of optical security elements, which are particularly but not exclusively suitable for document protection, is published in the following book: Rudolf L. van Renesse, Optical Document Security, Third Edition, Artech House Boston / London, 2005 (pp 63-259).
  • WO2005088533 (A1) describes a method with which objects can be identified and authenticated on the basis of their characteristic surface structure. The method comes without additional means such as security elements that are connected to the objects from.
  • a laser beam is focused on the surface of the object, across the surface moves (scanning) and detected by means of photodetectors at different points of the surface at different angles different degrees of scattered rays.
  • the detected scattered radiation is characteristic of a variety of different materials and is very difficult to imitate because it is due to coincidences in the production of the object.
  • paper-like objects have a production-related nature Fiber structure unique to each manufactured object.
  • the scatter data for the individual objects are stored in a database in order to be able to authenticate the object at a later time. For this purpose, the object is measured again and the scatter data compared with the stored reference data.
  • a disadvantage of the method is that an extensive database for the scatter data of all captured objects must be created.
  • the database must have a high storage capacity in order to be able to store the large amount of data of scatter data of a large number of objects.
  • the access time to the data in the database must be fast because the collected scatter data for authentication must be compared to all reference data in the database (1: n match) to find the correct record.
  • not every object has a surface that is accessible to a method according to WO2005088533 (A1).
  • the object is to provide a solution for identifying and authenticating objects that is applicable to a wide variety of different objects that are easy to implement existing IT infrastructures can be built, which ensures a high protection against counterfeiting and which is also still cost-effective.
  • this object can be achieved by a security element which is irreversibly connected to an object and which comprises a code area and a scatter area, the code area being used to identify the object on the basis of an optical code and the scatter area for authenticating the object characteristic scattered radiation due to random characteristics is used.
  • the subject of the present invention is therefore a security element in the form of a self-adhesive label for attaching the security element to an object, with
  • the security element comprises a code area and a visually marked spreading area, the code area having an optical code and the spreading area having randomly distributed and / or oriented scattering centers which, upon irradiation of the Scattering with electromagnetic radiation for the
  • Security element cause characteristic and unique scatter signal.
  • Identification is the process that is used to uniquely recognize an object. If an object is uniquely recognized, it can be uniquely assigned or it can be uniquely assigned to the detected object. For example, An item (object) can be assigned a price or its destination. The identification takes place on the basis of characteristics characterizing the object and distinguishing from other objects.
  • Authentication is the process of verifying (verifying) an alleged identity.
  • the authentication of objects, documents, or data is the assertion that they are authentic - that is, they are unchanged, not copied or faked originals.
  • the authentication also takes place on the basis of features characterizing the object and distinguishing from other objects.
  • the features for identification and the features for authentication of an object are provided by the security element according to the invention.
  • the code area includes the characteristics required for identification.
  • the code area comprises at least one optical code, e.g. a barcode or 2D code or other optically machine readable code.
  • the optical code preferably encodes a unique identification number for the security element. On the basis of the identification number, a unique association between the security element and e.g. an entry in a database, a file containing a characteristic scatter signal for reference, or any other real or virtual object.
  • the optical code is preferably printed with a dark color on a light background. Likewise, an inverse representation is conceivable in which the optical code is printed in light color on a dark background.
  • the size of the code area is determined by the size of the optical code used. Usually, the size of the code area is in the range between 50 mm 2 and 1000 mm 2 .
  • the security element according to the invention comprises more than one code area and / or more than one optical code.
  • the scattering range of the security element according to the invention is characterized in that it generates a characteristic scattered signal upon irradiation with electromagnetic radiation.
  • Scattering is understood to mean that electromagnetic radiation impinging on a scattering area in the form of a bundle is reflected in different directions. While a parallel beam is reflected when hitting a plane mirror and is reflected back as a parallel beam at a defined angle, incident radiation in the case of the scattering range is reflected by a plurality of scattering centers in different directions.
  • the scattering centers of the scattering range of a security element according to the invention are subject to a random distribution and / or orientation.
  • Random distribution and / or orientation means that the position of individual scattering centers and / or the orientation of individual scattering centers can not be foreseen by the production process.
  • the location and / or orientation of individual Scattering centers are subject to random fluctuations in the manufacturing process. The location and / or orientation of individual scattering centers can therefore not be easily reproduced. This fact is due to the high level of protection afforded by the security feature according to the invention: it can be adjusted only at great expense.
  • the random distribution and / or orientation provides for individualization: each security element is unique (individual) due to the random distribution and / or orientation of the scattering centers, which manifests itself in a unique, characteristic scattered signal when irradiated with electromagnetic radiation.
  • the scattering centers of a security element according to the invention preferably have a size of 1 square micrometer to 0.001 square millimeters.
  • the scattering centers may be formed by pigments (e.g., titanium dioxide) or fibers (e.g., pulp).
  • the scattering centers of a security element according to the invention are preferably provided by a fibrous material which has a production-related random fiber structure which causes a characteristic scattered radiation upon irradiation with electromagnetic radiation.
  • a fiber structure is e.g. in paper, cardboard or textiles.
  • a paper is used as the pulp.
  • electromagnetic radiation having at least one wavelength in the range of 300 nm to 1000 nm is scattered by the scattering range of the security element according to the invention.
  • the scattering area is visually identified in a preferred embodiment of the security element according to the invention. This makes it clear to a user at which point an authentication takes place based on the characteristic scatter signal. A user thus knows which location of the security element according to the invention must be presented to a device for automatic authentication.
  • the visual identification is furthermore such that it can also be used by the device for machine authentication as a positioning mark for the detection of the scattering area.
  • the scattering range can be made visually recognizable, for example, by framing with a solid line.
  • the size of the scattering range is in the range between 50 mm 2 and 1000 mm 2 .
  • the code area is preferably rectangular, with the corners being rounded. It is also conceivable to perform the scattering area square, round, elliptical, oval, triangular, pentagonal or generally n-shaped.
  • code area and scatter area are spatially separated from one another. However, it is also conceivable that they overlap completely or partially or that one area completely covers the other.
  • the security element according to the invention is preferably designed as a self-adhesive label in order to be able to be attached to a multiplicity of different objects.
  • a self-adhesive label is understood to mean a flat composite which has an adhesive layer which allows a bond between the label and an object by means of adhesion.
  • a flat body here means a body whose spatial extent (thickness) is smaller by at least a factor of 10, preferably at least by a factor of 50, than the two remaining spatial dimensions (length, width).
  • Composite means a body of two or more interconnected materials. The connection between the materials preferably takes place via lamination and / or adhesion.
  • the security element according to the invention has a layer structure of at least four layers: an adhesive layer, a fiber-containing layer, a print layer and a protective layer.
  • the security element according to the invention is connected to an object.
  • the adhesive layer is adapted to the material properties of the object in order to achieve a good connection between the security element and the object.
  • the fibrous-containing layer comprises at least one fibrous material which serves for receiving printing ink (dyes, pigments) and at the same time provides randomly distributed and / or oriented scattering centers.
  • the security element has a protective layer which is directed to the outside world and protects the lower layers from harmful environmental influences (moisture, mechanical stress, UV radiation, etc.).
  • the protective layer is transparent to at least a portion of visible electromagnetic radiation to view the printing layer, to machine read the optical code and to irradiate the scattering area with electromagnetic radiation and to be able to receive a characteristic scattering signal.
  • the protective layer for electromagnetic radiation having at least one wavelength in the range of 300 nm to 1000 nm is transparent.
  • Transparency is understood to mean that the proportion of electromagnetic radiation having at least one wavelength which penetrates the layer is greater than the sum of
  • Transmittance of the layer is thus greater than 50%, with transmittance the
  • Ratio of the intensity of the electromagnetic radiation with at least one wavelength, which passes through the layer based on the intensity of the electromagnetic radiation with the at least one wavelength, which is incident on the layer to understand.
  • the individual layers within the security element according to the invention do not necessarily extend over the entire security element. For example, not all areas of the pulp are printed. In particular, the spreading area is not printed.
  • the printing layer thus does not extend over the entire cross-section of a security element according to the invention.
  • the layers along the layer sequence are not necessarily spatially separated from one another. For example, the print layer will to a certain extent penetrate into the fiber structure of the pulp and form a layer comprising pulp and print layer.
  • FIG. 1 An example of a layer sequence in a security element according to the invention is shown in FIG.
  • the layer sequence shown is a lowermost adhesive protective layer, an adhesive layer, a fibrous-containing layer, a printing layer, a protective layer.
  • a layer of adhesive protection is usually applied below the adhesive layer.
  • This adhesive protective layer protects against unwanted adhesion of the adhesive layer with any objects.
  • the adhesive protective layer is removed before attaching the security element according to the invention to an object.
  • the adhesive protective layer usually also serves as a carrier material for one or more security elements.
  • label-shaped security elements are held in large numbers on a support.
  • the label-shaped security elements are held on a carrier tape which is rolled up into a roll. It is also conceivable to store a plurality of security elements on arched carriers. From the carriers, the security elements can be applied to objects by machine or manually.
  • As a carrier films are usually used.
  • the uniqueness of inventive security elements allows the individualization of objects with which they are connected. Therefore, the security element according to the invention preferably has features that prevent non-destructive detachment from an object.
  • the attempt to remove a security element according to the invention from an object leads to the destruction of the security element, so that it becomes unusable. This prevents the security element, which gives an object measurable individuality, from being transferred to another object and thus misused.
  • the security feature according to the invention has a separating layer.
  • the adhesive layer for bonding to an object and the separation layer are matched to one another such that the forces which hold the separation layer together are weaker than the forces which hold the security element and an object together via the adhesive layer.
  • the attempt to remove the security element from the object therefore, leads rather to a separation of the separation layer than to a detachment of the adhesive layer from the object.
  • the separating layer accordingly represents a predetermined breaking point.
  • the separating layer is formed from a fibrous material which irreversibly tears along the layer and thereby forms clear traces of crack indicating a separation attempt.
  • the security element according to the invention has a layer which undergoes an irreversible color change on exceeding and / or falling below a certain temperature limit (color change layer).
  • the irreversible color change occurs at least 5 Kelvin below the upper temperature limit of the effective adhesive area and / or at least 5 Kelvin above the lower temperature limit of the effective Kle area.
  • the security element according to the invention has a color change layer, which makes the optical code illegible when it exceeds or falls below a certain temperature limit. It is conceivable, for example, for the color change layer to undergo discoloration when it exceeds or falls short of the temperature limit and corresponds to the hue of the optical code. Is the Color change layer attached below or above the optical code, the discoloration causes the optical code can not be discriminated from its environment, he is no longer mechanically detectable.
  • optical code itself makes a change in color, which means that it no longer visually emphasizes its surroundings.
  • the preferably combination of the irreversible color change when exceeding and / or falling below a temperature limit with the functionality of the optical code has the advantage that an attack attempt can be detected by machine during read operation of the optical code, without further means for the detection of an attack attempt are necessary.
  • the security element according to the invention has punches which, in the case of a detachment attempt of the security element, lead from an object to a division of the security element. By punching thus a replacement of the security element as a whole of an object is difficult / prevented. Forces acting on the security element during a detachment attempt are purposefully channeled through the punches and lead to a division of the security element.
  • the division of the security element is preferably irreversible, e.g. can be achieved that the punches do not lead through all layers of the security element, so that in a division, a layer in which no punching is present, through the division undergoes irreversible, recognizable separation (destruction).
  • the security element according to the invention has a plurality of said features which prevent a reversible detachment of the security element from an object or indicate a detachment attempt.
  • the security element according to the invention can be round, elliptical, oval or n-square. But it is also any other arbitrary form conceivable.
  • the size of the inventive security element is between 100 mm 2 and 10,000 mm 2 .
  • the security element according to the invention can be combined with further security features known from the prior art, such as, for example, watermarks, special inks, guilloche patterns, micro-typefaces and holograms.
  • the security element according to the invention permits the use of the IT infrastructure already available for optical codes.
  • the security element according to the invention is simple and intuitive to use, inexpensive and offers a high protection against counterfeiting.
  • the present invention furthermore relates to the use of the security element according to the invention for the identification and / or authentication of objects and for the protection against counterfeiting.
  • the security element according to the invention is connected by means of the adhesive layer with an object. Since the security element according to the invention is designed as a self-adhesive label, it can be connected to a large number of different objects. Thus, it also makes such objects accessible for identification / authentication by a method according to WO2005088533 (A1), which would otherwise not be suitable for a method according to WO2005088533 (A1) due to their surface condition.
  • the mere presence of the security element according to the invention on an object indicates the authenticity of the corresponding object and thus serves to protect against counterfeiting. Based on the presence of the security element on the object, a human being can recognize that it is most likely an authentic object because the security element can not be removed from one object and transferred to another object.
  • the security element according to the invention is used on an object for identifying and authenticating objects.
  • the security element according to the invention is detected prior to attachment to an object.
  • detection is meant that the characteristic scatter signal is determined by the scattering range of the security element according to the invention and stored in the form of an electronically and mechanically processable file, wherein before or after storage, a link between the file containing the characteristic scatter signal and the optical code or a by means of optical code printed on the security element identification number.
  • the security element is registered. It carries an optical code associated with a file containing the characteristic scatter signal. This file is referred to here as a reference record.
  • the reference data set may contain the entire characteristic scattering signal in digitized form; but it can also contain only a part, for example a characteristic pattern within the signal, a so-called fingerprint.
  • the security element according to the invention After the security element according to the invention has been detected / registered, it is attached to an object. Since it can not be removed from the object without destroying it, it gives the object an individual identification number (optical code) and a unique characteristic for authentication (characteristic scatter signal).
  • the use of the security element according to the invention for the identification and authentication as well as for the counterfeit protection of an object comprises at least the steps:
  • steps (I) to (FV) are carried out in the order mentioned, wherein the order of steps (II) and (JS) can also be changed.
  • step (I) the characteristic scattering signal of the security element according to the invention is determined. The determination takes place by irradiation of the scattering range with electromagnetic radiation having at least one wavelength in the range of 300 nm to 1000 nm and detection of part of the radiation reflected by the scattering range at different angles. The determination of the characteristic scattering signal preferably takes place by means of a method according to WO2005088533 (A1).
  • the security elements can be detected quickly after their manufacture. Captured security elements can be generated and stored in advance and attached to an object as needed.
  • the method for identifying and authenticating objects by means of the security element according to the invention is likewise an object of the present invention.
  • the method according to the invention comprises at least the following steps:
  • the identification and authentication of an object is preferably carried out by machine.
  • Step (A) is for identifying the object based on the optical code.
  • the reading of the optical code in step (A) can be done with a corresponding commercial scanner for the optical code used.
  • the result is usually an identification number for the object.
  • optical codes refer to the extensive literature on the decoding of optical codes (eg C. Demant, B. Streicher-Abel, P. Waszkewitz, Industrial Image Processing, Springer-Verlag, 1998, p. 133 ff, J. Rosenbaum, Barcode, Verlagtechnik Berlin, 2000, p. 84 ff).
  • the characteristic scattering signal does not have to be compared with all the scattered signals of objects that have been detected at an earlier point in time.
  • the information about the identity of the object can be used to selectively select one or more stray signals from previously detected objects.
  • the reference data set comprises one or more selectively selected scatter signals, which has been determined at an earlier point in time and stored in the form of machine-processable data preferably in a database. Ideally, the reference data set includes only a single leakage signal.
  • the determination of the reference data record can be effected, for example, by the identification number referring to one or more entries in a database in which the reference data record and / or individual scatter signals are stored.
  • step (B) the characteristic scattering signal of the security element according to the invention is determined.
  • the determination takes place by irradiation of the scattering range with electromagnetic radiation having at least one wavelength in the range from 300 nm to 1000 nm and detection of the radiation reflected from the scattering range at different angles.
  • the determination of the characteristic scattering signal preferably takes place by means of a method according to WO2005088533 (A1).
  • step (A) and step (B) can be reversed.
  • step (C) the detected leakage signal is compared with all the leakage signals of the reference data set from step (A) (authentication). It is determined that scattering signal that is identical to the currently determined scatter signal in all probability. By identifying the object based on the optical code on the security element, the corresponding reference data set can be determined very quickly. The authentication can thus take place in a fast 1: n comparison of the currently recorded scatter data with the reference data record, where n preferably lies in the range from 1 to 1000.
  • the characteristic leakage signal will not match 100% with a leakage signal from the reference data set. The reason for this is, for example, the fact that the security element according to the invention undergoes an aging process and the characteristic scattering signal changes as a result of environmental influences.
  • a threshold value S is set. If the degree of correspondence between the characteristic scattering signal and a scatter signal of the reference data record is, for example, S or more, then a match is deemed to be given; if the degree of agreement is below S, the compared data records are considered different.
  • the determined characteristic scattering signal is present in the same way as the scattering signals of the reference data record in machine-processable form, ie generally as a number table. The comparison of the data sets can be made on the basis of the complete number table or on the basis of characteristic features from the number table.
  • step (D) a message is issued regarding the authenticity of the object depending on the result of the comparison in step (C).
  • a message can be sent as to whether the object is an authentic object or a forgery. It is possible, for example, to use a light signal for this purpose: if the data sets compared in step (C) are in agreement, it is obviously not a forgery and, for example, a green light lights up; If the data sets compared in step (C) do not match, it is obviously a forgery and, for example, a red light comes on. Alternatively, an acoustic signal or other message which can be grasped with the human senses, conceivable. Furthermore, it is possible to output the degree of coincidence via a printer, monitor or the like.
  • FIG. 1 shows schematically a preferred embodiment of the security element (1) according to the invention comprising a code region (2) and a scattering region (3).
  • the code area (2) comprises an optical code in the form of a bar code printed in dark hue on a light background.
  • the scattering area (3) is indicated by a frame of a solid line. Scatter area (3) and code area (2) are spatially separated.
  • the security element according to the invention in FIG. 1 is round. The diameter in the present example is between 40 and 60 mm. In addition to the elements shown (scattering area, code area, framing), further elements are conceivable, in particular the printing with text, images and characters.
  • FIG. 2 shows schematically the layer structure of a preferred embodiment of the security element according to the invention (a) in cross section, (b) in cross section in an exploded view.
  • the layer sequence starting with the lowest layer is: an adhesive protection layer (10), an adhesive layer (11), a layer comprising a pulp (12), a print layer (13) and a protective layer (14).
  • the fibrous layer (12) fulfills in the present case in addition to the provision of a predetermined breaking point in a separation attempt (separation layer) nor the function of providing randomly distributed and / or oriented scattering centers and the function of recording for the printing ink (printing layer).
  • FIG 3 shows schematically the introduction of punched in a security element (1) according to the invention.
  • punches there are three types of punches: radial safety punches (20) in the edge region of the security element, wavy safety punches (21) which run over the security element and an outer contour puncture (22) in the edge region of the security element.
  • FIG. 4 shows schematically with reference to three examples which layers of a security element according to the invention can be affected by a punching. Further possibilities of punching are conceivable.
  • the layer sequence from FIG. 2 serves as a layer sequence by way of example.
  • the punching (31) runs through the protective layer, the print layer and the fibrous material layer. It is conceivable to perform the punching even through the adhesive layer.
  • a punching on the type of punching (31) means that the security element can not be replaced as a whole of an object.
  • a peel attempt would lead to the division of the security element along the punching lines.
  • the punching (31) shown has the disadvantage that it passes through the protective layer. This could, for example, moisture penetrate into the layers below and cause damage.
  • the punching (32) passes through the print layer, the fibrous layer and the adhesive layer.
  • the protective layer is not affected and can therefore fully fulfill its function.
  • the protective layer would rupture (irreversible damage), which would be recognizable and would indicate a detachment attempt.
  • the punching (33) runs partially only through the fibrous layer. A peel test would be recognizable by the irreversible damage in the pulp and protective layer.
  • FIG. 5 schematically shows the layer structure of the preferred embodiment of a security element according to the invention from example 1 (details see example 1).
  • FIG. 6 shows the characteristic scattering signal of the preferred embodiment of a security element according to the invention from Example 1, measured according to the method described in Example 2.
  • the lower area (41) is formed by the special paper 7110 from 3M (3M 7110 litho paper, white).
  • This special paper is a composite material that already includes the layer sequence adhesive protective layer, adhesive layer and fibrous layer.
  • the adhesive layer is a strongly adhering acrylate adhesive whose adhesion to the substrate (eg polyethylene or polypropylene) according to the manufacturer is higher than the strength of the fibrous layer.
  • the fibrous layer acts as a release layer, which ruptures during a separation attempt.
  • the special paper 7110 is temperature resistant in the range of -40 ° C to 175 ° C.
  • the matt surface allows the printing and thus provides the surface for the
  • the fiber structure of the fiber unique for each area of the specialty paper, ensures
  • the primer (42) serves for better adhesion of printing ink.
  • the primer used here was the product Indigo Topaz 10 Solution MPS-2056-42 from Hewlett Packard.
  • the primer was applied over the entire surface of the special paper by known printing techniques (e.g., digital printing).
  • a color change layer 43 and a print layer 44 are applied by known printing techniques (e.g., digital printing).
  • the color change layer (43) consists of a temperature-sensitive envelope color, which causes an irreversible color change when a temperature of about 120 ° C from transparent to black is exceeded.
  • the cover color used is commercially available under the name ThermaFlag W / B from the manufacturer Flexo & Gravure Ink.
  • the envelope color is preferably printed only in the code area (unlike in FIG.
  • the optical code is printed by known printing techniques (e.g., digital printing).
  • the conclusion of the composite forms a protective layer (45).
  • a PET Overlam RP35 laminate from UPM Raflatac was applied as a protective film by means of known lamination processes.
  • FIG. 5 (a) shows the course of the punches in the security element (40).
  • the radial security punches (22) and the outer contour punching (22) extend as schematically shown in Fig. 5 (a) through all the layers, with only the adhesive protective layer (lower part of area (41)) is excluded from the punching.
  • the wave-shaped security punches (21) run only through the special paper, here too the adhesive protective layer is excluded from the punching.
  • Example 2 Measuring the characteristic leakage signal of a security element according to the invention
  • the characteristic scattering signal of the inventive security element from Example 1 was measured.
  • the security element according to the invention had the shape, the dimensions and the spatial distribution of code area and scattering area according to FIG. 1 and punching according to FIG. 3, wherein the spreading area was not affected by punching.
  • a device according to FIG. 1 from WO 2005088533 (A1) was used, with a Flexpoint® laser of the type FP-65/5 (wavelength 650 nm, maximum power 5 mW) and Si-NPN phototransistors of the type FT-65. 30 of the company STM as detectors.
  • the beam profile of the laser on the security element was liminal with a length of 2 mm and a width of 20 ⁇ m.
  • the rigid array of laser and detectors was guided at a constant speed (about 2 cm / second) across the long side of the beam profile over a range of 1.5 cm of the scattering area.
  • FIG. 6 shows the intensity / of the scattered radiation detected at a detector (detector 16b from FIG. 1 of WO2005088533 (A1)) as a function of the travel path x in arbitrary units.
  • the scatter signal is unique for each individual security element according to the invention and can therefore be used for authentication.

Landscapes

  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Finance (AREA)
  • Health & Medical Sciences (AREA)
  • Chemical & Material Sciences (AREA)
  • Chemical Kinetics & Catalysis (AREA)
  • General Chemical & Material Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Toxicology (AREA)
  • Engineering & Computer Science (AREA)
  • Manufacturing & Machinery (AREA)
  • Credit Cards Or The Like (AREA)
  • Inspection Of Paper Currency And Valuable Securities (AREA)
  • Laminated Bodies (AREA)
PCT/EP2009/000451 2008-02-05 2009-01-24 Sicherheitselement Ceased WO2009097980A2 (de)

Priority Applications (7)

Application Number Priority Date Filing Date Title
EP09707754A EP2259930A2 (de) 2008-02-05 2009-01-24 Sicherheitselement
BRPI0907479A BRPI0907479A2 (pt) 2008-02-05 2009-01-24 elemento de segurança
US12/865,578 US20110018253A1 (en) 2008-02-05 2009-01-24 Security element
JP2010545383A JP2011514548A (ja) 2008-02-05 2009-01-24 セキュリティエレメント
RU2010136838/12A RU2493968C2 (ru) 2008-02-05 2009-01-24 Элемент безопасности
CN2009801043143A CN101939173B (zh) 2008-02-05 2009-01-24 安全元件以及用其标识和鉴别对象的方法
MX2010008480A MX2010008480A (es) 2008-02-05 2009-01-24 Elemento de seguridad.

Applications Claiming Priority (6)

Application Number Priority Date Filing Date Title
DE102008007731.3 2008-02-05
DE102008007731A DE102008007731B4 (de) 2008-02-05 2008-02-05 Verfahren und Vorrichtung zur Identifizierung und Authentifizierung von Objekten
DE102008016803A DE102008016803A1 (de) 2008-04-02 2008-04-02 Authentifizierung von Objekten mittels Bilderkennung
DE102008016803.3 2008-04-02
DE102008053798.5 2008-10-29
DE200810053798 DE102008053798A1 (de) 2008-10-29 2008-10-29 Sicherheitselement

Publications (2)

Publication Number Publication Date
WO2009097980A2 true WO2009097980A2 (de) 2009-08-13
WO2009097980A3 WO2009097980A3 (de) 2009-12-03

Family

ID=40886117

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/EP2009/000451 Ceased WO2009097980A2 (de) 2008-02-05 2009-01-24 Sicherheitselement

Country Status (8)

Country Link
US (1) US20110018253A1 (https=)
EP (1) EP2259930A2 (https=)
JP (1) JP2011514548A (https=)
KR (1) KR20100117597A (https=)
CN (1) CN101939173B (https=)
BR (1) BRPI0907479A2 (https=)
MX (1) MX2010008480A (https=)
WO (1) WO2009097980A2 (https=)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2011128373A1 (de) 2010-04-14 2011-10-20 Bayer Technology Services Gmbh Optischer scanner
DE102010020810A1 (de) 2010-05-18 2011-11-24 Bayer Technology Services Gmbh Identifizierung von Gegenständen
WO2011147760A1 (de) 2010-05-25 2011-12-01 Bayer Technology Services Gmbh Identifizierung von gegenständen
EP3154015A1 (de) * 2015-10-09 2017-04-12 Authentic Vision GmbH Authentifizierungsverfahren für artikelidentifikatoren
DE102021114841A1 (de) 2021-06-09 2022-12-15 Schreiner Group Gmbh & Co. Kg Folienverbund mit Schutz vor Manipulation
DE102023126016A1 (de) * 2023-09-26 2025-03-27 Schreiner Group Gmbh & Co. Kg Etikett mit Schutz vor Fälschung

Families Citing this family (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE102009052538A1 (de) * 2009-11-11 2011-05-12 Giesecke & Devrient Gmbh Herstellung eines mit gefärbten Mikrovertiefungen versehenen Sicherheitselementes
US20150231896A1 (en) * 2011-03-10 2015-08-20 Fastechnology Group, LLC Inverted codes on transparent packaging exterior
US9436770B2 (en) 2011-03-10 2016-09-06 Fastechnology Group, LLC Database systems and methods for consumer packaged goods
US10832015B2 (en) 2011-03-10 2020-11-10 Joseph A. Hattrup Trust Dated July 16, 1996, As Amended On-the-fly marking systems for consumer packaged goods
JP2013190478A (ja) * 2012-03-12 2013-09-26 Toppan Printing Co Ltd 偽造防止媒体、粘着ラベル、転写箔及びラベル付き物品
EP2878453A1 (de) * 2013-11-28 2015-06-03 Authentic Vision GmbH Objektmarkierung zur optischen Authentifizierung und Verfahren zu deren Herstellung
CN106585164B (zh) * 2016-11-30 2018-01-19 东莞市天眼网络科技有限公司 一种生成防伪纹理的方法和防伪印刷品

Family Cites Families (20)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
NL7406230A (https=) * 1973-05-11 1974-11-13
NL9001368A (nl) * 1990-06-15 1992-01-02 Tel Developments B V Beveiliging van voorwerpen of dokumenten.
GB9116097D0 (en) * 1991-07-25 1991-09-11 Ordonez Gabriel Security price or barcode label
JPH08156473A (ja) * 1994-12-06 1996-06-18 Dainippon Printing Co Ltd 金券類およびその偽造防止方法
JPH10241000A (ja) * 1997-02-26 1998-09-11 Ricoh Co Ltd 特殊原稿判定装置,特殊原稿判定方法およびその方法をコンピュータに実行させるためのプログラムを記録した機械読み取り可能な記録媒体
WO1998057299A1 (de) * 1997-06-11 1998-12-17 Nova-Technik Entwicklung Von Und Handel Mit Medizinischen Geräten Gmbh Dokument mit einem echtheitsmerkmal
FR2765014B1 (fr) * 1997-06-24 2000-02-11 Rene Boulnois Procede d'authentification d'un document en papier, document de securite en papier, et dispositif de controle de l'authenticite de documents en papier
US6904525B1 (en) * 1997-07-01 2005-06-07 Pitney Bowes Inc. Method for preventing counterfeiting of articles of manufacture
DE19807232C1 (de) * 1998-02-20 1999-07-08 Schreiner Etiketten Mehrlagiges Etikett
JP2000293108A (ja) * 1999-04-02 2000-10-20 Kuramoto Sangyo:Kk 偽造防止用ラベル
EA003919B1 (ru) * 1999-12-08 2003-10-30 Валентин Александрович Мищенко Способ и система для маркировки и идентификации изделий
US6550685B1 (en) * 2000-11-14 2003-04-22 Hewlett-Packard Development Company Lp Methods and apparatus utilizing visually distinctive barcodes
JP4030830B2 (ja) * 2002-08-13 2008-01-09 日本電気株式会社 縞模様画像鑑定装置および縞模様画像鑑定方法
CN2715245Y (zh) * 2003-09-22 2005-08-03 兆日科技(深圳)有限公司 一种纹理密码标签
AU2005220385B2 (en) * 2004-03-12 2010-07-15 Ingenia Holdings Limited Authenticity verification methods, products and apparatuses
DE602005014755D1 (de) * 2004-03-12 2009-07-16 Ingenia Technology Ltd Verfahren und vorrichtungen zur erzeugung authentifizierbarer gegenstände und ihrer nachfolgenden überprüfung
JP2006082481A (ja) * 2004-09-17 2006-03-30 Bridgestone Sports Co Ltd ゴルフボール用箱又はゴルフボール用包装材への印刷方法及びゴルフボール用箱又はゴルフボール用包装材
JP2006235257A (ja) * 2005-02-25 2006-09-07 Nichiei Kako Kk セキュリティ用ラベル
US7624928B2 (en) * 2005-11-18 2009-12-01 Fuji Xerox Co., Ltd. Method and apparatus for making tags, tag, and system for managing articles
US20080129037A1 (en) * 2006-12-01 2008-06-05 Prime Technology Llc Tagging items with a security feature

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2011128373A1 (de) 2010-04-14 2011-10-20 Bayer Technology Services Gmbh Optischer scanner
DE102010015014A1 (de) 2010-04-14 2011-10-20 Bayer Technology Services Gmbh Optischer Scanner
DE102010020810A1 (de) 2010-05-18 2011-11-24 Bayer Technology Services Gmbh Identifizierung von Gegenständen
WO2011144533A1 (de) 2010-05-18 2011-11-24 Bayer Technology Services Gmbh Identifizierung von gegenständen
WO2011147760A1 (de) 2010-05-25 2011-12-01 Bayer Technology Services Gmbh Identifizierung von gegenständen
DE102010021380A1 (de) 2010-05-25 2011-12-01 Bayer Technology Services Gmbh Identifizierung von Gegenständen
EP3154015A1 (de) * 2015-10-09 2017-04-12 Authentic Vision GmbH Authentifizierungsverfahren für artikelidentifikatoren
WO2017060438A1 (de) * 2015-10-09 2017-04-13 Authentic Vision Gmbh Authentifizierungsverfahren für artikelidentifikatoren
DE102021114841A1 (de) 2021-06-09 2022-12-15 Schreiner Group Gmbh & Co. Kg Folienverbund mit Schutz vor Manipulation
US12106684B2 (en) 2021-06-09 2024-10-01 Schreiner Group Gmbh & Co. Kg Film composite with protection against tampering
DE102023126016A1 (de) * 2023-09-26 2025-03-27 Schreiner Group Gmbh & Co. Kg Etikett mit Schutz vor Fälschung

Also Published As

Publication number Publication date
US20110018253A1 (en) 2011-01-27
MX2010008480A (es) 2011-02-23
WO2009097980A3 (de) 2009-12-03
CN101939173A (zh) 2011-01-05
EP2259930A2 (de) 2010-12-15
CN101939173B (zh) 2012-06-20
BRPI0907479A2 (pt) 2019-02-26
JP2011514548A (ja) 2011-05-06
KR20100117597A (ko) 2010-11-03

Similar Documents

Publication Publication Date Title
EP2259930A2 (de) Sicherheitselement
DE10162537A1 (de) Verfahren zur Authentizitätssicherung von Dokumenten
EP2435994A1 (de) Positonsmarkierung zur kennzeichnung eines oberflächenbereichs und verfahren zur identifizierung /authentifizierung auf der basis des markierten oberflächenbereichs
DE10326983A1 (de) Wertdokument mit einem maschinenlesbaren Echtheitskennzeichen
DE102008051409A1 (de) Sicherheitselement
DE102009037832A1 (de) Identifikationsdokument mit zwei sich überlagernden Bildern
DE102016203609A1 (de) Sicherheitsgegenstand mit dynamischem und statischem Fenstersicherheitsmerkmal und Verfahren zur Herstellung
DE102008030182A1 (de) Wert- oder Sicherheitsdokument und Verfahren zum Bilden mindestens eines Sicherheitsmerkmals bei der Herstellung des Wert- oder Sicherheitsdokuments sowie Verfahren und Mittel zur Verifikation
DE102020133826A1 (de) Verfahren zur Herstellung eines gedruckten Bildes auf einem Datenträger für ein Sicherheits- oder Wertdokument
DE102014214548B4 (de) Verfahren zur Herstellung eines Dokuments
DE102013218754B4 (de) Manipulationsabgesichertes Wert- oder Sicherheitsprodukt und Verfahren zum Verifizieren der Echtheit des manipulationsabgesicherten Wert- oder Sicherheitsproduktes
EP4051509B1 (de) Prüfung eines sicherheitsdokuments auf basis von tröpfchenmorphologien
DE102020127879A1 (de) Verfahren zur echtheitsverifikation eines aus mehreren teilen gebildeten sicherheitsmerkmals eines wert- oder sicherheitsprodukts
DE102008053798A1 (de) Sicherheitselement
DE102008016435A1 (de) Haftetikett und Verfahren zum Kennzeichnen und zum Authentifizieren eines Gegenstandes mit Haftetiketten
AT517776A2 (de) Sicherheitsdokument, umfassend eine Folie mit Interferenzeffekten, Verfahren zur Bestimmung der Echtheit eines solchen Dokuments und Vorrichtung zur Durchführung eines solchen Verfahrens
EP3922473A1 (de) Verfahren zur herstellung eines gedruckten lichtbildes auf einem datenträger für ein sicherheits- oder wertdokument
EP3938217A1 (de) Sicherheitseinlage mit taktiler lackanordnung für ein ausweisdokument und verfahren zur herstellung einer solchen sicherheitseinlage
EP2896508B1 (de) Erkennungssystem für Sicherheitscodierungen
EP1954508B9 (de) Verfahren und vorrichtung zur herstellung eines sicherheitsdokumentes
DE102019103495A1 (de) Gegenstand zum Schutz einer vertraulichen Information vor Ausspähung
EP3415339B1 (de) Verfahren zum eineindeutigen identifizieren eines dokuments
DE102023112927A1 (de) Druckplattenkombination und Verfahren zu deren Herstellung, Sicherheitsdruck und Verfahren zu dessen Herstellung, Ausweis-, Wert- oder Sicherheitsdokument mit einem solchen Sicherheitsdruck und Verfahren zur Verifikation des Sicherheitsdrucks

Legal Events

Date Code Title Description
WWE Wipo information: entry into national phase

Ref document number: 200980104314.3

Country of ref document: CN

121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 09707754

Country of ref document: EP

Kind code of ref document: A2

WWE Wipo information: entry into national phase

Ref document number: 2009707754

Country of ref document: EP

WWE Wipo information: entry into national phase

Ref document number: MX/A/2010/008480

Country of ref document: MX

WWE Wipo information: entry into national phase

Ref document number: 5530/DELNP/2010

Country of ref document: IN

WWE Wipo information: entry into national phase

Ref document number: 2010545383

Country of ref document: JP

ENP Entry into the national phase

Ref document number: 20107017453

Country of ref document: KR

Kind code of ref document: A

NENP Non-entry into the national phase

Ref country code: DE

WWE Wipo information: entry into national phase

Ref document number: 2010136838

Country of ref document: RU

WWE Wipo information: entry into national phase

Ref document number: 12865578

Country of ref document: US

ENP Entry into the national phase

Ref document number: PI0907479

Country of ref document: BR

Kind code of ref document: A2

Effective date: 20100804