WO2017153196A1 - Sicherheitselement sowie ein verfahren zur herstellung eines sicherheitselements - Google Patents
Sicherheitselement sowie ein verfahren zur herstellung eines sicherheitselements Download PDFInfo
- Publication number
- WO2017153196A1 WO2017153196A1 PCT/EP2017/054514 EP2017054514W WO2017153196A1 WO 2017153196 A1 WO2017153196 A1 WO 2017153196A1 EP 2017054514 W EP2017054514 W EP 2017054514W WO 2017153196 A1 WO2017153196 A1 WO 2017153196A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- security element
- volume hologram
- layer
- security
- bent state
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Ceased
Links
Classifications
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B42—BOOKBINDING; ALBUMS; FILES; SPECIAL PRINTED MATTER
- B42D—BOOKS; BOOK COVERS; LOOSE LEAVES; PRINTED MATTER CHARACTERISED BY IDENTIFICATION OR SECURITY FEATURES; PRINTED MATTER OF SPECIAL FORMAT OR STYLE NOT OTHERWISE PROVIDED FOR; DEVICES FOR USE THEREWITH AND NOT OTHERWISE PROVIDED FOR; MOVABLE-STRIP WRITING OR READING APPARATUS
- B42D25/00—Information-bearing cards or sheet-like structures characterised by identification or security features; Manufacture thereof
- B42D25/30—Identification or security features, e.g. for preventing forgery
- B42D25/328—Diffraction gratings; Holograms
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B42—BOOKBINDING; ALBUMS; FILES; SPECIAL PRINTED MATTER
- B42D—BOOKS; BOOK COVERS; LOOSE LEAVES; PRINTED MATTER CHARACTERISED BY IDENTIFICATION OR SECURITY FEATURES; PRINTED MATTER OF SPECIAL FORMAT OR STYLE NOT OTHERWISE PROVIDED FOR; DEVICES FOR USE THEREWITH AND NOT OTHERWISE PROVIDED FOR; MOVABLE-STRIP WRITING OR READING APPARATUS
- B42D25/00—Information-bearing cards or sheet-like structures characterised by identification or security features; Manufacture thereof
- B42D25/20—Information-bearing cards or sheet-like structures characterised by identification or security features; Manufacture thereof characterised by a particular use or purpose
- B42D25/24—Passports
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B42—BOOKBINDING; ALBUMS; FILES; SPECIAL PRINTED MATTER
- B42D—BOOKS; BOOK COVERS; LOOSE LEAVES; PRINTED MATTER CHARACTERISED BY IDENTIFICATION OR SECURITY FEATURES; PRINTED MATTER OF SPECIAL FORMAT OR STYLE NOT OTHERWISE PROVIDED FOR; DEVICES FOR USE THEREWITH AND NOT OTHERWISE PROVIDED FOR; MOVABLE-STRIP WRITING OR READING APPARATUS
- B42D25/00—Information-bearing cards or sheet-like structures characterised by identification or security features; Manufacture thereof
- B42D25/20—Information-bearing cards or sheet-like structures characterised by identification or security features; Manufacture thereof characterised by a particular use or purpose
- B42D25/29—Securities; Bank notes
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B42—BOOKBINDING; ALBUMS; FILES; SPECIAL PRINTED MATTER
- B42D—BOOKS; BOOK COVERS; LOOSE LEAVES; PRINTED MATTER CHARACTERISED BY IDENTIFICATION OR SECURITY FEATURES; PRINTED MATTER OF SPECIAL FORMAT OR STYLE NOT OTHERWISE PROVIDED FOR; DEVICES FOR USE THEREWITH AND NOT OTHERWISE PROVIDED FOR; MOVABLE-STRIP WRITING OR READING APPARATUS
- B42D25/00—Information-bearing cards or sheet-like structures characterised by identification or security features; Manufacture thereof
- B42D25/30—Identification or security features, e.g. for preventing forgery
- B42D25/324—Reliefs
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B42—BOOKBINDING; ALBUMS; FILES; SPECIAL PRINTED MATTER
- B42D—BOOKS; BOOK COVERS; LOOSE LEAVES; PRINTED MATTER CHARACTERISED BY IDENTIFICATION OR SECURITY FEATURES; PRINTED MATTER OF SPECIAL FORMAT OR STYLE NOT OTHERWISE PROVIDED FOR; DEVICES FOR USE THEREWITH AND NOT OTHERWISE PROVIDED FOR; MOVABLE-STRIP WRITING OR READING APPARATUS
- B42D25/00—Information-bearing cards or sheet-like structures characterised by identification or security features; Manufacture thereof
- B42D25/30—Identification or security features, e.g. for preventing forgery
- B42D25/355—Security threads
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B42—BOOKBINDING; ALBUMS; FILES; SPECIAL PRINTED MATTER
- B42D—BOOKS; BOOK COVERS; LOOSE LEAVES; PRINTED MATTER CHARACTERISED BY IDENTIFICATION OR SECURITY FEATURES; PRINTED MATTER OF SPECIAL FORMAT OR STYLE NOT OTHERWISE PROVIDED FOR; DEVICES FOR USE THEREWITH AND NOT OTHERWISE PROVIDED FOR; MOVABLE-STRIP WRITING OR READING APPARATUS
- B42D25/00—Information-bearing cards or sheet-like structures characterised by identification or security features; Manufacture thereof
- B42D25/30—Identification or security features, e.g. for preventing forgery
- B42D25/36—Identification or security features, e.g. for preventing forgery comprising special materials
- B42D25/373—Metallic materials
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B42—BOOKBINDING; ALBUMS; FILES; SPECIAL PRINTED MATTER
- B42D—BOOKS; BOOK COVERS; LOOSE LEAVES; PRINTED MATTER CHARACTERISED BY IDENTIFICATION OR SECURITY FEATURES; PRINTED MATTER OF SPECIAL FORMAT OR STYLE NOT OTHERWISE PROVIDED FOR; DEVICES FOR USE THEREWITH AND NOT OTHERWISE PROVIDED FOR; MOVABLE-STRIP WRITING OR READING APPARATUS
- B42D25/00—Information-bearing cards or sheet-like structures characterised by identification or security features; Manufacture thereof
- B42D25/40—Manufacture
- B42D25/405—Marking
- B42D25/41—Marking using electromagnetic radiation
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B42—BOOKBINDING; ALBUMS; FILES; SPECIAL PRINTED MATTER
- B42D—BOOKS; BOOK COVERS; LOOSE LEAVES; PRINTED MATTER CHARACTERISED BY IDENTIFICATION OR SECURITY FEATURES; PRINTED MATTER OF SPECIAL FORMAT OR STYLE NOT OTHERWISE PROVIDED FOR; DEVICES FOR USE THEREWITH AND NOT OTHERWISE PROVIDED FOR; MOVABLE-STRIP WRITING OR READING APPARATUS
- B42D25/00—Information-bearing cards or sheet-like structures characterised by identification or security features; Manufacture thereof
- B42D25/40—Manufacture
- B42D25/45—Associating two or more layers
-
- G—PHYSICS
- G03—PHOTOGRAPHY; CINEMATOGRAPHY; ANALOGOUS TECHNIQUES USING WAVES OTHER THAN OPTICAL WAVES; ELECTROGRAPHY; HOLOGRAPHY
- G03H—HOLOGRAPHIC PROCESSES OR APPARATUS
- G03H1/00—Holographic processes or apparatus using light, infrared or ultraviolet waves for obtaining holograms or for obtaining an image from them; Details peculiar thereto
- G03H1/0005—Adaptation of holography to specific applications
- G03H1/0011—Adaptation of holography to specific applications for security or authentication
-
- G—PHYSICS
- G03—PHOTOGRAPHY; CINEMATOGRAPHY; ANALOGOUS TECHNIQUES USING WAVES OTHER THAN OPTICAL WAVES; ELECTROGRAPHY; HOLOGRAPHY
- G03H—HOLOGRAPHIC PROCESSES OR APPARATUS
- G03H1/00—Holographic processes or apparatus using light, infrared or ultraviolet waves for obtaining holograms or for obtaining an image from them; Details peculiar thereto
- G03H1/02—Details of features involved during the holographic process; Replication of holograms without interference recording
- G03H1/0236—Form or shape of the hologram when not registered to the substrate, e.g. trimming the hologram to alphanumerical shape
-
- G—PHYSICS
- G03—PHOTOGRAPHY; CINEMATOGRAPHY; ANALOGOUS TECHNIQUES USING WAVES OTHER THAN OPTICAL WAVES; ELECTROGRAPHY; HOLOGRAPHY
- G03H—HOLOGRAPHIC PROCESSES OR APPARATUS
- G03H1/00—Holographic processes or apparatus using light, infrared or ultraviolet waves for obtaining holograms or for obtaining an image from them; Details peculiar thereto
- G03H1/02—Details of features involved during the holographic process; Replication of holograms without interference recording
- G03H1/024—Hologram nature or properties
- G03H1/0248—Volume holograms
-
- G—PHYSICS
- G03—PHOTOGRAPHY; CINEMATOGRAPHY; ANALOGOUS TECHNIQUES USING WAVES OTHER THAN OPTICAL WAVES; ELECTROGRAPHY; HOLOGRAPHY
- G03H—HOLOGRAPHIC PROCESSES OR APPARATUS
- G03H1/00—Holographic processes or apparatus using light, infrared or ultraviolet waves for obtaining holograms or for obtaining an image from them; Details peculiar thereto
- G03H1/22—Processes or apparatus for obtaining an optical image from holograms
- G03H1/2202—Reconstruction geometries or arrangements
-
- G—PHYSICS
- G03—PHOTOGRAPHY; CINEMATOGRAPHY; ANALOGOUS TECHNIQUES USING WAVES OTHER THAN OPTICAL WAVES; ELECTROGRAPHY; HOLOGRAPHY
- G03H—HOLOGRAPHIC PROCESSES OR APPARATUS
- G03H1/00—Holographic processes or apparatus using light, infrared or ultraviolet waves for obtaining holograms or for obtaining an image from them; Details peculiar thereto
- G03H1/26—Processes or apparatus specially adapted to produce multiple sub- holograms or to obtain images from them, e.g. multicolour technique
- G03H1/2645—Multiplexing processes, e.g. aperture, shift, or wavefront multiplexing
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B42—BOOKBINDING; ALBUMS; FILES; SPECIAL PRINTED MATTER
- B42D—BOOKS; BOOK COVERS; LOOSE LEAVES; PRINTED MATTER CHARACTERISED BY IDENTIFICATION OR SECURITY FEATURES; PRINTED MATTER OF SPECIAL FORMAT OR STYLE NOT OTHERWISE PROVIDED FOR; DEVICES FOR USE THEREWITH AND NOT OTHERWISE PROVIDED FOR; MOVABLE-STRIP WRITING OR READING APPARATUS
- B42D25/00—Information-bearing cards or sheet-like structures characterised by identification or security features; Manufacture thereof
- B42D25/20—Information-bearing cards or sheet-like structures characterised by identification or security features; Manufacture thereof characterised by a particular use or purpose
- B42D25/23—Identity cards
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B42—BOOKBINDING; ALBUMS; FILES; SPECIAL PRINTED MATTER
- B42D—BOOKS; BOOK COVERS; LOOSE LEAVES; PRINTED MATTER CHARACTERISED BY IDENTIFICATION OR SECURITY FEATURES; PRINTED MATTER OF SPECIAL FORMAT OR STYLE NOT OTHERWISE PROVIDED FOR; DEVICES FOR USE THEREWITH AND NOT OTHERWISE PROVIDED FOR; MOVABLE-STRIP WRITING OR READING APPARATUS
- B42D25/00—Information-bearing cards or sheet-like structures characterised by identification or security features; Manufacture thereof
- B42D25/30—Identification or security features, e.g. for preventing forgery
- B42D25/333—Watermarks
-
- G—PHYSICS
- G03—PHOTOGRAPHY; CINEMATOGRAPHY; ANALOGOUS TECHNIQUES USING WAVES OTHER THAN OPTICAL WAVES; ELECTROGRAPHY; HOLOGRAPHY
- G03H—HOLOGRAPHIC PROCESSES OR APPARATUS
- G03H1/00—Holographic processes or apparatus using light, infrared or ultraviolet waves for obtaining holograms or for obtaining an image from them; Details peculiar thereto
- G03H1/0005—Adaptation of holography to specific applications
- G03H1/0011—Adaptation of holography to specific applications for security or authentication
- G03H2001/0016—Covert holograms or holobjects requiring additional knowledge to be perceived, e.g. holobject reconstructed only under IR illumination
-
- G—PHYSICS
- G03—PHOTOGRAPHY; CINEMATOGRAPHY; ANALOGOUS TECHNIQUES USING WAVES OTHER THAN OPTICAL WAVES; ELECTROGRAPHY; HOLOGRAPHY
- G03H—HOLOGRAPHIC PROCESSES OR APPARATUS
- G03H1/00—Holographic processes or apparatus using light, infrared or ultraviolet waves for obtaining holograms or for obtaining an image from them; Details peculiar thereto
- G03H1/04—Processes or apparatus for producing holograms
- G03H1/0402—Recording geometries or arrangements
- G03H2001/043—Non planar recording surface, e.g. curved surface
-
- G—PHYSICS
- G03—PHOTOGRAPHY; CINEMATOGRAPHY; ANALOGOUS TECHNIQUES USING WAVES OTHER THAN OPTICAL WAVES; ELECTROGRAPHY; HOLOGRAPHY
- G03H—HOLOGRAPHIC PROCESSES OR APPARATUS
- G03H1/00—Holographic processes or apparatus using light, infrared or ultraviolet waves for obtaining holograms or for obtaining an image from them; Details peculiar thereto
- G03H1/04—Processes or apparatus for producing holograms
- G03H1/0402—Recording geometries or arrangements
- G03H2001/0434—In situ recording when the hologram is recorded within the device used for reconstruction
-
- G—PHYSICS
- G03—PHOTOGRAPHY; CINEMATOGRAPHY; ANALOGOUS TECHNIQUES USING WAVES OTHER THAN OPTICAL WAVES; ELECTROGRAPHY; HOLOGRAPHY
- G03H—HOLOGRAPHIC PROCESSES OR APPARATUS
- G03H2270/00—Substrate bearing the hologram
- G03H2270/30—Nature
- G03H2270/31—Flexible
Definitions
- the invention relates to a security element, a method for producing a security element and a security document with a
- Security documents such as banknotes, passports, ID cards,
- security elements often have light-diffractive, diffractive structures such as holograms.
- Security elements provide the viewer with a tilt of the
- Security elements also optically variable thin-film elements used, which in a tilting for the viewer different color impressions,
- the invention is now based on the object to provide a security element and a method for producing a security element, which is characterized by a novel optically variable effect, which differs from the previously described known optically variable effects.
- This task is performed by a security element with a first
- Volumenhologrammtik which spans a coordinate system with the mutually perpendicular coordinate axes x and y spans in a non-bent state of the security element solved, wherein in the first
- Volume hologram layer is introduced a first volume hologram in at least a first region, wherein the first volume hologram is formed such that a first information in a first predefined bent state of the security element is visible to a viewer in a first viewing situation and is not visible in the unbent state of the security element in the first viewing situation, or vice versa.
- This object is further achieved by a method for producing a security element with a first
- a volume hologram layer in particular according to one of claims 1 to 43, the method comprising the steps of: a) providing the first volume hologram layer; b) arranging a first master having a first surface structure on the first volume hologram layer; c) exposing the first master and the first volume hologram layer by means of coherent light, wherein the first volume hologram thus introduced into the first volume hologram layer is shaped in such a way that a first information in a first predefined bent state of the
- Security element is visible to a viewer in a first viewing situation and is not visible in the unbent state of the security element in the first viewing situation or vice versa. This task is also solved by a security document with a
- the invention is based on the finding that by shaping the above-specified volume hologram layer, an optically variable effect can be generated, which differs from the aforementioned known optically variable effects. While at previous
- Security elements has shown here is an optically variable effect generated by bending the security element, so that, for example, a
- optically variable effect seen in bending clearly differs from an optical effect of the volume hologram when tilted.
- the optically variable effect according to the invention can, depending on the design of the volume hologram
- Security element according to the invention increases the security against counterfeiting, since a counterfeiter must now also take into account a bent state of the security element in a possible imitation. Furthermore, that is
- the security element can not be copied by molding a surface relief.
- volume hologram In a "volume hologram" is in particular - in contrast to
- Embossed holograms where the information only as a relief on the surface a film is applied and diffracted by the incident light - the information stored in the material volume. Over a modulation of at least two coherent waves occurs in this volume of material as a recording medium for superposition of these waves.
- Volume hologram stored in so-called Bragg planes and contain the holographic information as a variation of the refractive index of the material.
- Volume hologram applies the Bragg condition, which has the consequence that a volume hologram only by reference beams with specific
- n ⁇ 2d sin ⁇ , where n is a natural number, ⁇ the
- bending is also understood to mean buckling, so that a bent security element can have one or more break points or fold lines on which the security element is bent sharply or abruptly.
- bent state of the security element is understood to mean a bent security element, that is to say that the shape of a
- Safety element in a bent state was changed by the force.
- the security element is curved or bent in the bent state and flat or flat when not bent.
- predefined is meant a predetermined value or range of values or a predetermined shape or geometry, for example, a security element in a predefined bent state follows the shape of a parabola, the parameters describing the parabola being fixed within tolerance limits for the predefined bent state ,
- viewing situation here means the relative positional relationships of the observer, a lighting device and the security element to one another
- the situation relationships do not change.
- the distances or angular relationships of the observer, the illumination device and the security element to each other in a particular viewing situation remain substantially the same.
- “invisible” is understood to be only slightly visible, so that it is possible for the "Invisible” information for the viewer, especially in comparison to the “visible” information, only slightly recognizable.
- area is understood to mean in each case a defined area of a layer which, when viewed perpendicular to one of the first
- Volume hologram layer spanned level is taken.
- the defined area occupied by the area is determined in the non-bent state of the security element.
- Further advantageous embodiments of the invention are in the
- the first volume hologram is formed in such a way that at least one second information in at least one second predefined bent state of the security element is visible to the viewer in the first viewing situation and is not visible in the unbent state of the security element in the first viewing situation or the other way around.
- This ensures that in a second predefined bent state of the security element, a second information for the viewer in the first viewing situation is visible.
- the first and the second information complement each other, so that for an untrained observer from the combination of the first and the second
- the first information may be visible in the first and in the second predefined bent state. So can the
- Security element recognizable motive upon bending of the security element in the second bent state changes.
- a picture story can be generated for the viewer, which is also intuitive and self-explanatory for the layman.
- the viewer is "rewarded" by bending through the discovery of the history of the picture and the counterfeit security is further increased, since a counterfeiter now has to observe several bent states
- An example of such a pictorial story is a picture that turns like a puzzle piece for bending Piece composed.
- the security element in the first and / or the at least one second predefined bent state is bent about the x-axis and / or the y-axis.
- the security element in the first and / or the at least one second predefined bent state is bent about a horizontal and / or vertical axis of the security element.
- a bend about the x-axis and / or y-axis is also understood to mean a bend to a parallel to one of these axes.
- the security element in the first and / or the at least one second predefined bent state is bent toward the viewer, in particular such that the security element has a concave shape in the first and / or the at least one second predefined bent state, and / or that the security element of the
- the security element in the first and / or the at least one second predefined bent state has a convex shape. Furthermore, it is possible for the first and / or the at least one second predefined bent state of the security element to follow approximately the shape of a half parabola or a parabola.
- the security element has at least one bending line around which the security element is bent in the first and / or the at least one second predefined bent state of the security element.
- the bending line preferably lies in the at least one first region, in which the first volume hologram is introduced into the first volume hologram layer.
- the thickness of the security element is reduced in a region of the bending line.
- the thickness of the first volume hologram layer is reduced in the region of the bending line
- the thicknesses of one or more further layers of the security element preferably by at least 1 ⁇ , preferably by at least 2.5 ⁇ , more preferably by at least 5 ⁇ , even more preferably by at least 10 ⁇ . It is also possible that the thicknesses of one or more further layers of the security element, in particular a carrier layer and / or a
- Protective lacquer layer are reduced in the area of the bending line. Furthermore, it is possible that at least one of the layers of the security element is not present in the region of the bending line, so that the thickness of the security element is thereby reduced. It is also possible that in the area of the bending line perforations or other local openings of the
- the width of the region of reduced thickness of the security element is preferably between 5 ⁇ and 10 mm, preferably between 50 ⁇ and 5 mm, more preferably between 100 ⁇ and 5 mm. This makes it possible that the security element is bent along a bending line whose Position on the security element is predetermined by the reduction in thickness.
- the security element in the first and / or the at least one second predefined bent state is bent symmetrically or asymmetrically with respect to the bending line.
- symmetrical is preferably understood to mean geometric symmetry, so that the security element symmetrically curved in the first and / or the at least one second predefined bent state can be imaged onto itself by movement and / or the at least one second predefined bent state symmetrically curved security element is bent mirror-inverted with respect to the bending line.
- asymmetric here preferably a bend in the first and / or the at least one second bent state is referred to, which is not symmetrical.
- Coordinate axes x and y spanned plane between a surface of the security element and one of the coordinate axes x or y
- included angles are different on both sides of the bending line.
- the angles differ by less than 5 °, preferably by less than 2.5 °, more preferably by less than 1 °.
- a predefined limit value is exceeded on application of the Laplace operator ⁇ to a surface of the security element described by a function F (x, y), and the unbent state is not exceeded, the function F (x, y) being the distance of the surface of the
- predefined bent state of the security element another predefined limit when applying the Laplace operator ⁇ on the
- Function F (x, y) is not exceeded, so that when applying the Laplace- operator ⁇ to the function F (x, y) of the first and / or the at least one second predefined bent state by a range of values between the predefined limit and the further predefined limit value is determined.
- the bending radius in the first and / or the at least one second predefined bent state of the security element is between 1 mm and 100 mm, preferably between 2 mm and 50 mm, more preferably between 4 mm and 30 mm.
- bending radius is here understood the radius r of the largest circle, which bears tangentially on the bending line or the bending point and at the same time no intersections with the security element and / or
- Security element by at least 2 mm, preferably 5 mm, more preferably 10 mm different. Furthermore, it is expedient that the security element is bendable, preferably is easily and reversibly bendable, in particular that the shape of the
- Security element by force is changeable.
- the security element in the direction of the coordinate axis x or y, about which the security element is bent in the first and / or the at least one second predefined bent state has a length of at least 5 mm, preferably of at least 10 mm, more preferably of at least 20 mm , even more preferably of at least 50 mm.
- the security element in the non-bent state of the security element, has an areal extent of at least 5 mm ⁇ 1 mm, preferably of at least 10 mm ⁇ 2 mm, even more preferably of at least 50 mm ⁇ 10 mm.
- the first volume hologram has two or more first zones in the at least one first region, wherein the two or more first zones in the first predefined bent state of the security element for the viewer in the first viewing situation, the first information
- the first volume hologram has two or more second zones in the at least one first area, wherein the two or more second zones in the at least one second predefined bent state of the security element for the viewer in the first viewing situation, the at least one second Provide information.
- the at least one second information is generated by the two or more second zones of the at least one first area in the first viewing situation.
- Security element a surface extent of at least 5 mx 5 ⁇ , preferably of 50 ⁇ x 50 ⁇ , even more preferably of 500 ⁇ x 500 ⁇ have. It is also expedient if the two or more first zones and / or the two or more second zones are arranged according to a grid.
- the grid is a one-dimensional grid
- dot matrix in particular a dot matrix, is.
- dot matrix is also here
- Pixel grid understood from quadrangular, in particular rectangular or square areas. It is further possible that the two or more first zones and / or the two or more second zones are interlaced. Thus, it is possible that the two or more first zones are arranged alternately with the two or more second zones and that the two or more first zones are adjacent to the two or more second zones
- the grid width is smaller than the resolution limit of the unarmed human eye, in particular that the grid is less than 300 ⁇ , preferably less than 150 ⁇ , is.
- the two or more first zones and / or the two or more second zones are arranged on both sides of the bending line.
- at least one of the first zones to lie on a first side of the bending line and for at least one of the first zones to lie on a second side of the bending line.
- the two or more first zones are in the first predefined bent state of the security element and / or the two or a plurality of second zones in the at least one second predefined bent state of the security element in the first
- Volume hologram layer in the unbent state spanned plane and the viewing direction of an observer included included angle. Also, as the illumination angle, the plane subtended between the plane defined by the first volume hologram layer in the non-bent state and the illumination direction of a lighting device
- the viewing angle and the illumination angle for the respective zone change in the two or more first and / or second zones.
- the first volume hologram layer has Bragg planes formed by variations in refractive index.
- at least one of the parameters differs from the Bragg planes and the orientation of the Bragg planes in the two or more first zones and / or in the two or more second zones. This makes it possible, for example, that the two or more first zones and / or the two or more second zones for the
- the distance of the Bragg planes differs by more than 5 nm, preferably more than 10 nm, even more preferably by more than 20 nm, and / or if that of the Bragg planes and that of the first Volume hologram layer included angle differs by more than 2 °, preferably by more than 5 °, more preferably by more than 10 °, even more preferably by more than 20 °.
- Generating the first information in the first predefined bent state of the security element in the first viewing situation contributes.
- the alignment of the Bragg planes in the two or more first zones in the flat state is not equal to each other.
- the orientation of the Bragg planes in the two or more second zones is substantially equal to one another. This can be achieved that each of the two or more second zones for
- Generating the at least one second information in the at least one second predefined bent state of the security element in the first viewing situation contributes. This also means that the Alignment of the Bragg planes in the two or more second zones in the flat state is not equal to each other.
- reflected and / or diffracted light are included angles.
- a first master is used for producing a security element, which is created on the basis of a curved intermediate master, wherein the bending of the curved intermediate master of the bending of the first and / or the at least one second predefined bent state of the security element corresponds.
- the intermediate master may for example be a film with a holographically exposed photoresist, wherein the film in the holographic exposure corresponding to the bending of the first and / or the at least one second predefined bent state of the
- a first master is used, which is produced by means of distorting optics, in particular cylindrical lenses.
- the distorting optics in this case expose the first master in such a way that the first volume hologram introduced into the first volume hologram layer by means of the first master is shaped such that the first and / or the at least one second information in the first and / or at least a second predefined bent state of the security element is visible to a viewer in a first viewing situation and in the unbent state of the security element in the first one
- a first master containing a computer-generated hologram (CGH) for producing a security element, this CGH for a curved surface corresponding to the bend of the first and / or the at least one second predefined bent state of the security element is calculated.
- the curvature of the bent security element is thus in the calculated CGH
- first master is used whose first surface structure is a Kinegram®, a symmetric lattice
- asymmetric grating in particular a blaze grating, a binary grating, a multi-stage phase grating, isotropic or anisotropic matt structures, a retroreflective structure, a (substantially) refractive-active
- Macrostructure in particular a microprism structure or a micromirror, in particular fresnel-like or otherwise executed free-form surfaces or combinations thereof.
- grating structures with statistically varying parameters grating period,
- blaze gratings whose flank angles are designed for the illumination and viewing angles of the corresponding zones of the security element in the first and / or at least one second predefined bent state are suitable.
- the depth t of the blazed gratings is preferably optimized to the wavelength for which the first volumetric hologram is designed, according to the following formula:
- the depth t should preferably not be greater than the period of the blaze gratings.
- a first master which has at least two partial areas, the incident light in at least two
- the first surface structure of the first master preferably differs in the at least two subregions, in particular in at least one of the parameters profile shape, grating depth, grating period and azimuth angle.
- the first master prefferably has a symmetrical grid structure in a first partial area and to have a first asymmetrical grid structure in a second partial area, the grid periods and / or grid depths of the grid structures differing in the first and second partial areas.
- the first master prefferably has a second asymmetrical lattice structure in a third partial region, wherein the lattice periods and / or lattice depths of the first and second asymmetric lattice structures differ. It is advantageous that the first volume hologram layer and the first master are exposed by coherent light beams of different wavelengths and / or different directions of incidence. Advantageously, the coherent light beam passes through the first
- Volume hologram layer through and is at the first
- the master is in particular the object to be reconstructed. It makes sense that the first master, directly or with the interposition of a transparent optical medium to the first
- Volume hologram layer is arranged.
- the exposure is effected with laser light with a power density in the range of 0.5 to 5 W / cm 2 or with an energy density in the range of 5 to 50 mJ / cm 2 , particularly preferably with a power density in the range of 1 to 3 W / cm 2 or with an energy density in the range of 10 to 30 mJ / cm 2 .
- Volumenhologramm für is fixed by curing, in particular by means of UV radiation.
- a second volume hologram is introduced into at least one second area in the first volume hologram layer.
- the second volume hologram is formed such that a third information in the non-bent state of the security element in the first viewing situation is visible.
- This makes it possible for the observer to perceive the third information, for example an image of a sun, in the first viewing situation in the unbent state of the security element, and to perceive the first information in the first curved state of the security element, for example to perceive an image of a cloud and a sun ,
- the at least one first region and the at least one second region are scanned into one another, in particular the at least one first region is arranged alternately with the at least one second region and the at least one first region is arranged adjacent to the at least one second region.
- Volume hologram layer has a third volume hologram.
- the method further comprises the following steps, which are carried out in particular after the steps a) to c): d) applying a second volume hologram layer; e) arranging a second master having a second surface structure on the second
- volume hologram layer f) exposing the second master and the second volume hologram layer by means of coherent light, so that in this way a third volume hologram is introduced into the second volume hologram layer.
- first volume hologram layer and the second volume hologram layer are exposing the second master and the second volume hologram layer by means of coherent light, so that in this way a third volume hologram is introduced into the second volume hologram layer.
- volume hologram layer when viewed perpendicular to a plane defined by the first volume hologram layer of the security element plane in the non-bent state of the security element arranged one above the other. It is furthermore possible to arrange further volume hologram layers, in particular a third, fourth, fifth volume hologram layer, one above the other like the first and the second volume hologram layer.
- the security element has at least a third volume hologram in at least one second volume hologram layer.
- Volume hologram layer and the third volume hologram in the second volume hologram layer are aligned register to each other.
- the third volume hologram is formed such that a fourth information in a third predefined bent state of the security element for a viewer in the first
- the curved state shows the first information and / or the at least one second information in the first viewing situation and shows the fourth information in the third curved state in the first viewing situation.
- the first and / or at least one second information may be recognizable in the case of a concavely curved shape of the security element
- the third information may be in the case of a convexly curved shape of the security element
- the second volume hologram is formed such that a fifth information in the unbent state of the security element in the first
- Security element perceives the fifth information and the first
- bent state of the security element perceives the first information.
- Exposing the second master and / or further master and the second and / or further volume hologram layers is here referred to the corresponding embodiments relating to the first master.
- the security element in at least a third area a relief structure selected from the group diffractive grating, Kinegram® or hologram, Blazegitter, binary grating, multi-level
- Phase grating linear grating, cross grating, hexagonal grating, asymmetric or symmetrical grating structure, retroreflective structure, in particular binary or continuous fresnel-like freeform surfaces, diffractive or refractive macrostructure, in particular lens structure or microprism structure,
- Moth eye structure or anisotropic or isotropic matte structure, or an overlay or combinations of two or more of the aforementioned relief structures are preferably, preferably,
- Grid structures with statistically varying parameters grid period
- Security elements in particular in the first and / or at least a second and / or third predefined bent state of the security element, are visible to combine with generated by the relief structures optical effects whose visibility shows no or a slight dependence on a bend.
- the effect is achieved, for example, that an optical effect produced by the relief structures, in particular by diffractive lenses and / or by binary or continuous free-form surfaces and / or by a retroreflective structure, is visible in the undeflected state of the security element, and by the first information in FIG first curved state is added, wherein the characteristic appearance of the optical effect generated by the relief structure in the first predefined bent state does not change or only slightly.
- Replication lacquer layer comprises.
- the replication lacquer layer consists for example of a thermoplastic lacquer in which a relief structure is formed by means of heat and pressure by the action of a stamping tool. Furthermore, it is also possible that the replication lacquer layer is formed by a UV-crosslinkable lacquer and the relief structure by means of UV replication in the
- Replizierlacktik is molded.
- the relief structure is molded onto the uncured replication lacquer layer by the action of an embossing tool and the replication lacquer layer is cured by irradiation with UV light before and / or immediately during and / or after the impression.
- the relief structure is preferably shaped into the replication lacquer layer in the at least one third area. It is also advantageous that the
- Replizierlack stands a layer thickness between 0.2 ⁇ and 4 ⁇ , preferably 0.3 ⁇ and 2 ⁇ , more preferably 0.4 ⁇ and 1, 5 ⁇ having.
- the security element preferably has a reflection layer in at least a fourth area.
- the reflection layer is Preferably, a metal layer of aluminum, chromium, gold, copper, silver or an alloy of such metals, in vacuo in a
- the reflection layer may also be a non-metallic layer.
- the reflection layer can be a printed or high-resolution structured color layer or another layer which absorbs radiation, in particular in the visible spectral range.
- the reflection layer is formed in particular as a color layer.
- the color layer is
- the reflection layer can be over the entire surface or even in regions,
- the reflection layer can be applied over the entire area and then be removed again by surface area by means of known structuring methods (for example by means of etching resist, by means of photoresist, by means of a washing process).
- a partial metallisation may be for example a KINEGRAM ® or a metallic nano text.
- the reflection layer is formed rastered.
- the partially metallized reflection layer is formed rasterformig.
- the screened reflection layer may also be non-metallic and in particular consist of a printed or high-resolution structured colored layer.
- the at least one first and / or second and / or third and / or fourth area are aligned register-accurate.
- the information supplementing the respective areas particularly preferably complements each other.
- Register or register or register accuracy or registration accuracy is to be understood as a positional accuracy of two or more elements and / or layers relative to one another. In this case, the register accuracy should move within a predetermined tolerance and be as small as possible.
- positionally accurate positioning can in particular by means of sensor, preferably optically detectable registration marks or
- Register marks take place. These register marks or register marks can either represent special separate elements or regions or layers or themselves be part of the elements or regions or layers to be positioned.
- the first volume hologram in the first volume hologram layer may likewise preferably not be full-surface but raster-shaped, ie only
- Volume hologram is arranged according to a grid.
- the first volume hologram is arranged such that the respective areas of the first volume hologram congruently register with the
- the first volume hologram is preferably arranged below, in particular with respect to the viewing direction of the security element, the reflection layer. Next is advantageous if the grid of the first
- Volume hologram is designed as a line grid. In the non-bent state of the security element, the reflection layer thus hides the first volume hologram, whereby the first volume hologram in the
- the reflection layer no longer completely covers the first volume hologram, so that the first volume hologram becomes visible or at least partially visible.
- Volume hologram layer and the partially metallized and / or screened reflection layer has a transparent spacer layer
- Security element two grid-shaped, preferably partially metallized
- Reflective layers between which preferably a transparent
- Spacer layer is arranged. Furthermore, a further spacer or lacquer layer can be arranged between the reflection layers and the Volumenholgramm Mrs.
- the two reflection layers are preferably arranged offset relative to one another in such a way that the transparent regions of the one
- Reflection layer of the existing or present in particular the metallized areas of the other reflection layer, in particular when viewed perpendicular to a plane spanned by the first volume hologram layer in the non-bent state of the security element, are covered.
- the two reflection layers are positioned so as to be "in gap" relative to one another, whereby the two reflection layers are arranged in relation to one another in such a way that, in the unbent state of the security element, they lie below them, for example over the entire surface completely cover the first holograms, so that the first
- volume hologram therefore, is essentially not visible to the viewer.
- the reflection layers no longer cover the first volume hologram, so that it becomes visible or at least partially visible.
- the grid of the reflection layer and / or the reflection layers and / or the first volume hologram is a regular grid. However, it is also possible that it is an irregular grid.
- the lines of the line grid run parallel to the bending line of the security element.
- the line widths and / or the line distances between 1 ⁇ and 50 ⁇ , preferably between 2 ⁇ and 10 ⁇ .
- Volume holograms are not constant, but vary.
- the line widths and / or line distances preferably vary perpendicularly to the bending line, in particular as a function of the bending of the first and / or the at least one second bent state of the security element.
- the line widths and the line spacings of the raster of the reflection layer and / or the reflection layers and the layer thickness of the transparent spacer layer are selected such that the effect of the visibility of the first volume hologram in the first and / or at least one second predefined bent state, for example at a predetermined Bend radius of the security element is maximized.
- the layer thickness of the transparent spacer layer essentially corresponds to the raster periods of the line patterns of the reflection layers or of the reflection layer.
- the line widths and / or the line distances between 1 ⁇ and 50 ⁇ , preferably between 2 ⁇ and 10 ⁇ .
- the spacer layer has a layer thickness between 1 ⁇ and 50 ⁇ , preferably between 2 ⁇ and 10 ⁇ having.
- the lines of the line grid of the two reflection layers run parallel to the bending line of the security element. It is also possible to provide, instead of a transparent spacer layer with a constant layer thickness, a transparent spacer layer whose thickness varies.
- both a continuous variation of the layer thickness and a stepped, discrete variation of the layer thickness are possible. Thereby, it is possible to improve the effect of the visibility of the first volume hologram in the first and / or at least a second predefined bent state, as well as the effect of the non-visibility in the planar state.
- the thickness of the spacer layer changes perpendicular to
- the spacer layer in the range of Bending line or along the bending line has the largest layer thickness and the layer thickness decreases with distance from the bending line or is less. This means, in particular, that a smaller layer thickness of the spacer layer is provided in the region of small bending angles and a smaller layer thickness of the spacer layer is provided in the region of larger bending angles. The decrease can be both continuous and stepped.
- the reflection layer and / or the reflection layers can be formed by a transparent reflection layer, preferably a thin or finely structured metallic layer or a dielectric HRI or LRI layer (high refraction index - HRI, low refraction index - LRI).
- a transparent reflection layer preferably a thin or finely structured metallic layer or a dielectric HRI or LRI layer (high refraction index - HRI, low refraction index - LRI).
- a dielectric HRI or LRI layer high refraction index - HRI, low refraction index - LRI
- Reflection layer consists for example of a vapor deposited layer of a metal oxide or metal sulfide, e.g. Titanium oxide, etc. with a thickness of 10 nm to 150 nm.
- a metal oxide or metal sulfide e.g. Titanium oxide, etc. with a thickness of 10 nm to 150 nm.
- the structured reflection layer or the structured reflection layers is not provided over the entire area, but only partially over the underlying volume hologram. This allows in particular that a region of the volume hologram is also visible in the flat state, so that the viewer's attention to the Security element is directed. During bending, an increasing part of the volume hologram becomes visible.
- one of the reflection layers is formed as a line grid, the other reflection layer, however, as a screened layer of areal grid elements.
- the formation of moiré effects is exploited by the two spaced-apart layers arranged one above the other.
- the geometric shapes of the two reflection layers and their dimensions are obtained by mathematical calculation, for example by means of software for the calculation of moiré effects.
- the first target variable specified is that the moire produces a completely or almost completely opaque surface in the planar state of the security element.
- the underlying volume hologram is covered in a flat state and thus invisible or almost invisible.
- a second target size it is predetermined, for example, that in the bent state of the security element, windows or transparent areas are produced in the superimposed reflection layers by the moiré effect, which have certain geometric shapes. In these transparent areas, the underlying volume hologram becomes visible.
- Reflection layer or the reflection layers apply accordingly also for the absorption layer. It is also conceivable that only a single grid to cover the
- Volume hologram is used in the flat state. This has the advantage that no register retention would be necessary as with the two or more metal grids.
- the reflection layer or a metal grid lies here in
- flanks ago The reflection layer is formed in particular flank-shaped.
- the reflection layer extends not only in the x / y plane, but also in the z direction.
- the flank-shaped reflection layer or the flanks act similarly to the lamellae in a so-called "privacy filter" for computer screens
- the light can pass through the reflection layer substantially perpendicularly, ie in the z-direction.
- the flanks of the reflection layer block the light coming from the volume hologram almost completely, but the intensity of the volume hologram is reduced even for smaller angles, since with the critical angle g the light can only pass from a few points of the volume hologram.
- Metallrasters takes place in particular in that a lamellar or cup-shaped structure is replicated.
- Cup rims can be between 1 ⁇ and 50 ⁇ , preferably between 2 ⁇ and 20 ⁇ and more preferably between 2 ⁇ and 10 ⁇ lie.
- the spacing of the lamellae or cup edges should preferably be less than or equal to 10 ⁇ H, more preferably less than 5 ⁇ H and even better less than 2 ⁇ H.
- the replicated structure is then over the entire surface with a reflective layer, preferably with a thin metal layer, for example, in a thickness of 20 nm to 30 nm, in particular with aluminum vapor-deposited.
- a reflective layer preferably with a thin metal layer, for example, in a thickness of 20 nm to 30 nm, in particular with aluminum vapor-deposited.
- the at least one third and / or fourth area forms a graphic element, in particular a motif, an image, a symbol, a logo and / or an alphanumeric character.
- the at least one first area may form a frame around the at least one third and / or fourth area. It is also possible that the at least one first region completely surrounds the at least one third and / or fourth region. Alternatively, it is also possible that the at least one third and / or fourth area completely surrounds the at least one first and / or second area.
- the first and / or the at least one second and / or the third and / or the fourth information represents one or more symbols, logos, motifs, images, characters or alphanumeric characters.
- the first and / or second Volumenhologramm silk a layer thickness between 3 ⁇ and 100 ⁇ , preferably between 10 ⁇ and 30 ⁇ on.
- first and / or second and / or further volume hologram layers consist of a photopolymer, in particular of Omni DX 796 (DuPont), silver halide emulsions or dichromated gelatin.
- the security element preferably comprises a carrier layer, in particular a transparent carrier layer.
- PEN polyethylene naphthalate
- BOPP biaxially oriented polypropylene
- the security element can also be created directly on the substrate.
- the volume hologram can be made directly in the manufacture of polymer banknotes or polymer banknote substrates.
- the volume hologram layer and, if appropriate, further layers below and / or above the volume hologram layer can each be applied directly to the substrate by known printing methods such as screen printing, gravure printing, offset printing or inkjet printing, and the
- Volume hologram layer are exposed directly on the substrate.
- the security element at least one
- a security element may include
- Identification document passport document, visa, credit card, banknote, security or the like is formed.
- the security element may also lie over a transparent window area of a security document. This may be, for example, a transparent region of a polymer or hybrid banknote or a punched or lasered hole in a paper banknote. It is possible, for example, via a suitable screening of the structures in the master, two
- Integrate volume holograms in the volume hologram layer which show different optical effects in the bent state when viewed from the front and the back of the security document. These different optical effects can either be seen if the bend is kept the same, ie once convex and once concave. The different effects can also be seen, though
- the bend is inverted, so when viewing from the front and the back, the same bending shape - convex or concave - is available.
- Fig. 1 shows schematically a security document
- Fig. 2a to Fig. 2c show schematically a tilting of a
- FIGS. 3 a to 3d schematically show a bending of a
- Security element Fig. 4 shows schematically a bent security element
- Fig. 5a, b and Fig. 6a, b show schematically bending variants of a
- FIG. 7 shows schematically the function of a curved one
- Fig. 8 shows a diagram showing bending variants
- Fig. 9a shows schematically a bent security element
- Fig. 9b shows a schematically and simplified represented
- FIGS. 10a to 10d schematically show method steps for
- FIG. 1 1 shows a receptacle of a security element in one embodiment
- Fig. 12 shows schematically an example of an application
- FIGS. 13 a to 13 j show schematically application examples of FIGS
- Fig. 14 shows schematically an example of an application
- FIGS. 15a to 15c schematically show a curved one
- Security document with a security element Fig. 16a, b show schematically a flat or curved
- Fig. 17 shows a schematic representation of characteristics for
- FIG. 18 shows the dependence of the determined line widths and line distances on the angle of curvature each show schematically a flat
- Security document with a security element with spacer layer with variable thickness shows each schematically a flat
- Security document with a security element show schematically a flat or curved security document with a security element schematically shows a flat security document with a security element schematically an example of an application
- Security element shows a plan view of a section of a line grid executed layer shows a plan view of a section of a screened layer of areal
- FIG. 27 shows schematically a flat security document with a security element Fig. 28a to 28d show a possible manufacturing method for in
- Fig. 1 shows the top view of a security document 2 with a
- the security document 2 is a banknote in the example shown in FIG. However, it is also possible that the security document 2 is an identification document, passport document, visa, credit card, security or the like.
- the security document 2 consists of a flexible, elastic or inelastic substrate 17 on which the security element 1 is arranged.
- the substrate 17 is preferably a substrate of paper material which is provided with an imprint and into which further security features, such as watermarks or
- the substrate 17 or the security document 2 can be a paper banknote or a paper visa.
- the substrate 17 is a plastic film or a laminate consisting of one or more paper and / or plastic layers.
- plastic films for polymer banknotes are for example the substrate Guardian® from Innovia or Safeguard® from De La Rue or also Tyvek® from Dupont.
- Examples of laminates of paper and plastic layers, also called hybrid substrates, are, for example, Durasafe® from Landquart or "Hybrid” from Giesecke & Devrient
- the thickness of the carrier substrate 17 is, in particular in the case of a banknote, between 6 ⁇ m and 150 ⁇ , preferably between 15 ⁇ and 50 ⁇ .
- the security document 2 lies in the xy plane and is thus flat in the state shown in FIG.
- Security element 1 has, as shown in Fig. 1, the dimensions ⁇ and Ay.
- the security element 1 is applied to the security document 2 by means of embossing, in particular by means of cold or hot stamping.
- Transfer film is provided so that an application of the
- Security elements 1 can be done on a security document 2 by means of embossing.
- a transfer film has at least one security element 1, wherein the at least one security element 1 is detachably arranged by a carrier layer in the form of a carrier film of the transfer film.
- a release layer is present to the security element 1 after embossing of the
- the security element 1 can by means of an adhesive layer, in particular of a cold or hot glue, on
- the security element may also be on a laminating film
- the security element 1 fixed on the security document 2 is applied to the security document 2 in such a way that it adapts to form and / or geometry changes of the security document 2.
- the security element 1 is bendable, so that the shape of the security element 1 is changed by the action of force or is changeable. If, for example, the security document 2 shown in FIG. 1 is bent symmetrically about the x-axis in the middle of the security document 2, then the applied security element 1 essentially undergoes the same change in shape as the security document 2 in the region of
- FIGS. 2 a to 2 c and FIGS. 3 a to 3 d The difference between tilting and bending of the security element 1 will first be illustrated below with reference to FIGS. 2 a to 2 c and FIGS. 3 a to 3 d. In the following, for the sake of simplicity, only a tilting or bending of the security element 1 will be discussed and not, as is usually shown in the figures, a tilting or bending of the security document 2 together with the security document 1 arranged thereon
- FIGS. 2a to 2c schematically show a tilting of a security element 1 about the x-axis. Under tilting is understood here that the
- FIG. 2 a shows the security document 2 along the section A - B shown in FIG. 1 in a side view.
- the Security document 2 and the attached security identifier 1 is located in Fig. 2a in the xy plane and is of the
- Lighting device 8 for example, the sun, illuminated. As shown in FIG. 2a, light from the security element 1 passes here under the different viewing angles CM, C (2 and 03 into the eye of FIG.
- Security element 1 enters the eye of the observer 7, such that the angles CM ', C ⁇ ' and 03 'are all smaller in the tilted state of the security element 1.
- the horizontal axis which here corresponds to the x-axis, away from the viewer, thus all reduce
- Security elements 1 in the tilted state the same angle ⁇ with respect to the y-axis.
- FIGS. 3 a to 3d schematically show a bending of a security element 1.
- bending is meant the deformation of an object in a certain way by exerting a force Security element 1 will therefore exert force on the
- Security identity 1 understood, the shape of the security element 1 is changed by the force or is changeable. A bent security element 1 thus has in comparison to the unbent
- Security element 1 on a changed geometry also means buckling, so that a bent security element 1 can have one or more break points or bend lines, on which the security element 1 is sharply or abruptly bent in Fig. 3a.
- bending also means buckling, so that a bent security element 1 can have one or more break points or bend lines, on which the security element 1 is sharply or abruptly bent in Fig. 3a.
- Level at which security document 2 along the section A - B shown in Fig. 1 in a side view as in Fig. 2a, wherein light from the security document 2 arranged on the security element 1 in this case under the different viewing angles CM, C (2 and 03 in the eye If the security element 1, as shown in Fig. 3b, bent around the bending point 9 of the viewer 7 or
- the viewing angles ⁇ ⁇ and 03 ', under which light from the security element 1 enters the eye of the viewer 7, on different sides of the bending point 9 change in different ways.
- the viewing angle ⁇ ⁇ smaller, whereas the
- Viewing angle 03 ' is greater compared to the unbent state of the security element 1 in Fig. 3a.
- the viewing angle 02 in the bending point 9 remains the same.
- Fig. 3b shows the extreme case of bending, namely buckling.
- Fig. 3c also shows the changed viewing angles ⁇ ⁇ and 03 'in a bent state of the security element 1, wherein the bent state of Fig. 3c
- Tilting point 6 is the same. Furthermore, the angle ⁇ removed at the bending point 9, as shown in FIG. 3d, differs from the angles ⁇ 1 and ⁇ 2. As shown in Fig. 3d, the angle ⁇ at the bending point 9 is zero. The bending point 9 lies in the area of the security element 1, as can be seen from FIGS. 3 a to 3d.
- Security element 1 to one of the coordinate axes x and y
- spanned two-dimensional reference surface describes. For example, for a security element 1 in a non-bent state, AF (x, y) ⁇ G and for a security element 1 in the bent state AF (x, y)> G.
- the amount of AF (x, y) is preferably compared with the predefined limit value G.
- FIG. 4 shows schematically the representation of a curved security element 1. As shown in Fig. 4, the bent state of a security element 1 by the bending radius r can be described. By “bending radius” is here understood the radius r of the largest circle, which tangent to the
- Security element 1 has.
- the bending radius in the bent state of the security element 1 is preferably between 1 mm and 100 mm, preferably between 2 mm and 50 mm, more preferably between 4 mm and 30 mm and even more preferably between 10 mm and 25 mm.
- Fig. 5a, b and Fig. 6a, b show schematically bending variants of a
- FIG. 5a, b show the bending of the security element 1 about the horizontal axis, which corresponds here to a parallel to the x-axis.
- FIG. 5a shows a security document 2 with a security element 1 arranged thereon in the unbent state.
- CM, C viewing angles
- Security document 2 and arranged thereon security element 1 are bent around the horizontal axis.
- Security document 2 are bent around the bending line 9, as shown in Fig. 5b.
- FIG. 6a, b show the bending of the security element 1 about the vertical axis, which corresponds here to a parallel to the y-axis.
- FIG. 6a shows a security document 2 with a security element 1 arranged thereon in the unbent state.
- the design of the security document 2 reference is made here to the above statements. As already explained, light from the security element 1 arrives here among the different ones
- FIG. 6b shows the security document 2 with the security element 2 and the security element 1 arranged thereon bent about the vertical axis is bent around the bending line 9, as shown in Fig. 6b.As already explained change here in the bent state of the security element 1, the
- FIG. 7 shows schematically the function of a curved security element 1 with a volume hologram layer 1 1 into which a volume hologram 1 1 v is introduced. As shown in FIG. 7, the volume hologram 1 1 v is formed such that information in the bent state of the
- Security element 1 is visible to a viewer 7 in a viewing situation and is not visible in the non-bent state of the security element 1 in the same viewing situation.
- the security element in FIG. 7 has a length of 30 mm in the direction of the coordinate axis y. It is also possible that the security element 1 in the direction of Coordinate axis x or y, around which the security element 1 in the
- curved state has a length of at least 5 mm, preferably of at least 10 mm, more preferably of at least 20 mm, even more preferably of at least 50 mm.
- the volume hologram layer 1 1 is preferably a layer of a photopolymer, in particular of Omni DX 796 from DuPont, Wilmington, United States of America. Further, it is also possible that the volume hologram layer 1 1 is formed of a silver halide emulsion or dichromated gelatin.
- the layer thickness of the Volumenhologramm für 1 1 is preferably between 3 ⁇ and 100 ⁇ , in particular mussl O ⁇ and 30 ⁇ .
- the volume hologram 1 1 v has a periodic modulation of the refractive index, which is indicated in FIG. 7 by the alternately arranged dark lines in the enlarged representations of the security element 1.
- refraction of light at the interface between volume hologram layer 1 1 and adjacent paint layer or air was neglected.
- Refractive index variations in the Volumenhologramm Mrs 1 1 a plurality of nodes are formed, which cause a diffraction of the incident light 13 and thus form an optically active element.
- the nodes As shown in FIG. 7, are arranged in planes which run essentially parallel to one another.
- the nodes have a refractive index n ', of a refractive index n of the rest
- Volume hologram layer 1 1 thus has a location-dependent refractive index n ', which describes a stored in the Volumenhologramm Weg 1 1 three-dimensional refractive index pattern.
- n ' which describes a stored in the Volumenhologramm für 1 1 three-dimensional refractive index pattern.
- These planes formed by refractive index variations are also referred to as Bragg planes 12.
- the difference ⁇ in refractive index between 0.005 and 0.1 is preferably between 0.01 and 0.05.
- This three-dimensional refractive index pattern can be generated by a holographic interference arrangement, for example by a structure in which a coherent light beam, in particular a laser source, on a arranged on the volume hologram layer 1 1 master with a
- volume hologram 1 1 v incident on the volume hologram layer 1 1 light beam is first refracted at the volume hologram layer 1 1 and then deflected at the master by diffraction at the surface structure.
- the deflected beams represent the object wave, which interferes with the reference wave embodied by the incident light beam and, in the volume hologram layer 1 1, is a local one
- Volume hologram layer 1 1 changed locally.
- the refractive index variations are located in the Bragg planes 12.
- Fig. 10 shows this process by way of example.
- the Bragg planes 12 in the zones 10a, 10b and 10c are aligned such that they are in the bent state of the
- Security element 1 incident light 13 bow and / or
- Security elements 1 is here referred to the above statements. That in the Volume hologram layer 1 1 introduced volume hologram is thus designed for a predetermined bent state of the security element.
- the volume hologram has the zones 10a, 10b and 10c, the zones 10a, 10b and 10c providing information to the viewer 7 in a predefined bent state of the security element 1 in a viewing situation.
- the angles included between the normals on the Bragg planes 12 and the direction of the incident light 13 are substantially equal to those between the two
- the color of the light 14 diffracted and / or reflected by the respective zone 10a, 10b and 10c can also be determined for the viewer 7, for example. This makes it possible, for example, for the light diffracted and / or reflected by the zones 10a, 10b and 10c to appear to the viewer 7 in the same color or in different colors. It is advantageous for different colors if the distance between the Bragg planes differs by more than 2 nm, preferably more than 10 nm, even more preferably by more than 20 nm.
- the distance of the Bragg planes in the zone 10a is approximately 260 nm, the light diffracted and / or reflected by the zone 10a appears green to the viewer.
- the Bragg planes in the zone 10b of, for example, approximately 320 nm, the light diffracted and / or reflected by the zone 10b appears red to the viewer.
- the zones 10a, 10b, and 10c may provide the viewer with common information, such as an image, with each zone 10a, 10b, and 10c producing a portion of the image.
- the zones 10a, 10b and 10c may each generate a single piece of information to the viewer.
- the zone 10a may generate a letter for the viewer 7 in one color and the zone 10b may generate another letter for the viewer 7 in another color.
- the zones 10a, 10b and 10c shown in FIG. 7 have, in the non-bent state of the security element 1 in the direction of one of the coordinate axes y, a length of 200 ⁇ m.
- the zones 10a, 10b and 10c in the non-bent state of the security element 1 in the direction of one of the coordinate axes x and / or y a length of at least 10 ⁇ , preferably 500 ⁇ , even more preferably 2000 ⁇ on.
- the zones 10a, 10b and 10c may also be distributed quasi-continuously and not discretely.
- Fig. 8 shows a diagram which specifies bending variants. As already explained, the volume hologram is for one or more curved
- the volume hologram is here for a
- predetermined bending variant 801 created so that the information for the viewer is visible only when bending the security element in this predetermined bending variant.
- the division of the bent state of the security element can first be made according to FIG.
- the security element in the predefined bent state is thus bent about the x-axis and / or the y-axis.
- a bend about the x-axis and / or y-axis is also understood to mean a bend to a parallel to one of these axes.
- a further classification of the bent state of the security element can be distinguished according to whether the security element is bent in the predefined bent state towards the viewer, in particular whether the security element has a concave shape 804, 806 in the predefined bent state, and / or whether Security element of that
- the bent state of the security element may be of a symmetrical bending shape (with respect to a bend line) 808, 810, 812, 814 or an asymmetrical bend shape (with respect to the bend line) 809, 81 1, 813, 815 be differentiated.
- bending variants 801 shown in FIG. 8 can be further specified.
- bending variants 801 may be further specified by means of the bend radius, the above-described geometric characteristics of the curved state of the security element, or by the mathematical Laplace function.
- predetermined bending variant now determines the orientation of the Bragg planes in the zones such that the desired information is visible to the viewer in the predefined bent state.
- the exact angular sizes for this case can be determined, for example, by the geometric characteristics in this case, as shown in Fig. 3d.
- the orientation of the individual zones, which then generate the information corresponding to the viewer in this bent state can then be determined on the basis of the angles ⁇ , ⁇ and ⁇ 2. Zones which are not aligned accordingly are not or hardly visible in the predefined bent state or do not contribute to the information for the viewer.
- the Bragg planes in these zones are oriented so that they become visible in further predefined bent states. For example, upon further bending of the security element or upon a change from a concave curved security element to a convexly curved security element of further zones, further information can be generated or the existing information can be supplemented.
- the Bragg planes are aligned in the other zones such that the further information is only visible to the viewer in the further predefined bent state of the security element.
- the distance of the Bragg planes in the zones and / or the other zones differs, so that different color impressions can be generated for the viewer.
- Fig. 8 represents only one possible division, further divisions are possible.
- the divisions can therefore determine the predetermined bent state of the security element, in which as described above a Information for a viewer in a viewing situation is visible and in the unbent state of the security element in the
- FIG. 9a shows schematically a bent security element. 1
- Security element 1 is here, as explained above, applied to a security document 2, for example, a banknote.
- the security element 1 comprises a volume hologram layer in which a volume hologram is introduced.
- the volume hologram is designed in such a way that it generates information for the viewer 7 in the viewing situation shown in FIG. 9a in the predefined bent state of the security element 1 shown in FIG. 9a.
- the bent state shown in Fig. 9a is characterized in that the security element 1 left of the bending point 9 is not bent because it is on a flat surface, such as a
- Volume hologram here has the zones 10d, 10e and 10f, wherein the Bragg planes in the zones 10d, 10e and 10f are aligned such that for the viewer 7 in the viewing situation shown in Fig. 9a and in that shown in Fig. 9a curved state information is visible. In the unbent state and in the same viewing situation is for the
- Fig. 9b shows an exemplary strip design shown schematically and simplified, which is designed for viewing as shown in Fig. 9a.
- the numeral "75" and the portrait, formed for example as in particular fresnel-like freeform surface, include zones 10d and lie in the flat
- Design elements include zones 10e and 10f and only fully illuminate when bent or show the desired information only when bent.
- the pigeon may be a hologram created on a curved exposed master. In the flat state, only a washed-out, unrecognizable surface can be seen here. When bent, the pigeon appears. At the same time the frame lights up
- FIGS. 10a to 10d schematically show method steps for producing a security element 1.
- PEN polyethylene naphthalate
- BOPP biaxially oriented polypropylene
- volumenhologramm Mrs 1 1 applied.
- the volume hologram layer 11 is preferably applied to the carrier layer 16 by printing, casting, eg slot casting or knife coating.
- the Volumenhologramm Mrs 1 1 consists for example of Omni DX 796 DuPont, Wilmington, United States of America and has a layer thickness between 3 ⁇ and 100 ⁇ on.
- the layer thickness of Volunnenhologrannnn für 1 1 in Fig. 10a is for example 25 ⁇ .
- a release layer is applied to the carrier layer 16 before the volume hologram layer 1 1 is printed, cast or knife-coated.
- the release layer may be provided to facilitate later release of the carrier layer from the volume hologram layer.
- the security element 1 at least one
- Barrier layer and / or at least one stabilizing layer and / or at least one adhesive layer in particular comprising acrylates, PVC, polyurethane or polyester.
- volume hologram layer 1 1 arranged.
- the volume hologram layer 1 1 can be brought into contact with the side of the master 18 having the surface structure directly or with the interposition of a transparent optical medium.
- the master 18 is designed in such a way that the volume hologram to be written into the volume hologram layer 11 by means of the master 18 contains information in a predefined bent state
- Security element 1 for a viewer in a viewing situation makes visible and not visible in the non-bent state of the security element in the first viewing situation or vice versa.
- Such a master 18 can be created, for example, starting from a curved intermediate master, wherein the bend of the curved
- an intermediate master is initially created by means of holographic exposure, the intermediate master being present in the predefined bent state.
- a flat master 18 Starting from this curved intermediate master is then a flat master 18 with the
- the flat master 18 may also be a particular Fresnel-like
- Cylindrical lens structure is occupied as surface texture, lit in
- FIGS. 11a and 11b show this on the basis of a pattern with a volume hologram applied to a black background.
- the volume hologram was created with a flat master with a fresnel-like cylindrical lens structure as a surface structure, which for a predefined bent state with a
- FIG. 11 a shows the photographed volume hologram in the flat state and FIG. 11 b shows the photographed volume hologram in FIG
- predefined bent state with the radius of curvature of about 38 mm.
- the curvature around the bending point is symmetrical here.
- In the flat state essentially only the area which lies in the bending point lights up.
- a larger area illuminates around the bending point.
- This can be used inter alia as a design element, for example as a frame around another design element, said frame focus in the predefined bent state of the security element 1, the viewer's attention to this area.
- the frame in Fig. 9b is a concrete example thereof.
- Cylindrical lens structures can be e.g. using e-beam lithography
- the depth of the fresnel-like cylindrical lens structure is adjusted to the wavelength at which the volume hologram appears.
- a structural depth is chosen that is half that
- Wavelength of the incident light corresponds. Furthermore, it is also possible to produce the master 18 by means of distorting optics, in particular by means of cylindrical lenses. Here, the beam path is distorted during the holographic production of a flat master by means of distorting optics such that the in
- Volumenhologramm Mrs 1 1 to be written volume hologram is visible only in the bent state for the viewer.
- the structure of Fig. 10b is then exposed to a coherent light beam 19.
- the coherent light beam 19 for example a laser beam of the wavelength 640 nm, passes through the carrier layer 16 and the volume hologram layer 11 and is deflected or reflected back and / or on the surface structure of the opaque master 18
- the Volunnenhologrannnn here has in the zones 10g Bragg planes 12, which are aligned in different angular position to each other.
- the different orientation of the Bragg planes 12 in the zones 10g arises here by the of
- the master 18 can have at least two partial regions which reflect or diffract incident light into at least two different zones of the volume hologram layer 11.
- the subregions are in this case designed such that they reflect and / or diffract the incident light in a predetermined angular position, which is determined in such a way that the desired alignment of the Bragg planes in the volume hologram layer 1 1 arises.
- the angular position into which the at least two subregions reflect and / or diffract the incident light beam are different on the one hand and also depend on the angular position in which the coherent light beam 19 is radiated onto the at least two subregions.
- deflection angle is to be understood as the angle by which the surface structure of the master 18 in the respective subregion is perpendicularly incident
- the surface structures of the master 18 include
- Kinegram® linear or crossed sine, anisotropic or isotropic matte structures, lens structures, fresnel-like free-form surfaces, kinoform structures or computer generated holograms, a symmetric lattice, an asymmetric lattice, in particular a blaze lattice, predominantly refractive microstructures such as micromirrors, a binary lattice Multi-stage phase grating or combinations thereof.
- grating structures with statistically varying parameters grating period
- blaze grids or predominantly refractive microstructures are suitable whose flank angles are designed for the illumination and viewing angles of the corresponding zones of the security element in the predefined bent state.
- volume hologram layer 1 1 and the master 18 by coherent light beams 19, in particular by a laser-generated light beams, different wavelengths and / or
- the information generated by the volume hologram in the bent state of the security element appear in different colors and / or are visible in different viewing situations.
- the surface structures of the master 18 partially provide no information.
- the areas of the master 18 that do not provide information may be used as a background structure.
- Such background structures can be so for example be formed so that stray light and / or disturbing reflections are reduced.
- the areas of the master 18 that do not contain image information as moth-eye structure, in particular cross lattice structures (square or hexagonal) or statistical structures with high line numbers or Spatialfrequenzen (for example, more than 2000 lines / mm, in particular more than 3000 lines / mm) and / or as a mirror and / or as a matt structure and / or as a scattering grid. It is also possible to use antireflection structures or structures specially optimized for this purpose.
- the surface structure of the master 18 differs in the at least two sub-areas, in particular, the different
- Distribution functions can be defined.
- the master 18 has a symmetrical lattice structure in a first partial region and a first asymmetric lattice structure, in particular a blazed lattice, in a second partial region, wherein the lattice periods and / or lattice depths of the lattice structures differ in the first and second partial regions , Furthermore, the master 18 can, in a third subregion, have a second asymmetrical lattice structure,
- the grating period in the first subregion is 600 lines / mm
- the grating period in the second subregion is 300 lines / mm
- in the third subregion 100 lines / mm.
- Security document such as a banknote to apply.
- FIG. 12 shows schematically an application example of a security element 1.
- the security element 1 is here, as explained above, to a
- Security document 2 for example, a banknote applied.
- Security element 1 comprises a volume hologram layer in which a volume hologram is introduced.
- the volume hologram is configured in such a way that information is sequentially completed when bending into the predefined, curved final state E of the security element 1 shown in FIG. 12 for the viewer 7 in the viewing situation shown in FIG.
- the bent states Z, E shown in FIG. 12 are characterized in that the security element 1 on the left of
- Bending point 9 is not bent and the security element 1 is bent to the right of the bending point 9 on the viewer 7 to in the predefined bent end state E.
- Part of the information here is generated by a zone 10h of the volume hologram, which lies to the left of the bending point 9. This part of the information is thus for the viewer 7 in the in Fig. 12
- the viewing situation shown inside is visible and remains unchanged. Therefore, the part of the information generated by the zone 10h is also visible to the viewer 7 in the unbent state U.
- the security element on the right of the bending point 9, as shown in FIG. 12 is bent toward the observer, the observer 7 sequentially displays further parts of the information until the complete information for the viewer 7 is visible in the predefined bent final state E.
- zones 10i, 10j to the right of the bending point 9.
- the viewer 7 for example, when bending to the predefined final state E piece by piece a building appear as a skyscraper, in the unbent state of the security element U, for example, only the ground floor is visible to the viewer, in the bent intermediate state Z are, for example 60th % of the building visible and in the curved
- FIGS. 13a to 13i show schematically application examples of FIG.
- FIGS. 13a to 13i show possible optically variable effects of FIG.
- Fig. 13a shows an optical effect, which is perceptible to the viewer when bending the security element 1 about the horizontal axis in a convex shape.
- the bending variant thus corresponds to the bending variant 810 of FIG. 8.
- the security element 1 has, as described above
- the unbent state of the security element 1 only the letter B is relatively clearly recognizable to the viewer. The reason for this is that the letter B is arranged in a zone of the security element 1, which undergoes no or only a slight change in shape during the bending in the predetermined bent state of the security element 1.
- the Bragg planes are thus oriented in the zone of the volume hologram layer forming the letter B in such a way that the letter B is visible to the observer both in the unbent state and in the predefined curved state. If the security element 1 is bent into the predetermined bent state, further information 21 is available to the viewer
- the Bragg planes are thus oriented in the zones forming the information 21 in such a way that the letters A and C are for the
- Fig. 13b also shows an optical effect which is perceptible to the observer when the security element 1 is bent around the horizontal axis into a convex shape. Again, in the not bent and in the
- predefined bent states of the letter B comparatively clearly recognizable.
- the viewer in a first predefined bent state of the security element 1, in addition to the letter B, the viewer only sees the information 22, which represents the letter A.
- the information disappears 22, but now is for the viewer in addition to the letter B, the information 40, which the Letters C represents recognizable.
- the volume hologram has in this case, therefore, two information 22, 40, which in two different
- bent states are visible to the viewer or comparatively clearly visible.
- FIG. 13c corresponds to FIG. 13b with the difference that now the letter A can be recognized by the observer both in the non-bent state and in the two bent states.
- the information 23, 41 is here on the same side of the bending line of FIG. 13b.
- Such a security element 1 can be produced for example by means of a master whose surface structure
- the azimuth angle of the grating may be, for example, 0 °, the line density being adjusted according to the curvature of the security element 1 in the bent states.
- the line density in the portion which is to represent the letter A in the volume hologram to be written may be 600 lines / mm, and 1000 lines / mm in the portion which is to later represent the letter B.
- the line density may for example be 1400 lines / mm.
- FIG. 13d corresponds to FIG. 13b with the difference that the information 24 and 42 light up in respectively different colors. As already explained, This can be different during the production of the security feature 1, for example by exposure to coherent light beams
- Wavelengths and / or different exposure angles can be achieved. It is also possible for the surface structure of the master used for the production to have different lattice structures in the corresponding partial areas, which can be found in particular in the parameters
- Grid depth, grating period, profile shape and azimuth angle differ, where these parameters can also be defined by statistical distribution functions, and the volume holograms with different
- Fig. 13e shows an optical effect perceivable to the viewer when bending the security element 1 around the horizontal axis into a convex shape.
- Security elements 1 the color. It does not change the subject or it does not appear to the viewer a new motive in a bending for the viewer, but only the color impression of the perceptible information changes. Such an effect can be achieved for example by two nested volume holograms. The first
- Volume hologram is as explained above formed such that the information 25 in the bent state of the security element 1 is visible to the viewer in a different color than in the unbent state.
- the second volume hologram is a
- Volume hologram which is designed such that the information 25 is already visible in the unbent state of the security element 1. However, the information 25 generates in the unbent state of the
- the first volume hologram is preferably in at least a first area of the volume hologram layer and the second volume hologram in at least a second area of the volume hologram
- volume hologram layer arranged, wherein the at least one first and second area are scanned into each other. Furthermore, such an effect can be achieved by a first and a third volume hologram, wherein the first and third volume holograms are introduced into two volume hologram layers, which are arranged one above the other.
- the first volume hologram is formed in the first volume hologram layer in such a way that the subject undergoes a color change of the motif when the security element 1 is bent relative to the motif produced by the third volume hologram.
- the first volume hologram in the first volume hologram layer and the third volume hologram in the second volume hologram layer are register-aligned.
- Fig. 13f corresponds to Fig. 13e with the difference that not the
- Fig. 13g corresponds to Fig. 13a with the difference that the
- Security document 2 has a pressure 60, which is supplemented by bending the security element 1 in a predefined bent state by the then visible to the viewer information 27 of the volume hologram.
- the volume hologram and the print are aligned register exactly with each other.
- the pressure 60 shows the information which becomes visible to the viewer when bent into the predefined bent state of the security element 1.
- the security element 1 it is possible for the security element 1 to be applied to a pressure 60 already applied to the security document 2.
- the pressure 60 can in this case again show the information which becomes visible to the viewer when bending into the predefined bent state of the security element 1 or the information of the pressure and that of the volume hologram are complementary. In the two last-mentioned cases, the pressure thus forms a reference for the information recognizable to the viewer only in the bent state of the security element 1.
- pressure and volume hologram are designed so that when bending the security document a word
- Fig. 13h shows a security document 2 with a security element 1, wherein the security element 1 in two different curved
- States two different information 28, 43 shows.
- a first bent state which corresponds to a bending of the security element 1 about the horizontal axis into a concave shape for the viewer, the information 28 is recognizable to the viewer.
- a second bent state of the security element the bending of the security element 1
- the information 43 can be seen around the horizontal axis in a convex form for the observer, with the colors of the letters A and C changing again between the first and second bent state as described above.
- the motifs can change when changing from concave to convex bending form.
- the bent states shown in FIG. 13h correspond to the bending variants 808 and 809 of FIG. 8.
- FIG. 13i shows a security document 2 with a security element 1.
- the security element 1 generates in the unbent state for the viewer a design with two dark rectangles, the rectangles appear blue, for example in the color against a white background.
- the bent state of the security element 1 changes both the recognizable for the viewer design and the color impression.
- the dark rectangles vanish and a strip-shaped color impression, for example of two red and one white stripes, is produced for the viewer.
- Security element 1 in particular the volume hologram layer of the security element 1, is here referred to the above statements.
- the security element 1 in the square areas 50 a is here referred to the above statements.
- the reflection layer can, as shown in Fig. 13i, above the
- Volume hologram layer may be arranged, but it may also be arranged below the Volumenhologramm harsh.
- the reflective layer is preferably a metal layer of aluminum, chromium, gold, copper, silver or an alloy thereof Metals, which is evaporated in a vacuum in a layer thickness of 0.01 ⁇ to 0.15 ⁇ .
- the reflection layer is preferably first applied over the entire surface. Subsequently, the reflective layer is removed again by surface area by means of known structuring methods (by means of etching resist, by means of photoresist, by means of a washing process), so that partial metallization in the regions 50 is produced. As shown in FIG. 13i, the regions 50 form a motif, for example in the form of squares. The areas 50 are thus visible to the viewer regardless of the bending of the security element 1 and thus complement each other with the effects of the security element 1, which is a function of the bending of the
- FIG. 13 j shows a security document 2 with a security element 1.
- the security element 1 shows this optical effects, which both a
- bent state is a function of the tilting of the
- Security elements 1 on With regard to the configuration of such a security element, reference is made here to the above statements, in particular in the context of FIGS. 13d and 13e, wherein, in particular, the first
- Volume hologram is designed such that it has a parallax and thus before the plane defined by the security element 1 level for the Viewer appears and the second volume hologram is designed such that it has no parallax and thus appears in the plane spanned by the security element 1 level for the viewer.
- the volume hologram can be provided, which shows the information 29 in the bent state. In the unbent state either nothing is visible, or only a blurred area without the information 29.
- the volume hologram which in the bent state generates the information 29 in the form of the three-dimensional impression of the motif, may for example be a CGH calculated for a curved surface as it is in the bent state.
- this volume hologram can also be a 3D hologram, which is based on a master, which, as explained above, is based on a curved-exposed intermediate master.
- Fig. 14 schematically shows an example of application of a security element 1 with a volume hologram layer.
- a volume hologram is introduced in a region 51, which is formed in such a way that complete image information is only visible in a bent state of the security element 1.
- part of the information 30u is already in the unbent state of FIG. 14
- the region 52 is configured in the form of a pattern in the form of a flame motif.
- the relief structure is, for example, a binary or continuous Fresnel-like free-form surface, which is characterized in particular by the fact that it
- the security element 1 preferably has a replication lacquer layer into which a relief structure is molded.
- the replication lacquer layer consists for example of a thermoplastic lacquer in which the relief structure is shaped by means of heat and pressure by the action of an embossing tool.
- the replication lacquer layer it is also possible for the replication lacquer layer to be formed by a UV-crosslinkable lacquer and for the relief structure to be shaped into the replication lacquer layer by means of UV replication.
- the relief structure is formed by the action of an embossing tool on the uncured Replizierlack GmbH and hardened the Replizierlacktik immediately during or after the impression by irradiation with UV radiation.
- Replizierlack Anlagen has in particular a layer thickness between 0.1 ⁇ and 20 ⁇ , preferably 0.2 ⁇ and 10 ⁇ , more preferably 0.4 ⁇ and 5 ⁇ on.
- the security element 1, in particular in the area 50 has a reflection layer.
- the reflective layer is preferably a metal layer of aluminum, chromium, gold, copper, silver or an alloy of such metals, which is evaporated in a vacuum in a layer thickness of 0.01 ⁇ m to 0.15 ⁇ m.
- FIGS. 15 a to 15 c schematically show the bending of a security document 2 with a security element 1.
- the security element 1 is applied to the substrate 17 by means of the adhesive layer 15.
- the substrate 17 is preferably a substrate 17
- the security element 1 further comprises a volume hologram layer 1 1, in which a volume hologram
- the volume hologram has the zones 10 j and 10 k, the zones 10 j providing first information to the viewer 7 in the predefined bent state of the security element 1 shown in FIG. 15 b, and the zones 10 k being predefined in FIG. 15 c bent state of the security element 1 for the viewer 7 provide a second information.
- the viewer 7 sees this in the process
- Security element distinguishes. In the non-bent state of the security element 1 shown in FIG. 15a, the viewer does not recognize any information. If the security element 1 is bent into the first bent state shown in FIG. 15b, then the viewer 7 recognizes a first information generated by the zones 10j. At the first information it can
- the Bragg planes in the zones 10 j are aligned such that the first information is predefined in the first one
- the second information may be, for example, an open flower of a flower.
- the Bragg planes in the zones 10k are aligned in such a way that the second information in the second predefined bent state is visible to the viewer 7.
- the bending radii differ in the first and the second predefined bent state of the security element 1 by at least 2 mm, preferably 5 mm, more preferably 10 mm.
- FIGS. 16 a and 16 b schematically show the bending of a security document 2 with a security element 1.
- the security document 2 consists of a flexible substrate 17, on which the security element 1 is applied by means of an adhesive layer 15.
- the security element 1 further comprises a volume hologram layer 1 1, a reflection layer 17r and the
- the lacquer layer 1711 is preferably a
- the lacquer layer 1711 is preferably transparent and has a layer thickness between 0.1 ⁇ m and 10 ⁇ m, preferably between 0.3 ⁇ m and 1 ⁇ m, more preferably between 0.5 ⁇ m and 1 ⁇ m.
- the resist layer 1712 is preferably a transparent spacer layer disposed between the volume hologram layer 11 and the reflection layer 17r.
- the reflection layer 17r is preferably a
- the reflection layer 17r may also be a printed or high-resolution structured color layer or another layer which absorbs radiation in the visible spectral range.
- reflection layer 17r is applied only in regions, so that a partial metallization or partial coating is present.
- the reflection layer 17r can first be applied over the entire surface and subsequently by means of known structuring methods (for example by means of etching resist, by means of photoresist, by means of washing methods)
- the partially metallized reflection layer 17r is arranged in a raster.
- the grid is preferably a line grid.
- the volume hologram 1 1 v is arranged in regions according to a grid, wherein the areas into which the volume hologram 1 1 v into the volume hologram layer 1 1
- Reflection layer 17r are arranged.
- the regions with the volume hologram 11 are preferably arranged in the register with the reflection layer.
- the grid is thus preferably also a line grid, which is arranged in particular register-accurate with the line grid of the reflection layer 17r.
- the adhesive layer shown in Fig. 16a and 16b has a layer thickness of 2 ⁇ on.
- the reflection layer 17r now covers the volume hologram 1 1 v arranged in the register so that the volume hologram 1 1 v for a viewer, in particular under normal illumination conditions and / or at a normal viewing distance and / or a normal one
- Incident light 19 which is diffracted and / or reflected by the volume hologram 1 1 v, can now not reach the observer because of the reflection layer 17 r, so that the light is emitted
- Volume hologram 1 1 v is not or almost invisible to the viewer.
- security element 1 now covers reflection layer 17r, in particular due to the deformation of the layers of the security element caused by the bending of the security element and the resulting displacement of reflection layer 17r with respect to volume hologram 1 1 v, the volume hologram 1 1 v is no longer completely off. so that now shown in Fig. 16b portions of the
- Volume hologram can be visible and from the volume hologram 1 1 v diffracted and / or reflected light 14 at the reflection layer 17r can pass to the viewer. For the viewer, the volume hologram 1 1 v is then at least partially visible in the predefined bent state of the security element 1. On the security element 1 incident light 19e passes through the partially metallized reflection layer 17r to the
- volume hologram 1 1 v is there reflected and / or diffracted and can now at least partially pass the reflection layer 17r to the viewer due to the bending of the security element 1.
- the line widths and line spacings of the rasters of the reflection layer 17r and / or the volume hologram 11 are 1 and v
- Layer thickness of the transparent spacer layer 1712 selected such that the visibility of the Volumenhologrannnns 1 1 v in the predefined bent state of the security element 1 is maximized.
- the lines of the line grid as shown in FIGS. 16b and 16b, run parallel or predominantly parallel to the bending line of the security element 1.
- the line widths and line spacings of the rasters of the reflection layer 17r and the corresponding line widths and line spacings of the volume hologram 11 v are determined by geometric construction or mathematical calculation. This is based on the characteristics defined in FIG. For the sake of simplicity, the case of a curvature with a constant bending diameter D is drawn there. However, line grids and volume holograms can also be designed for any other type of curvature. Other important parameters that are taken into account are the opening angles ⁇ and ⁇ as well as the viewing angle ⁇ and the viewing distance h.
- FIG. 18 shows the dependence of the thus determined line widths and
- Curvature angles also increase the widths and distances of the grid.
- the widths and spacings are at a 45 ° bend angle in the thickness layer of the spacer layer.
- the widths and spacings are at a 45 ° bend angle in the thickness layer of the spacer layer.
- Spacer layer for example, 10 ⁇ lie the line distances and Line widths of the reflection layer and the corresponding line spacings and line widths of the volume hologram in the range of 10 ⁇ .
- the spacer layer or lacquer layer 1712 may not be provided with a constant thickness, as shown in FIGS. 16a and 16b, but with a variable thickness. This is shown for example in FIG. 19.
- the thickness of the spacer layer increases.
- the thickness of the spacer layer changes perpendicular to the bending line.
- the bendline extends out of the leaf level. It is advantageous if the spacer layer in the region of the bending line or along the bending line has the greatest layer thickness and the layer thickness decreases or becomes smaller with distance from the bending line. This means, in particular, that in the region of small bending angles a greater layer thickness of the spacer layer and in the region of greater bending angles a smaller layer thickness of the
- the advantage is that, by varying the thickness of the spacer layer, the line widths and line spacings of the screens of the reflection layer 17r can be made more uniform and thus the volume hologram 11b is equally well visible at all points in the bent state and, moreover, the appearance of the metallization is more uniform ,
- the spacer layer or the lacquered inserts 1712 not to be provided as a layer with a constant thickness or continuously varying thickness, but as a stepped layer, see FIG. 20.
- it can be provided to use two or more spacer layers 1712, 1713 instead of a single spacer layer 1712 and two or more partial reflection layers 17r1, 17r2 instead of a single partial reflection layer, see FIG. 21.
- the line widths can be made smaller and the line spacing larger.
- the volume hologram 1 1 v is better in the bent state and / or less visible in the non-bent state.
- FIGS. 22 a and 22 b schematically show the bending of a security document 2 with a security element 1.
- the security document 2 consists of a flexible substrate 17, on which the security element 1 is applied by means of an adhesive layer 15.
- the security element 1 further comprises a volume hologram layer 1 1, the reflection layers 17r1 and 17r2 and the resist layers 1711, 1712 and 1713.
- the resist layer 1712 is preferably transparent
- the transparent spacer layer 1712 and 1713 preferably have a layer thickness between 1 ⁇ and 50 ⁇ , preferably between 2 ⁇ and 10 ⁇ on.
- the transparent spacer layer 1712 and 1713 shown in FIGS. 22a and 22b have layer thicknesses of 5 ⁇ m, for example.
- the reflection layers 17r1 and 17r2 are, as shown in FIGS. 22a and 22b, respectively formed in regions and raster-shaped.
- the grid is preferably a line grid with line widths and / or
- the line grid shown in FIGS. 22a and 22b has line widths and line spacings of 5 ⁇ .
- the rasters of the reflection layers 17r1 and 17r2 are offset relative to one another in such a way that the non-metallized regions of the reflection layer 17r1 are covered by the metallized regions of the reflection layer 17r2, in particular when viewed perpendicular to a plane spanned by the volume hologram layer 11 in the undeflected state of the security element 1 are and vice versa.
- the two reflection layers 17r1 and 17r2 are positioned so as to be "in gap" relative to one another.
- the two reflection layers 17r1 and 17r2 are therefore arranged relative to one another in such a way that they introduce the entire surface area underneath in the unbent state of the security element 1
- Security elements 1 cover the reflective layers 17r1 and 17r2, however, the volume hologram 1 1 v no longer completely, so that now, in particular due to the bending of the security element in the predefined bent state caused deformation of the layers of the security element, from the volume hologram 1 1 v diffracted and / or reflected light 14 can pass the reflection layers 17r1 and 17r2 past the viewer. For the viewer, the volume hologram 1 1 v is then at least partially visible in the predefined bent state of the security element 1.
- the line widths and line spacings of the grid are the same.
- Spacer layers 17I2 and 17I3 chosen such that the visibility of the volume hologram 1 1 v in the predefined bent state of the security element 1 is maximized. It is advantageous if the
- Layer thicknesses of the spacer layers 1712 and 1713 substantially correspond to the pitch period of the line patterns of the reflection layers 17r1 and 17r2. It is also possible that the line widths and / or
- Line spacings vary, in particular as a function of the predefined bent state of the security element 1.
- the line widths and spacings of the two line screens are in turn determined in particular by geometric construction, as described above, or by calculation.
- the lines of the line grid as shown in FIGS. 22 a and 22 b, extend parallel to the bending line of the security element 1.
- the spacer layers 1712 and 1713 may not be provided with constant thicknesses, as shown in FIGS. 22a and 22b, but with variable thicknesses.
- the advantage is that by varying the thickness of the spacer layers 1712 and 1713
- Reflection layers 17r1 and 17r2 can be made more uniform and thus the volume hologram 1 1 v in the bent state at all points is equally visible and also the appearance of the metallization is more uniform.
- the line widths can be made smaller and the line distances larger. As a result, the volume hologram is better in the bent state and less visible in the unbent state.
- FIG. 23 shows a security document 2, in particular a further variant of the layer structure in FIG. 22. It is preferred only one of
- Reflection layers 17r1 as a line grid, the other reflection layer 17r2, however, as a screened layer of area raster elements
- the upper reflection layer 17r1 is designed as a line grid, while the lower reflection layer 17r2 is designed as a screened layer of planar raster elements. But it is also the reverse case possible.
- Reflection layers 17r1 and 17r2 as well as their dimensions result in particular by mathematical calculation, for example by means of a software for the calculation of moiré effects.
- Lacquer layer 1712 which forms the spacer layer of the two reflection layers 17r1, 17r2, in particular decisive for the calculation.
- the first target in the calculation is given that the Moire in the plane State of the security element 1 generates a completely or almost completely opaque surface, as shown in Fig. 24 left.
- the underlying volume hologram 1 1 v is covered in the flat state and thus invisible or almost invisible.
- second goal size becomes
- Security elements 1 are generated by the moiré effect at least two windows or transparent areas in the superimposed reflection layers having, for example, the shape of the numerals "3" and "5", as shown in Fig. 24 right. In these transparent areas, the underlying volume hologram 1 1 v, which is in the
- Volume hologram layer is formed, visible.
- Fig. 25 shows the plan view of a section of a line grid executed as a layer.
- a thickness of a spacer layer or lacquer layer of 170 ⁇ for example, line widths of 70 to 90 ⁇ (g, h), while the line distances 20 to 30 ⁇ (e, f) amount.
- FIG. 26 shows a plan view of a detail of a screened layer of areal raster elements.
- structure widths of 10 to 70 ⁇ m (g, h) result, for example, while the structural distances are 10 to 80 ⁇ m (e, f).
- FIG. 27 a further embodiment of a security element 1 is shown.
- the security element shown in Figure 27 has only one
- Reflection layer 17r 'on.
- the reflection layer 17r ' is present essentially as flanks.
- the reflection layer 17r 'therefore extends not only in the x / y plane, but also extends in the z-direction.
- Reflection layer 17r or the flanks act similarly to the lamellae in a so-called "privacy filter" for computer screens
- the light can pass through the reflection layer substantially perpendicularly, ie in the z-direction
- the intensity of the volume hologram is reduced even for smaller angles, because with the critical angle g the light can pass only from a few points of the volume hologram.
- Figures 28a to 28d show one possible method of manufacturing the security element 2 shown in Figure 27.
- a lamellar or cup-shaped structure 62 is replicated, the structure may be a lacquer layer ( Figure 18a).
- Cup rims can be between 1 ⁇ and 50 ⁇ , preferably between 2 ⁇ and 20 ⁇ and more preferably between 2 ⁇ and 10 ⁇ lie.
- the spacing d of the lamellae 60 or cup edges should preferably be less than or equal to 10 ⁇ H, more preferably less than 5 ⁇ H and even better less than 2 ⁇ H.
- the replicated structure 62 is completely coated with a reflection layer, preferably with a thin metal layer 64, for example in a thickness of 20 nm to 30 nm, in particular with aluminum (FIG. 18b).
- a reflection layer preferably with a thin metal layer 64, for example in a thickness of 20 nm to 30 nm, in particular with aluminum (FIG. 18b).
- a lacquer layer can still be applied to the reflection layer 17'r.
- the single-layer reflection layer 17r ' can then with a
- Volume hologram layer 1 1 combined and applied to a flexible substrate 17, such as a paper banknote, applied (Fig. 18d). Between the
- a layer 68 may be arranged.
- This layer 68 may be an adhesive layer and / or an adhesion promoter layer. On the layer 68 can also be dispensed with.
Landscapes
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Engineering & Computer Science (AREA)
- Manufacturing & Machinery (AREA)
- Electromagnetism (AREA)
- Health & Medical Sciences (AREA)
- Computer Security & Cryptography (AREA)
- General Health & Medical Sciences (AREA)
- Toxicology (AREA)
- Business, Economics & Management (AREA)
- Accounting & Taxation (AREA)
- Finance (AREA)
- Credit Cards Or The Like (AREA)
- Holo Graphy (AREA)
- Diffracting Gratings Or Hologram Optical Elements (AREA)
Priority Applications (6)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| EP17707332.7A EP3426496A1 (de) | 2016-03-09 | 2017-02-27 | Sicherheitselement sowie ein verfahren zur herstellung eines sicherheitselements |
| JP2018547351A JP2019512732A (ja) | 2016-03-09 | 2017-02-27 | セキュリティエレメント及びセキュリティエレメントの製造方法 |
| AU2017230258A AU2017230258A1 (en) | 2016-03-09 | 2017-02-27 | Security element and method for producing a security element |
| US16/083,207 US20190092081A1 (en) | 2016-03-09 | 2017-02-27 | Security Element and Method for Producing a Security Element |
| CA3016661A CA3016661A1 (en) | 2016-03-09 | 2017-02-27 | Security element and method for producing a security element |
| US17/477,986 US20220105743A1 (en) | 2016-03-09 | 2021-09-17 | Security element and method for producing a security element |
Applications Claiming Priority (4)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| DE102016104300.1 | 2016-03-09 | ||
| DE102016104300.1A DE102016104300A1 (de) | 2016-03-09 | 2016-03-09 | Sicherheitselement sowie ein Verfahren zur Herstellung eines Sicherheitselements |
| DE102016109632 | 2016-05-25 | ||
| DE102016109632.6 | 2016-05-25 |
Related Child Applications (2)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| US16/083,207 A-371-Of-International US20190092081A1 (en) | 2016-03-09 | 2017-02-27 | Security Element and Method for Producing a Security Element |
| US17/477,986 Division US20220105743A1 (en) | 2016-03-09 | 2021-09-17 | Security element and method for producing a security element |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| WO2017153196A1 true WO2017153196A1 (de) | 2017-09-14 |
Family
ID=58162623
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| PCT/EP2017/054514 Ceased WO2017153196A1 (de) | 2016-03-09 | 2017-02-27 | Sicherheitselement sowie ein verfahren zur herstellung eines sicherheitselements |
Country Status (6)
| Country | Link |
|---|---|
| US (2) | US20190092081A1 (cg-RX-API-DMAC7.html) |
| EP (1) | EP3426496A1 (cg-RX-API-DMAC7.html) |
| JP (1) | JP2019512732A (cg-RX-API-DMAC7.html) |
| AU (1) | AU2017230258A1 (cg-RX-API-DMAC7.html) |
| CA (1) | CA3016661A1 (cg-RX-API-DMAC7.html) |
| WO (1) | WO2017153196A1 (cg-RX-API-DMAC7.html) |
Cited By (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| DE102020112447A1 (de) | 2020-05-07 | 2021-11-11 | Bayerische Motoren Werke Aktiengesellschaft | Verfahren zum Integrieren eines Hologramms in einem starren Bauteil einer vorbestimmten gekrümmten Oberflächen-Sollgeometrie, insbesondere einer Fahrzeugscheibe, ein resultierendes Bauteil und ein dieses enthaltendes Fahrzeug |
| JP2022502283A (ja) * | 2018-09-24 | 2022-01-11 | オーファウデー キネグラム アーゲー | 光学可変エレメント、セキュリティ文書、光学可変エレメントの製造方法、セキュリティ文書の製造方法 |
Families Citing this family (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US12014232B2 (en) * | 2022-10-07 | 2024-06-18 | Capital One Services, Llc | Transaction card with hidden visual features |
Citations (7)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20020191234A1 (en) * | 2001-05-30 | 2002-12-19 | Dai Nippon Printing Co., Ltd. | Hologram laminate and hologram label |
| WO2004023220A1 (de) * | 2002-08-12 | 2004-03-18 | Giesecke & Devrient Gmbh | Holographisch-optisches element und verfahren zu dessen herstellung |
| WO2006021102A1 (en) * | 2004-08-27 | 2006-03-02 | Kxo Ag | Security document with a volume hologram forming a partial motif |
| WO2007115785A1 (de) * | 2006-04-06 | 2007-10-18 | Ovd Kinegram Ag | Mehrschichtkörper mit volumen-hologramm |
| WO2007131496A2 (de) * | 2006-05-16 | 2007-11-22 | Hologram Industries Research Gmbh | Verfahren zum herstellen von dokumenten mit hologramm sowie dokument mit hologramm |
| WO2008141773A2 (de) * | 2007-05-21 | 2008-11-27 | Ovd Kinegram Ag | Mehrschichtkörper |
| WO2009121602A2 (de) * | 2008-04-04 | 2009-10-08 | Leonhard Kurz Stiftung & Co. Kg | Holographische sicherheitselemente sowie verfahren zu ihrer herstellung |
Family Cites Families (15)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| JPS5332048A (en) * | 1976-09-07 | 1978-03-25 | Canon Inc | Information mark display device |
| JPH0325590A (ja) * | 1989-06-22 | 1991-02-04 | Mitsubishi Electric Corp | Icカード及びその製造管理方式 |
| JPH03171082A (ja) * | 1989-11-30 | 1991-07-24 | Dainippon Printing Co Ltd | 曲面用ホログラムの製造方法 |
| JP2903673B2 (ja) * | 1990-09-04 | 1999-06-07 | 旭硝子株式会社 | ホログラム露光法 |
| US5223955A (en) * | 1990-11-29 | 1993-06-29 | Zabka James B | Reflection integral holography |
| JP3169997B2 (ja) * | 1991-09-26 | 2001-05-28 | 富士通株式会社 | ホログラム作成方法 |
| DE19924385A1 (de) * | 1999-05-27 | 2000-12-07 | Xetos Ag | Informationsträger mit Hologramm |
| FR2803443B1 (fr) * | 1999-12-30 | 2004-08-20 | Thomson Csf Sextant | Dispositif de generation d'impulsions laser a tres forte puissance crete, moyens de compression et d'etirement correspondants |
| DE60217732D1 (de) * | 2002-07-10 | 2007-03-08 | Rue De Int Ltd | Optisch variable sicherheitsvorrichtung |
| JP4349613B2 (ja) * | 2003-07-30 | 2009-10-21 | 大日本印刷株式会社 | 付加情報の付いたホログラム記録フィルム、及び、その記録方法とその真偽判定方法 |
| JP4884894B2 (ja) * | 2006-09-07 | 2012-02-29 | 富士フイルム株式会社 | 光再生装置及び光再生方法 |
| GB0711434D0 (en) * | 2007-06-13 | 2007-07-25 | Rue De Int Ltd | Holographic security device |
| FR2948216B1 (fr) * | 2009-07-17 | 2011-11-25 | Arjowiggins Security | Element de securite a effet de parallaxe |
| JP5741445B2 (ja) * | 2009-12-11 | 2015-07-01 | 日本電気株式会社 | 照明装置およびそれを用いた投射型表示装置 |
| FR3005068B1 (fr) * | 2013-04-26 | 2017-05-26 | Arjowiggins Security | Element de securite comportant un hologramme en volume. |
-
2017
- 2017-02-27 CA CA3016661A patent/CA3016661A1/en not_active Abandoned
- 2017-02-27 EP EP17707332.7A patent/EP3426496A1/de not_active Withdrawn
- 2017-02-27 AU AU2017230258A patent/AU2017230258A1/en not_active Abandoned
- 2017-02-27 WO PCT/EP2017/054514 patent/WO2017153196A1/de not_active Ceased
- 2017-02-27 JP JP2018547351A patent/JP2019512732A/ja active Pending
- 2017-02-27 US US16/083,207 patent/US20190092081A1/en not_active Abandoned
-
2021
- 2021-09-17 US US17/477,986 patent/US20220105743A1/en not_active Abandoned
Patent Citations (7)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20020191234A1 (en) * | 2001-05-30 | 2002-12-19 | Dai Nippon Printing Co., Ltd. | Hologram laminate and hologram label |
| WO2004023220A1 (de) * | 2002-08-12 | 2004-03-18 | Giesecke & Devrient Gmbh | Holographisch-optisches element und verfahren zu dessen herstellung |
| WO2006021102A1 (en) * | 2004-08-27 | 2006-03-02 | Kxo Ag | Security document with a volume hologram forming a partial motif |
| WO2007115785A1 (de) * | 2006-04-06 | 2007-10-18 | Ovd Kinegram Ag | Mehrschichtkörper mit volumen-hologramm |
| WO2007131496A2 (de) * | 2006-05-16 | 2007-11-22 | Hologram Industries Research Gmbh | Verfahren zum herstellen von dokumenten mit hologramm sowie dokument mit hologramm |
| WO2008141773A2 (de) * | 2007-05-21 | 2008-11-27 | Ovd Kinegram Ag | Mehrschichtkörper |
| WO2009121602A2 (de) * | 2008-04-04 | 2009-10-08 | Leonhard Kurz Stiftung & Co. Kg | Holographische sicherheitselemente sowie verfahren zu ihrer herstellung |
Cited By (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| JP2022502283A (ja) * | 2018-09-24 | 2022-01-11 | オーファウデー キネグラム アーゲー | 光学可変エレメント、セキュリティ文書、光学可変エレメントの製造方法、セキュリティ文書の製造方法 |
| DE102020112447A1 (de) | 2020-05-07 | 2021-11-11 | Bayerische Motoren Werke Aktiengesellschaft | Verfahren zum Integrieren eines Hologramms in einem starren Bauteil einer vorbestimmten gekrümmten Oberflächen-Sollgeometrie, insbesondere einer Fahrzeugscheibe, ein resultierendes Bauteil und ein dieses enthaltendes Fahrzeug |
Also Published As
| Publication number | Publication date |
|---|---|
| CA3016661A1 (en) | 2017-09-14 |
| EP3426496A1 (de) | 2019-01-16 |
| US20190092081A1 (en) | 2019-03-28 |
| JP2019512732A (ja) | 2019-05-16 |
| US20220105743A1 (en) | 2022-04-07 |
| AU2017230258A1 (en) | 2018-09-27 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| EP3339048B1 (de) | Sicherheitselement mit reflektivem flächenbereich | |
| EP1800271B1 (de) | Sicherheitsdokument | |
| EP2451650B2 (de) | Mehrschichtkörper | |
| EP2864130B2 (de) | Dekorelement, sicherheitsdokument mit einem dekorelement sowie verfahren zur herstellung eines dekorelements | |
| DE102007023560B4 (de) | Mehrschichtkörper | |
| EP2475529B1 (de) | Mehrschichtkörper | |
| EP2091756B1 (de) | Durchsichtssicherheitselement mit mikrostrukturen | |
| EP3216620B1 (de) | Sicherheitselement, wertdokument mit einem solchen sicherheitselement sowie herstellungsverfahren eines sicherheitselementes | |
| EP2853411B1 (de) | Sicherheitselement mit Linsenrasterbild | |
| EP1853763A1 (de) | Sicherheitselement und verfahren zu seiner herstellung | |
| EP1786632A2 (de) | Metallisiertes sicherheitselement | |
| EP3242801B1 (de) | Verfahren zur herstellung eines sicherheitselements sowie ein sicherheitselement | |
| DE102012203350A1 (de) | Sicherheitsetikett und ein Verfahren zu seiner Herstellung | |
| EP3606765B1 (de) | Sicherheitselement mit reliefstruktur und herstellungsverfahren hierfür | |
| WO2017153196A1 (de) | Sicherheitselement sowie ein verfahren zur herstellung eines sicherheitselements | |
| DE102016104300A1 (de) | Sicherheitselement sowie ein Verfahren zur Herstellung eines Sicherheitselements |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| ENP | Entry into the national phase |
Ref document number: 3016661 Country of ref document: CA |
|
| ENP | Entry into the national phase |
Ref document number: 2018547351 Country of ref document: JP Kind code of ref document: A |
|
| NENP | Non-entry into the national phase |
Ref country code: DE |
|
| ENP | Entry into the national phase |
Ref document number: 2017230258 Country of ref document: AU Date of ref document: 20170227 Kind code of ref document: A |
|
| WWE | Wipo information: entry into national phase |
Ref document number: 2017707332 Country of ref document: EP |
|
| ENP | Entry into the national phase |
Ref document number: 2017707332 Country of ref document: EP Effective date: 20181009 |
|
| 121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 17707332 Country of ref document: EP Kind code of ref document: A1 |