EP1319220B2 - Security system, particularly for valuable documents - Google Patents
Security system, particularly for valuable documents Download PDFInfo
- Publication number
- EP1319220B2 EP1319220B2 EP01960674.8A EP01960674A EP1319220B2 EP 1319220 B2 EP1319220 B2 EP 1319220B2 EP 01960674 A EP01960674 A EP 01960674A EP 1319220 B2 EP1319220 B2 EP 1319220B2
- Authority
- EP
- European Patent Office
- Prior art keywords
- security
- pattern
- verification
- security element
- verification element
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Lifetime
Links
- 238000012795 verification Methods 0.000 claims abstract description 87
- 238000000034 method Methods 0.000 abstract description 12
- 230000010287 polarization Effects 0.000 description 6
- 230000000694 effects Effects 0.000 description 4
- 230000003287 optical effect Effects 0.000 description 3
- 238000011156 evaluation Methods 0.000 description 2
- 238000006243 chemical reaction Methods 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 238000006073 displacement reaction Methods 0.000 description 1
- 230000012447 hatching Effects 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 238000012545 processing Methods 0.000 description 1
- 238000003672 processing method Methods 0.000 description 1
- 238000000859 sublimation Methods 0.000 description 1
- 230000008022 sublimation Effects 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07D—HANDLING OF COINS OR VALUABLE PAPERS, e.g. TESTING, SORTING BY DENOMINATIONS, COUNTING, DISPENSING, CHANGING OR DEPOSITING
- G07D7/00—Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency
- G07D7/06—Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency using wave or particle radiation
- G07D7/12—Visible light, infrared or ultraviolet radiation
- G07D7/128—Viewing devices
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B42—BOOKBINDING; ALBUMS; FILES; SPECIAL PRINTED MATTER
- B42D—BOOKS; BOOK COVERS; LOOSE LEAVES; PRINTED MATTER CHARACTERISED BY IDENTIFICATION OR SECURITY FEATURES; PRINTED MATTER OF SPECIAL FORMAT OR STYLE NOT OTHERWISE PROVIDED FOR; DEVICES FOR USE THEREWITH AND NOT OTHERWISE PROVIDED FOR; MOVABLE-STRIP WRITING OR READING APPARATUS
- B42D25/00—Information-bearing cards or sheet-like structures characterised by identification or security features; Manufacture thereof
- B42D25/20—Information-bearing cards or sheet-like structures characterised by identification or security features; Manufacture thereof characterised by a particular use or purpose
- B42D25/29—Securities; Bank notes
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07D—HANDLING OF COINS OR VALUABLE PAPERS, e.g. TESTING, SORTING BY DENOMINATIONS, COUNTING, DISPENSING, CHANGING OR DEPOSITING
- G07D7/00—Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency
- G07D7/003—Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency using security elements
- G07D7/0032—Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency using security elements using holograms
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07D—HANDLING OF COINS OR VALUABLE PAPERS, e.g. TESTING, SORTING BY DENOMINATIONS, COUNTING, DISPENSING, CHANGING OR DEPOSITING
- G07D7/00—Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency
- G07D7/20—Testing patterns thereon
- G07D7/202—Testing patterns thereon using pattern matching
- G07D7/207—Matching patterns that are created by the interaction of two or more layers, e.g. moiré patterns
Definitions
- the invention relates to a security system, in particular for the authenticity verification of value documents, which consists of a security element and a verification element, which make information hidden by surface contact visible to one another, and corresponding security elements, verification elements and value documents.
- the invention further relates to methods and apparatus for reading the hidden information.
- a self-verifying value document which generally carries unrecognizable information at a location under normal observation.
- a verification element is applied, which can be made to coincide with the security information carrying the hidden information by folding the value document so that the hidden information becomes visible.
- a text written in microwriting in the security element is increased by means of an optical lens as a verification element when the verification element is brought to coincide with the security element by folding the value document.
- the security element and the verification element are designed such that they produce a so-called moiré pattern when covering the verification element with the security element.
- both the security element as well as the verification element comprise a polarization element. With appropriate regionally different orientation of the polarization plane information can be made visible in this way.
- the DE 197 29 918 A shows a banknote with a security feature and a verification element for verifying this security feature, wherein at least one verification element and at least one security feature verifiable with this verification feature are integrated into the banknote at different locations. The verification element and the security element are superimposed for verification.
- the security or verification elements have an even higher degree of counterfeit security, so that on the one hand value documents can be made even more secure against forgery and the authenticity verification.
- a security system comprises a planar security element which is arranged in a carrier plane.
- the security element comprises a hologram carrier, which reconstructs a pattern holographic way, which lies outside the carrier plane under the incidence of light. Hidden information is stored in this pattern.
- the security system according to the invention comprises an at least partially transparent verification element which makes the information concealed in the pattern holographically generated by the security element readable when the security element is touched flat when exposed to light.
- a document of value or bill is thus at one point a security element.
- This security element is a hologram carrier.
- the hologram contained in it produces a light opposite the document to be secured offset image or pattern, which may be two-dimensional or three-dimensional.
- hidden information is stored. This hidden information, which is now at a distance from the document, can be read out with a verification element.
- the hidden information is thus not applied directly to the value document as in the case of known security features, but is only generated at a distance from the value document by holographic means.
- the hologram of the security element makes the counterfeiting significantly more difficult.
- the information stored in the holographically generated pattern can only be made visible by the verification element.
- the security element includes a hologram that generates a phase modulated pattern when illuminated.
- the hidden information can be stored in such a way that the phase of the light in the area of the hidden information is different from the phase of the surrounding areas of the pattern.
- the verification element is then configured to convert this phase modulation to visible amplitude modulation. This is z. B. in a known manner by the phase contrast method or the Schlieren method possible.
- the verification element comprises a hologram which reconstructs a corresponding pattern under incident light, which generates the necessary for the conversion of the phase modulation in an amplitude modulation optical light pattern.
- the security element can be designed such that it generates a holographically generated pattern when the light is incident, but does not have a constant distance from the carrier plane.
- the verification element must take into account this circumstance by appropriately adapted spatial frequencies. In such an embodiment, no information is visible in the level of the value document. Only the holographic reproduction produces the pattern in which the hidden information is stored. This pattern does not represent a plane but is at a varying distance from the plane of the security element. This changing distance can only be with help of the verification element are compensated. In addition, the information is additionally hidden, in which they in the holographically generated, non-planar pattern z. B.
- the verification element has different tasks. On the one hand, it compensates for the different distance of the holographically generated pattern from the carrier plane. On the other hand, it makes the information hidden in the holographically generated pattern visible.
- the holographically generated pattern which results from incident light on the security element, may have different distances from the carrier plane.
- a 3D hologram can be generated.
- a bill can be in a 3D hologram, which generates a pattern in only a small distance from the carrier plane, keep the blur within tolerable limits.
- the information stored in the holographically generated pattern resulting from incident light on the security element can be read out with an external verification element.
- both the verification element and the security element are applied to one and the same value document.
- the elements can then be brought to coincidence in order to make the hidden information visible. In this way, a self-verifying system is possible.
- the same effect can be achieved by juxtaposition of two bills in a corresponding orientation.
- the pattern reconstructed by the incidence of light on the security element can be virtual or even real, ie can be imaged on a screen.
- a security element for use in a security system according to the invention comprises a hologram structure which reconstructs a pattern with hidden information outside the carrier plane when holographically incident.
- a verification element for use with a security system according to the invention serves to visualize the hidden information which is reconstructed by a security element outside the carrier plane of the security element when light is incident.
- the verification element is at least partially transparent.
- the verification element may carry another security feature. It can, for.
- another hologram structure may be applied which produces another image superimposed on the hidden information like a background.
- a value document according to the invention comprises a security element and / or a verification element.
- the security system according to the invention can be designed so that it makes the hidden information with appropriate coverage of the verification element and the security element with appropriate incidence visible to the naked eye.
- a device that allows the verification machine comprises a device which brings the security element with a verification element to cover.
- the verification element may be part of the device or be applied to the object to be verified itself and be brought by machine folding with the security element to coincide.
- a lighting device is provided which illuminates the security element and verification elements brought to cover.
- the hidden information is visible and readable by means of a read-out device.
- This can be z.
- B. be a corresponding brightness detector that can detect differences in brightness in the hidden information.
- the read-out device may comprise a camera which allows image processing and evaluation of the image of the hidden information.
- Fig. 1 is a value document 1, such as a banknote, with a verification element 3 and a security element 5 shown.
- the verification element is indicated by hatching.
- the security element 5 comprises a hologram carrier.
- this hologram carrier generates a pattern outside the plane of the document 1 when light enters, e.g. B. the bill.
- the thus holographically generated pattern advantageously has a distance 7 of 100 to 300 ⁇ m from the surface of the bill 1.
- the reference numerals 1, 3, 5, 7 and 9 are generally used in the following for various embodiments.
- the security element 5 In an embodiment in which the verification element 3 carries a line grid, the security element 5 generates a holographic pattern upon incidence of light, which is likewise modulated in a strip shape. If one brings a verification element 3 with the security element 5 to cover, the line grid of the verification element has a distance from the holographically generated pattern. In this way, by tilting z. For example, the area below the line grid can be made visible or by vertical viewing direction the area between the line grid of the verification element 3. In this way, tilting effects can be generated, which are otherwise visible only in the presence of an actual distance between the grid pattern and the image plane.
- Fig. 7 Such an embodiment is schematically visible in the side sectional view. Shown is a folded bill 1, have been brought in the verification element 403 and security element 5, 405 to cover. This is the position during the read-out process.
- the term "readout” is generally used in this specification for verification, whether by the naked eye or by machine.
- the verification element With appropriate incidence of light reconstructed from the hologram of the security element 5, 405 at a distance 7 from the contact plane 9, a holographically generated pattern 400.
- the verification element is transparent and with a z. B. printed strip pattern provided. Due to the distance 7, the region of the holographically generated pattern 400, which is visible through the stripe pattern of the verification element 3, 403, depends on the viewing direction on the security element 5, 405. ever looking direction can z. B. the area below the stripe pattern 3, 403 be visible, or the area between the strip of the verification element 3, 403rd
- FIGS. 4 to 8 are indicated by short vertical lines on the bill 1, in which area the verification element and the security element are located. Of course, these are not objective characteristics.
- the FIGS. 4 to 8 not to scale. In particular, for example, the distance 7 is much smaller. Verification element and security element are directly adjacent to each other and are preferably not thicker than the bill. 1
- the security element 5, which is in FIG. 1 is visible, can also be a hologram carrier, which generates a phase-modulated pattern outside the plane of the bill 1 upon incidence of light.
- the verification element 3 is an element that converts this phase modulation into an amplitude modulation. Is this phase modulation z. B. in the form of the letters OK, by stacking the verification element 3 with the security element 5, as it is in FIG. 2 is shown, the hidden information "OK" 6 visible to the eye 8.
- the verification element 3, 203 generates a line pattern upon incidence of light in the same plane outside the bill 1, when the verification element 3, 203 and security element 5, 205 lie on one another.
- the line patterns are set to give a moiré pattern, as is known for the superposition of actual line patterns.
- this moiré pattern information can be stored by appropriate arrangement of the holographically generated lines, so that z. B. again the font "OK" is recognizable.
- the security element 5,105 can also produce a pattern 100 outside the plane of the bill 1, which is made visible by means of a lens structure 102 in the verification element 3, 103, z. B. by magnification, see Fig. 4 ,
- a certain distance 7 from the lens structure of the pattern to be imaged is necessary, which according to the invention is obtained by the holographic reconstruction of the pattern 100.
- the lens structure 102 thus does not need to have a certain thickness, as usual, to produce this distance from the object to be imaged.
- Possible is z. B. a lenticular lens structure.
- a simple other embodiment comprises a security element 5, which is outside the plane of the Bill 1 reconstructs a holographically generated pattern in the event of light, which carries only a portion of information that is not meaningful on its own.
- the verification element 3 comprises a comparable holographic structure which reconstructs in the same plane outside the bill 1 a holographically generated pattern representing the remaining part of the information. If now the verification element is brought into coincidence together with the security element and exposed to light, then both parts of the hidden information become visible and can be read out together.
- the partial information generated holographically by illuminating the security element 5 may include parts of the letters O and K that are not per se recognizable as such.
- the remaining remaining parts of the letters O and K are holographically generated by illuminating the verification element in the same place when the two elements come to rest on each other. In this way the whole picture becomes OK.
- a security element 5, 305 which generates a pattern 300 holographically outside the plane 9 of the bill 1, which has different polarization in different areas. While z.
- a security element 5, 305 which generates a pattern 300 holographically outside the plane 9 of the bill 1, which has different polarization in different areas. While z.
- the verification element 3, 303 is a polarizing filter that is polarized perpendicularly. In this way, the horizontally polarized light from the regions of the holographically generated pattern corresponding to the letters O and K can not pass through the verification element 3, 303, so that they appear black.
- the holographically generated distance 7 between the reconstructed pattern of the security element makes the forgery more difficult. Ordinary direct storage of the information on the bill is easier to imitate than a hologram having corresponding information in a staggered plane. In addition, the information is such that it can only be read out with the aid of the verification element. Without such a verification element, the holographically stored information is not recognizable. An even higher security against counterfeiting can be achieved if the holographically generated pattern 505 has no constant distance 7 from the banknote l, but z. B. reconstructed in a wavy surface or in a stepped surface, see FIG. 8 in the scheme. In turn the ripple is much smaller than shown. In such an embodiment, the verification element 3, 503 is designed such that it does not account for this non-constant distance, wherein this can be achieved by a corresponding spatial frequency of the verification element.
- the necessary hologram structures for the above embodiments may, for. B. optically produced or computer generated in conventional ways. They can of course be provided in different places or even several times on the bill. Likewise, z. B. an arrangement in two opposite corners of the bill conceivable.
- the security element can produce both a virtual and a real image that can be captured on a screen.
- the verification element 3 is at least partially transparent. Thus, light can strike the security element through the verification element and make the holographic pattern stored behind the banknote 1 visible. Viewing this pattern through the verification element reveals the hidden information.
- a security feature can still be provided on the verification element itself, for. B. another hologram structure that causes a different optical effect to further increase the security against counterfeiting.
- the transparency of the verification element must remain sufficient that the hidden information can still be read.
- FIG. 2 shows the read-out process.
- Viewer 8 sees the collated bill 1.
- the verification element 3 lying on the security element 5 makes visible the information hidden in the pattern holographically generated by the security element 5.
- Fig. 3 schematically a mechanical arrangement for reading the security system is shown.
- the bill 1 is folded by machine, so that verification element 3 and security element 5 come to rest on each other.
- the bill folded in this way is brought into the beam path of a lighting device 10 with a light direction 12.
- the light beam 12 passes through the verification element 3 on the security element 5, which in the Fig. 3 is not visible.
- the holographically generated pattern is detected by the verification element 3, which is at least partially transparent, with the aid of the camera 14, z. B. a CCD camera, taken in direction 13.
- the verification element 3 recognizes the hidden information that is visible in the holographically generated pattern.
- the image thus generated with the visible hidden information is transmitted from the camera 14 z. B. a computer unit 16.
- an evaluation of the image can be made, for. For example, a comparison with expected images to verify authenticity.
- the light source 10 may also be arranged behind the folded bill 1.
- a device for reading the verification element is not fixed on the bill, but in the machine itself and the bill 1 is moved with the security element 5 past it.
- the security system according to the invention thus offers the advantage that the hidden information is stored in a pattern which is not in the plane of the bill or the value document 1. Instead, the pattern outside the value document 1 is holographically generated. This makes the counterfeiting significantly more difficult.
- holographic displacement of the pattern with the hidden information enables verification by means of elements which normally must be some distance from the hidden information pattern, e.g. As lenticular lens structures or line grid with a tilting effect. In the invention, no increased thickness is necessary because the distance is generated holographically.
Abstract
Description
Die Erfindung betrifft ein Sicherheitssystem insbesondere zur Echtheitsverifikation von Wertdokumenten, das aus einem Sicherheitselement und einem Verifikationselement besteht, die durch flächige Berührung miteinander versteckte Information sichtbar machen, und entsprechende Sicherheitselemente, Verifikationselemente und Wertdokumente. Die Erfindung betrifft weiterhin Verfahren und Vorrichtungen zum Auslesen der versteckten Information.The invention relates to a security system, in particular for the authenticity verification of value documents, which consists of a security element and a verification element, which make information hidden by surface contact visible to one another, and corresponding security elements, verification elements and value documents. The invention further relates to methods and apparatus for reading the hidden information.
Dokumente, Urkunden, Banknoten, Ausweise, Plastikkarten etc. lassen sich mit Hilfe moderner hochauflösender Farbscanner sowie mit Hilfe von Farblaserdruckem bzw. Thermosublimationsdruckern detailgetreu und farbecht reproduzieren. Auch durch die allgemeine Erhältlichkeit von Farbkopierern ist es wesentlich einfacher geworden, hochwertige Fälschungen herzustellen.Documents, certificates, banknotes, identity cards, plastic cards, etc. can be reproduced with the help of modern high-resolution color scanners and with the help of color laser printers or thermal sublimation printers in true to detail and colourfast. Also by the general availability of color copiers, it has become much easier to produce high-quality counterfeits.
Es besteht daher ein Bedürfnis, Dokumente, Ausweise, Banknoten, Wertpapiere, Plastikkarten etc. durch zusätzlich aufgebrachte Sicherheitsmerkmale fälschungssicher zu machen. Durch derartige Sicherheitsmerkmale kann zumindest bewirkt werden, daß die Herstellung einer qualitativ hochwertigen Fälschung stark verteuert wird. Als derartige Sicherheitsmerkmale sind Wasserzeichen, Seidenfäden, verschlungene Linienstrukturen, sowie die Verwendung besonderen Papiers bekannt. Auch das Aufbringen von metallisierten Prägehologrammen auf Banknoten, Kreditkarten und Euroscheckkarten hat sich inzwischen allgemein durchgesetzt.There is therefore a need to make documents, ID cards, banknotes, securities, plastic cards, etc. counterfeit-proof by additionally applied security features. Such security features can at least have the effect of making the production of a high-quality forgery much more expensive. As such security features are watermarks, silk threads, intricate line structures, and the use of special paper known. The application of metallized embossed holograms on banknotes, credit cards and euro check cards has now become generally accepted.
Aus
Bei den derzeit immer sich verbessernden Kopier- und Fälschungstechniken besteht jedoch die Gefahr, daß derartige flächige Elemente keine ausreichende Fälschungssicherheit bieten. So kann z. B. erwartet werden, daß auch in Mikroschrift aufgebrachter Text mit einem Kopierer ausreichender Auflösung reproduziert werden kann. Ebenso können gegebenenfalls die Muster zur Erzeugung eines Moiré-Musters reproduziert werden.However, with the ever-improving copying and counterfeiting techniques, there is a risk that such sheet-like elements will not provide adequate counterfeit security. So z. For example, it can be expected that even microformed text can be reproduced with a copier of sufficient resolution. Also, if necessary, the patterns for producing a moiré pattern can be reproduced.
Die
Wünschenswert ist es also, daß die Sicherheits- bzw. Verifikationselemente einen noch höheren Fälschungssicherheitsgrad aufweisen, so daß zum einen Wertdokumente noch fälschungssicherer gemacht werden können und die Echtheitsverifikation zuverlässiger.It is therefore desirable that the security or verification elements have an even higher degree of counterfeit security, so that on the one hand value documents can be made even more secure against forgery and the authenticity verification.
Diese Aufgabe mit wird einem Sicherheitssystem mit den Merkmalen des Anspruchs 1, einer Verwendung eines Verifikationselements mit den Merkmalen des Anspruchs 7 und einem Wertdokument mit den Merkmalen eines der Ansprüche 9 oder 10 erreicht.This object is achieved with a security system having the features of
Ein erfindungsgemäßes Sicherheitssystem umfaßt ein flächiges Sicherheitselement, das in einer Trägerebene angeordnet ist. Das Sicherheitselement umfaßt einen Hologrammträger, der unter Lichteinfall auf holographischem Wege ein Muster rekonstruiert, das außerhalb der Trägerebene liegt. In diesem Muster ist versteckte Information gespeichert. Weiterhin umfaßt das erfindungsgemäße Sicherheitssystem ein zumindest teilweise transparentes Verifikationselement, das bei flächiger Berührung des Sicherheitselements unter Lichteinfall die in dem durch das Sicherheitselement holographisch erzeugten Muster versteckte Information auslesbar macht.A security system according to the invention comprises a planar security element which is arranged in a carrier plane. The security element comprises a hologram carrier, which reconstructs a pattern holographic way, which lies outside the carrier plane under the incidence of light. Hidden information is stored in this pattern. Furthermore, the security system according to the invention comprises an at least partially transparent verification element which makes the information concealed in the pattern holographically generated by the security element readable when the security element is touched flat when exposed to light.
Auf bzw. in dem zu sichernden Gegenstand, z. B. einem Wertdokument oder Geldschein befindet sich also an einer Stelle ein Sicherheitselement. Dieses Sicherheitselement ist ein Hologrammträger. Das darin enthaltene Hologramm erzeugt bei Lichteinfall ein gegenüber dem zu sichernden Dokument versetztes Bild bzw. Muster, welches zweidimensional oder dreidimensional sein kann. In dem Muster ist eine versteckte Information gespeichert. Diese versteckte Information, die sich nun in einem Abstand von dem Dokument befindet, kann mit einem Verifikationselement ausgelesen werden.On or in the object to be secured, z. B. a document of value or bill is thus at one point a security element. This security element is a hologram carrier. The hologram contained in it produces a light opposite the document to be secured offset image or pattern, which may be two-dimensional or three-dimensional. In the pattern hidden information is stored. This hidden information, which is now at a distance from the document, can be read out with a verification element.
Die versteckte Information ist also nicht wie bei bekannten Sicherheitsmerkmalen direkt auf dem Wertdokument aufgebracht, sondern wird auf holographischem Wege erst in einem Abstand von dem Wertdokument erzeugt. Das Hologramm des Sicherheitselements erschwert die Fälschung signifikant. Im Gegensatz zu bisher bereits als Sicherheitselement eingesetzten Hologrammen ist die Information, die in dem holographisch erzeugten Muster gespeichert ist, jedoch erst durch das Verifikationselement sichtbar zu machen.The hidden information is thus not applied directly to the value document as in the case of known security features, but is only generated at a distance from the value document by holographic means. The hologram of the security element makes the counterfeiting significantly more difficult. In contrast to holograms already used as a security element, however, the information stored in the holographically generated pattern can only be made visible by the verification element.
Auf diese Weise wird ein sehr viel besserer Fälschungsschutz erreicht. Zudem ist die Information ohne Verifikationselement nicht erkennbar und somit nicht kopierbar.In this way a much better counterfeit protection is achieved. In addition, the information without verification element is not recognizable and thus not copied.
In dem Sicherheitssystem umfaßt das Sicherheitselement ein Hologramm, das bei Beleuchtung ein phasenmoduliertes Muster erzeugt. Die versteckte Information kann dabei derart gespeichert sein, daß die Phase des Lichts im Bereich der versteckten Information eine andere ist, als die Phase der umgebenden Bereiche des Musters. Das Verifikationselement ist dann derart ausgestaltet, daß es diese Phasenmodulation in eine sichtbare Amplitudenmodulation umwandelt. Dies ist z. B. in bekannter Weise durch das Phasenkontrastverfahren oder das Schlierenverfahren möglich.In the security system, the security element includes a hologram that generates a phase modulated pattern when illuminated. The hidden information can be stored in such a way that the phase of the light in the area of the hidden information is different from the phase of the surrounding areas of the pattern. The verification element is then configured to convert this phase modulation to visible amplitude modulation. This is z. B. in a known manner by the phase contrast method or the Schlieren method possible.
Dabei umfaßt auch das Verifikationselement ein Hologramm, das ein entsprechendes Muster unter Lichteinfall rekonstruiert, das die zur Umwandlung der Phasenmodulation in eine Amplitudenmodulation notwendigen optischen Lichtmuster erzeugt.In this case also the verification element comprises a hologram which reconstructs a corresponding pattern under incident light, which generates the necessary for the conversion of the phase modulation in an amplitude modulation optical light pattern.
Um eine noch größere Fälschungssicherheit zu erlangen, kann das Sicherheitselement derart ausgestaltet sein, daß es unter Lichteinfall ein holographisch erzeugtes Muster erzeugt, das jedoch keinen konstanten Abstand von der Trägerebene hat. Das Verifikationselement muß diesem Umstand durch entsprechend angepaßte Ortsfrequenzen Rechnung tragen. Bei einer solchen Ausgestaltung ist keine Information in der Ebene des Wertdokuments sichtbar. Erst durch die holographische Reproduktion wird überhaupt das Muster erzeugt, in dem die versteckte Information gespeichert ist. Dieses Muster stellt keine Ebene dar, sondern hat einen wechselnden Abstand von der Ebene des Sicherheitselements. Dieser wechselnde Abstand kann nur mit Hilfe des Verifikationselements ausgeglichen werden. Zudem ist die Information noch zusätzlich verborgen, in dem sie in dem holographisch erzeugten, nicht ebenen Muster z. B. nur als Phasenmodulation, Polarisationsmodulation oder Linienmuster zur Erzeugung eines Moiré-Musters gespeichert ist. In diesem Fall hat das Verifikationselement also verschiedene Aufgaben. Zum einen gleicht es den unterschiedlichen Abstand des holographisch erzeugten Musters von der Trägerebene aus. Zum anderen macht es die in dem holographisch erzeugten Muster versteckte Information sichtbar.In order to obtain an even greater security against counterfeiting, the security element can be designed such that it generates a holographically generated pattern when the light is incident, but does not have a constant distance from the carrier plane. The verification element must take into account this circumstance by appropriately adapted spatial frequencies. In such an embodiment, no information is visible in the level of the value document. Only the holographic reproduction produces the pattern in which the hidden information is stored. This pattern does not represent a plane but is at a varying distance from the plane of the security element. This changing distance can only be with help of the verification element are compensated. In addition, the information is additionally hidden, in which they in the holographically generated, non-planar pattern z. B. is stored only as a phase modulation, polarization modulation or line pattern for generating a moiré pattern. In this case, the verification element has different tasks. On the one hand, it compensates for the different distance of the holographically generated pattern from the carrier plane. On the other hand, it makes the information hidden in the holographically generated pattern visible.
Das holographisch erzeugte Muster, das durch Lichteinfall auf das Sicherheitselement entsteht, kann verschiedene Abstände von der Trägerebene haben. Besonders vorteilhaft ist jedoch die Größenordnung von einigen 100 µm, vorteilhafterweise 100 bis 300 µm. Auf diese Weise läßt sich ein 3D-Hologramm erzeugen. Trotz der Schwierigkeiten, die sich beim Aufbringen bzw. Einbringen eines Hologramms auf die rauhe Oberfläche z. B. eines Geldscheins ergeben, läßt sich bei einem 3D-Hologramm, das ein Muster in nur so geringem Abstand von der Trägerebene erzeugt, die Unschärfe in tolerierbaren Grenzen halten.The holographically generated pattern, which results from incident light on the security element, may have different distances from the carrier plane. However, the order of magnitude of a few 100 μm, advantageously 100 to 300 μm, is particularly advantageous. In this way, a 3D hologram can be generated. Despite the difficulties involved in applying or introducing a hologram on the rough surface z. B. a bill, can be in a 3D hologram, which generates a pattern in only a small distance from the carrier plane, keep the blur within tolerable limits.
Die Information, die in dem holographisch erzeugten Muster gespeichert ist, das durch Lichteinfall auf das Sicherheitselement entsteht, kann mit einem externen Verifikationselement ausgelesen werden. Besonders vorteilhaft ist es jedoch, wenn auf ein und demselben Wertdokument sowohl das Verifikationselement als auch das Sicherheitselement aufgebracht sind. Durch entsprechendes Falten des Wertdokuments können die Elemente dann zur Deckung gebracht werden, um die versteckte Information sichtbar zu machen. Auf diese Weise ist ein selbstverifizierendes System möglich. Bei entsprechender Anordnung der Elemente auf den Geldscheinen kann derselbe Effekt auch durch Aufeinanderliegen zweier Geldscheine in entsprechender Ausrichtung erreicht werden.The information stored in the holographically generated pattern resulting from incident light on the security element can be read out with an external verification element. However, it is particularly advantageous if both the verification element and the security element are applied to one and the same value document. By appropriate folding of the value document, the elements can then be brought to coincidence in order to make the hidden information visible. In this way, a self-verifying system is possible. With appropriate arrangement of the elements on the bills, the same effect can be achieved by juxtaposition of two bills in a corresponding orientation.
Das durch Lichteinfall auf das Sicherheitselement rekonstruierte Muster kann je nach Ausgestaltung virtuell oder auch reell, also auf einem Schirm abbildbar, sein.Depending on the embodiment, the pattern reconstructed by the incidence of light on the security element can be virtual or even real, ie can be imaged on a screen.
Ein Sicherheitselement zur Verwendung in einem erfindungsgemäßen Sicherheitssystem umfaßt eine Hologrammstruktur, die bei Lichteinfall auf holographischem Wege ein Muster mit einer versteckten Information außerhalb der Trägerebene rekonstruiert. Ein Verifikationselement zum Einsatz mit einem erfindungsgemäßen Sicherheitssystem dient der Sichtbarmachung der versteckten Information, die von einem Sicherheitselement außerhalb der Trägerebene des Sicherheitselements rekonstruiert wird, wenn Licht einfällt.A security element for use in a security system according to the invention comprises a hologram structure which reconstructs a pattern with hidden information outside the carrier plane when holographically incident. A verification element for use with a security system according to the invention serves to visualize the hidden information which is reconstructed by a security element outside the carrier plane of the security element when light is incident.
Das Verifikationselement ist zumindest teilweise transparent. Zusätzlich zu den Strukturen, die der Sichtbarmachung der versteckten Information dienen, kann das Verifikationselement ein weiteres Sicherheitsmerkmal tragen. Es kann z. B. eine weitere Hologrammstruktur aufgebracht sein, die ein anderes Bild erzeugt, das der versteckten Information wie ein Hintergrund überlagert ist.The verification element is at least partially transparent. In addition to the structures that serve to visualize the hidden information, the verification element may carry another security feature. It can, for. For example, another hologram structure may be applied which produces another image superimposed on the hidden information like a background.
Ein erfindungsgemäßes Wertdokument umfaßt ein Sicherheitselement und/oder ein Verifikationselement.A value document according to the invention comprises a security element and / or a verification element.
Das erfindungsgemäße Sicherheitssystem kann so ausgestaltet sein, daß es bei entsprechender Überdeckung des Verifikationselements und des Sicherheitselements die versteckte Information bei entsprechendem Lichteinfall für das bloße Auge sichtbar macht. Es kann jedoch auch eine Vorrichtung vorgesehen sein, die die Verifikation maschinell ermöglicht. Eine solche Vorrichtung umfaßt eine Einrichtung, die das Sicherheitselement mit einem Verifikationselement zur Deckung bringt. Dabei kann das Verifikationselement Teil der Vorrichtung sein oder auf dem zu verifizierenden Gegenstand selbst aufgebracht sein und durch maschinelle Faltung mit dem Sicherheitselement zur Deckung gebracht werden. Eine Beleuchtungseinrichtung ist vorgesehen, die die zur Deckung gebrachten Sicherheitselement und Verifikationselemente beleuchtet. So wird die versteckte Information sichtbar und mit Hilfe einer Ausleseeinrichtung auslesbar. Dies kann z. B. ein entsprechender Helligkeitsdetektor sein, der Helligkeitsunterschiede in der versteckten Information nachweisen kann. Schließlich kann die Ausleseeinrichtung eine Kamera umfassen, die eine Bildverarbeitung und Auswertung des Bildes der versteckten Information ermöglicht.The security system according to the invention can be designed so that it makes the hidden information with appropriate coverage of the verification element and the security element with appropriate incidence visible to the naked eye. However, it can also be provided a device that allows the verification machine. Such a device comprises a device which brings the security element with a verification element to cover. In this case, the verification element may be part of the device or be applied to the object to be verified itself and be brought by machine folding with the security element to coincide. A lighting device is provided which illuminates the security element and verification elements brought to cover. Thus, the hidden information is visible and readable by means of a read-out device. This can be z. B. be a corresponding brightness detector that can detect differences in brightness in the hidden information. Finally, the read-out device may comprise a camera which allows image processing and evaluation of the image of the hidden information.
Verschiedene Ausführungsformen werden anhand beiliegender Figuren zum besseren Verständnis der Erfindung erläutert. Dabei zeigt
-
Fig. 1 schematisch ein erfindungsgemäßes Wertdokument mit einem erfindungsgemäßen Sicherheitssystem, -
Fig. 2 schematisch den Auslesevorgang, -
Fig. 3 schematisch einen maschinellen Auslesevorgang, -
Fig. 4 schematisch eine seitliche Schnittansicht einer Ausführungsform eines Wertdokuments während des Auslesevorgangs, -
Fig.5 schematisch eine andere Ausführungsform des Wertdokuments während
des Auslesevorgangs im seitlichen Schnitt, -
Fig.6 schematisch eine weitere Ausführungsform eines Wertdokuments während des Auslesevorgangs im seitlichen Schnitt, -
Fig. 7 schematisch eine weitere Ausführungsform eines Wertdokuments während des Auslesevorgangs im seitlichen Schnitt, und -
Fig.8 schematisch eine weitere Ausführungsform eines erfindungsgemäßen Wertdokuments während des Auslesevorgangs im seitlichen Schnitt.
-
Fig. 1 1 schematically a value document according to the invention with a security system according to the invention, -
Fig. 2 schematically the read-out process, -
Fig. 3 schematically a machine readout process, -
Fig. 4 1 is a schematic sectional side view of an embodiment of a value document during the read-out process; -
Figure 5 schematically another embodiment of the value document during
the reading process in the lateral section, -
Figure 6 schematically another embodiment of a value document during the read-out process in the lateral section, -
Fig. 7 schematically another embodiment of a value document during the read-out in the lateral section, and -
Figure 8 schematically a further embodiment of a value document according to the invention during the read-out in the lateral section.
In
Bei einer Ausführungsform, bei der das Verifikationselement 3 ein Linienraster trägt, erzeugt das Sicherheitselement 5 bei Lichteinfall ein holographisches Muster, das ebenfalls streifenförmig moduliert ist. Bringt man ein Verifikationselement 3 mit dem Sicherheitselement 5 zur Deckung, so hat das Linienraster des Verifikationselements einen Abstand von dem holographisch erzeugten Muster. Auf diese Weise kann durch Kippung z. B. der Bereich unterhalb des Linienrasters sichtbar gemacht werden oder durch senkrechte Blickrichtung der Bereich zwischen dem Linienraster des Verifikationselements 3. Auf diese Weise können Kippeffekte erzeugt werden, die sonst nur bei Vorliegen eines tatsächlichen Abstands zwischen dem Rastermuster und der Bildebene sichtbar sind.In an embodiment in which the
In
Wie auch in den
Das Sicherheitselement 5, das in
Bei einer anderen Ausführungsform, die in Seitenansicht in
Schließlich kann das Sicherheitselement 5,105 auch ein Muster 100 außerhalb der Ebene des Geldscheins 1 erzeugen, das mit Hilfe einer Linsenstruktur 102 in dem Verifikationselement 3, 103 sichtbar gemacht wird, z. B. durch Vergrößerung, siehe
Eine einfache andere Ausgestaltung umfaßt ein Sicherheitselement 5, das außerhalb der Ebene des Geldscheins 1 ein holographisch erzeugtes Muster bei Lichteinfall rekonstruiert, das nur einen Teil einer Information trägt, der für sich alleine nicht aussagekräftig ist. Das Verifikationselement 3 umfaßt eine vergleichbare holographische Struktur, die in derselben Ebene außerhalb des Geldscheins 1 ein holographisch erzeugtes Muster rekonstruiert, das den restlichen Teil der Information darstellt. Wird nun das Verifikationselement zusammen mit dem Sicherheitselement in Überdeckung gebracht und mit Licht beaufschlagt, so werden beide Teile der versteckten Information sichtbar und können zusammen ausgelesen werden.A simple other embodiment comprises a
Zum Beispiel kann die Teilinformation, die auf holographischem Wege durch Beleuchtung des Sicherheitselements 5 erzeugt wird, Teile der Buchstaben O und K umfassen, die für sich alleine nicht als solche erkennbar sind. Die verbleibenden restlichen Teile der Buchstaben O und K werden durch Beleuchtung des Verifikationselements holographisch an derselben Stelle erzeugt, wenn die beiden Elemente aufeinander zu liegen kommen. Auf diese Weise wird das gesamte Bild OK erkennbar.For example, the partial information generated holographically by illuminating the
Bei einer anderen Ausgestaltung der Seitenansicht der
Der holographisch erzeugte Abstand 7 zwischen dem rekonstruierten Muster des Sicherheitselements erschwert die Fälschung. Eine gewöhnliche direkte Speicherung der Information auf dem Geldschein ist leichter nachzuahmen als ein Hologramm, das in einer versetzten Ebene entsprechende Information aufweist. Zudem ist die Information derart, daß sie nur mit Hilfe des Verifikationselements ausgelesen werden kann. Ohne ein solches Verifikationselement ist auch die holographisch gespeicherte Information nicht erkennbar. Eine noch höhere Fälschungssicherheit kann erreicht werden, wenn das holographisch erzeugte Muster 505 keinen konstanten Abstand 7 von dem Geldschein l hat, sondern z. B. in einer welligen Fläche oder in einer stufigen Fläche rekonstruiert, siehe
Die notwendigen Hologrammstrukturen für obige Ausführungen können z. B. auf herkömmlichen Wege optisch hergestellt oder computergeneriert werden. Sie können selbstverständlich an verschiedenen Stellen oder sogar mehrfach auf dem Geldschein vorgesehen sein. Ebenso ist z. B. eine Anordnung in zwei gegenüberliegenden Ecken des Geldscheins denkbar. Das Sicherheitselement kann sowohl ein virtuelles als auch ein reelles Bild erzeugen, das auf einem Schirm aufgefangen werden kann.The necessary hologram structures for the above embodiments may, for. B. optically produced or computer generated in conventional ways. They can of course be provided in different places or even several times on the bill. Likewise, z. B. an arrangement in two opposite corners of the bill conceivable. The security element can produce both a virtual and a real image that can be captured on a screen.
Das Verifikationselement 3 ist zumindest teilweise transparent. So kann durch das Verifikationselement hindurch Licht auf das Sicherheitselement treffen und das darin gespeicherte holographische Muster hinter dem Geldschein 1 sichtbar machen. Betrachtung dieses Musters durch das Verifikationselement macht die versteckte Information erkennbar.The
Zusätzlich kann auf dem Verifikationselement selbst noch ein Sicherheitsmerkmal vorgesehen sein, z. B. eine weitere Hologrammstruktur, die einen anderen optischen Effekt hervorruft, um die Fälschungssicherheit weiter zu erhöhen. Selbstverständlich muß die Transparenz des Verifikationselements dabei ausreichend bleiben, daß die versteckte Information noch ausgelesen werden kann.In addition, a security feature can still be provided on the verification element itself, for. B. another hologram structure that causes a different optical effect to further increase the security against counterfeiting. Of course, the transparency of the verification element must remain sufficient that the hidden information can still be read.
In
Bei entsprechender Ausgestaltung des Sicherheitselements 5 kann die Lichtquelle 10 auch hinter dem gefalteten Geldschein 1 angeordnet sein.With a corresponding embodiment of the
Bei einer anderen nicht gezeigten Ausführungsform einer Vorrichtung zum Auslesen ist das Verifikationselement nicht auf dem Geldschein, sondern in der Maschine selbst fixiert und der Geldschein 1 wird mit dem Sicherheitselement 5 daran vorbei bewegt.In another not shown embodiment of a device for reading the verification element is not fixed on the bill, but in the machine itself and the
Das erfindungsgemäße Sicherheitssystem bietet also den Vorteil, daß die versteckte Information in einem Muster gespeichert ist, das nicht in der Ebene des Geldscheins bzw. des Wertdokuments 1 liegt. Statt dessen wird das Muster außerhalb des Wertdokuments 1 holographisch erzeugt. Dies erschwert die Fälschung signifikant. Zusätzlich ermöglicht eine solche holographische Verlagerung des Musters mit der versteckten Information die Verifikation mit Hilfe von Elementen, die normalerweise einen gewissen Abstand von dem Muster mit der versteckten Information haben müssen, z. B. Lentikularlinsenstrukturen oder Linienraster mit einem Kippeffekt. Bei der Erfindung ist dazu keine erhöhte Dicke notwendig, da der Abstand holographisch erzeugt wird.The security system according to the invention thus offers the advantage that the hidden information is stored in a pattern which is not in the plane of the bill or the
Claims (10)
- A security system, in particular for a value document, having a flat security element (5, 105, 205, 305, 405, 505) in a carrier plane (9) which reconstructs under light incidence by holographic means outside the carrier plane (9) a pattern (100, 200, 300, 400, 500) having concealed information stored therein, and a flat, at least partly transparent verification element (3, 103, 203, 303, 403, 503) which, upon flat contact with the security element (5, 105, 205, 305, 405, 505), makes the information stored therein readable, characterized in that the security element comprises a first hologram carrier which reconstructs under light incidence outside the carrier plane (9) a first pattern having the concealed information stored therein as phase modulation, the verification element (3) comprising a second hologram carrier which reconstructs under light incidence a second pattern which interacts with the phase modulation induced by the security element (5) under light incidence, such that the phase modulation of the security element (5) is converted to a visible amplitude modulation.
- The security system according to claim 1, wherein the security element (505) is constructed such that the holographically reconstructed pattern (500) with the concealed information is not reconstructed in one plane.
- The security system according to either of claims 1 and 2, wherein the distance (7) of the pattern reconstructed by light incidence on the security element (5, 105, 205, 305, 405, 505) from the carrier plane (9) is in the range of a few 100 µm, preferably 100 to 300 µm.
- The security system according to any of claims 1 to 3, wherein the verification element (3, 103, 203, 303, 403, 503) and the security element (5, 105, 205, 305, 405, 505) are applied to, or incorporated in, an object (1), in particular a value document, such that they can be brought into flat contact by folding the object (1).
- The security system according to any of claims 1 to 4, wherein the security element (5, 105, 205, 305, 405, 505) is designed such that the pattern reconstructed by light incidence is virtual.
- The security system according to any of claims 1 to 4, wherein the security element (5, 105, 205, 305, 405, 505) is designed such that the pattern reconstructed by light incidence is real.
- Use of a verification element according to any of claims 1 to 6 in a security system according to any of claims 1 to 6, for making the concealed information visible that is reconstructed by a security element (5, 105, 205, 305, 405, 505) according to any of claims 1 to 6 under light incidence in a plane outside the carrier plane (9) of the security element, characterized in that the verification element is designed so as to convert the phase modulation to a visible amplitude modulation.
- The use according to claim 7, wherein the verification element (3, 103, 203, 403, 503) is equipped with an additional security feature.
- A value document having a security system according to any of claims 1 to 6, wherein the security element (5, 105, 205, 305, 405, 505) and the verification element (3, 103, 203, 403, 503) can be brought into flat contact by folding the value document.
- The value document according to claim 9, wherein the verification element (3, 103, 203, 403, 503) carries additional information.
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
DE10040785A DE10040785A1 (en) | 2000-08-21 | 2000-08-21 | Security system, in particular for documents of value |
DE10040785 | 2000-08-21 | ||
PCT/EP2001/009511 WO2002017242A1 (en) | 2000-08-21 | 2001-08-17 | Security system, particularly for valuable documents |
Publications (3)
Publication Number | Publication Date |
---|---|
EP1319220A1 EP1319220A1 (en) | 2003-06-18 |
EP1319220B1 EP1319220B1 (en) | 2007-07-18 |
EP1319220B2 true EP1319220B2 (en) | 2016-11-02 |
Family
ID=7653123
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
EP01960674.8A Expired - Lifetime EP1319220B2 (en) | 2000-08-21 | 2001-08-17 | Security system, particularly for valuable documents |
Country Status (8)
Country | Link |
---|---|
US (3) | US7315407B2 (en) |
EP (1) | EP1319220B2 (en) |
AT (1) | ATE367627T1 (en) |
AU (1) | AU2001282102A1 (en) |
CZ (1) | CZ2003558A3 (en) |
DE (2) | DE10040785A1 (en) |
RU (1) | RU2282244C2 (en) |
WO (1) | WO2002017242A1 (en) |
Families Citing this family (36)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7114750B1 (en) * | 1995-11-29 | 2006-10-03 | Graphic Security Systems Corporation | Self-authenticating documents |
US7654580B2 (en) * | 1995-11-29 | 2010-02-02 | Graphic Security Systems Corporation | Self-authenticating documents with printed or embossed hidden images |
DE10040785A1 (en) * | 2000-08-21 | 2002-03-21 | Hsm Gmbh | Security system, in particular for documents of value |
US20040121241A1 (en) * | 2002-07-09 | 2004-06-24 | Dai Nippon Printing Co., Ltd. | Volume hologram medium |
US7429062B2 (en) * | 2002-10-30 | 2008-09-30 | Xerox Corporation | Anti-counterfeiting see-through moire security feature using frequency-varying patterns |
US6995913B2 (en) * | 2004-01-09 | 2006-02-07 | National Graphics, Inc. | Digitally imaged lenticular products incorporating customized elements |
US7083340B2 (en) * | 2004-01-09 | 2006-08-01 | National Graphics, Inc. | Systematic lenticular lens selection in a digital printing environment |
US20050152040A1 (en) * | 2004-01-09 | 2005-07-14 | Goggins Timothy P. | Digitally imaged lenticular products incorporating a special effect feature |
DE102004044458B4 (en) | 2004-09-15 | 2010-01-07 | Ovd Kinegram Ag | The security document |
DE102004044459B4 (en) * | 2004-09-15 | 2009-07-09 | Ovd Kinegram Ag | Security document with transparent windows |
DE102004056553B4 (en) * | 2004-11-23 | 2013-03-14 | Giesecke & Devrient Gmbh | Security arrangement for security documents and method for producing the security documents |
DE102005027380B4 (en) | 2005-06-14 | 2009-04-30 | Ovd Kinegram Ag | The security document |
EP1767381B1 (en) * | 2005-09-20 | 2008-11-05 | Alcan Technology & Management Ltd. | Article with optical effect |
AU2007304879B2 (en) * | 2006-10-04 | 2013-03-21 | Reserve Bank Of Australia | Security document containing an authentication device |
DE102006055480A1 (en) * | 2006-11-24 | 2008-05-29 | Bayer Innovation Gmbh | Coding method, decoding method, codec and data carrier for holographic storage |
CA2627004A1 (en) * | 2007-03-22 | 2008-09-22 | Photogram Technologies Inc. | Hand-held decoder card having a parallax barrier portion and a light filtering portion and method of making same |
DE102007048366A1 (en) * | 2007-10-09 | 2009-04-16 | Interprint Gmbh & Co Kg | Hidden marking insertion method for printed product, involves applying information on carrier before, during or after printing carrier, and forming structure information such that information is selected with selection unit by moire effect |
DE102007052326A1 (en) | 2007-10-31 | 2009-05-07 | Bundesdruckerei Gmbh | Method for producing a security feature for a document |
DE102007000886B4 (en) | 2007-11-12 | 2018-04-05 | Bundesdruckerei Gmbh | Document with an integrated display device, and reader for such a document |
FR2940179B1 (en) | 2008-12-23 | 2017-06-02 | Arjowiggins | SECURITY DOCUMENT COMPRISING AT LEAST ONE COMBINED IMAGE AND A REVELATION MEANS, AND ASSOCIATED METHOD. |
FR2948217B1 (en) | 2009-07-17 | 2011-11-11 | Arjowiggins Security | SECURITY ELEMENT WITH PARALLAX EFFECT |
FR2948216B1 (en) | 2009-07-17 | 2011-11-25 | Arjowiggins Security | SECURITY ELEMENT WITH PARALLAX EFFECT |
RU2461882C2 (en) * | 2009-08-26 | 2012-09-20 | Аркадий Николаевич Адамчук | Method of protecting documents |
AT11874U1 (en) | 2009-12-03 | 2011-06-15 | Securikett Ulrich & Horn Gmbh | LABEL FOR AUTHENTICATING THE AUTHENTICITY OF A PRODUCT |
IT1396839B1 (en) * | 2009-12-04 | 2012-12-14 | Cartiere Fedrigoni & C Spa | ANTI-COUNTERFEITING DOCUMENT, PARTICULARLY FOR VALUE AND SIMILAR |
FR2961621B1 (en) | 2010-06-22 | 2014-09-05 | Arjowiggins Security | METHOD OF AUTHENTICATING AND / OR IDENTIFYING A SECURITY ARTICLE |
FR2961622B1 (en) * | 2010-06-22 | 2013-02-08 | Arjowiggins Security | METHOD FOR AUTHENTICATION AND / OR IDENTIFICATION OF A SECURITY ARTICLE |
JP5776697B2 (en) * | 2010-09-28 | 2015-09-09 | 凸版印刷株式会社 | Booklet with anti-counterfeit function and method for manufacturing the same |
KR20140030099A (en) | 2010-10-11 | 2014-03-11 | 그래픽 시큐리티 시스템즈 코포레이션 | Method for constructing a composite image incorporating a hidden authentication image |
RU2467879C1 (en) * | 2011-06-30 | 2012-11-27 | Федеральное Государственное Унитарное Предприятие "Гознак" (Фгуп "Гознак") | Valuable document with optically variable structure (versions) |
FR2993204B1 (en) * | 2012-07-16 | 2018-02-02 | Oberthur Fiduciaire Sas | SAFETY STRUCTURE. |
DE102012108200B4 (en) | 2012-09-04 | 2019-03-07 | Hologram Industries Research Gmbh | Method for producing a multi-leaf document with hologram and multi-leaf document with hologram, such as passport |
US20160052326A1 (en) * | 2013-03-27 | 2016-02-25 | Innovia Security Pty Ltd | Lens-Foil Based Security Device |
FR3025742B1 (en) * | 2014-09-17 | 2016-10-21 | Arjowiggins Security | SECURITY ELEMENT |
CN104309312B (en) * | 2014-10-11 | 2017-06-16 | 北京志恒达科技有限公司 | Automatic laser stamp device and automatic laser code printing method |
CN114901485A (en) * | 2019-12-26 | 2022-08-12 | 凸版印刷株式会社 | Display body and display method |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
GB2196443A (en) † | 1986-10-17 | 1988-04-27 | Gen Electric Plc | Secure holographic data storage using an optical phase encryption device |
US5396559A (en) † | 1990-08-24 | 1995-03-07 | Mcgrew; Stephen P. | Anticounterfeiting method and device utilizing holograms and pseudorandom dot patterns |
CA2294755A1 (en) † | 1997-07-04 | 1999-01-14 | Bundesdruckerei Gmbh | Security document and/or value document |
WO1999037488A1 (en) † | 1998-01-21 | 1999-07-29 | Securency Pty. Ltd. | Method of verifying the authenticity of a security document and document for use in such a method |
US5999280A (en) † | 1998-01-16 | 1999-12-07 | Industrial Technology Research Institute | Holographic anti-imitation method and device for preventing unauthorized reproduction |
Family Cites Families (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
GB9211123D0 (en) * | 1992-05-26 | 1992-07-08 | Amblehurst Ltd | Holographic device |
GB9309673D0 (en) | 1993-05-11 | 1993-06-23 | De La Rue Holographics Ltd | Security device |
RU2103741C1 (en) * | 1996-04-08 | 1998-01-27 | Акционерное общество закрытого типа Научно-производственное объединение "Криптон" | Device for checking validity of holograms |
AUPO289296A0 (en) | 1996-10-10 | 1996-10-31 | Securency Pty Ltd | Self-verifying security documents |
EP0911758B1 (en) * | 1997-07-29 | 2005-11-30 | Nhk Spring Co.Ltd. | Optical identification system using cholesteric liquid crystals |
DE10040785A1 (en) * | 2000-08-21 | 2002-03-21 | Hsm Gmbh | Security system, in particular for documents of value |
-
2000
- 2000-08-21 DE DE10040785A patent/DE10040785A1/en not_active Withdrawn
-
2001
- 2001-08-17 WO PCT/EP2001/009511 patent/WO2002017242A1/en active IP Right Grant
- 2001-08-17 EP EP01960674.8A patent/EP1319220B2/en not_active Expired - Lifetime
- 2001-08-17 AT AT01960674T patent/ATE367627T1/en active
- 2001-08-17 DE DE50112744T patent/DE50112744D1/en not_active Expired - Lifetime
- 2001-08-17 US US10/362,254 patent/US7315407B2/en not_active Expired - Fee Related
- 2001-08-17 AU AU2001282102A patent/AU2001282102A1/en not_active Abandoned
- 2001-08-17 RU RU2003107678/09A patent/RU2282244C2/en not_active IP Right Cessation
- 2001-08-17 CZ CZ2003558A patent/CZ2003558A3/en unknown
-
2007
- 2007-11-09 US US11/983,540 patent/US7724408B2/en not_active Expired - Fee Related
-
2010
- 2010-04-07 US US12/755,485 patent/US8077364B2/en not_active Expired - Fee Related
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
GB2196443A (en) † | 1986-10-17 | 1988-04-27 | Gen Electric Plc | Secure holographic data storage using an optical phase encryption device |
US5396559A (en) † | 1990-08-24 | 1995-03-07 | Mcgrew; Stephen P. | Anticounterfeiting method and device utilizing holograms and pseudorandom dot patterns |
CA2294755A1 (en) † | 1997-07-04 | 1999-01-14 | Bundesdruckerei Gmbh | Security document and/or value document |
US5999280A (en) † | 1998-01-16 | 1999-12-07 | Industrial Technology Research Institute | Holographic anti-imitation method and device for preventing unauthorized reproduction |
WO1999037488A1 (en) † | 1998-01-21 | 1999-07-29 | Securency Pty. Ltd. | Method of verifying the authenticity of a security document and document for use in such a method |
Also Published As
Publication number | Publication date |
---|---|
US7724408B2 (en) | 2010-05-25 |
EP1319220A1 (en) | 2003-06-18 |
AU2001282102A1 (en) | 2002-03-04 |
EP1319220B1 (en) | 2007-07-18 |
RU2282244C2 (en) | 2006-08-20 |
US8077364B2 (en) | 2011-12-13 |
CZ2003558A3 (en) | 2003-11-12 |
US20030169468A1 (en) | 2003-09-11 |
ATE367627T1 (en) | 2007-08-15 |
WO2002017242A1 (en) | 2002-02-28 |
DE50112744D1 (en) | 2007-08-30 |
US20080062485A1 (en) | 2008-03-13 |
US20100195176A1 (en) | 2010-08-05 |
US7315407B2 (en) | 2008-01-01 |
DE10040785A1 (en) | 2002-03-21 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP1319220B2 (en) | Security system, particularly for valuable documents | |
DE19729918B4 (en) | Security and / or value document | |
DE69738115T2 (en) | Security documents with built-in authentication means | |
EP1819527B1 (en) | Security arrangement for security documents | |
EP2208118B1 (en) | Method and device for producing holograms having regions of different scattering characteristics and corresponding hologram | |
EP0219012A2 (en) | Data carrier with an optical authenticity feature, and method of making and checking the data carrier | |
EP1718475B2 (en) | Security element comprising a lens grid and method for the production thereof | |
CH707981B1 (en) | Diffractive device, and method and apparatus for viewing the same. | |
DE102014217099B4 (en) | Process for the production of a security hologram with a transmission volume hologram in contact copy | |
DE4443029A1 (en) | Master hologram for the production of copy-proof holograms | |
DE69837275T2 (en) | MICROGRAPHIC DEVICE | |
EP3648983B1 (en) | Optically variable security arrangement | |
EP2215529B1 (en) | Method and device for producing holograms having an individually exposed watermark-type structure | |
EP3406458B1 (en) | Security element with reflective surface area | |
DE60124283T2 (en) | Optical data carrier with an optical diffraction-based code, and associated reader | |
EP2126638B1 (en) | Method for writing holographic pixels | |
DE10100836A1 (en) | Reading of holographic markings formed as security markings on such as a banknotes using a laser | |
WO2009056358A1 (en) | Method and device for producing holograms having an individually exposed watermark-type structure | |
DE19926733A1 (en) | Holographic strip e.g. for banknote etc., has sequence of adjacent individual holograms which can be read by relative movement of laser | |
DE3843076A1 (en) | SECURITY ELEMENT TO PROTECT DOCUMENTS AGAINST UNAUTHORIZED REPRODUCTION | |
EP1060908A2 (en) | Optical authenticity feature | |
DE10129938B4 (en) | As an authenticity feature on a document arranged optically variable surface pattern | |
DE19926698A1 (en) | Computer generated security feature for application to document or banknote, uses computer-generated hologram algorithm to calculate interference pattern applied to carrier | |
DE102004063376A1 (en) | Method and device for generating a multi-channel diffraction image |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PUAI | Public reference made under article 153(3) epc to a published international application that has entered the european phase |
Free format text: ORIGINAL CODE: 0009012 |
|
17P | Request for examination filed |
Effective date: 20030319 |
|
AK | Designated contracting states |
Designated state(s): AT BE CH CY DE DK ES FI FR GB GR IE IT LI LU MC NL PT SE TR |
|
AX | Request for extension of the european patent |
Extension state: AL LT LV MK RO SI |
|
17Q | First examination report despatched |
Effective date: 20060728 |
|
GRAP | Despatch of communication of intention to grant a patent |
Free format text: ORIGINAL CODE: EPIDOSNIGR1 |
|
GRAS | Grant fee paid |
Free format text: ORIGINAL CODE: EPIDOSNIGR3 |
|
GRAA | (expected) grant |
Free format text: ORIGINAL CODE: 0009210 |
|
AK | Designated contracting states |
Kind code of ref document: B1 Designated state(s): AT BE CH CY DE DK ES FI FR GB GR IE IT LI LU MC NL PT SE TR |
|
AX | Request for extension of the european patent |
Extension state: AL LT LV MK RO SI |
|
REG | Reference to a national code |
Ref country code: GB Ref legal event code: FG4D Free format text: NOT ENGLISH |
|
GBT | Gb: translation of ep patent filed (gb section 77(6)(a)/1977) |
Effective date: 20070718 |
|
REG | Reference to a national code |
Ref country code: CH Ref legal event code: EP Ref country code: CH Ref legal event code: NV Representative=s name: PATENTANWAELTE SCHAAD, BALASS, MENZL & PARTNER AG |
|
REF | Corresponds to: |
Ref document number: 50112744 Country of ref document: DE Date of ref document: 20070830 Kind code of ref document: P |
|
REG | Reference to a national code |
Ref country code: IE Ref legal event code: FG4D Free format text: LANGUAGE OF EP DOCUMENT: GERMAN |
|
ET | Fr: translation filed | ||
LTIE | Lt: invalidation of european patent or patent extension |
Effective date: 20070718 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: ES Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20071029 Ref country code: NL Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20070718 Ref country code: FI Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20070718 Ref country code: PT Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20071218 |
|
NLV1 | Nl: lapsed or annulled due to failure to fulfill the requirements of art. 29p and 29m of the patents act | ||
BERE | Be: lapsed |
Owner name: GIESECKE & DEVRIENT G.M.B.H. Effective date: 20070831 |
|
REG | Reference to a national code |
Ref country code: IE Ref legal event code: FD4D |
|
PLBI | Opposition filed |
Free format text: ORIGINAL CODE: 0009260 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: MC Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20070831 Ref country code: GR Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20071019 Ref country code: DK Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20070718 |
|
26 | Opposition filed |
Opponent name: SECURENCY INTERNATIONAL PTY LTD Effective date: 20080415 |
|
PLAX | Notice of opposition and request to file observation + time limit sent |
Free format text: ORIGINAL CODE: EPIDOSNOBS2 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: IE Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20070718 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: SE Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20071018 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: BE Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20070831 |
|
PLBB | Reply of patent proprietor to notice(s) of opposition received |
Free format text: ORIGINAL CODE: EPIDOSNOBS3 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: CY Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20070718 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: LU Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20070817 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: TR Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20070718 Ref country code: IT Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20070817 |
|
RDAF | Communication despatched that patent is revoked |
Free format text: ORIGINAL CODE: EPIDOSNREV1 |
|
APBM | Appeal reference recorded |
Free format text: ORIGINAL CODE: EPIDOSNREFNO |
|
APBP | Date of receipt of notice of appeal recorded |
Free format text: ORIGINAL CODE: EPIDOSNNOA2O |
|
APAH | Appeal reference modified |
Free format text: ORIGINAL CODE: EPIDOSCREFNO |
|
APBQ | Date of receipt of statement of grounds of appeal recorded |
Free format text: ORIGINAL CODE: EPIDOSNNOA3O |
|
PGRI | Patent reinstated in contracting state [announced from national office to epo] |
Ref country code: IT Effective date: 20110616 |
|
APBU | Appeal procedure closed |
Free format text: ORIGINAL CODE: EPIDOSNNOA9O |
|
REG | Reference to a national code |
Ref country code: DE Ref legal event code: R082 Ref document number: 50112744 Country of ref document: DE |
|
PLAY | Examination report in opposition despatched + time limit |
Free format text: ORIGINAL CODE: EPIDOSNORE2 |
|
PLBC | Reply to examination report in opposition received |
Free format text: ORIGINAL CODE: EPIDOSNORE3 |
|
PLAY | Examination report in opposition despatched + time limit |
Free format text: ORIGINAL CODE: EPIDOSNORE2 |
|
APAH | Appeal reference modified |
Free format text: ORIGINAL CODE: EPIDOSCREFNO |
|
APBM | Appeal reference recorded |
Free format text: ORIGINAL CODE: EPIDOSNREFNO |
|
APBP | Date of receipt of notice of appeal recorded |
Free format text: ORIGINAL CODE: EPIDOSNNOA2O |
|
APBU | Appeal procedure closed |
Free format text: ORIGINAL CODE: EPIDOSNNOA9O |
|
REG | Reference to a national code |
Ref country code: FR Ref legal event code: PLFP Year of fee payment: 16 |
|
PLAB | Opposition data, opponent's data or that of the opponent's representative modified |
Free format text: ORIGINAL CODE: 0009299OPPO |
|
PUAH | Patent maintained in amended form |
Free format text: ORIGINAL CODE: 0009272 |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: PATENT MAINTAINED AS AMENDED |
|
R26 | Opposition filed (corrected) |
Opponent name: SECURENCY INTERNATIONAL PTY LTD Effective date: 20080415 |
|
PGFP | Annual fee paid to national office [announced via postgrant information from national office to epo] |
Ref country code: IT Payment date: 20160823 Year of fee payment: 16 |
|
27A | Patent maintained in amended form |
Effective date: 20161102 |
|
AK | Designated contracting states |
Kind code of ref document: B2 Designated state(s): AT BE CH CY DE DK ES FI FR GB GR IE IT LI LU MC NL PT SE TR |
|
AX | Request for extension of the european patent |
Extension state: AL LT LV MK RO SI |
|
REG | Reference to a national code |
Ref country code: DE Ref legal event code: R102 Ref document number: 50112744 Country of ref document: DE |
|
REG | Reference to a national code |
Ref country code: CH Ref legal event code: AELC |
|
PGFP | Annual fee paid to national office [announced via postgrant information from national office to epo] |
Ref country code: AT Payment date: 20160822 Year of fee payment: 16 |
|
REG | Reference to a national code |
Ref country code: FR Ref legal event code: PLFP Year of fee payment: 17 |
|
REG | Reference to a national code |
Ref country code: DE Ref legal event code: R081 Ref document number: 50112744 Country of ref document: DE Owner name: GIESECKE+DEVRIENT CURRENCY TECHNOLOGY GMBH, DE Free format text: FORMER OWNER: GIESECKE & DEVRIENT GMBH, 81677 MUENCHEN, DE |
|
PGFP | Annual fee paid to national office [announced via postgrant information from national office to epo] |
Ref country code: GB Payment date: 20170824 Year of fee payment: 17 Ref country code: DE Payment date: 20170831 Year of fee payment: 17 |
|
REG | Reference to a national code |
Ref country code: CH Ref legal event code: PUE Owner name: GIESECKE+DEVRIENT CURRENCY TECHNOLOGY GMBH, DE Free format text: FORMER OWNER: GIESECKE AND DEVRIENT GMBH, DE |
|
REG | Reference to a national code |
Ref country code: GB Ref legal event code: 732E Free format text: REGISTERED BETWEEN 20180118 AND 20180124 |
|
REG | Reference to a national code |
Ref country code: AT Ref legal event code: MM01 Ref document number: 367627 Country of ref document: AT Kind code of ref document: T Effective date: 20170817 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: AT Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20170817 |
|
REG | Reference to a national code |
Ref country code: FR Ref legal event code: TP Owner name: GIESECKE+DEVRIENT CURRENCY TECHNOLOGY GMBH, DE Effective date: 20180530 |
|
REG | Reference to a national code |
Ref country code: FR Ref legal event code: PLFP Year of fee payment: 18 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: IT Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20170817 |
|
PGFP | Annual fee paid to national office [announced via postgrant information from national office to epo] |
Ref country code: FR Payment date: 20180824 Year of fee payment: 18 |
|
PGFP | Annual fee paid to national office [announced via postgrant information from national office to epo] |
Ref country code: CH Payment date: 20180827 Year of fee payment: 18 |
|
REG | Reference to a national code |
Ref country code: DE Ref legal event code: R119 Ref document number: 50112744 Country of ref document: DE |
|
GBPC | Gb: european patent ceased through non-payment of renewal fee |
Effective date: 20180817 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: DE Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20190301 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: GB Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20180817 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: LI Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20190831 Ref country code: CH Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20190831 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: FR Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20190831 |