WO2008074106A2 - Monitoring ruler - Google Patents

Monitoring ruler Download PDF

Info

Publication number
WO2008074106A2
WO2008074106A2 PCT/BR2007/000055 BR2007000055W WO2008074106A2 WO 2008074106 A2 WO2008074106 A2 WO 2008074106A2 BR 2007000055 W BR2007000055 W BR 2007000055W WO 2008074106 A2 WO2008074106 A2 WO 2008074106A2
Authority
WO
WIPO (PCT)
Prior art keywords
monitoring
security
ruler
document
security document
Prior art date
Application number
PCT/BR2007/000055
Other languages
French (fr)
Other versions
WO2008074106A3 (en
Inventor
Carlos André Xavier VILLELA
Original Assignee
Villela Carlos Andre Xavier
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Villela Carlos Andre Xavier filed Critical Villela Carlos Andre Xavier
Publication of WO2008074106A2 publication Critical patent/WO2008074106A2/en
Publication of WO2008074106A3 publication Critical patent/WO2008074106A3/en

Links

Classifications

    • BPERFORMING OPERATIONS; TRANSPORTING
    • B42BOOKBINDING; ALBUMS; FILES; SPECIAL PRINTED MATTER
    • B42DBOOKS; BOOK COVERS; LOOSE LEAVES; PRINTED MATTER CHARACTERISED BY IDENTIFICATION OR SECURITY FEATURES; PRINTED MATTER OF SPECIAL FORMAT OR STYLE NOT OTHERWISE PROVIDED FOR; DEVICES FOR USE THEREWITH AND NOT OTHERWISE PROVIDED FOR; MOVABLE-STRIP WRITING OR READING APPARATUS
    • B42D25/00Information-bearing cards or sheet-like structures characterised by identification or security features; Manufacture thereof
    • B42D25/30Identification or security features, e.g. for preventing forgery
    • B42D25/355Security threads

Definitions

  • the present patent of utility model aims at a security feature, for use in security documents or fiduciary printing, with a view to provide better use and efficiency than similar existing models.
  • variable position elements such as: Security threads or strips, holografic ribbons, stripes or patches, security fibers or confetti, iridescent stripes, intaglio printing, letterpress printing, screen printing, or any other element that can come to present any kind of position variation, as small it may be, even if unintentional, when added to document support.
  • the present patent of utility model suggests the inclusion among the graphic ensemble of the authentic documents of one or more graduated rulers.
  • security thread As an example, one can cite a widely used variable position element known as "security thread". It consists of a thread that crosses the security document, from top to bottom, or from one side to the other. In the transversal direction of the thread, one observes a constant variation of its position (one degree of freedom).
  • the position of the security thread is captured, which repeats itself in all reproduced documents. That is because, in these cases, the image of the security thread and the image of the rest of the document are saved together in the same data file. Thus, all the counterfeits produced from that same data file will have a security thread image appearing, invariably, in the same position.
  • the present patent of utility model consists, in this case, in a ruler-shape device, to be inserted among the graphic elements of the authentic document, disposed in transversal direction of the security thread, to the direct reading of its position.
  • holographic patch Another variable position element often used in security documents, known as "holographic patch”. It consists of an accessory device that can be fastened at any location of the security document. Its position can vary with two degrees of freedom. In other words, it can vary from left to right and from top to bottom. Likewise, during the scanning process of the original document, the position of the holographic patch is captured, which repeats itself in all reproduced documents. In this case, two monitoring rulers can be used, one for each degree of freedom, or only one monitoring ruler, carefully positioned to register position variations both in the horizontal and vertical directions.
  • the now proposed security feature can have visible or hidden usage, within the discretion of the security document issuer.
  • For a hidden usage one can develop some decorative graphic element that also plays the role of monitoring ruler.
  • the present patent of utility model can also be very useful in monitoring the manufacturing process of authentic documents.
  • a way to quickly check the location of the variable position elements would be one more resourse to quality control procedures.
  • Fig. 1 is a sketch of a security document (3), equipped with a variable position element (4), as a type of "security thread”.
  • Fig. 2 is a sketch of a security document (3), equipped with a variable position element (4), as a type of windowed "security thread”.
  • Fig. 3 is a sketch of a security document (3), equipped with a variable position element (4), as a type of high- frequency position variation "security thread”.
  • Fig. 4 is a sketch of a security document (3), equipped with two variable position elements (4), as a type of high- frequency position variation "security thread”.
  • Fig. 5 is a sketch of a security document (3), equipped with a variable position element (5), as a type of "holographic patch".
  • Fig. 6 is a sketch of a security document (3), equipped with a variable position element (4), as a type of "security thread”, with one degree of freedom (9), coincident with the horizontal direction (1).
  • Fig. 7 is a sketch of a security document (3), equipped with a variable position element (5), as a type of "holographic patch”, with two degrees of freedom (9 and 10); one degree of freedom (9), coincident with the horizontal direction (1), and one degree of freedom (10), coincident with the vertical direction (2).
  • Fig. 8 is a sketch of a security document (3), equipped with a monitoring ruler (7), in a straight line, disposed to position monitoring in the horizontal direction (1).
  • Fig. 9 is a sketch of a security document (3), equipped with a monitoring ruler (7), in an inclined straight line, disposed to position monitoring in the horizontal direction (1) and in the vertical direction (2).
  • Fig. 10 is a sketch of a security document (3), equipped with a monitoring ruler (7), in the shape of a curve, disposed to position monitoring in the horizontal direction (1).
  • Fig. 11 is a sketch of a security document (3), equipped with a monitoring ruler (7), in a sequence of nonaligned points, disposed to position monitoring in the horizontal direction (1) and in the vertical direction (2).
  • Fig. 12 is a sketch of a security document (3), equipped with a monitoring ruler (7), in the shape of geometric forms, disposed to position monitoring in the horizontal direction (1).
  • Fig. 13 is a sketch of a security document (3), equipped with a monitoring ruler (7), mingled with graphic motif, disposed to position monitoring in the horizontal direction (1).
  • Fig. 14 is a sketch of a security document (3), equipped with two monitoring rulers (7 and 8), in two straight lines; one ruler (7) disposed to position monitoring in the horizontal direction (1) and another ruler (8) disposed to position monitoring in the vertical direction (2).
  • Fig. 15 is the superimposition of Figs. 1 and
  • Fig. 16 is the superimposition of Figs. 2 and
  • Fig. 17 is the superimposition of Figs. 3 and 10. It is a sketch of a security document (3), equipped with a variable position element (4), as a type of high-frequency position variation "security thread", and a monitoring ruler (7), in the shape of a curve, disposed to position monitoring of the element (4) in the horizontal direction (1).
  • Fig. 18 is the superimposition of Figs. 4 and 8.
  • Fig. 19 is the superimposition of Figs. 5 and 14. It is a sketch of a security document (3), equipped with a variable position element (5), as a type of "holographic patch", and two monitoring rulers (7 and 8), in two straight lines; one ruler disposed to position monitoring of the element (5) in the horizontal direction (1) and another ruler disposed to position monitoring of the element (5) in the vertical direction (2).
  • Fig. 20 is the superimposition of Figs. 5 and 9.
  • the monitoring ruler must be associated with some variable position element of the security document, in order to register its position.
  • the use of monitoring rulers in position reading of the variable position elements will be useful to the industrial process quality control, indicating if said elements are positioned within each respective range of tolerance.
  • the use of monitoring rulers in position reading of the printed images of the variable position elements will be useful to the monitoring of the counterfeits, furnishing link evidences between counterfeits of the same origin. Analysing the first application example of Fig.
  • a monitoring ruler (7) in a sequence of nonaligned points, composed of 23 points.
  • the represented security thread (4) crosses the security document, from top to bottom, intercepting the monitoring ruler (7), touching the points 11 and 12, counting from left to right. For instance, one can register the reading as the dimensionless measure 11.5.
  • Analysing the second application example of Fig. 16 one can observe a monitoring ruler (7), mingled with graphic motif (6), composed of 23 vertical strokes. In the same figure, one can observe that the represented security thread (4) crosses the security document, from top to bottom, intercepting the monitoring ruler (7), touching stroke number 10, counting from left to right. For instance, one can register the reading as the dimensionless measure 10. Analysing the third application example of
  • Fig. 17 one can observe a monitoring ruler (7), in the shape of a curve, composed of 25 vertical strokes.
  • the represented security thread (4) crosses the security document, from top to bottom, intercepting the monitoring ruler (7), touching stroke number 12, counting from left to right. For instance, one can register the reading as the dimensionless measure 12.
  • a monitoring ruler (7) in a straight line, composed of 15 vertical strokes.
  • the two represented security threads (4) cross the security document, from top to bottom, intercepting the monitoring ruler (7) in two points.
  • the first point between stroke numbers 6 and 7, and the second point betweeen stroke numbers 7 and 8, always counting from left to right. For instance, one can register the readings as the dimensionless measures 6.5 and 7.5.
  • the represented holographic patch (5) intercepts the monitoring rulers (7 and 8), in such a way that its lateral border touches the horizontal ruler (7) between the 6th and 7th strokes, counting from right to left, and its upper border touches the vertical ruler (8) between the 4th and 5th strokes, counting from top to bottom.
  • the readings as the dimensionless measures 6.2 and 4.8 respectively.
  • a monitoring ruler (7) in an inclined straight line, composed of 25 points.
  • the represented holographic patch (5) intercepts the monitoring ruler (7), in such a way that its lateral border touches the monitoring ruler (7) on the 5th point, counting from right to left, and its upper border touches the monitoring ruler (7) on the 15th point, counting from top to bottom. For instance, one can register the readings as the dimensionless measures 5 and 15 respectively.
  • the examples of monitoring ruler of Figs. 10 and 11 are also capable of performing, with suitable settings, the position monitoring of elements with two degrees of freedom.
  • monitoring rulers can be of any size and shape, according to creativity and different needs of each user.

Abstract

Patent of utility model to security feature aiming at combating the couterfeiting of security documents equipped with variable position elements, by the monitoring of the counterfeits. It consists of the insertion in the security document (3) of graduated rulers (7 and 8) aiming at registering the position of certain elements (4 and 5), which positions can vary (9 and 10) in the authentic documents, but remain constant in the same family of counterfeits, furnishing link evidences for the identification of counterfeit families. The now proposed device allows the direct reading of these positions, free from variations and deformations caused by the counterfeit printing process, even if enlargements or reductions have occured during the process. Said security feature can have visible or hidden usage. In authentic document manufacturing, the use of monitoring rulers can be useful to the quality monitoring of the process.

Description

"MONITORING RULER"
The present patent of utility model aims at a security feature, for use in security documents or fiduciary printing, with a view to provide better use and efficiency than similar existing models.
Many security features are already used in graphic arts, that try to make impossible or, at least, complicate a counterfeiter's job in illicit copying of documents. The existing security features work, invariably, as follows: they are hard to produce, generated by complex and sophisticated machinery and industrial technics, not widely available to the general public, which make them, in theory, copy-proof. Thus, the existent security features act preventively, by discouraging forgery through the introduction of deterrents or impediments to its achievement. Nevertheless, due to modern computing resources, the fall in price of graphic technologies and their consequent availability, resources like scanners, high-definition printers, graphic editors etc, are becoming more and more affordable. In this present-day environment, even if it's impossible to exactly reproduce the expensive and sophisticated security features, one can still observe excellent simulations of them, perfectly capable of deceiving the common citizen. Thus, even if the traditional security features keep being used to discourage criminal action, one should admit that there is currently no fraud-proof security feature. Considering that problem and with a view to solve it, the present security feature was conceived to combat counterfeiting, no more preventively, but in a reactive way, that is to say, allowing that repressive steps can be taken by the competent authorities after the commision of the crime, as will be shown as follows.
Many countries which are concerned about the protection of their security documents against forgery, have developed different counterfeiting monitoring systems. In short, they are databases where relevant information about seized counterfeits is stored. Through data comparison it is possible to come to useful conclusions; for example, the identification of counterfeit families. Among the information to be stored, one preferably selects those peculiarities capable of unequivocally linking the counterfeits to each other, and consequently, linking these counterfeits to a common origin. One intends, this way, to identify and store some repeated characteristics always present in the same family of counterfeits. Some of these peculiarities found in forged documents come from the authentic document used as original for the reproductions, for example: The always constant position of certain element that would normally have a variable position in the authentic documents.
The purpose of this patent of utility model is to present a device to register the position of any one of these variable position elements, such as: Security threads or strips, holografic ribbons, stripes or patches, security fibers or confetti, iridescent stripes, intaglio printing, letterpress printing, screen printing, or any other element that can come to present any kind of position variation, as small it may be, even if unintentional, when added to document support.
In order to readily and efficiently measure the position of these variable position elements, free from variations or deformations caused by the counterfeit printing process, even if enlargements or reductions have occured during the process, the present patent of utility model suggests the inclusion among the graphic ensemble of the authentic documents of one or more graduated rulers.
As an example, one can cite a widely used variable position element known as "security thread". It consists of a thread that crosses the security document, from top to bottom, or from one side to the other. In the transversal direction of the thread, one observes a constant variation of its position (one degree of freedom). In some counterfeits, during the scanning process of the original document, the position of the security thread is captured, which repeats itself in all reproduced documents. That is because, in these cases, the image of the security thread and the image of the rest of the document are saved together in the same data file. Thus, all the counterfeits produced from that same data file will have a security thread image appearing, invariably, in the same position. The present patent of utility model consists, in this case, in a ruler-shape device, to be inserted among the graphic elements of the authentic document, disposed in transversal direction of the security thread, to the direct reading of its position.
Also as an example, one can cite another variable position element often used in security documents, known as "holographic patch". It consists of an accessory device that can be fastened at any location of the security document. Its position can vary with two degrees of freedom. In other words, it can vary from left to right and from top to bottom. Likewise, during the scanning process of the original document, the position of the holographic patch is captured, which repeats itself in all reproduced documents. In this case, two monitoring rulers can be used, one for each degree of freedom, or only one monitoring ruler, carefully positioned to register position variations both in the horizontal and vertical directions.
The now proposed security feature can have visible or hidden usage, within the discretion of the security document issuer. For a hidden usage, one can develop some decorative graphic element that also plays the role of monitoring ruler.
To increase the potential of this security feature as a resourse for counterfeit monitoring, it is also recommended to maximize, as technically feasible, the oscillation range of the variable position elements.
One also recommends the adoption of contrasting colors between these variable position elements and the support used for the security document.
Moreover, the present patent of utility model can also be very useful in monitoring the manufacturing process of authentic documents. A way to quickly check the location of the variable position elements would be one more resourse to quality control procedures.
The attached drawings show the arrangement of the monitoring ruler, object of the present patent:
Fig. 1 is a sketch of a security document (3), equipped with a variable position element (4), as a type of "security thread".
Fig. 2 is a sketch of a security document (3), equipped with a variable position element (4), as a type of windowed "security thread".
Fig. 3 is a sketch of a security document (3), equipped with a variable position element (4), as a type of high- frequency position variation "security thread". Fig. 4 is a sketch of a security document (3), equipped with two variable position elements (4), as a type of high- frequency position variation "security thread".
Fig. 5 is a sketch of a security document (3), equipped with a variable position element (5), as a type of "holographic patch".
Fig. 6 is a sketch of a security document (3), equipped with a variable position element (4), as a type of "security thread", with one degree of freedom (9), coincident with the horizontal direction (1). Fig. 7 is a sketch of a security document (3), equipped with a variable position element (5), as a type of "holographic patch", with two degrees of freedom (9 and 10); one degree of freedom (9), coincident with the horizontal direction (1), and one degree of freedom (10), coincident with the vertical direction (2).
Fig. 8 is a sketch of a security document (3), equipped with a monitoring ruler (7), in a straight line, disposed to position monitoring in the horizontal direction (1).
Fig. 9 is a sketch of a security document (3), equipped with a monitoring ruler (7), in an inclined straight line, disposed to position monitoring in the horizontal direction (1) and in the vertical direction (2).
Fig. 10 is a sketch of a security document (3), equipped with a monitoring ruler (7), in the shape of a curve, disposed to position monitoring in the horizontal direction (1).
Fig. 11 is a sketch of a security document (3), equipped with a monitoring ruler (7), in a sequence of nonaligned points, disposed to position monitoring in the horizontal direction (1) and in the vertical direction (2). Fig. 12 is a sketch of a security document (3), equipped with a monitoring ruler (7), in the shape of geometric forms, disposed to position monitoring in the horizontal direction (1).
Fig. 13 is a sketch of a security document (3), equipped with a monitoring ruler (7), mingled with graphic motif, disposed to position monitoring in the horizontal direction (1). Fig. 14 is a sketch of a security document (3), equipped with two monitoring rulers (7 and 8), in two straight lines; one ruler (7) disposed to position monitoring in the horizontal direction (1) and another ruler (8) disposed to position monitoring in the vertical direction (2).
Fig. 15 is the superimposition of Figs. 1 and
11. It is a sketch of a security document (3), equipped with a variable position element (4), as a type of "security thread", and a monitoring ruler (7), in a sequence of nonaligned points, disposed to position monitoring of the element (4) in the horizontal direction (1).
Fig. 16 is the superimposition of Figs. 2 and
13. It is a sketch of a security document (3), equipped with a variable position element (4), as a type of windowed "security thread", and a monitoring ruler (7), mingled with graphic motif (6), disposed to position monitoring of the element (4) in the horizontal direction (1).
Fig. 17 is the superimposition of Figs. 3 and 10. It is a sketch of a security document (3), equipped with a variable position element (4), as a type of high-frequency position variation "security thread", and a monitoring ruler (7), in the shape of a curve, disposed to position monitoring of the element (4) in the horizontal direction (1).
Fig. 18 is the superimposition of Figs. 4 and 8.
It is a sketch of a security document (3), equipped with two variable position elements (4), as a type of high-frequency position variation "security thread", and a monitoring ruler (7), in a straight line, disposed to position monitoring of the elements (4) in the horizontal direction (1).
Fig. 19 is the superimposition of Figs. 5 and 14. It is a sketch of a security document (3), equipped with a variable position element (5), as a type of "holographic patch", and two monitoring rulers (7 and 8), in two straight lines; one ruler disposed to position monitoring of the element (5) in the horizontal direction (1) and another ruler disposed to position monitoring of the element (5) in the vertical direction (2). Fig. 20 is the superimposition of Figs. 5 and 9.
It is a sketch of a security document (3), equipped with a variable position element (5), as a type of "holographic patch", and a monitoring ruler (7), in an inclined straight line, disposed to position monitoring of the element (5) in the horizontal direction (1) and in the vertical direction (2).
In accordance with what the listed drawings show, the monitoring ruler must be associated with some variable position element of the security document, in order to register its position. During authentic documents manufacturing, the use of monitoring rulers in position reading of the variable position elements will be useful to the industrial process quality control, indicating if said elements are positioned within each respective range of tolerance. In respect to forged documents, the use of monitoring rulers in position reading of the printed images of the variable position elements will be useful to the monitoring of the counterfeits, furnishing link evidences between counterfeits of the same origin. Analysing the first application example of Fig.
15, one can observe a monitoring ruler (7), in a sequence of nonaligned points, composed of 23 points. In the same figure, one can observe that the represented security thread (4) crosses the security document, from top to bottom, intercepting the monitoring ruler (7), touching the points 11 and 12, counting from left to right. For instance, one can register the reading as the dimensionless measure 11.5.
Analysing the second application example of Fig. 16, one can observe a monitoring ruler (7), mingled with graphic motif (6), composed of 23 vertical strokes. In the same figure, one can observe that the represented security thread (4) crosses the security document, from top to bottom, intercepting the monitoring ruler (7), touching stroke number 10, counting from left to right. For instance, one can register the reading as the dimensionless measure 10. Analysing the third application example of
Fig. 17, one can observe a monitoring ruler (7), in the shape of a curve, composed of 25 vertical strokes. In the same figure, one can observe that the represented security thread (4) crosses the security document, from top to bottom, intercepting the monitoring ruler (7), touching stroke number 12, counting from left to right. For instance, one can register the reading as the dimensionless measure 12.
Analysing the fourth application example of Fig. 18, one can observe a monitoring ruler (7), in a straight line, composed of 15 vertical strokes. In the same figure, one can observe that the two represented security threads (4) cross the security document, from top to bottom, intercepting the monitoring ruler (7) in two points. The first point between stroke numbers 6 and 7, and the second point betweeen stroke numbers 7 and 8, always counting from left to right. For instance, one can register the readings as the dimensionless measures 6.5 and 7.5.
Analysing the fifth application example of Fig. 19, one can observe two monitoring rulers (7 and 8), in two straight lines, each one composed of 9 transversal strokes. In the same figure, one can observe that the represented holographic patch (5) intercepts the monitoring rulers (7 and 8), in such a way that its lateral border touches the horizontal ruler (7) between the 6th and 7th strokes, counting from right to left, and its upper border touches the vertical ruler (8) between the 4th and 5th strokes, counting from top to bottom. For instance, one can register the readings as the dimensionless measures 6.2 and 4.8 respectively.
Analysing the sixth and last application example of Fig. 20, one can observe a monitoring ruler (7), in an inclined straight line, composed of 25 points. In the same figure, one can observe that the represented holographic patch (5) intercepts the monitoring ruler (7), in such a way that its lateral border touches the monitoring ruler (7) on the 5th point, counting from right to left, and its upper border touches the monitoring ruler (7) on the 15th point, counting from top to bottom. For instance, one can register the readings as the dimensionless measures 5 and 15 respectively. It is important to observe that, as in the example of Fig. 20, the examples of monitoring ruler of Figs. 10 and 11 are also capable of performing, with suitable settings, the position monitoring of elements with two degrees of freedom.
It is important to emphasize that here adopted reading procedures of the rulers were presented just for example. New measurement conventions can be adopted in practice.
Finally, monitoring rulers can be of any size and shape, according to creativity and different needs of each user.

Claims

CLAIM
1) "MONITORING RULER" comprised by a security feature aiming at combating the counterfeiting of security documents (3) equipped with elements (4 and 5) which can come to present position variations (9 and 10), as small they may be, even if unintentionals, characterized by graduated scale (7 and 8), produced by any process, inserted on the security document (3) and graduated in the same directions of the position degrees of freedom (9 and 10) of the elements (4 and 5) which position one wishes to monitor.
PCT/BR2007/000055 2006-12-18 2007-03-02 Monitoring ruler WO2008074106A2 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
BRMU8602844-8 2006-12-18
BRMU8602844 BRMU8602844U (en) 2006-12-18 2006-12-18 monitoring ruler

Publications (2)

Publication Number Publication Date
WO2008074106A2 true WO2008074106A2 (en) 2008-06-26
WO2008074106A3 WO2008074106A3 (en) 2008-08-28

Family

ID=39536764

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/BR2007/000055 WO2008074106A2 (en) 2006-12-18 2007-03-02 Monitoring ruler

Country Status (2)

Country Link
BR (1) BRMU8602844U (en)
WO (1) WO2008074106A2 (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2010012059A1 (en) * 2008-07-28 2010-02-04 Villela Carlos Andre Xavier Varying position print, method for document authentication and method for counterfeit monitoring
ITVI20100225A1 (en) * 2010-08-05 2012-02-06 Gianluca Frasson FORM FOR THE REALIZATION OF UNPAINTABLE PAPER DOCUMENTS AND / OR NOT CONTRACTABLE

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5216724A (en) * 1989-02-10 1993-06-01 Canon Kabushiki Kaisha Apparatus for image reading or processing
JP2002232678A (en) * 2001-01-30 2002-08-16 Oki Electric Ind Co Ltd Image processing system

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5216724A (en) * 1989-02-10 1993-06-01 Canon Kabushiki Kaisha Apparatus for image reading or processing
JP2002232678A (en) * 2001-01-30 2002-08-16 Oki Electric Ind Co Ltd Image processing system

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2010012059A1 (en) * 2008-07-28 2010-02-04 Villela Carlos Andre Xavier Varying position print, method for document authentication and method for counterfeit monitoring
ITVI20100225A1 (en) * 2010-08-05 2012-02-06 Gianluca Frasson FORM FOR THE REALIZATION OF UNPAINTABLE PAPER DOCUMENTS AND / OR NOT CONTRACTABLE
WO2012017468A1 (en) * 2010-08-05 2012-02-09 Gianluca Frasson Anti- forgery paper document form

Also Published As

Publication number Publication date
BRMU8602844U (en) 2008-08-05
WO2008074106A3 (en) 2008-08-28

Similar Documents

Publication Publication Date Title
KR0153034B1 (en) Printed matter and printing method
RU2091239C1 (en) Member for creating latent image used to prevent counts, credit cards etc from forgery and method for manufacture latent image
US20110298203A1 (en) Document authentication enhancement processes
US7429062B2 (en) Anti-counterfeiting see-through moire security feature using frequency-varying patterns
AU2022200816B2 (en) Security device
DE10204870B4 (en) Method for securing counterfeiting of a value carrier, value carrier and method for checking its authenticity
CN100371177C (en) Security element and printing method
CN104968505B (en) Secure file with security feature
US20050094229A1 (en) Security document with an optical security area
WO2008074106A2 (en) Monitoring ruler
JP2012517921A (en) Method and apparatus for protecting documents from forgery
EP1607235A1 (en) Authentication mark
JP4415542B2 (en) Printed material having latent image and method for visualizing the same
JP4281149B2 (en) Anti-counterfeit latent image pattern formed body and method for producing the same
EP3871893B1 (en) Anti-counterfeiting printed material and manufacturing method therefor
JP7276399B2 (en) duplicate restraint printed matter
JP5481691B2 (en) Anti-counterfeit molded body
JP2021011098A (en) Copy prevention sheet and manufacturing method thereof
JP5652787B2 (en) Printed material capable of authenticating authenticity and authentication method of the printed material
CN202039250U (en) Anti-copying paper
WO2008151398A1 (en) Rotary seal, monitoring protractor, printing form for rotary seal and method to counterfeit monitoring
WO2010012059A1 (en) Varying position print, method for document authentication and method for counterfeit monitoring
CN101261749A (en) Anti-counterfeit technology implementation system for banknote digital information
RU2605074C1 (en) Protective element for sheet printing product
KR20200005063A (en) Anti-counterfeiting pattern, apparatus and method of processing anti-counterfeiting pattern

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 07710583

Country of ref document: EP

Kind code of ref document: A2

DPE1 Request for preliminary examination filed after expiration of 19th month from priority date (pct application filed from 20040101)
NENP Non-entry into the national phase in:

Ref country code: DE

DPE1 Request for preliminary examination filed after expiration of 19th month from priority date (pct application filed from 20040101)
122 Ep: pct application non-entry in european phase

Ref document number: 07710583

Country of ref document: EP

Kind code of ref document: A2