This U.S. application claims priority under 35 U.S.C. 371 to, and is a U.S. National Phase application of, the International Patent Application No. PCT/CH2014/00179, filed 22 Dec. 2014 which claims priority from CH PCT/CH2013/000231 file 23 Dec. 2013, the entire content of the above-mentioned patent application is incorporated by reference as part of the disclosure of this U.S. application.
The invention relates to a security device for verifying an authenticity of a security document as well as to a security document, e.g., a banknote, a passport, a document of value, a certificate, or a credit card which comprises such a security device. Furthermore, the invention relates to a method for generating such a security device as well as to a method for verifying the authenticity of a security document.
US 2006/0197990 A1 discloses a superposition of two tally images, thus revealing a hidden image. The hidden image cannot be reconstructed from a single tally image.
WO 97/47487 describes a security device having two simple patterns printed on opposite sides of a substrate, which generate different images when seen in reflection and transmission.
It is an object of the present invention to provide a security device for verifying an authenticity of a security document. Another object of the invention is to provide a method for generating such a security device. Yet another object of the invention is to provide a security document comprising such a security device. Yet another object of the invention is to provide a method for verifying the authenticity of such a security document.
These objects are achieved by the devices and the methods of the independent claims.
Accordingly, a security device for verifying an authenticity of a security document (such as a banknote, a passport, a document of value, a certificate, or a credit card) comprises an at least partially transparent substrate with a first surface and a second surface. The substrate is partially reflecting in a reflection viewing mode.
Herein, the terms “at least partially transparent” as well as “partially reflecting” relate to an optical property of a nonzero transmission and nonzero reflection, respectively, of light at at least one wavelength, in particular in the visible regime between 380 nm and 780 nm. Thus, in a transmission viewing mode, a nonzero amount of light can be shone through said substrate, and at least part of the light is also reflected. Advantageously, a transmittance of the substrate is higher than 50%, at least for one transmitted wavelength (which is in particular in the visible regime between 380 nm and 780 nm).
Advantageously, the substrate is flat and/or flexible (e.g., its thickness is smaller than 500 μm, in particular smaller than 120 μm) and the second surface can be on the opposite side of a flat substrate than the first surface. This simplifies the application in security documents which are usually flat and/or flexible to some degree.
Furthermore, the security device comprises a first pattern (e.g., a halftone, grayscale, or a color image) which is arranged on said first surface of said substrate. The first pattern may be derivable using a first seed pattern, i.e. the first pattern on the substrate may be generated using the first seed pattern (e.g., a halftone, grayscale, or a color image).
The first pattern has a plurality of color densities d1, i.e. it is non-uniform.
The first pattern has, for said at least one wavelength, a plurality of different color densities d1 (gray levels) d1 in a range between 0% (i.e. d1=0) and a given density level. This given density level is larger than 0% and smaller than 100%. Advantageously, it lies between 10% and 90% (i.e. between 0.1 and 0.9), in particular at 50% (i.e. at 0.5).
Furthermore, the security device comprises a second pattern (e.g., again, a halftone, grayscale, or a color image) which is arranged on said second surface of said substrate, e.g., opposite said first surface (see above). The second pattern may be derivable using the first seed pattern and a second seed pattern which is different from the first seed pattern, i.e. the second pattern on the substrate may be generated using the first seed pattern and a second seed pattern (e.g., again, a halftone, grayscale, or a color image).
The second pattern has a plurality of color densities d2, i.e. it is non-uniform.
Even though the color densities d2 of the second pattern can vary over a broad range, in particular even over a range between 0 and 1, they are not independent of the color densities d1 at the corresponding locations of the first pattern. Rather, they are such that, at said at least one wavelength, a “transmission-superposed pattern” formed by viewing the two patterns in transmission, has a plurality of color densities b=1−(1−d1)*(1−d2)*t in a range between said given density level and 100%, with t being a factor between 0.5-1.0. In particular, factor t may be used to compensate for a non-perfect substrate transmission.
In particular, each pattern comprises a plurality of distinct regions (e.g., pixels) with a uniform visual appearance in each region. This enhances the information content of the patterns.
According to the invention, transmittances and reflectivities of said first pattern and of said second pattern are selected such
As an effect, a transmission-mode-viewer (e.g., a naked eye of a viewer without visual aids or a viewing device such as a camera-equipped cellphone) can discern at least some different regions (e.g., pixels) in the visible pattern in the transmission viewing mode such that he can reproduce at least some of the information content of the second seed pattern. E.g., the pattern he acquires in the transmission viewing mode corresponds to the second seed pattern from which the second pattern is derivable. However, as stated above, a brightness and/or contrast can be different.
As an example for “visibility”, i.e., for a discernibility of different regions in the pattern, e.g., ΔE94-values for the different regions are above 1.8.
However, transmittances and reflectivities of said first pattern and of said second pattern may furthermore selected such
As an effect, a reflection-mode-viewer (e.g., a naked eye of a viewer without visual aids or a viewing device such as a camera-equipped cellphone) can discern at least some different regions in the visible pattern in the reflection viewing mode. The pattern he acquires in the reflection viewing mode, e.g., corresponds to the first seed pattern from which the first pattern is derivable. However, a brightness and/or contrast can be different.
As an effect, according to the invention, the visual appearance and reconstructable information content of the security device depends on the viewing mode and security is thus enhanced considerably.
Advantageously, in the transmission viewing mode, only the second seed pattern is visible. Thus, the pattern can be seen more clearly as it is not contaminated by, e.g., leftovers from the first seed pattern.
In another advantageous embodiment, in the reflection viewing mode, only the first seed pattern is visible. Thus, the pattern can be seen more clearly as it is not contaminated by, e.g., leftovers from the second seed pattern.
Advantageously, the substrate comprises multiple layers with the same or different optical properties (such as transmission spectra). Thus, more specific effects can be realized and security is enhanced.
Advantageously, the first and/or the second pattern can be covered with one or more additional layer(s), e.g., for reducing or enhancing specular reflections from the first and/or second substrate surface(s) and/or pattern(s).
In an advantageous embodiment of the security device, the first pattern is applied, in particular printed (e.g., via offset printing, screen printing, or sublimation printing), onto said first surface of said substrate and/or the second pattern is applied, in particular printed (e.g., via offset printing or screen printing, or sublimation printing), onto said second surface of said substrate. Thus, the security device can be manufactured more easily.
Optionally, a primer layer can be applied below the first and/or second pattern in order to ensure the stability of the printed inks.
In another advantageous embodiment of the security device, the second seed pattern is invisible in said reflection viewing mode. This is particularly then the case when an overall (i.e., spatially integrated over the whole security device) reflected light intensity from the security device or from the first pattern outshines an overall (i.e., spatially integrated over the whole security device) transmitted light intensity through said security device at least by a factor of 5. In other words, in this embodiment, a definition for “reflection viewing mode” is that the overall reflected light intensity from the security device or from the first pattern outshines an overall transmitted light intensity through the security device at least by the above-mentioned factor.
Thus, it is easier to select the transmittances and reflectivities of the first and second pattern such that the above-discussed visual appearance effects occur in the reflection viewing mode.
In yet another advantageous embodiment of the security device, the first seed pattern is invisible in said transmission viewing mode. This is particularly then the case when an overall (i.e., spatially integrated over the whole security device) transmitted light intensity through the security device (in the transmission viewing mode) outshines an overall (i.e., spatially integrated over the whole security device) reflected light intensity from the security device or from the first pattern at least by a factor of 5. In other words, in this embodiment, a definition for “transmission viewing mode” is that the overall transmitted light intensity through the security device outshines an overall reflected light intensity from the security device at least by the above-mentioned factor.
Thus, it is easier to select the transmittances and reflectivities of the first and second patterns such that the above-discussed visual appearance effects occur in the transmission viewing mode.
Advantageously, the second pattern is derivable using—in addition to the second seed pattern—an inversion of said first seed pattern.
Herein, the term “inversion”, “inverted”, and, respectively, “inverted transmittance” and “inverted reflectivity” relate to a transmittance/reflectivity value (e.g., of a pattern or a specific region of a pattern) which is “inverted” with respect to an ideal 100% transmission/reflection at one or more wavelength(s) (in particular in the visible regime between 380 nm and 780 nm) and with respect to another transmittance/reflectivity value (e.g., that of another pattern or region). As examples, for a 90% transmittance of a specific region of the first seed pattern, an inverted transmittance would be 10%. As another example, a 20% reflectivity of a specific region is inverted with respect to an 80%) reflectivity.
Thus, it is easier to select the transmittances and reflectivities of the first and second patterns such that the above-discussed visual appearance effects occur in the transmission and reflection viewing modes of the security device.
In an advantageous embodiment of the security device, a first histogram (i.e., a graph indicative of an absolute or relative frequency-distribution of specific transmittance/reflectivity-values, e.g., gray levels) of said first pattern comprises at least a first unpopulated region and at least a first populated region. In other words, as an example, a first histogram of a first-pattern-gray-level-image comprises unpopulated gray levels, i.e., not all gray levels are present in the image (but some are!).
Thus, it is easier to select the transmittances and reflectivities of the first and second patterns such that the above-discussed visual appearance effects occur in the transmission and reflection viewing modes of the security device.
In another advantageous embodiment of the security device, the first pattern and/or the second pattern and/or the substrate comprises a color filter. This makes it easier to select one or more transmitted and/or reflected wavelength(s).
As another aspect of the invention, a method for generating a security device as described above comprises steps of
Furthermore, the method comprises a step of
The method comprises a further step of
Finally, the method comprises the steps of
Hence,
Furthermore, it is ensured
Thus, first and second patterns which have transmittances and reflectivities as discussed above are easier to generate. Thus, the above-discussed visual appearance effects in the transmission and reflection viewing modes of the security device are easier to achieve.
In an advantageous embodiment, the method comprises further steps of
Thus, grayscale images can be applied as halftone-images which simplifies manufacturing of the security device.
As another aspect of the invention, a security document (e.g., a banknote, a passport, a document of value, a certificate, or a credit card) comprises a security device as described above. The security device is advantageously arranged in a window (i.e., a transparent region) of (the substrate of) the security document. As an effect, the visual appearance and reconstructable information content of the security document can be more easily made dependent on the viewing mode. Thus, security is enhanced and counterfeiting is considerably aggravated.
Advantageously, such a security document further comprises a light absorber, in particular arranged at a distance to the security device. Then, for example by folding the security document along an applied, in particular printed, folding line, the light absorber can be brought into an overlap with the security device, in particular on a side of the second surface of the substrate of the security device. As an effect, the amount of transmitted light is reduced by the light absorber and thus a reflection viewing mode is reached more easily. As an effect, handling is improved when the authenticity of the security document is to be checked.
Advantageously, the light absorber has a reflectivity of less than 50% at least for said at least one reflected wavelength from said security device and/or the light absorber has a transmittance of less than 50% at least for said at least one transmitted wavelength through said security device. The light absorber can, e.g., comprise a region of the security document which is covered by a dark color, e.g., 100% black. As an effect, the reflection viewing mode of the security device is reached more easily and handling is improved when the authenticity of the security document is to be checked.
As another aspect of the invention, a method for verifying an authenticity of a security document as described comprises steps of
Furthermore, the method comprises a step of
Because of the specific and different visual appearances in transmission viewing mode (second seed pattern is visible) and reflection viewing mode (first seed pattern in visible), the authenticity of the security document is easier to derive, security is enhanced, and counterfeiting is aggravated.
Advantageously, during the step of acquiring said second image, an overall (i.e., spatially integrated) reflected light intensity from said security device outshines an overall transmitted light intensity through said security device at least by a factor of 5. Thus, the reflection viewing mode is easier to establish.
In another advantageous embodiment, during said step of acquiring said first image, an overall (i.e., spatially integrated) transmitted light intensity through said security device outshines an overall reflected light intensity from said security device at least by a factor of 5. Thus, the transmission viewing mode is easier to establish.
Advantageously, the method comprises a step of bringing a light absorbing device into an overlap with said security device. Thus, an amount of transmitted light through the security device is reduced and the reflection viewing mode is easier to establish. Then, the step of acquiring said second image of said security device is carried out with said light absorbing device being arranged in said overlap with said security device, e.g., opposite said second viewing position near the second surface of the substrate of the security device. This simplifies the handling of the security document for acquiring the reflection viewing mode image.
The factor t used in the method and device can e.g. be chosen to be equal to 1, in particular if reflection effects of the substrate are negligible or if they are intentionally neglected.
In another embodiment, factor t may be between 0.5 and 0.9 and correspond to the transmission of the substrate. In this case, the effect of a non-perfect transmission of the substrate is neglected.
The substrate is partially reflecting, thus allowing to view recognize an image in reflection viewing mode.
In one embodiment, the reflection of the substrate can be caused by specular reflection, i.e. the substrate exhibits specular reflection in said reflection viewing mode. This allows to obtain reflection images of strong contrast when viewing the substrate under an angle where a light source is reflected to.
In another embodiment, the substrate exhibits at least 10% but no more than 50% reflection in said reflection viewing mode at said at least one wavelength. This allows to obtain reflection images of strong contrast.
Advantageously, the substrate should exhibit at least 10%, in particular at least 20%, and/or no more than 50% reflection at said at least one wavelength for light reflected perpendicularly to the substrate.
In another advantageous embodiment, the substrate is non-absorbing at the at least one wavelength, i.e. it absorbs light transmitted perpendicularly through the substrate by no more than 10%, in particular by no more than 5%. This is based on the understanding that an absorbing substrate leads to poorer image contrast in reflection viewing mode.
In another embodiment, the substrate exhibits at least 10%, in particular at least 20%, diffuse reflection, and/or it exhibits no more than 50% diffuse reflection in said reflection viewing mode at said at least one wavelength. This allows to obtain reflection images of strong contrast when viewing the substrate under any angle.
The first and second patterns are advantageously halftoned patterns, i.e. patterns applied in halftone technology.
The first and second patterns are advantageously applied by an absorbing, i.e. “black” ink, i.e. an ink that absorbs the light at said at least one wavelength.
The “given density level” is advantageously 50%, which allows to distribute the available contrast evenly between the transmitted and reflected images.
As mentioned, each of said first and second patterns has a plurality of color densities d1, d2, i.e. they are non-uniform. Advantageously, each pattern has at least three different color densities as a function of position, i.e. there are at least three different positions within each pattern that have at least three different color densities.
Remarks:
The invention is not limited to halftone or grayscale patterns. Although the description and figures herein mainly focus on halftone and grayscale patterns for the sake of clarity, analogous considerations can be made for each color channel of color patterns which renders the subject-matter of the invention feasible for color patterns.
The described embodiments similarly pertain to the devices and the methods. Synergetic effects may arise from different combinations of the embodiments although they might not be described in detail.
The invention will be better understood and objects other than those set forth above will become apparent when consideration is given to the following detailed description thereof. Such description makes reference to the annexed drawings, wherein:
When the first pattern 10 is overlaid with the second pattern 20 (i.e., when a first region 11 fully coincides with a third region 23 and a second region 12 fully coincides with fourth region 24) and viewed in a transmission viewing mode, a grayscale image 200 as depicted in the lower part of
The upper part of
What can be seen from the diagram is that in the transmission viewing mode (i.e., with transmissions through the first and through the second pattern being combined), the first region 11 is indiscernible from the second region 12 of the first pattern 10, because both the first region 11 and the second region 12 show the same gray levels of 84% black (see the points labeled 12+24 and 11+23 of the curve labeled 200 in the diagram).
This is, because the first region 11 of the first pattern 10 fully coincides with the third region 23 of the second pattern 20 (see vertical line). Similarly, the second region 12 of the first pattern 10 fully coincides with the fourth region 24 of the second pattern (see vertical line). Furthermore, the first pattern 10 (i.e., all regions) is inverted with respect to the second pattern 20, i.e., the third region 23 is inverted with respect to the first region 11 and the fourth region 24 is inverted with respect to the second region 12.
One possible theoretical approach to explain this is the so-called Demichel equation. For 2 colors, the Demichel equation shows that for the superposition of a layer of color C1 with a density d1 and of a layer of color C2 with a density d2 (both layers having a random halftoning), a
surface coverage of white w=(1−d1)×(1−d2),
a perceived color C1=d1×(1−d2), and
a perceived color C2=d2×(1−d1).
If both colors C1 and C2 are black and if
d2=1−d1 (inverted patterns!), the density of black b (i.e., b=1−w) for the superposed image equals to
b=1−d1+d12. This corresponds to the curve labeled 200 in the diagram of
As an example, the first region 11 of the first pattern 10 and the fourth region 24 of the second pattern 20 are both 80% black. The second region 12 of the first pattern 10 and the third region 23 of the second pattern 20 are both 20% black, i.e., inverted. Hence, the first region 11 has a different transmittance and reflectivity than the second region 12 and the third region 23 has a different transmittance and reflectivity than the fourth region 24. The superposition of the first region 11 with the third region 23 yields b=1−0.8+0.82, i.e., b=84% black. This is the same value as for the superposition of the second region 12 with the fourth region 24, namely b=1−0.2+0.22=84% black. Note that a 100%) transmittance of the substrate is assumed here (substrate not shown!).
Thus, in a transmission viewing mode (i.e., in a superposition of the first pattern 10 with the second pattern 20), the first region 11 is indiscernible from the second region 12 and the third region 23 is indiscernible from the fourth region 24.
As can be further seen from the Demichel equation:
If the first pattern 10 is viewed in a reflection viewing mode (e.g., with an overall reflected light intensity from the first pattern 11 outshining an overall transmitted light intensity at least by a factor of 5), the full superposition of the first pattern 10 with the second pattern 20 does not take place any more and the first region 11 thus becomes discernible from the second region 12 due to their different reflectivities. In general, it can be stated that regions with reflected light intensity-differences above 5% can be discerned.
Thus, very specific patterns can be created under different viewing conditions and security in enhanced.
While
Now, here, instead of using these seed patterns 10′ and 20′ directly for applying onto a substrate 2 of a security device 1 (both not shown), the brightness and contrast of the second seed pattern 20′ is modified to ensure that all grayscale levels are darker than 50% black. In other words, a its histogram of color densities (gray levels) is shrunken. Thus, an intermediate pattern 20″ is yielded. In other words, in a histogram of this intermediate pattern 20″, only black levels between 50% black and 100% black are populated while the gray levels between 0% black and 50% black are unpopulated (i.e., only regions with gray values between 50% black and 100% black are present in the intermediate pattern 20″).
Furthermore, the brightness and contrast of the first seed pattern 10′ is modified to ensure that the grayscale level is brighter than 50% black. Thus, the first pattern 10 is yielded which is to be arranged on a first surface 3 of a security device substrate 2 (not shown). In other words, in a histogram of this first pattern 10, only black levels between 0% black and 50% black are populated while the gray levels between 50% black and 100% black are unpopulated.
Now, as a next step, a second pattern 20 is generated using the first pattern 10 and the intermediate pattern 20″. The second pattern 20 (which is to be arranged on a second surface 4 of a security device substrate 2) is created such that
The diagram at the top of
This last step of generating the second pattern 20 is carried out by using the Demichel equation as explained above with regard to
b=1−(1−d1)*(1−d2)=1−(1−d2−d1+d2d1) (1)
b=d1+d2−d1d2 (2)
Here, b is again indicative of the density of black for the transmission-superposed pattern 10+20=20″.
In other words, the black level in a specific region of the to be generated second pattern 20 can be calculated by
d2=1−(1−b)/(1−d1) (3)
For an example, please refer to the dashed vertical line in the diagram on top of
d2=1−(1−0.6)/(1−0.4)=0.33=33% black (4)
This corresponds to point 201 on the pattern-20-curve in the diagram of
For a pattern generation rule, we need to impose that d2>=0. This leads to
(1−b)/(1−d1)<1 or
d1<b. (5)
This means, however, that a gray level of any region of the first pattern 10 (i.e., d1) is always brighter than a corresponding gray level of a region of the intermediate pattern 20″ at the same position. In other words, the color density d1 of the first pattern 10 is in a range between 0% (0.0) and a given density level, while the color densities b of the intermediate pattern are in a range between said given density level and 100% (1.0)
For this to be taken into account, the step of histogram-shrinking is used, if necessary.
In the examples herein, two equal ranges for d1 (i.e., black levels in the first pattern 10) and b (i.e., black levels in the intermediate pattern 20″) such as 0-50% for d1 and 50%-100% for b are selected. Other ranges are possible as well.
As an effect, first and second patterns 10, 20 which are to be arranged on a first and second surface 3,4 of a security device substrate 2 are easier to generate.
Note that the above discussed approach also works in color:
Demichel equation in CMYK:
Ccyan=dcyan×(1−dmagenta)×(1−dyellow)×(1−dblack)
Cmagenta=dmagenta×(1−dcyan)×(1−dyellow)×(1−dblack)
Cyellow=dyellow×(1−dcyan)×(1−dmagenta)×(1−dblack)
Ccyanmagenta=dcyan×dmagenta×(1−dyellow)×(1−dblack)
Ccyanyellow=dcyan×(1−dmagenta)×dyellow×(1−dblack)
Cmagentayellow=dmagenta×(1−dcyan)×dyellow×(1−dblack)
Cblack=(1−dcyan)×(1−dmagenta)×(1−dyellow)×dblack
+dcyan×dmagenta×dyellow×(1−dblack)
+dcyan×dmagenta×dyellow×dblack
+dcyan×(1−dmagenta)×(1−dyellow)×dblack
+dmagenta×(1−dcyan)×(1−dyellow)×dblack
+dyellow×(1−dcyan)×(1−dmagenta)×dblack
+dcyan×dmagenta×(1−dyellow)×dblack
+dcyan×(1−dmagenta)×dyellow×dblack
+dmagenta×(1−dcyan)×dyellow×dblack
If cyanmagentayellow=black
Cwhite=(1−dcyan)×(1−dmagenta)×(1−dyellow)×(1−dblack)
In contrast to the gray wedges as discussed above with regard to
As can be seen from panels (a) and (b), a brightness and a contrast of the first seed pattern 10′ are modified for yielding the first pattern 10, which is to be arranged on the first surface 3 of a security device substrate 2 (not shown). A first histogram H10 of the first pattern 10 comprises a first unpopulated region H10u below gray levels of 127 and a first populated region H10p above gray levels of 128.
Panels (c) and (d) show a generation of an intermediate pattern 20″ using a second seed pattern 20′. Specifically, a brightness and a contrast of the second seed pattern 20′ are modified for yielding the intermediate pattern 20″, which is later used for generating the second pattern 20, which is to be arranged on the second surface 4 of a security device substrate 2 (not shown). A second histogram H20″ of the intermediate pattern 20 comprises a second unpopulated region H20″u above gray levels of 128 and a first populated region H20″p below gray levels of 127.
As can be seen from the right panel on the left hand side of the figure, a first image I1 which is taken from a first viewing position P1 in a transmission viewing mode only shows the second seed pattern 20′ (statue).
However, as can be seen from the right panel on the right hand side of the figure, in a reflection viewing mode (second image I2 from a second viewing position P2), which is here facilitated by overlaying the security device 1 with a light absorber 5, only the first seed pattern 10′ (“inventor”) is visible.
Thus, specific visual effects are created and the security is enhanced.
The use of halftoning patterns simplifies the manufacturing of the security device.
In the embodiments described above, substrate 2 is assumed to be specularly reflecting. Further, any reflection of the substrate is neglected e.g. in the calculations of Eq. (1)-(3).
In another embodiment, substrate 2 can also be diffusely reflecting, as mentioned above.
Advantageously, substrate 2 is uniformly reflecting over the whole area of the first and second seed patterns.
Further, it must be noted that Eq. (1)-(3) can be refined to take the reflection r or transmission t of substrate 2 into account. In this case, Eq. (1) and (3) become, when neglecting multiple reflections.
b=1−(1−d1)*(1−d2)=1−(1−d2−d1+d2d) (1′)
d2=1−(1−b)/(1−d1)/t (3′)
The above equations must be approximately fulfilled for each location where the two patterns overlap in order to see the intermediate pattern b in transmission.
In this case, the condition of Eq. (5) is changed to
1−t+t*d1<b (5′)
For example, for t=0.8, and if we assume that b>50% (0.5), we have d1<38% (0.38).
In other words, for the at least one wavelength and for values t<1, the color density d1 of the first pattern 10 is in a range between 0% (0.0) and a first given density level, while the color densities b of the intermediate pattern are in a range between a second given density level and 100% (1.0), with the first given density level being smaller than the second given density level.
Remark:
While there are shown and described presently preferred embodiments of the invention, it is to be distinctly understood that the invention is not limited thereto but may be otherwise variously embodied and practiced within the scope of the following claims.
Number | Date | Country | Kind |
---|---|---|---|
PCT/CH2013/000231 | Dec 2013 | WO | international |
Filing Document | Filing Date | Country | Kind |
---|---|---|---|
PCT/CH2014/000179 | 12/22/2014 | WO | 00 |
Publishing Document | Publishing Date | Country | Kind |
---|---|---|---|
WO2015/095978 | 7/2/2015 | WO | A |
Number | Name | Date | Kind |
---|---|---|---|
5449200 | Andric et al. | Sep 1995 | A |
6036233 | Braun et al. | Mar 2000 | A |
6089614 | Howland et al. | Jul 2000 | A |
6827283 | Kappe et al. | Dec 2004 | B2 |
20060197990 | Myodo et al. | Sep 2006 | A1 |
20100164219 | Jeacock et al. | Jul 2010 | A1 |
20120182443 | Vincent | Jul 2012 | A1 |
20130181435 | Hersch et al. | Jul 2013 | A1 |
20150244727 | Fournel | Aug 2015 | A1 |
Number | Date | Country |
---|---|---|
195 41 064 | May 1997 | DE |
102 60 124 | Jul 2004 | DE |
0 310 707 | Apr 1989 | EP |
0 628 408 | Dec 1994 | EP |
2 522 529 | Nov 2012 | EP |
9747478 | Dec 1997 | WO |
199747487 | Dec 1997 | WO |
9815418 | Apr 1998 | WO |
0227647 | Apr 2002 | WO |
2009010714 | Jan 2009 | WO |
2009056351 | May 2009 | WO |
2009056355 | May 2009 | WO |
2011007343 | Jan 2011 | WO |
2014041298 | Mar 2014 | WO |
Entry |
---|
International Search Report dated Jan. 31, 2013 for International Application No. PCT/CH2012/000073. |
International Search Report and Written Opinion of the International Searching Authority dated Sep. 19, 2014 for International Application No. PCT/CH2013/000230. |
International Search Report dated Sep. 19, 2014 for International Application No. PCT/CH2013/000231. |
International Preliminary Report on Patentability dated Oct. 1, 2014 for International Application No. PCT/CH2012/000073. |
International Search Report and Written Opinion of the International Searching Authority dated Feb. 2, 2015 for International Application No. PCT/CH2014/000078. |
International Search Report and Written Opinion of the International Searching Authority dated Mar. 16, 2015 for International Application No. PCT/CH2014/000053. |
International Search Report and Written Opinion of the International Searching Authority dated Mar. 16, 2015 for International Application No. PCT/CH2014/000179. |
International Preliminary Report on Patentability dated Jun. 28, 2016 for International Application No. PCT/CH2013/000231. |
English translation of DE 102 60 124 A1. |
Espacenet English abstract of WO 2009/056351 A1. |
English translation of WO 2009/056351 A1. |
Espacenet English abstract of EP 2 522 529 A2. |
English translation of EP 2 522 529 A2. |
Espacenet English abstract of WO 2009/056355 A1. |
English translation of WO 2009/056355 A1. |
English translation of EP 1 580 025 A2. |
Chosson, S., et al., “See-through images”, Optical Documents Security, 2014, pp. 1-8. |
Machizaud, J., et al., “Spectral transmittance model for stacks of transparencies printed with halftone colors”, Color Imaging XII: Processing, Hardcopy and Applications, 2012, 10 pages. |
Machizaud, J., et al., “Spectral reflectance and transmittance prediction model for stacked transparency and paper both printed with halftone colors”, Optical Society of America, vol. 29, No. 8, Aug. 2012, pp. 1537-1548. |
English Abstract of WO 1997/47487. |
Number | Date | Country | |
---|---|---|---|
20160328904 A1 | Nov 2016 | US |