This application is a 371 of International Application PCT/CH2010/000175 filed 7 Jul. 2010 entitled “Security Document With Holographic Foil And Printed Machine Readable Markings” which was published in the English language on 12 Jan. 2012, with International Publication Number WO 2012/003592 A1.
The invention relates to a security document, such as a banknote or an identification document, with holographic foil and printed machine-readable markings. The invention also relates to methods for manufacturing such a security document as well as for checking its authenticity.
It has been known to provide security documents with a foil element comprising a security feature formed by a diffractive structure, such as a surface or volume hologram or grating. Such foils cannot be forged by conventional printing or copying techniques, thereby rendering the documents more secure.
However, such documents may be tampered with if it is possible to remove the foil element without damaging it. Even though a removal of the foil element can be detected by verification devices, such devices need to be equipped with dedicated sensors for sensing the presence of the foil element, which renders such equipment more expensive.
Hence, it is a general object of the invention to provide a security document with a foil element comprising a security feature, such as a diffractive structure, that has improved counterfeit security.
This object is achieved by the security document of claim 1. That document comprises a substrate, such as a paper or plastic substrate, and a foil element. The foil element comprises the security feature and has a top surface facing away from the substrate and a bottom surface attached to the substrate. In addition, the security document comprises machine-readable markings arranged on the first surface or between the second surface and the substrate, i.e. above or below the foil element. These machine-readable markings intersect at least partially with the foil element, i.e. they cover at least part of the same surface region of the security document as the foil element. This makes it possible to more readily detect the presence of the foil element when the document's authenticity has to be verified by a machine, in particular by a conventional machine equipped for detecting conventional printed security markings. There is no need to equip the machine with means for detecting the security feature of the foil element.
In a further aspect, the invention also relates to a method for manufacturing such a security document. This method comprises the step of printing said markings to at least one of said top surface, said bottom surface, and said substrate.
In a first advantageous embodiment, at least part of the machine readable markings are printed onto the top surface of the foil element, thus that they are missing from the security document when the foil element is removed.
In a second advantageous embodiment, at least part of the machine readable markings are printed onto the bottom surface of the foil element. In that case, again, the markings will likely remain attached at least partially to the foil element if the foil element is removed from the substrate.
In another advantageous embodiment, at least part of the machine readable markings are printed onto the substrate. In that case, the adhesion of the markings to the substrate should be weaker than the adhesion of the markings to the foil element, i.e. when the foil element is removed from the substrate by mechanical force, a major part (more than 50%) of the markings printed to the substrate should be lifted off together with the foil element. This, again, allows to easily detect the removal of the foil element.
The invention also relates to a method for automatically verifying the authenticity of the security document. This method comprises the step of checking for a presence of the markings by means of a sensor device. If the markings are at least in part missing, it can be assumed that the document is not authentic or at least damaged.
The invention will be better understood and objects other than those set forth above will become apparent when consideration is given to the following detailed description thereof. Such description makes reference to the annexed drawings, wherein:
Definitions:
The term “security document” encompasses any type of document that contains a security feature that makes it difficult to reproduce. Examples for security documents of this type are banknotes, passports, checks, stock certificates, tickets, credit cards, ID cards, good certificates, stamps, vouchers, shares, driving licenses, residence permits, birth certificates, or insurance certificates. The present invention is, however, of particular advantage when applied to banknotes.
The term “diffractive structure” as used herein and in the claims is to designate a periodic structure with a periodicity in the order of the wave-length of visible light, in particular between 0.1 μm and 10 μm. Such periodic structures give rise to diffractive interference effects. As known to the skilled person, the structure may e.g. be a surface structure, such as e.g. known from surface gratings, surface holograms or kinegrams, or it may be a structure in the volume of the foil element, in particular an absorptive or refractive grating, such as it is e.g. known from volume holograms.
The terms “top”, “above”, “below”, “bottom” etc. refer to a direction extending perpendicularly to the substrate of the document, with the foil element being, by definition, above the substrate. Hence, the surface of the foil element that faces away from the substrate is called the “top surface” of the foil element, while the surface of the foil element that faces the substrate is called its “bottom surface”.
Security Document:
The security document shown in
As shown in
A security feature in the form of a diffractive structure, such as a volume hologram 12, is arranged in foil element 6. As mentioned above, other diffractive structures can be provided in foil element 6 alternatively to or in addition to volume hologram 12.
Even though
Advantageously, foil element 6 has a thickness of no more than 100 μm, in particular no more than 25 μm, which renders it difficult to remove, in particular without damaging it.
As shown in
The security markings should be machine readable, i.e. they should be readily detectable by means of automated sensor devices. For easy and reliable detection, the security markings can e.g. any use combination of the following techniques:
Advantageously, at least part of the markings are invisible to the naked eye. For example, markings 15 can be such that, in the visible spectral range, they do not differ from other markings in their surroundings, while they show a strong absorptive band in the infrared spectral range.
However, other markings, such as markings 4, can be readily visible to the human observer.
In a further advantageous aspect, at least part of the markings are machine detectable through foil element 6, i.e. a suitable sensor is able to detect them from the top side of the security document, by probing the markings through foil element 6. For example, if markings 15 comprise a magnetic dye and foil element 6 is of a polymeric material, an inductive sensor is readily able to detect the markings through foil element 6.
The markings can form any desired pattern, such as patterns readable to the human eye (for example a printed number), or they can form codes typically read by a machine only (such as a bar code).
Manufacturing:
The security document shown in
In a first printing step, e.g. using offset print, ink is applied to substrate 1. Typically, such a step applies background colors and patterns and at least part of the visually-perceptible elements of the final document.
The first step can also comprise the printing of security markings, such as the markings 4, onto substrate 1, at a location that intersects with the later applied foil element 6. If the markings 4 printed onto substrate 1 are to comprise dyes that are difficult to apply by means of offset print, other printing techniques can be used for applying them, such as screen printing or intaglio printing. However, in that case, because dyes applied with screen printing or intaglio printing are likely to weaken the adhesive force between foil element 6 and substrate 1, the area covered by such markings should be much smaller than the area covered by foil element 6 as a whole.
In a next step, foil element 6 is applied to substrate 1. Before doing so, markings (such as markings 15) may be printed to bottom surface 8 of foil element 6.
An advantageous method for applying foil element 6 to substrate 1 is a transfer method, where foil element 6 delivered as a laminate with its top surface 7 connected to a carrier layer. Then, bottom surface 8 of foil element 6 is mounted to substrate 1, e.g. using adhesive layer 11, whereupon the carrier layer can be removed. This technique allows for the application of even very thin foil elements 6.
Adhesive layer 11 can e.g. be a hot-melt layer and/or a UV-curable resin layer. In the first case, heat is applied for applying foil element 6 to substrate 1, in the second case UV-radiation is used for curing adhesive layer 11. Typical adhesives can e.g. comprise at least one component from the group comprising polyurethane, acrylates, polyvinyl-alcohols, polyvinyl-acetates oder polyvinyl-pyrolidones.
After applying foil element 6, any security markings (such as markings 14) to printed onto its top surface 7 can be applied, using any printing technique, such as offset printing, screen printing or intaglio printing.
Finally and optionally, a varnish layer can be applied over at least part of the security document, in particular for protecting any markings printed onto top surface 7 of foil element 6.
Notes:
In the example above, the security feature of foil element 6 has been formed by a diffractive structure. It must be noted, though, that the security feature can be formed by other techniques. For example, the security feature may comprise any optically variable device (OVD), such as a thin-film element with UV-fluorescence, or an optical light guide, see e.g. WO 2006/056089.
The authenticity of the security document can be verified by checking for the presence of the markings 4, 14, 15 in the region of foil element 6 by means of a suitable sensor device, as indicated by reference numeral 17 of
As mentioned above, the markings 4 and 15 situated between substrate 1 and foil element 6 can be checked by performing a measurement through the foil element 6. Alternatively, a detection can also take place by measuring through substrate 1 if substrate 1 allows the passage of the required signals.
One advantage of the present technique is the fact that it uses conventional printing technology for improving the security of a diffractive foil element, thus that it can be implemented easily. Still, it allows to reliably detect a removal of foil element 6 using conventional authentication devices.
While there are shown and described presently preferred embodiments of the invention, it is to be distinctly understood that the invention is not limited thereto but may be otherwise variously embodied and practiced within the scope of the following claims.
Filing Document | Filing Date | Country | Kind | 371c Date |
---|---|---|---|---|
PCT/CH2010/000175 | 7/7/2010 | WO | 00 | 1/30/2013 |
Publishing Document | Publishing Date | Country | Kind |
---|---|---|---|
WO2012/003592 | 1/12/2012 | WO | A |
Number | Name | Date | Kind |
---|---|---|---|
6358607 | Grotzner | Mar 2002 | B1 |
6592972 | Trantoul | Jul 2003 | B1 |
7085024 | Ishimoto et al. | Aug 2006 | B2 |
7699351 | Heierli et al. | Apr 2010 | B2 |
20010020895 | Suzuki et al. | Sep 2001 | A1 |
20020018430 | Heckenkamp et al. | Feb 2002 | A1 |
20030129344 | Mori et al. | Jul 2003 | A1 |
20050225077 | Eichenberger | Oct 2005 | A1 |
20070046477 | Kolo et al. | Mar 2007 | A1 |
20080130074 | Heierli et al. | Jun 2008 | A1 |
20080169639 | Eichenberger | Jul 2008 | A1 |
20080246272 | Vast | Oct 2008 | A1 |
20080316556 | Eto et al. | Dec 2008 | A1 |
20090001709 | Kretschmar | Jan 2009 | A1 |
20090033085 | Suto et al. | Feb 2009 | A1 |
20090045617 | Lawandy | Feb 2009 | A1 |
Number | Date | Country |
---|---|---|
2146758 | Nov 1993 | CN |
1157972 | Aug 1997 | CN |
1313574 | Sep 2001 | CN |
101329546 | Dec 2008 | CN |
10 2007 044 482 | Mar 2009 | DE |
2009516 | Dec 2008 | EP |
2 793 726 | Nov 2000 | FR |
5-278380 | Oct 1993 | JP |
Entry |
---|
Notification of Reasons for Refusal dated Jun. 9, 2014 for Japanese Application No. 2013-516933. |
English translation of an Office Action for Russian Application No. 2013105009. |
English translation of an Office Action dated Aug. 7, 2014 for Chinese Application No. 201080068452.3. |
espacenet English abstract of CN 101329546 A. |
Machine translation of CN 101329546 A. |
espacenet English abstract of CN 2146758 Y. |
Partial English translation of CN 2146758 Y. |
espacenet English abstract of CN 1157972 A. |
Office Action dated Nov. 11, 2014 for European Application No. 10 730 035.2-1701. |
espacenet English abstract of WO2009036966 A2. |
Machine translation of DE 10 2007 044 482 A1. |
espacenet English abstract of FR 2 793 726 A1. |
Examination Report dated Jul. 3, 2015 for Australian Application No. 2010357157. |
Office Action dated Jun. 12, 2015 for European Application No. 10 730 035.2-1701. |
Patent Abstracts of Japan English abstract of JP 5-278380 A. |
Number | Date | Country | |
---|---|---|---|
20130207375 A1 | Aug 2013 | US |