This application is a National Phase of International Application Serial No. PCT/EP02/14415, filed Dec. 17, 2002.
This invention relates to a security element for security papers, documents of value, ID cards or the like that is of self-supporting design and has two different optically variable security features. Further, the invention relates to a security paper and to a document of value having such a security element.
WO 95/10420 describes a document of value in which, after production thereof, a through opening is punched which is then sealed off on one side with a cover foil protruding beyond the opening on all sides. The cover foil is transparent at least in a partial area so that if there is an attempt to copy the document of value the background shows through and is rendered accordingly by the copier. In addition, the cover foil can have a security feature, for example a hologram.
The invention is based on the problem of proposing a security element as well as a security paper and a document of value having elevated forgery-proofness in comparison to the prior art.
The inventive security element has two different security features disposed on opposite sides of the security element, at least one of the security features being optically variable. Optically variable means that the security feature has a different, visually recognizable appearance, such as an interplay of colors and/or different information, from different viewing angles.
The optically variable security features can be for example diffraction structures observable in reflected light, coarse grid structures whose optically variable impression is based solely on their reflective properties, thin-film elements or optically variable prints, the printing ink used containing at least one optically variable pigment, such as liquid-crystal pigments or interference-layer pigments. The security element can have any combinations of optically variable security features.
The other security features to be used according to the invention may be any printed images, semitransparent or screened metal layers or the like. The printed images can be done using any inks, which can also have machine-detectable properties such as luminescent, magnetic or electroconductive properties.
It is also within the scope of the invention to use different security features if they contain readable information and this information can be read true to side on both sides of the security element.
The inventive security element preferably has two different optically variable security features disposed on opposite sides of the security element so that only one of the optically variable security features is recognizable when the security element is viewed from one side.
It is especially advantageous to use the inventive security element in security papers or documents of value having a through opening. In a document of value according to the prior art described in WO 95/10420, which only has a security feature in the area of the opening, there is only one side on which the security feature can be viewed true to side and completely. Viewed from the back, the security feature can either not be recognized at all or only mirror-inverted. If the inventive security element is disposed in the area of the opening, however, a complete and true-to-side security feature can be recognized from both sides. This increases the protection from forgery since the opening, if produced by simple punching, can be produced just as simply by a forger. The double-sided security element, in contrast, cannot be readily copied. In particular if there is a textual relationship between the two security features or the security features show different views of the same motif.
For example, the first optically variable security feature can show the front view of a motif, such as an eagle or the face part of a portrait, while the second optically variable security feature shows the back of the eagle or the back of the head in the portrait. The two security features are moreover preferably disposed congruently so that a forger must overcome the additional problem of disposing them in register. The inventive security element moreover offers special advantages if the security features contain readable information that is preferably identical in both security features and can always be read true to side due to the two-layer structure of the security element.
A machine-testable layer can moreover be disposed between the security features. This can be at least one IR-absorbent, electrically conductive or magnetic layer. A plurality of such layers can also be disposed between the security features. Moreover, said intermediate layers do not need to be all-over but can be designed in the form of encodings or other information. It can also be expedient in certain cases to dispose an all-over color layer, preferably black color layer, between the security features so that only certain security features are visible from each side of the security element.
According to a preferred embodiment, the security element consists of a plastic foil provided with at least one opaque coating on each side. Each of said opaque coatings has interruptions, preferably in the form of characters, patterns, logos or the like. Said interruptions are disposed offset from each other. That is, in the area where one opaque coating has interruptions, the opposite opaque coating is executed all over. This guarantees that the security element only has information recognizable true to side on each side. The opaque coatings are preferably metal layers, but other coatings such as color layers can also be used. Combinations are also possible by which the first security feature consists of a metal layer of any color and the second of an opaque color layer or an optically variable printed layer or a thin-film coating. Layers or printing inks showing different colors upon lookdown and lookthrough can also be used.
The metals used can additionally have different colors and/or be designed to be translucent. If at least one of the layers is translucent the interruptions in the opposite layer can also be recognized in transmitted light. The translucency can be produced via the layer thickness or by using screens. These possible embodiments of the metal layer can also be used in all other examples described hereinafter in which metal layers are mentioned. The metals used are for example aluminum, iron, copper, gold, nickel. The term “metal” also refers within the scope of the invention to any alloys.
The interruptions can be produced by any methods, for example removal by laser radiation, etching methods or washing methods.
Providing such interruptions and their arrangement can of course also be transferred to all other security features having a metal layer or other vapor-deposited layers, such as diffraction structures or thin-film elements. If printing inks are used for producing the security features, such gaps can also be produced by negative printing.
According to a further preferred embodiment, the security element can also have a coating with the above-described gaps only on one side, while a semitransparent metal layer is disposed on the other side.
According to a further preferred embodiment, the security element has two plastic layers in which diffraction structures are embossed. At least one of said plastic layers is provided with a metal layer so that the diffraction structures are observable in reflected light. The second plastic layer can likewise be provided with a metal layer or a dielectric layer with a high refractive index. If the second plastic layer is also provided with a metal layer, the latter can have a different inherent color from that of the first metal layer.
The inventive security element need of course not necessarily be disposed in the area of an opening, but can be used expediently wherever it can be tested from both sides without impairment. The place may be for example a completely transparent area in a document of value, such as a plastic bank note or the like.
It is likewise possible to use the inventive security element as a security thread, which is incorporated e.g. in so-called “pendulum” window security papers. In such security papers the “window areas,” where the security threads are directly accessible on the security paper surface and thus verifiable, are provided alternately on the front and back of the paper.
As is well-known, it cannot always be ensured in papermaking that the security threads are embedded in the paper true to side. For a security thread that is twisted and thus incorporated in laterally reversed fashion to be nevertheless readable, characters, texts, etc., are therefore normally provided alternately true to side and laterally reversed. Thus, one part is always readable regardless of the position of the security thread.
To eliminate this problem the inventive security element can of course also be used even if the security paper has window areas on one side.
The security element can further be used not only for protecting security papers or documents of value but also for protecting any goods from forgery. The same applies to the security paper and/or document of value provided with an inventive security element.
The security element can have any contours, being for example round, oval, rectangular, trapezoidal, star-shaped or strip-shaped.
If a strip-shaped security element is disposed in a document of value or security paper in the area of an opening, one of the security features is to be recognized over the total length of the strip, while the second is visible only in the area of the opening.
Production of the security feature is effected for example on a self-supporting carrier element, such as a transparent plastic foil which is then used as label material. Particularly when using diffraction structures as security features; however, it is alternatively expedient to produce a hot stamping foil whereby the complete layer structure of the security element is prepared on a carrier material and then transferred to the document of value or security paper at least in certain areas under the action of pressure and heat. The carrier material is then preferably removed.
The individual security features can also be prepared on separate carriers which are then laminated or interconnected via an adhesive layer.
Individual embodiments of the invention will be explained in more detail hereinafter with reference to the figures, in which:
Opening 2 is closed on one side by inventive security element 3. In the shown example, security element 3 is disposed in bank note depression 5 surrounding opening 2. This gives bank note 1 a continuous stepless surface, which facilitates the handling, in particular stacking, of the bank notes.
According to the invention, security element 3 has a different appearance when viewed from direction B as when viewed from direction C. In the simplest case, security element 3 shows different picture motifs, texts, alphanumeric characters, patterns or combinations of said elements on each side.
To impede imitation of such security elements 3, however, the two appearances of security element 3 have a recognizable relationship to each other. For example, both sides can show the same true-to-side information, which is helpful in particular in the case of textual information since the text can be read true to side from both sides in this case. Thus a different appearance also exists if the same information is to be recognized on both sides, albeit true to side in each case.
Alternatively, security element 3 can also show different views of a motif. If the front view of an eagle is to be recognized from direction B, for example, the back of the eagle is to be recognized in direction C. The two representations are preferably disposed in register. Likewise, parts of total information that supplement each other can be disposed in register on both sides. Symmetrical information is preferably selected which is likewise perceived true to side from each side.
The different appearances of security element 3 arise through the combination of two different security features that are so disposed in security element 3 that only one of said features is visible to the viewer depending on the viewing direction.
If interruptions 16, 18 are provided in metal layers 12, 13, middle layer 23 is preferably provided, it being designed opaque e.g. white or black, contrasting with the metal layer and preventing the mirror-inverted characters of the back from showing through. The interruptions can also be provided congruently, however.
The two security features 6, 7 can be either interconnected via an adhesive layer or laminated together without an adhesive layer. Security element 3 is finally connected with bank note 1 via adhesive layers 14.
Plastic layers 9, 11 serve primarily as protective layers and are optional. They are unnecessary in particular when the total layer structure is prepared on a carrier foil for a transfer material. In this case the carrier foil, which can optionally be pretreated with respect to its desired release properties, is coated with plastic layer 8. Diffraction structure 15 is embossed into plastic layer 8, and embossed relief structure 15 coated with metal layer 12 preferably by the vacuum deposition method. Plastic layer 10 is then applied to metal layer 12 and likewise embossed. Metal layer 13 is applied, preferably by vapor deposition, to plastic layer 10 provided with diffraction structures 17. The adhesive layer is applied to metal layer 13 for transfer to the end substrate. If metal layers 12, 13 have interruptions, additional steps are necessary which result from the particular method used, such as laser removal, etching or washing.
Relief structure 15 is designed for example such that when viewed from direction B the front of an eagle is visible, which changes color when bank note 1 is tilted. Diffraction structure 17, however, creates the visual impression of the back of an eagle, which likewise changes color when bank note 1 is tilted. Alternatively or additionally, the diffraction structure itself can also convey readable information, which is readable true to side on both sides.
Depending on which adhesive properties or laminating behavior layer 23 has, adhesive layer 19 can also be omitted.
Instead of black color layer 23 a dark magnetic layer can also be used that produces the same optical effect and additionally ensures machine readability of security element 3. The magnetic layer can also be provided in addition to the color layer in order to prevent the magnetic layer from being spied out in transmitted light.
In the variant of security element 3 shown in
The information represented by thin-film structure 22 can correspond to the information represented by diffraction structures 15, supplement it or, as mentioned above, show a different view of the same motif.
Instead of the thin-film structure, other effect layers or printing inks containing effect pigments can also be used. Said effect layers or effect pigments can be for example luminescent or absorbent, in particular IR-absorbent, substances, or liquid-crystal pigments, etc. A simple print is also possible.
If only one of prints 25, 26 is to be visible in each case, opaque carrier 24 is used. Carrier 24 is preferably a plastic foil which is preferably colored dark.
The shown examples each include adhesive layer 14 fastening security element 3 to bank note 1. However, adhesive layer 14 is optional. Instead, the adhesive layer can also be applied to the document itself or a different manner of fastening selected.
In the simplest case, plastic layers 36, 37 are provided with the same diffraction structure and security features 6, 7 differ only with respect to the color of metal layers 35, 38. The different color of metal layers 35, 38 can be produced by the use of special metals with different inherent colors. For example, metal layer 35 can consist of a silvery aluminum layer, and metal layer 38 of a copper layer. However, a different color effect of the metal layer can also be produced with the aid of protective layer 34, 39. In this case, the same materials are used for metal layers 35, 38, and protective layers 34, 39 are colored with corresponding translucent different colors. Alternatively or additionally, a different diffraction structure can also be selected for security features 6, 7.
Alternatively, one can also use a multilayer structure having for example a diffraction structure analogous to security feature 6. However, in this case metal layer 35 must be replaced by a dielectric transparent layer revealing print 40, on the one hand, and making the diffraction structures visible in reflected light, on the other hand. In this example it can also be expedient to color carrier foil 33 to separate security features 6, 7 visually from each other. According to a further embodiment shown in
If metal layers are used for opaque coating 43, 45 they can of course be combined with diffraction structures, as explained above.
In all embodiments using diffraction structures as security features, said structures can also be executed as transparent diffraction elements by replacing the metal layer with a dielectric layer having a corresponding refractive index. Said dielectric layer might potentially also be a corresponding adhesive layer that serves as an element for connection to a further security feature or the end substrate.
If the security features have metal layers, the latter can also be executed to be semitransparent or in the form of a screened metal layer.
Security element 3 shown in
Alternatively, security element 3 can also be executed in the form of a strip extending over the total width or length of the document of value. This embodiment is especially expedient if a security paper is used for producing the document of value and security element 3 is already to be applied to the security paper in continuous form.
The security feature can also be executed as a security thread to be embedded in the security paper. In this case the security paper preferably has openings, so-called windows, on both sides.
Number | Date | Country | Kind |
---|---|---|---|
101 63 264 | Dec 2001 | DE | national |
Filing Document | Filing Date | Country | Kind | 371c Date |
---|---|---|---|---|
PCT/EP02/14415 | 12/17/2002 | WO | 00 | 6/16/2004 |
Publishing Document | Publishing Date | Country | Kind |
---|---|---|---|
WO03/053713 | 7/3/2003 | WO | A |
Number | Name | Date | Kind |
---|---|---|---|
987678 | Howes et al. | Mar 1911 | A |
1903711 | Wendel | May 1931 | A |
2532664 | Freedman | Jun 1946 | A |
3770943 | Sill | Nov 1973 | A |
3881987 | Benz | May 1975 | A |
4856857 | Takeuchi et al. | Aug 1989 | A |
4943093 | Melling et al. | Jul 1990 | A |
5176405 | Kaule et al. | Jan 1993 | A |
5210777 | Narabu et al. | May 1993 | A |
5265916 | Coe | Nov 1993 | A |
5388862 | Edwards | Feb 1995 | A |
5405500 | Knight | Apr 1995 | A |
5424119 | Phillips et al. | Jun 1995 | A |
5465301 | Jotcham et al. | Nov 1995 | A |
5492370 | Chatwin et al. | Feb 1996 | A |
5783275 | Muck et al. | Jul 1998 | A |
5820971 | Kaule et al. | Oct 1998 | A |
5876068 | Schneider et al. | Mar 1999 | A |
5944927 | Seifert | Aug 1999 | A |
5949927 | Tang | Sep 1999 | A |
6210777 | Vermeulen et al. | Apr 2001 | B1 |
6355140 | Murakami et al. | Mar 2002 | B1 |
6428051 | Herrmann et al. | Aug 2002 | B1 |
6471248 | Hardwick et al. | Oct 2002 | B2 |
6474695 | Schneider et al. | Nov 2002 | B1 |
6491324 | Schmitz et al. | Dec 2002 | B1 |
6508489 | Herrmann et al. | Jan 2003 | B2 |
6545166 | Honma et al. | Apr 2003 | B2 |
6616803 | Isherwood et al. | Sep 2003 | B1 |
6686027 | Caporaletti et al. | Feb 2004 | B1 |
6903850 | Kay et al. | Jun 2005 | B2 |
6954293 | Heckenkamp et al. | Oct 2005 | B2 |
7054042 | Holmes et al. | May 2006 | B2 |
20020015426 | Kim | Feb 2002 | A1 |
20050211403 | Hard | Sep 2005 | A1 |
Number | Date | Country |
---|---|---|
2122528 | Nov 1994 | CA |
2325316 | Mar 2001 | CA |
1071634 | Sep 2001 | CN |
0013557 | Jul 1980 | EP |
0229645 | Jul 1987 | EP |
0290875 | Nov 1988 | EP |
0400902 | May 1990 | EP |
0648616 | Apr 1995 | EP |
0667248 | Aug 1995 | EP |
0756945 | May 1997 | EP |
1604463 | Dec 1981 | GB |
2311303 | Sep 1997 | GB |
219 095 | Feb 2001 | HU |
0104929 | Apr 2002 | HU |
8-300859 | Nov 1996 | JP |
10237799 | Sep 1998 | JP |
2001172897 | Jun 2001 | JP |
2001213074 | Aug 2001 | JP |
2001-315472 | Nov 2001 | JP |
199825249 | Jul 1998 | KR |
2135667 | Aug 1999 | RU |
178675 | Jan 1966 | SU |
9106925 | May 1991 | WO |
9509274 | Apr 1995 | WO |
WO 9510420 | Apr 1995 | WO |
9813211 | Apr 1998 | WO |
WO 9813211 | Apr 1998 | WO |
9904983 | Feb 1999 | WO |
WO 9904983 | Feb 1999 | WO |
0031571 | Jun 2000 | WO |
0054985 | Sep 2000 | WO |
0103945 | Jan 2001 | WO |
WO 0200446 | Jan 2001 | WO |
0153113 | Jul 2001 | WO |
0200445 | Jan 2002 | WO |
0200446 | Jan 2002 | WO |
WO 0200445 | Jan 2002 | WO |
03053713 | Jul 2003 | WO |
Entry |
---|
van Renesse, “Optical Document Security”, Artech House, Boston London, ISBN 0-89006-619-1, Seiten 156 bis 161, 1994, pp. 153-161. |
De La Rue “Insight and Innovation”, 5 pages. |
Number | Date | Country | |
---|---|---|---|
20050104364 A1 | May 2005 | US |