The present teaching concerns a method for producing a security foil, the security foil, a security device produced from such a security foil and a batch of those security devices.
Today many products or objects carry information, often encoded in machine-readable formats (e.g. as a bar-code, QR-code etc.). In some applications, the combination of machine-readable information together with security features is used for product authentication or verification purposes (cf. WO 2013/188897 A1). Typically, such a product authentication application is applied onto a product via labels or directly. In both scenarios, at least two production steps are required. In a first production step, the security feature is applied, often cut or transferred from some larger original material (cf. WO 2015/079014 A1). In a second production step, the machine-readable information is applied, either carrying authentication-relevant information of the security features and/or a (unique) identifier. Label-based solutions are often used because this allows to produce such security labels in a centralized facility and the labels can be applied onto any kind of objects and products with industry-standard procedures, e.g. at the product's manufacturer. However, labels have some significant shortcomings. First, applying them is expensive in high-volume productions. Secondly, as long as usual adhesives are used, they can be removed fairly easily from the objects. Especially for producing plastic parts, e.g. plastic objects or bottle closures, hot-foil-stamping and cold-foil-stamping are used to transfer parts of a raw material (i.e. the foil) via thermos-activated, pressure-activated or radiation-activated (e.g. by UV radiation) adhesives. Also shrink foils, which are wrapped around an object and shrunk by e.g. applying heat, or similar transfer technologies are well-known. The process of transferring one material onto an object is also known as “decoration” of the object and is widely used in the packaging and printing industry to create e.g. metal-like looks or transfer patterns to objects without resorting to printing devices. In a separate step, variable data (e.g. expiry date, production date, serial numbers, authentication relevant information) can be applied directly onto the object with technologies such as ink-jet, thermos-transfer, embossing, laser engraving etc. This is often referred to as “direct part marking”. However, especially if non-simple patterns, e.g. a machine-readable code, with variable data should be applied, those processes (which are effective in high-volume production) are limited in terms of cost-effectiveness.
Transferable foils are available in various configurations, differing in layer structure, used materials and transfer technology. The present teaching is (with slight adaptions) applicable to many or all transferable foil configurations. We will therefore introduce a meta model of a transferable foil (which corresponds to the principal components of a hot- or cold-stamping foil) comprising a carrier layer, a protection layer, a functional and an adhesive layer. In the transfer process the protection layer and the functional layer are disengaged from the carrier layer and transferred to an object in those regions, where the adhesive layer is activated, e.g. by applying heat, radiation or pressure. The functional layer is responsible for the (perceived) optical characteristics and typically a compound of multiple layers, comprising at least a replication layer and a reflection layer. As a comprehensive, abstract example to describe the present teaching we will subsequently use a functional layer comprising a transparent replication layer and a metallized reflection layer. Generally, within the scope of the present teaching, the functional layer may or may not comprise a metallic component (i.e. it may be metal-free). For example, foils using refractive optical effects, e.g. lenticular print or based on non-metallic structured coating, which have a functional layer without metal or metallic constituents, may be used. For the sake of simplicity, we generally omit subsequently further non-related details, such as layers, which are needed in practice but do not contribute to the present teaching, e.g. a very thin lacquer layer between carrier and protection layer, functional layers comprising more than two layers, functional layers with different materials, e.g. with opaque non-metallized layers (cf. WO 2005 07 52 15 A3), etc.
It is known from DE 43 07 487 C2 that the shape of the transferred parts can be pre-determined by structuring the adhesive layer into activatable parts and non-activatable parts. While a personalized structuring in the adhesive layers may be used to pre-determine the shape of the parts transferred to the object, still a second production step is needed to print the marking needed e.g. for a security device verifiable by optical authentication means.
It is known from EP 0 420 261 B1 to produce a printed marking on a conventional hot-stamping foil. However, the marking is arranged either above or below the reflection layer such that it is difficult and error-prone due to limited contrast and symbol clearance to optically detect and read-out such a marking using machine-vision equipment and image recognition methods.
The method disclosed in EP 1 854 642 A2 includes forming a label on a surface of an object by printing optically variable (OV) ink onto the object and adhesively bonding, for example by hot-stamping, a patterned structure, such as a hologram, onto the OV ink. While the OV ink is applied directly onto the object, the hologram is formed by a layered structure comprising a reflective coating, a grating and a protective layer on top of the OV ink. By means of windows in the reflective coating, the OV ink underneath remains partially visible. Opaque indicia may be printed on top of the protective layer, i.e. overprinting the layered structure.
With respect to methods which are based on simply overprinting an existing raw-material, it is noted that in addition to a separate production step, which is necessary to overprint the foil after application, a print image produced in this manner can be removed (e.g. scratched off) and replaced relatively easily. Therefore, such methods cannot match the security achieved with fully integrated foils, i.e. where the print image is embedded beneath a permanent surface layer.
EP 2 848 423 A1 shows a security laminate/foil film with a carrier layer (first sub-layer), a release layer, an acrylic layer and two metallic layers. The first metallic layer is transparent and has a high refractive index. In the second metallic layer recesses are produced by etching, through which recesses data of a document provided with the foil remain visible. It is evident that the recesses need to remain clear in order to meet this purpose.
WO 2015/172189 A1 concerns the production of a security element integrally with a document. The document is produced together with (in line') the security element. This method is contrasted against security elements made separately from the remainder of the security document and subsequently applied to the document.
It is an object of the present teaching to overcome the disadvantages of the prior art. The present teaching provides for security devices comprising a security feature as well as a printed marking, which can be both applied to the object in a single production step and wherein the printed marking enables easy and reliable read-out.
The method according to the present teaching for producing a security foil, in particular a hot-stamping or cold-stamping foil, from an original foil comprising a carrier layer, a protection layer and a functional layer, comprises the following steps:
Correspondingly the security foil according to the present teaching comprises a carrier layer, a protection layer and a functional layer, wherein the functional layer has at least one clearance, wherein the foil comprises a printed layer arranged within and partially filling said clearance and adjacent to and non-overlapping with the functional layer, and wherein the printed layer represents a marking. Said clearance in the functional layer may be interpreted subsequently as the whole functional layer (i.e. all layers forming the functional layer; see below) being removed at this location. In practical applications, it may be beneficial to remove some but at least one of the layers forming the functional layer, e.g. only removing a reflection layer in the clearance area but sparing a replication layer.
A foil within the present context refers to a sheet-like product comprising a multilayered coating that transfers to the surface of an object. It has a functional layer, which can provide the foil with viewpoint-dependent optical characteristics. The functional layer preferably comprises a replication layer and a reflection layer, wherein the reflection layer comprises a metal material. Such foils may be hologram foils or generally foils for producing optically variable devices. Alternatively, the functional layer may be metal-free as explained in the outset. The present method is performed after production of the functional layer of the original foil but does not require a complete ready-to-use foil. Instead the original foil may also be an intermediate foil, e.g. without an adhesive layer. The clearance in the functional layer corresponds to an area, where at least one of the corresponding layers is removed. Typically, at least a metalized reflection layer is removed, which is why the process is often called “demetalization”. The clearance may have an invariant (i.e. fixed or constant) shape and size. The selective removal of parts of the functional layer leaves the functional layer intact in a pattern area within the clearance (where the foil thus keeps its original characteristics). In case the original foil is not an intermediate but a complete foil including an adhesive layer covering the functional layer, both at least a part of the functional layer and the adhesive layer may be removed during selective removal.
The marking is preferably a unique, random, individual, variable machine- and/or human-readable marking. A human-readable marking consists typically of letters and/or numbers. A machine-readable marking is preferably a bar-code, e.g. a 2D-Code. The marking may be an identifier. The printed layer representing the marking is arranged adjacent to and non-overlapping with the functional layer. By printing the marking into the clearance, a degradation of contrast and machine-readability by a metalized background of the marking can be avoided.
The present security foil is suitable for equipping an object with a security device by transferring at least a section of the protection layer, the functional layer and the printed layer to the object. The application of the security device onto an object can be performed in a single, preferably non-registered production step. In particular the transferred section may be comprised entirely within the clearance.
The method may further comprise the step of applying an adhesive material to produce an adhesive layer covering the functional layer and/or the printed layer. The security foil may comprise an adhesive layer covering the functional layer and/or the printed layer. The adhesive material may act as a filling between a printed marking and the original functional layer. The adhesive layer may be adapted across modified and unmodified parts of the foil to allow transferring the foil using standard transfer methods, e.g. hot-foil stamping or cold-foil stamping. The adhesive layer may not be required if the original foil has an adhesive layer and the original adhesive layer remains intact on the functional layer and extends over the majority of the foil surface, i.e. the clearance and/or the printed layer are comparatively small and may not need to be covered by the adhesive layer.
In an advantageous embodiment the present method may comprise applying a first adhesive material to the printed layer, wherein said first adhesive material is different from a second adhesive material covering the functional layer. Correspondingly the adhesive layer of the present security foil may comprise a first adhesive material covering the printed layer and a second adhesive material covering the functional layer, wherein the first adhesive material is different from the second adhesive material. By using different adhesive materials, differences in the material properties of the printed layer and the functional layer, e.g. regarding thermal conductivity and/or transparency to radiation, can be compensated to allow for a uniform transfer process, in particular essentially uniform adherence over the surface of the security device.
Moreover, the present method may comprise the step of filling at least a part of the clearance between the printed layer and the functional layer with a filling material. The present security foil may comprise a filling material arranged within the clearance of the functional layer, at least enclosing (i.e. at least partially surrounding) the printed layer. With the filling material a generally plane surface can be achieved, in particular for application to a plane surface on an object, e.g. with an adhesive layer having a homogeneous thickness.
In a preferred embodiment the removed parts forming the clearance corresponding to two neighboring security devices (i.e. arranged side-by-side on the security foil before being transferred to an object) touch and/or overlap, such that one continuous clearance is created spanning several security devices along the foil. In particular the functional layer may be removed completely except for the pattern areas forming the security features. In this setting, fairly inaccurate or unregistered transfer methods may be used because misalignment results in transferring parts of the present security foil which are transparent, e.g. only consist of protection and adhesive layer. Hence, while maintaining good integration to the object's design, it is possible to transfer a larger portion of the present security foil to the object, which is guaranteed to contain at least the part corresponding to the security device.
In another preferred embodiment the adhesive layer is only applied to the region corresponding to the security device, while the remaining parts are left without an adhesive layer or with a non-activatable adhesive layer. In this setting, which corresponds basically to masking the parts to transfer, i.e. the security device, with activatable adhesive, a very inaccurate transfer process can be used while it is guaranteed that only the desired security device is transferred to the object. As an example, a rotary, heated cylinder without any special treatment suffices to transfer security devices via hot-foil stamping. In this setting there are no unwanted parts transferred to the object, even though a very large portion of the security foil may be exposed to the activators (UV, temperature, pressure) during the transfer process.
The arrangement and/or period of security devices on the security foil (i.e. the parts of the foil configured for producing security devices) may be synchronized with the application use case, i.e. that the continuous application of the present security foil onto the objects results in one transferred security device per object. For instance, the period may be adapted to the distance of bottle caps or beverage cans in an industrial filling process. It may be necessary to account for border-line cases and/or countermeasures may need to be taken to compensate for accumulating offsets in the transfer process, which can e.g. be done with a very coarse registration.
In a preferred embodiment, the filling material is transparent. In this case the security device integrates flexibly with the appearance of the object.
In an alternative embodiment, the color or brightness of the filling material is complementary to the color or brightness respectively of the printed layer. Since the filling material appears as the background of the marking and the security feature (formed by the pattern area of the foil), an appearance similar to a tag or label can be achieved with such a filling material.
Preferably the filling material may cover the printed layer. This has the advantage that the filling material can compensate for differences in layer thickness between the printed layer and the functional layer. In a preferable embodiment the filling material may be ink applied in a second printing step, e.g. a black marking may be grounded white by filling at least a part of the clearance with white ink.
In an advantageous embodiment of the present method, during selectively removing parts of the functional layer a part of the functional layer having a predefined shape is spared such that said part is enclosed by the produced clearance. Consequently, the clearance of the security foil may preferably enclose a security feature formed by a spared pattern area of the functional layer. The clearance delimits the pattern area, which maintains the original foil's characteristics. This has the advantage that the shape of the security feature, which is created by transferring the pattern area, is defined during the selective removal step and not during the transfer step (as with conventional security features).
The marking may comprise a machine-readable code, in particular a bar-code, a QR-Code or a DataMatrix code. Such codes are particularly suited for identification purposes, e.g. product registration, tracking and authentication, and benefit particularly from the improved contrast of the marking achieved with the present teaching. An identification marking can be used for authentication together with the security features produced from the pattern area, e.g. by verifying the relative arrangement between the security feature and the marking. Additionally, the security features within the pattern area may be recorded and may be encoded directly into the marker and/or stored together with an identifier, which is encoded in the marker, in a data base.
Advantageously the marking may be printed using a digital printing technology, in particular digital ink-jet printing. This allows for production of individual marking on each instance along the security foil and thus for each security device produced therefrom. Correspondingly the printed layer of the present security foil preferably comprises an ink.
The present teaching also concerns a security device produced by application of the above security foil. Specifically, it concerns a security device comprising a protection layer and a functional layer, wherein the functional layer has at least one clearance, wherein the security device comprises a printed layer arranged within and partially filling said clearance and adjacent to and non-overlapping with the functional layer, and wherein the printed layer represents a marking. The functional layer may be of the type discussed above in connection with the security foil, comprising a replication layer and a reflection layer. In a preferred embodiment the security device comprises a security feature formed by a pattern area of the security foil, wherein the security feature has the original foil's characteristics. The security feature may be arranged within the clearance.
Finally, and with regard to copy protection of the security device, the present teaching concerns a batch of security devices having a randomly distributed offset between the marking represented by the printed layer and the functional layer, in particular a section of the functional layer delimited by said clearance, and/or having a randomly distributed offset between the clearance (or analogously the spared pattern area) and a reference marking provided in the functional layer, wherein one standard deviation of the offset is at least 50 micrometer. The registration of industrial printing steps is typically subject to tolerances exceeding this offset, e.g. not below 0.1 millimeters. Such registration tolerances occur when e.g. the clearance is registered with the printing step. Also, the production of the clearance with said pattern area arranged within the clearance is randomly offset relative to a reference position (e.g. indicated by a reference marking) on the foil. Consequently, the security features extracted from the pattern area are randomly distributed relative to the pattern area's border.
These random offsets (and any other offsets evolving from the registration of two processing steps) provide a stochastic and hence unpredictable feature of the security device and thus can be used to authenticate the security device and identify forged security devices.
Finally, it is preferable that the present security foil is configured for transferring a security device as described above from the security foil onto an object in a single production step, in particular in a single transfer step, e.g. by hot-foil stamping or cold-foil stamping.
The present teaching will be defined in more detail below by means of preferred exemplary embodiments, to which it is not to be limited to, however, and with reference to the drawings. In detail:
The meta foil 1 shown in
In a state-of-the-art production line according to
The present teaching is based on the realization that transfer-technologies such as hot-foil and cold-foil stamping are available for very high production speeds (yet in an unregistered manner). Most of today's printing lines are already equipped with hot- or cold-foil stamping equipment. The present teaching therefore proposes a transferable sheet-like product, in particular a security foil 13, which comprises a security feature 8 as well as a machine-readable marking 12 as shown in
A first example of the inventive method for producing a security foil 13 is illustrated in
For practical applications it is beneficial for the production of the present security foil 13 not to use a finished raw material 10 as the original foil 16, but to intercept an existing production chain while the raw material 10 is still an intermediate foil without the adhesive layer 7 and use this intermediate foil as the original foil 16 for producing the security foil 13.
As shown in
It has turned out that in practice different embodiments need to be considered. In most illustrations (e.g.
With regard to
Due to the different structure, the security foil 13 does not have the exact same physical properties as a conventional raw material 10. Yet the very same transfer processes can be used by only modifying the process parameters such as heat and/or pressure and/or time, because the general structure comprising the surrounding carrier layer 2, protection layer 3 and adhesive layer 7 remains the same. Similarly, the modified part comprising the functional layer 4 and the printed layer 17 as well as the clearance 14 can be seen as a functional layer with different properties, such as a large number of different function layers are known—and all of them can be transferred using the same process. Thus, the same machinery can be used for the transfer process, albeit it may need to be configured with different operation parameters.
Consequently, a security device 19 can be transferred from the security foil 13 in one non-registered production step onto an object 9. A coarse registration may be needed to not unintentionally transfer other parts of the security foil 13 interfering with the object's design. For such cases, it is beneficial to provide a clearance 14 that is larger than the security device 19. This accounts for manufacturing- and registration tolerances.
As shown in
In another preferable setting shown in
Each step in the process shown in
Number | Date | Country | Kind |
---|---|---|---|
17162789.6 | Mar 2017 | EP | regional |
Filing Document | Filing Date | Country | Kind |
---|---|---|---|
PCT/EP2018/057388 | 3/23/2018 | WO | 00 |