Printing techniques may be utilized to print security articles, such as banknotes, checks, passports, postage stamps, identity cards, driver's licenses, or the like with a feature that is utilized to prevent forgery or counterfeiting. For example, a watermark may be present in a banknote substrate (e.g., paper money), and may be visible when the banknote is viewed with backlighting. Similarly, a security ink, such as a color-shifting ink, may be utilized to print a portion of a security article. For example, a portion of a security article of paper currency may be printed with an optically variable color-changing ink that causes a viewer to observe a first color when viewing the security article at a first angle and a second color when viewing the security article at a second angle. In this way, the user can determine that the security article is genuine (e.g., not counterfeit or forged). However, a user may be unaware that a particular security feature, such as optically variable color-changing ink, has been incorporated into a security article, and may fail to check the security article for the particular security feature, thus limiting the effectiveness of the particular security feature.
According to some possible implementations, a security article may include a substrate. The security article may include a layer of security ink. The layer of security ink may include a set of color-shifting interference particles. The security article may include a layer of magnetic color-shifting ink. The layer of magnetic color-shifting ink may include a set of magnetically aligned magnetic particles. A color-shifting property of the layer of security ink and a color-shifting property of the layer of magnetic color-shifting ink may have a threshold level of similarity to create a color matching effect.
According to some possible implementations, a method may include printing a first security ink layer onto a substrate of a security article. The first security ink layer may include a first set of particles. The first security ink layer may include a first pigment with a first concentration. The method may include printing a second security ink layer onto the first security ink layer. The second security ink layer may include a second set of particles. The second security ink layer may include a second pigment with a second concentration. The second security ink layer and the first security ink layer may share a color-shifting property. The method may include exposing the security article to a magnetic field to magnetically orient the second set of particles. The method may include curing the second security ink layer to fix an orientation of the second set of particles based on magnetically orienting the second set of particles.
According to some possible implementations, a security article may include a substrate. The security article may include a dynamic security feature printed onto the substrate. The dynamic security feature may include a magnetically aligned security ink exhibiting a dynamic optical effect when exposed to a light source at a plurality of orientations relative to an observer. The security article may include a static security feature printed onto the substrate within a threshold proximity to the dynamic security feature. The static security feature may printed on top of the dynamic security feature, underneath the dynamic security feature, or adjacent to the dynamic security feature. The static security feature may include a color-shifting ink exhibiting a static optical effect when exposed to the light source at the plurality of orientations relative to the observer.
The following detailed description of example implementations refers to the accompanying drawings. The same reference numbers in different drawings may identify the same or similar elements.
A device banknote may include a security feature, such as a watermark or the like, in a security article of paper currency. A person may inspect or a bill validator device may analyze the security article to determine that the watermark is present in the security article. Based on identifying the watermark, the person may be confident or the bill validator device may determine that the security article is genuine. For example, a person may view a watermark in a dollar bill and may conclude that the dollar bill is not counterfeit.
However, the person may not know that a particular security article includes a particular security feature. For example, the person may not realize that a color-shifting ink is utilized to print a portion of a dollar bill and may, thus, fail to attempt to verify that the color-shifting ink is present by rotating or tilting the dollar bill. Implementations, described herein, may utilize a metameric security feature to facilitate determination of the veracity of a security article, such as a banknote, a check, a passport, a driver's license, a legal document, or the like. Moreover, based on including a dynamic security feature, such as the metameric security feature, within a threshold proximity of a static security feature, a likelihood that a person fails to inspect the static security feature is reduced. In this way, a likelihood of a security article being fraudulently passed off as genuine is reduced. Thus, implementations, described herein, improve the color contrast of a color shifting color shifting security feature and improve recognition and the likelihood that a user will notice a simulation of the feature.
As further shown in
In some implementations, particles 106 may include a set of magnetic particles. For example, when particles 106 are magnetic particles, security ink layer 104 may be exposed to a two-axial magnetic field to provide a flat alignment (e.g., substantially parallel to the surface of security article 102) of a set of particles 106. As shown, security ink layer 104 is coated with a security ink layer 108. Security ink layer 108 may include a magnetic color-shifting ink that includes a set of magnetically aligned magnetic particles 110. In this case, security ink layer 108 may be a layer of magnetic color-shifting ink. In some implementations, security ink layer 104 and security ink layer 108 may be a color matching or a metameric pair to cause security article 102 to exhibit a color matching or a metameric effect. For example, security ink layer 104 and security ink layer 108 may be associated with pigments with substantially similar color-shifting properties (e.g., the pigments each shift from approximately a first color to approximately a second color, such as from within an at least 10 deltaE similar first color to an at least 10 deltaE similar second color, from within an at least 10 deltaE similar first color to an at least 10 deltaE similar second color, or the like, based on a shift of a particular angle) to cause security ink layer 104 to color match security ink layer 108. Additionally, or alternatively, security ink layer 104 and/or security ink layer 108 may contain one or more dyes or pigments to cause color matching or metamerism between security ink layer 104 and/or security ink layer 108.
Security article 102 (and security ink layer 108) may be exposed to an external magnetic field during manufacture to cause particles 110 to be magnetically aligned to a direction of the magnetic field. In some implementations, particles 110 may be linearly aligned (e.g., based on a static magnetic field), circularly aligned (e.g., based on a rotating magnetic field), or the like. In some implementations, security ink layer 108 may be exposed to a curing procedure during manufacture. For example, security ink layer 108 may be exposed to an energy source, such as an ultraviolet (UV) light source, which may cause an organic binder of security ink layer 108 to solidify, thereby fixing particles 110 inside security ink layer 108 and in alignment with the direction of the magnetic field. In this way, a dynamic security feature, such as a rolling bar effect, a three-dimensional illusion effect, or the like may be incorporated into security article 102.
As further shown in
As shown in
As indicated above,
In this way, a security article may include a set of layers of security ink to form a metameric effect for a security feature of the security article. Based on including a color matching or metameric effect for the security article, a likelihood of a viewer inspecting the security feature is improved relative to another type of security feature, thereby improving security of the security article.
As shown in
As shown in
As shown in
In some implementations, the rolling bar effect may be aligned horizontally with regard to security article 202, as shown, to cause the rolling bar to move vertically with regard to security article 202. In this way, a viewer may be more likely to notice the rolling bar relative to another type of orientation.
As indicated above,
As shown in
As shown in
As indicated above,
As shown in
In some implementations, dynamic security feature 404 and static security feature 406 may be non-overlapping security features. For example, first ink may be printed onto a first region of security article 402 to form dynamic security feature 404 and second ink may be printed onto a second, non-overlapping region of security article 402 to form static security feature 406. In this way, an amount of ink that is used is reduced relative to printing ink in overlapping regions. In some implementations, the first region and the second region may be partially overlapping. In some implementations, the first region and the second region may be contiguous. In some implementations, the first region and the second region may be within a threshold proximity.
In some implementations, static security feature 406 may be a solid (i.e., contiguous) region of ink. For example, the second region may include a contiguous deposition of the second ink to form a solid region of color rather than a line-art region of color, a patterned region of color, or the like. In some implementations, static security feature 406 may be formed from non-magnetic particles and dynamic security feature 404 may be formed from magnetic particles, and the magnetic particles may form an image contiguous to a solid region of color formed from the non-magnetic particles. In some implementations, static security feature 406 and dynamic security feature 404 may be within a threshold proximity of an edge of security article 402, such as within 20 millimeters, within 10 millimeters, within 5 millimeters, within 1 millimeter, or the like. In this case, utilization of dynamic security feature 404 may call attention to static security feature 406 based on the three-dimensional effect of dynamic security feature 404, despite dynamic security feature 404 and static security feature 406 being within the threshold proximity of the edge of security article 402.
As shown in
As further shown in
As shown, static security feature 406 appears as a first color at a first orientation in
Moreover, with regard to the three-dimensional illusion effect of dynamic security feature 404, the viewer may be caused to rotate security article 402 to inspect dynamic security feature 404 (e.g., to attempt to view the three-dimensional globe from another angle and see the movement of the illumination from the north pole to the south pole and/or from the south pole to the north pole), causing color-shifting to occur for static security feature 406. In this way, a likelihood that a viewer fails to inspect static security feature 406 because the viewer does not know that security article 402 includes a static color-shifting ink security feature at the location of static security feature 406 is reduced relative to another security article that includes a static color-shifting ink security feature without a dynamic security feature within a threshold proximity (e.g., overlapping, within one centimeter, within one millimeter, printed on top of, printed underneath of, printed adjacent to, or the like). Furthermore, based on the viewer focusing on dynamic security feature 404, static security feature 406 may appear to suddenly (i.e., within a threshold period of time and/or a threshold degree of tilt) change color, causing the viewer's attention to shift from inspecting dynamic security feature 404 to inspecting static security feature 406 and to associate static security feature 406 with being a security feature for inspection. In this way, including both a dynamic security feature 404 and a static security feature 406 within a threshold proximity in a security article improves a likelihood that a user inspects security article 402 to ascertain whether security article 402 is genuine relative to including only one of the security features or including the security features at separate locations of a security article.
As shown in
Dynamic security feature 404 includes a second region 404B of ink printed onto region 404A to form a pattern of continents on the parabolic convex Fresnel reflector (e.g., to cause dynamic security feature 404 to appear as a globe of the Earth). In this case, region 404A in printed with a blue magnetic ink to form “oceans” of the globe of the Earth, and region 404B is printed with a gold-to-green magnetic ink (e.g., an optically variable ink that shifts from gold to green at different orientations and includes magnetic particles) in a concentration of approximately 10% to 25%, approximately 15% to 20%, or the like. Both the blue magnetic ink of region 404A and the gold-to-green magnetic ink of region 404B are exposed to a rotating magnetic field and cured using UV light to cause the ink to form the parabolic convex Fresnel reflector and cause the three-dimensional illusion effect.
As shown, static security feature 406 is printed onto security article 402 to surround security feature 404, thus causing a viewer's attention toward dynamic security feature 404 to cause the viewer to inspect static security feature 406. In some implementations, static security feature 406 is printed using the same gold-to-green magnetic ink of region 404B. Static security feature 406 is not exposed to a magnetic field to magnetically orient particles, thus reducing a likelihood of color fading at edges of static security feature 406.
As indicated above,
As shown in
As further shown in
In some implementations, the second security ink layer may include a pigment selected to be a metameric pair with another pigment of the first security ink layer. For example, a first pigment of the first security ink layer and a second pigment of the second security ink layer may be selected to have a substantially similar color-changing effect based on tilting the security article, as described herein. In some implementations, the first and second security ink layers may be deposited to form multiple security features. For example, the first (or multiple first) security ink layer(s) may be deposited to form a first, static security feature and the second (or multiple second) security ink layer(s) may be deposited to form a second, dynamic security feature, as described herein.
As further shown in
As further shown in
Although
In this way, a metameric effect security article is manufactured to include one or more security features, such as a dynamic security feature, a static security feature, a combination of a dynamic security feature and a static security feature, or the like. Based on including a static security feature within a threshold proximity of the dynamic security feature, a likelihood that a viewer fails to inspect the static security feature is reduced relative to the static security feature being printed at another location of the security article.
The foregoing disclosure provides illustration and description, but is not intended to be exhaustive or to limit the implementations to the precise form disclosed. Modifications and variations are possible in light of the above disclosure or may be acquired from practice of the implementations.
Some implementations are described herein in connection with thresholds. As used herein, satisfying a threshold may refer to a value being greater than the threshold, more than the threshold, higher than the threshold, greater than or equal to the threshold, less than the threshold, fewer than the threshold, lower than the threshold, less than or equal to the threshold, equal to the threshold, etc.
Even though particular combinations of features are recited in the claims and/or disclosed in the specification, these combinations are not intended to limit the disclosure of possible implementations. In fact, many of these features may be combined in ways not specifically recited in the claims and/or disclosed in the specification. Although each dependent claim listed below may directly depend on only one claim, the disclosure of possible implementations includes each dependent claim in combination with every other claim in the claim set.
No element, act, or instruction used herein should be construed as critical or essential unless explicitly described as such. Also, as used herein, the articles “a” and “an” are intended to include one or more items, and may be used interchangeably with “one or more.” Furthermore, as used herein, the term “set” is intended to include one or more items (e.g., related items, unrelated items, a combination of related items, and unrelated items, etc.), and may be used interchangeably with “one or more.” Where only one item is intended, the term “one” or similar language is used. Also, as used herein, the terms “has,” “have,” “having,” or the like are intended to be open-ended terms. Further, the phrase “based on” is intended to mean “based, at least in part, on” unless explicitly stated otherwise.
This application is a continuation of U.S. patent application Ser. No. 16/422,274, filed May 24, 2019, which is a continuation of U.S. patent application Ser. No. 15/830,301, filed Dec. 4, 2017 (now U.S. Pat. No. 10,357,991), which claims priority under 35 U.S.C. § 119 to U.S. Provisional Patent Application No. 62/436,226, filed on Dec. 19, 2016, the contents of each of which are incorporated by reference herein in their entireties.
Number | Name | Date | Kind |
---|---|---|---|
3853676 | Graves et al. | Dec 1974 | A |
4197563 | Michaud | Apr 1980 | A |
5630877 | Kashiwagi et al. | May 1997 | A |
6902807 | Argoitia et al. | Jun 2005 | B1 |
7040664 | Taylor et al. | May 2006 | B2 |
7047883 | Raksha et al. | May 2006 | B2 |
7258900 | Raksha et al. | Aug 2007 | B2 |
7300695 | Argoitia et al. | Nov 2007 | B2 |
7517578 | Raksha et al. | Apr 2009 | B2 |
7604855 | Raksha et al. | Oct 2009 | B2 |
7717038 | Raksha et al. | May 2010 | B2 |
7729026 | Argoitia et al. | Jun 2010 | B2 |
7922209 | Beretta et al. | Apr 2011 | B1 |
7934451 | Raksha et al. | May 2011 | B2 |
8039093 | Leenders et al. | Oct 2011 | B2 |
8064632 | Baloukas et al. | Nov 2011 | B2 |
8132736 | Wild et al. | Mar 2012 | B2 |
8137762 | Raksha et al. | Mar 2012 | B2 |
8211509 | Raksha et al. | Jul 2012 | B2 |
8211531 | Schmid et al. | Jul 2012 | B2 |
8287989 | Raksha et al. | Oct 2012 | B2 |
8343615 | Raksha et al. | Jan 2013 | B2 |
8726806 | Raksha et al. | May 2014 | B2 |
9470458 | Martin | Oct 2016 | B1 |
9701151 | Camus et al. | Jul 2017 | B2 |
9724957 | Lefebvre et al. | Aug 2017 | B2 |
10357991 | Raksha et al. | Jul 2019 | B2 |
20020160194 | Phillips et al. | Oct 2002 | A1 |
20060035080 | Argoitia | Feb 2006 | A1 |
20060115110 | Rodriguez et al. | Jun 2006 | A1 |
20060194040 | Raksha et al. | Aug 2006 | A1 |
20080024847 | Kittler, Jr. et al. | Jan 2008 | A1 |
20080171144 | Raksha et al. | Jul 2008 | A1 |
20090184169 | Degott et al. | Jul 2009 | A1 |
20090200791 | Despland et al. | Aug 2009 | A1 |
20100040845 | Schmid et al. | Feb 2010 | A1 |
20100170408 | Gygi et al. | Jul 2010 | A1 |
20110260442 | Chalifoux | Oct 2011 | A1 |
20110298207 | Despland et al. | Dec 2011 | A1 |
20120205905 | Degott et al. | Aug 2012 | A1 |
20120326430 | Kohlmann | Dec 2012 | A1 |
20130093174 | Downing et al. | Apr 2013 | A1 |
20130147179 | Baloukas et al. | Jun 2013 | A1 |
20130172048 | Rodriguez et al. | Jul 2013 | A1 |
20140077485 | Raksha et al. | Mar 2014 | A1 |
20140210200 | Bornschlegl et al. | Jul 2014 | A1 |
20150231912 | Yoon et al. | Aug 2015 | A1 |
20150321449 | Filipp | Nov 2015 | A1 |
20150321499 | Argoitia et al. | Nov 2015 | A1 |
20160187546 | Raksha et al. | Jun 2016 | A1 |
20160339474 | Degott | Nov 2016 | A1 |
20180170094 | Raksha et al. | Jun 2018 | A1 |
20190275826 | Raksha et al. | Sep 2019 | A1 |
Number | Date | Country |
---|---|---|
2012272129 | Jan 2014 | AU |
2707728 | Jun 2009 | CA |
2791199 | Sep 2011 | CA |
1505668 | Jun 2004 | CN |
1853961 | Nov 2006 | CN |
101011916 | Aug 2007 | CN |
101903183 | Dec 2010 | CN |
102224015 | Oct 2011 | CN |
103268657 | Aug 2013 | CN |
103338871 | Oct 2013 | CN |
103476596 | Dec 2013 | CN |
103748284 | Apr 2014 | CN |
103963352 | Aug 2014 | CN |
104066592 | Sep 2014 | CN |
104497714 | Apr 2015 | CN |
104813338 | Jul 2015 | CN |
105082713 | Nov 2015 | CN |
1669213 | Jun 2006 | EP |
1780040 | May 2007 | EP |
1806238 | Jul 2007 | EP |
1854642 | Nov 2007 | EP |
1854852 | Nov 2007 | EP |
2965920 | Jan 2016 | EP |
2009514694 | Apr 2009 | JP |
20160083578 | Jul 2016 | KR |
201435003 | Sep 2014 | TW |
2008139373 | Nov 2008 | WO |
2010037638 | Apr 2010 | WO |
2010058026 | May 2010 | WO |
2010066838 | Jun 2010 | WO |
2010115928 | Oct 2010 | WO |
2011012520 | Feb 2011 | WO |
2011092502 | Aug 2011 | WO |
2011107271 | Sep 2011 | WO |
2012175212 | Dec 2012 | WO |
2013106470 | Jul 2013 | WO |
WO-2015082344 | Jun 2015 | WO |
2015121028 | Aug 2015 | WO |
Entry |
---|
Datacolor, “Metamerism,” 2009, 2 pages. |
Extended European Search Report for Application No. EP17206793, dated Apr. 5, 2018, 7 pages. |
Extended European Search Report for Application No. EP20174029.7, dated Sep. 29, 2020, 6 pages. |
Hernandez S.M., “Estudio de la dinamica en Suspensiones magneto-reologicas sometidas a campos externos mediante el uso de tecnicas opticas. procesos de agregacion, formacion de estructuras y su evolucion espacio-temporal,” Apr. 2, 2002, 10 pages. Retrieved from Internet:[URL:https://www.infouniversidad.es/tesis-doctorales/fisica/estudio-de-la-dinamica-en-suspensiones-magnet. |
Itti L., “Visual Salience,” Sep. 7, 2007, 9 pages. Retrieved from Internet:[URL:http://www.scholarpedia.org/article/Visual_salience]. |
Schmidt M., “Security which Ornaments,” Oct. 2007, 2 pages. Retrieved from Internet:[URL:http://www.eng.vodyanoyznak.ru/magazine/1/31.htm]. |
Van Renesse R.L., “Optical Document Security,” 2005, 6 pages. |
Wikipedia., “Visual Search,” Apr. 16, 2018, 15 pages. Retrieved from Internet:[URL:https://en.wikipedia.org/wiki/Visual_search]. |
Extended European Search Report for Application No. EP22151406.0, dated Aug. 29, 2022, 7 pages. |
Number | Date | Country | |
---|---|---|---|
20220143997 A1 | May 2022 | US |
Number | Date | Country | |
---|---|---|---|
62436226 | Dec 2016 | US |
Number | Date | Country | |
---|---|---|---|
Parent | 16422274 | May 2019 | US |
Child | 17583404 | US | |
Parent | 15830301 | Dec 2017 | US |
Child | 16422274 | US |