Security document

文档序号:722668 发布日期:2021-04-16 浏览:15次 中文

阅读说明:本技术 防伪文件 (Security document ) 是由 尼尔斯·米克尔·安通·扬森 于 2019-07-10 设计创作,主要内容包括:本发明涉及防伪文件,包括:正面;背面;包括穿孔图案的第一安全特征,穿孔图案在对着亮背景观看时显示第一图像信息;以及包括图案的第二安全特征,该图案在落在该图案上的光被反射时显示第二图像信息;其中,在防伪文件上显示的第一图像信息和第二图像信息彼此对应;其中,正面包含第二安全特征;其中,背面包含第二安全特征;以及其中,背面的第二图像信息是正面的第二图像信息的镜像图像信息。(The invention relates to a security document comprising: a front side; a back side; a first security feature comprising a perforation pattern, the perforation pattern displaying first image information when viewed against a bright background; and a second security feature comprising a pattern which displays second image information when light falling on the pattern is reflected; wherein the first image information and the second image information displayed on the security document correspond to each other; wherein the front face comprises a second security feature; wherein the back side comprises a second security feature; and wherein the second image information of the back side is mirror image information of the second image information of the front side.)

1. A security document comprising:

the front surface of the utility model is provided with a plurality of grooves,

on the back side of the base plate,

a first security feature comprising a perforation pattern displaying first image information when viewed against a bright background, an

A second security feature comprising a pattern that displays second image information when light falling on the pattern is reflected,

wherein the first image information and the second image information displayed on the security document correspond to each other,

the security document is characterized in that,

the front face including the second security feature, an

The back side includes the second security feature,

wherein the second image information of the back surface is mirror image information of the second image information of the front surface.

2. The security document according to claim 1,

the second security feature comprises an engraved pattern displaying second image information when light falling on the engraved pattern is reflected, and/or

The second security feature comprises an ink-jet printed pattern which displays second image information when light falling on the printed pattern is reflected, and/or

The second security feature comprises a laser printed pattern which displays second image information when light falling on the printed pattern is reflected.

3. A security document according to claim 1 or 2,

on the back side, the second image information represented by the second security feature is the same as the first image information represented by the first security feature.

4. The security document according to any one of claims 1 to 3,

on the back face, the first image information and the second image information of the respective security feature coincide.

5. The security document according to any one of claims 1 to 4,

on the front side, the second image information represented by the second security feature corresponds to the second image information on the back side.

6. The security document according to any one of claims 1 to 5,

on the front side, the first image information and the second image information of the respective security feature coincide,

preferably, the second image information of the front side is coincident with the second image information of the back side and the first image information of the security document.

7. The security document according to any one of claims 1 to 6,

the second image information of the front side includes a size larger or smaller on the document than the second image information of the back side,

wherein, preferably, the size of the second image information of the back surface is the same as the size of the first image information.

8. The security document according to any one of claims 1 to 7,

the front side comprises the second security feature having a pattern of a first printing technique,

the back side comprises the second security feature having a pattern of a second printing technique,

the pattern of the second security feature displays second image information when light falling on the pattern is reflected, an

The anti-counterfeiting file comprises:

a. the first security feature having a perforation pattern that displays first image information when viewed against a bright background,

b. the second image information produced by the first printing technique on the front side, and

c. the second image information made by a second printing technique on the back side;

wherein the second image information corresponds to the first image information, an

Wherein the second image information of the back surface is mirror image information of the second image information of the front surface.

9. A security document according to claim 8,

the first printing technique and the second printing technique are different from each other,

wherein preferably said first printing technique comprises laser engraving, ink jet printing or laser printing,

wherein preferably said second printing technique comprises laser engraving, ink jet printing or laser printing,

wherein preferably the first printing technique comprises laser engraving and the second printing technique comprises inkjet printing or laser printing.

10. The security document according to any one of claims 1 to 9,

the first security feature being in the form of a perforation pattern which displays a grey tone when viewed against a bright background,

wherein preferably the document is made of a material which transmits light to a limited extent, wherein preferably at least some of the perforations forming part of the perforation pattern extend over only a part of the thickness of the document at the location of the perforations, and wherein preferably the thickness of the remaining part of the document at the location of the perforations is adjusted in accordance with the image to be displayed.

11. The security document according to any one of claims 1 to 10,

at least some of the perforations forming a portion of the perforation pattern extend at an angle other than 90 degrees relative to a major plane of the document,

wherein preferably the angle of the perforation is adjusted to obtain the first image information with grey value adjustment, and/or

Wherein preferably the density or diameter of the perforations of the first security feature is adjusted to generate the first image information.

12. A security document according to one of claims 1 to 11,

the first security feature represents an image, and/or

The second security feature represents an image.

13. A security document according to claims 1 to 12,

arranging material in the perforations of the first security feature, and/or

Wherein preferably the material is formed by an ink emitting light under UV light, and/or

Wherein preferably a vapour deposited metal layer is arranged in said perforations.

14. A security document according to one of claims 1 to 13,

the document comprising layers of material of different colours, wherein the colours are visible according to the depth of the perforations, and/or

Wherein preferably the document is made of plastic laminate and the core layer has a different colour to the other layers.

15. A security document according to one of claims 1 to 14,

the perforation pattern of the first security feature is further provided with perforations that are adjusted in density and size, and/or

Wherein preferably the perforation pattern of the first security feature is locally provided with a perforation pattern that is different from the remaining perforation patterns, and/or

Wherein preferably the perforation pattern of the first security feature is adapted to present a stereoscopic image to a viewer from a viewing position, and/or

Wherein preferably the perforation pattern of the first security feature is adapted to present an image to the user that is different at each viewing angle, and/or

Wherein preferably the angle of the perforation with respect to the main plane of the document increases with increasing distance from the centre of the perforation pattern, and/or

Wherein preferably the perforation pattern differs from a circle in cross section in its transverse plane.

Background

The present invention relates to security documents.

Such security documents are known, for example, as banknotes or identity cards with, for example, watermarks or the like.

Furthermore, known security documents comprise a security hologram which is applied to one side of the document, such as a passport or a banknote.

Although the prior art provides good security against counterfeiting, it is important to develop new security features for the technical potential of counterfeiters.

It is therefore an object of the present invention to provide a security document having security features that enhance security against counterfeiting and forgery, respectively, to complicate the counterfeiting of documents such as passports or tickets.

Disclosure of Invention

To solve the mentioned object, the following explanation may be used.

According to an aspect of the invention, the security document of the invention comprises a front side and a back side.

In general, the security document of the invention may be a badge, an identification card, a data page card in a passport or any other type of document that should be secured against counterfeiting, such as a ticket or a driver's license for a football game or a residence card.

Preferably, the security document comprises a first security feature comprising a perforation pattern which displays first image information when viewed against a bright background. Such a perforation pattern is preferably applied by means of a laser. This measure has the advantage that at the location of the perforations, material, such as paper, plastic or textile, is completely removed, so that no bumps or channels or burrs are felt at all when, for example, a finger tip is brushed across the document. If, for example, a counterfeiter applies a perforation pattern by means of, for example, a conical needle, cup-shaped edges or burrs are often produced, which are easily discernible with the finger tips. This therefore provides a good means of identifying possible counterfeits.

Furthermore, it is preferred that the security document comprises a second security feature comprising a pattern: the pattern displays second image information when light falling on the pattern is reflected. Such security features may be formed, for example, by laser engraving (laser engraving is the practice of using laser to engrave objects) or by inkjet printing or by laser printing.

Advantageously, the first image information and the second image information displayed on the security document correspond to each other. Corresponding information can thus be applied on the rear side and the front side, which for example helps to verify the authenticity of the security document. In this context, it will be easier for border officers or others, for example, to authenticate such security documents and at the same time make it more difficult for counterfeiters to reproduce.

Furthermore, it is advantageous if the front side comprises a second security feature, wherein preferably the rear side also comprises the second security feature. The security document therefore preferably comprises a first security feature (perforation pattern) visible on the front side and the rear side, as well as a front side with a second security feature and a rear side also with a second security feature.

It is further preferable that the second image information of the back surface is mirror image information of the second image information of the front surface.

Therefore, when the security document of the present invention is held against light so that light such as sunlight or a light source can emit light through the perforation pattern, a person looking at the front sees two images and image information referred to as first image information and second image information, respectively. On the front side, the first image and the second image correspond to each other and represent, for example, a passport photograph of a person.

Further, when the security document of the present invention is held against light so that light such as sunlight or a light source can emit light through the perforated pattern, a person viewing on the back side also sees two images and image information referred to as first image information and second image information, respectively. On the back side, the first image information and the second image information are identical and represent, for example, a passport photograph of a person.

However, the second image information of the front and back sides is different. The image information on the back side is then mirrored with respect to the image information on the front side.

Summarizing the above, the first image information of the first security feature can be observed if viewed on the back side of the security document, and the first image information of the first security feature can likewise be observed if viewed on the front side.

However, due to the fact that the first security feature partially and/or completely penetrates the security document through the perforations of the security document, the observable first image information on the back side is mirror image information of the observable first image information on the front side.

Therefore, all the image information on the back surface that can be observed by a person is mirror image information on the front surface that can be observed by a person.

Also, in other words, all the image information observable on the back surface is horizontal mirror image information of the image information observable on the front surface.

Due to this unique arrangement, a person or border official looking at the front side of the security document of the invention sees both a normal passport photograph, for example as a photograph on or in the security document, and the same passport photograph as a punched-out photograph.

And a person or border official looking at the back of the security document of the invention sees both a normal passport photograph, for example as a photograph on or in the security document, and the same passport photograph as a punched photograph.

However, the two photographs and image information on the back side, respectively, are mirrored compared to the photographs and image information on the front side, respectively.

To recapitulate the invention, the perforation pattern of the first security feature is applied to the security document only once and can be observed on the front and back side. The perforation pattern corresponds to and matches the pattern of the second security feature on the front and back surfaces, respectively.

Thus, a document (e.g. a passport) may be considered authentic if a first security feature having a perforation pattern and visible from the front and back corresponds to and matches the pattern of a second security feature on the front and back, respectively. Thus, it is very difficult to forge, for example, passports.

It is further preferred that the second security feature comprises an engraved pattern which displays the second image information when light falling on the engraved pattern is reflected.

Additionally or alternatively, it is preferred that the second security feature comprises an inkjet printed pattern which displays second image information when light falling on the printed pattern is reflected.

Additionally or alternatively, the second security feature may further comprise a laser printed pattern which displays the second image information when light falling on the printed pattern is reflected.

Furthermore, it is advantageous if, on the rear side, the second image information represented by the second security feature is identical to the first image information represented by the first security feature. Therefore, there is no difference in information content.

Preferably, on the rear side, the first image information and the second image information of the respective security feature coincide. This enhances the security against forgery, for example, a passport is only authentic when the passport photograph and the first and second image information respectively show the same image information on the back side.

A further advantage is that the arrangement of the registration can be easily controlled by holding the security document against light to check that the first image information comprising the perforation pattern and the second image information are aligned and registered, respectively.

Two photographs which are made different by perforation and by engraving or by laser printing or by inkjet printing and which are superposed and registered on one another thus each show the same photograph in the same space and position of the security document but in two different ways.

Thus, on the one hand, the user and the person see simultaneously the reflected image formed by engraving or by laser printing or by inkjet printing, respectively, and on the other hand the image formed by the perforations, emitted by the light.

It is also possible that on the front side the second image information represented by the second security feature corresponds to the second image information on the rear side. Thus, all images created on the security document show the same image and the same information content, respectively.

Furthermore, it is possible that, on the front side, the first image information and the second image information of the respective security feature coincide. This means that the second image information of the second security feature on the front side is aligned and registered, respectively, with the first image information of the first security feature, or superposed and registered, respectively, with each other.

Furthermore, it is preferred that the second image information of the front side is superimposed on the second image information of the rear side and on the first image information of the security document.

Thus, the first security feature visible on the front and back side of the security document is aligned and registered with the second image information of the second security feature applied on the front and back side, respectively.

In other words, it is preferable that the second image information having a pattern on the front surface coincides with the second image information having a pattern on the back surface, wherein the image information of the back surface is mirror image information of the front surface. It is also preferred that the first image information with the perforation pattern is made such that the image information and the pattern coincide and align with the second image information on the front side and the back side, respectively.

Thus, the three image information, i.e. the two image information of the second security feature on the front side and the back side, coincide with the patterned image information within the security document, wherein the image information of the second security feature is visible only on the front side or on the back side, and wherein the patterned image information is visible on both the front side and on the back side.

A further advantage is that the second image information of the front side has a larger or smaller size on the document than the second image information of the rear side. The image information can therefore be enlarged in the front side compared to the rear side, so that the security document can be easily compared with a person depicted on the security document, for example.

Preferably, the size of the second image information of the back surface is the same as the size of the first image information. This enables easy comparison of the two image information of the security document.

Furthermore, it is advantageous if the front side comprises a second security feature having a pattern of the first printing technology and preferably the back side comprises a second security feature having a pattern of the second printing technology.

In this context, it is preferred that the first and second printing techniques are different from each other. Preferably, the first printing technique comprises laser engraving, ink jet printing or laser printing and advantageously, the second printing technique comprises laser engraving, ink jet printing or laser printing.

Thus, it is possible that the first printing technique comprises laser engraving and the second printing technique comprises inkjet printing or laser printing.

Furthermore, it is preferred that the pattern of the second security feature displays second image information when light falling on the pattern is reflected.

It is also preferred that the security document comprises a first security feature having a perforation pattern which displays first image information when viewed against a bright background.

Preferably, the security document further comprises second image information produced by the first printing technique on the front side and second image information produced by the second printing technique on the rear side.

Advantageously, the second image information corresponds to the first image information, and the second image information of the back side is mirror image information of the second image information of the front side.

In summary, it is preferred that the security document is characterized in that:

the front side comprises a second security feature having a pattern which displays second image information when light falling on the pattern is reflected;

preferably, the back side comprises a second security feature having a pattern which displays second image information when light falling on the pattern is reflected;

preferably, the security document comprises a first security feature having a perforation pattern which displays first image information when viewed against a bright background;

preferably, the second image information of the front and back corresponds to the first image information; and

preferably, the second image information of the back side is mirror image information of the second image information of the front side.

However, due to the fact that the first security feature partially and/or completely penetrates the security document through the perforations of the security document, the first image information observable on the back side is mirror image information of the first image information observable on the front side.

Therefore, all the image information (the first image information and the second image information) on the back side that can be observed by a person are mirror image information (the first image information and the second image information) on the front side that can also be observed by a person.

According to another aspect of the invention, it is preferred that the perforation pattern and the first image information are respectively representations of images, and that the second image information is respectively arranged on the document by means of different techniques, such as respectively engraving an engraving pattern, or such as respectively laser printing a laser printing pattern, or such as respectively ink jet printing an ink jet printing pattern.

Since the image (second image information) and the perforation (first image information) can be visually compared, a less perfect counterfeit of only one of the two becomes immediately recognizable without the need to deploy a complicated auxiliary device. A high level of security against fraud is thus obtained.

This measure preferably requires that, in order to produce such a document, the following means must be present: means for making a perforation pattern (first image information); and means for producing the related images using different techniques; and means for recording the template and converting the template to digital form to enable control of the means required to make the perforation pattern.

An important application of the invention lies in the fact that: the document is a passport and the template is a photograph of the passport.

Advantageously, the document to be protected against counterfeiting comprises a first security feature in the form of a perforation pattern, wherein the perforation pattern extends over the surface of the security document and presents an image comprising a bright tone.

It is also preferred that the image and the first image information are respectively visible when the document is illuminated from behind.

Advantageously, the perforation pattern and the first image information are applied by means of a laser, respectively.

Preferably, the perforation pattern is a representation of the second image information and the image, respectively, arranged on the document by means of different techniques, wherein preferably the second image information arranged by means of different techniques is specific to the document.

It is further preferred that the document is a passport and the second image information is a passport photograph, wherein preferably the first security feature is applied to a page of the passport other than the page on which the passport photograph is arranged. Alternatively, it is possible that the document is a passport and the second image information is a passport photograph, wherein preferably the first security feature is applied on the front or back side of the passport on which the passport photograph is arranged.

Another advantage is that the brightness hue of the first image information is represented by means of the size of the perforations.

Furthermore, it is advantageous to represent the brightness hue by means of the density of the perforations.

It is also preferred that the light tones are represented by large perforations or high density of perforations, respectively, and the dark tones are represented by small perforations or low density of perforations, respectively.

It is noted that the present invention also preferably relates to a method for applying a security feature in a document in the form of a perforation pattern.

More precisely, it is preferred that the method for applying the first security feature in the form of a perforation pattern in the document comprises: the perforation pattern is applied by a laser device adapted to continuously apply the perforation pattern in the document, wherein the size of the perforations or the density of the perforations is controlled by means of an electronic representation of the image.

It is also preferred that the document is a passport and that the perforation pattern and the first image information, respectively, are applied to the passport, said perforation pattern and first image information being representations of a photograph of the passport arranged in the passport.

Advantageously, the passport photograph and the image information are each converted into digital form by means of the optical electronic device, and the perforation pattern and the first image information are each applied on the basis of a digital reproduction of the passport photograph.

In this context, it is also possible to convert a passport photograph into digital form by means of an optical electronic device, and to apply the perforation pattern and the first image information, respectively, on the basis of a digital reproduction of the passport photograph, the passport comprising a second security feature comprising an engraved pattern which displays the second image information when light falling on the engraved pattern is reflected. As an alternative to an engraved pattern, an ink-jet printed pattern may also be used as the second security feature, or a laser printed pattern may be used as the second security feature.

Furthermore, the present invention also preferably relates to a device for performing such a method as described above.

According to another aspect of the invention, a security document comprises a first security feature in the form of a perforation pattern which displays a grey tone when viewed against a bright background.

Preferably, the security document is made of a material which transmits light to a limited extent, wherein preferably the perforations extend over only a part of the thickness of the document at the location of the perforations, and wherein preferably the thickness of the remaining part of the document at the location of the perforations is adjusted in dependence on the image to be displayed and the image information, respectively.

This measure causes further difficulties; the determining factor for displaying the grey tone of the perforation and therewith the image information is determined by the remaining thickness of the document. This means that the depth of the discrete perforations must be determined very accurately. Finally, the resulting thickness is the difference between the two larger values, i.e. the thickness of the whole document and the depth of the perforation.

Advantageously, the perforation and the first image information are applied into the security document from the front side and/or from the rear side. With this arrangement, the first image information and the second image information can be easily written on the front surface and the back surface using the same laser apparatus, for example.

Advantageously, the perforation extends at an angle different from 90 ° with respect to the main plane of the security document. This includes the following results: the perforation cannot be arranged using a very small drill bit, while a laser would have to be used, which on the one hand requires a large investment and on the other hand requires a high degree of technical knowledge.

Preferably, the angle of the perforation is adjusted to obtain the image information with grey value adjustment.

Another advantage is that the density or size and diameter of the perforations of the first security feature can be individually adjusted, as with conventional straight perforations, in order to generate the first image information.

Advantageously, the perforation and the first image information preferably represent an image, respectively.

Preferably, the pattern and the second image information represent an image, a picture, a photograph or a passport photograph, respectively. The terms mentioned (image, picture, photograph, passport photograph) denote all the same features, i.e. "second image information".

It is noted herein that the first image information arranged by means of the perforations may be subjected to a certain degree of image processing. Thereby, the characteristics of the image lost due to the necessary quantization can be compensated. An example of such image processing is "contour enhancement".

The invention is also applicable to perforation patterns that do not represent an image but represent an alphanumeric representation or code.

It will be apparent that a combination of these possibilities may be applied. Such oblique perforations can of course be combined with normal straight perforations. This combination provides the option of introducing additional modes. The main image adjusted for displaying the grey tone is arranged, for example, here using straight perforations, while further features, for example in the form of logos or letters, are arranged obliquely. The angle or other properties of the slanted perforations may be selected such that: during normal viewing of the pattern at an angle of about 90 deg., a normal image appears, while during viewing at another angle, a second image in the form of a logo or letter combination becomes visible.

Another example is to arrange the two images at the same position on the carrier, although at different angles, so that each eye sees its own image, and thus a stereoscopic image.

Preferably, it will be apparent that this may be varied in many ways. It is attractive here to use a method in which the document to be protected is illuminated from two positions by a laser source.

Of course two laser sources may be used herein, although of course it is simpler to: a document in a first position is first illuminated at a first angle using a laser source and thereafter placed in a different position, wherein the document is illuminated at different angles by the same laser source.

The perforations may also be arranged at an angle other than 90 ° when the laser source is placed close to the document; due to the conical or pyramidal shape, the laser beam has to be displaced within the conical or pyramidal shape in order to arrange the perforations. A pattern is then formed that has an increasing angle with increasing distance from the center of the image.

Preferably, the perforations differ from a circle in their cross-section in a transverse plane. The use of a laser source offers the possibility to perform such perforation when the position of the laser spot is correctly controlled. In any case it is practically impossible to obtain such perforations using mechanical means, taking into account the fineness of the desired pattern.

Furthermore, it is advantageous to hide the code in the representation of the image. The teaching that has been applied in graphics technology can be used herein, according to which changes in the image can be arranged, which are invisible to the normal eye and which cause the code to be displayed after a specific treatment.

Instead, an immediately visible code may also be selected. The code may be used, for example, to identify the machine on which the associated product was manufactured. Accordingly, the relevant machine can be identified in the case where the machine is improperly used.

It is also possible to arrange an intermediate layer in the document, which intermediate layer is provided with ink. The use of a laser offers the possibility of completely removing (i.e. burning, evaporating, etc.) the material used for the manufacture of the document. Contamination of the relevant layers of the document hardly occurs here. When such documents are processed using a robot section, a certain degree of smudging will occur. This smudging can be observed particularly well when the ink is formed from an ink that is sensitive to UV light.

Advantageously, the ink is an ink visible under UV light.

Preferably, the material is arranged in the perforations.

It is also preferred that the perforations arranged in the carrier in a pattern representing the image are filled with ink that luminesces under UV light. Such a pattern becomes visible if illuminated with a UV light source.

Preferably, the inner side of the perforations of such a pattern is provided with a layer, for example formed by vapour deposition of a reflective metal layer, so as to produce an image which is visible when viewed. By arranging a removable foil before arranging the perforations and removing the foil after applying the layer, the layer can be selectively applied to the inside of all perforations.

Preferably, the security document comprises layers of material of different colours, wherein the colour is visible in dependence on the depth of the perforation.

Advantageously, the starting point is a carrier consisting of layers of material of different colours. By adjusting the depth, the perforations can be made to terminate in the desired layer, thereby making the desired color visible. Thus, a color image can be realized.

Another advantage is that the security document is made of a plastic laminate and that the core layer has a colour which is different from the colour of the other layers.

Preferably, the perforation pattern is also provided with perforations that are adjusted in density or size.

It is also possible that the perforation pattern is locally provided with a perforation pattern that differs from the remaining perforation patterns.

Another advantage is that the perforation pattern is adapted to present a stereoscopic image to a viewer from a viewing position.

Preferably, the perforation pattern is adapted to present images to the individual and the user, respectively, that are different at each viewing angle.

Advantageously, the angle of the perforation with respect to the main plane of the document increases with increasing distance from the centre of the perforation pattern.

Preferably, the perforation pattern differs from a circle in its cross-section in a transverse plane.

Advantageously, the code is hidden in the representation of the image.

Preferably, an intermediate layer with ink is arranged in the carrier. Advantageously, the ink is visible under UV light.

Preferably, the perforations are arranged in a protected element, such as an optically variable element, mounted on the carrier.

Furthermore, it is advantageous to personalize the image.

The invention also provides the option of arranging the perforations in a protected element, such as an optically variable element, e.g. a hologram or a kinegram, mounted on the carrier. A counterfeiter cannot access such security features because such security features only conduct transactions between one manufacturer and one purchaser. In addition, by providing such security features with individualized perforation patterns, counterfeiters are also deprived of the possibility of transferring such elements from one document to another.

When the image represented by the perforation pattern corresponds to another image disposed on the document, the images may be made to coincide. This provides the option of having the two images coincide exactly. This has the following advantages: the problems of counterfeiters and counterfeiting increase; authentication becomes even faster and simpler; and no additional surface area is required for the perforated image.

It is noted that the present invention also preferably relates to a method for arranging a perforation pattern in a security document, wherein the perforations are preferably arranged by means of a laser.

In this case, it is preferred that the security document is processed by the laser source in at least two different positions.

It is also preferred that the document is processed in a single location from a single laser source.

Advantageously, the foil layer is first arranged on the document, the perforations are subsequently arranged, the document is then subjected to a vapour deposition process, and finally the foil is removed.

For the sake of understanding, it is noted that the terms "perforation", "perforation pattern", "perforating" and "perforation image" are all synonymous, i.e. the first security feature comprises a perforation pattern which, when viewed against a bright background, displays first image information.

Drawings

FIG. 1 illustrates a second security feature of the front side of a security document of the present invention;

FIG. 2 illustrates a second security feature of the back side of the security document of the present invention;

FIG. 3 illustrates a first security feature and a second security feature of the front side of a security document of the present invention retained so as to be light transmissive;

FIG. 4 illustrates first and second security features of the back of a security document of the present invention held so that light is transmitted therethrough;

FIG. 5 shows a schematic perspective view of an apparatus for manufacturing a security document according to the invention;

FIG. 6 shows a detail view of the perforation pattern shown in FIG. 5;

FIG. 7 illustrates a schematic perspective view of a passport in accordance with the present invention;

figure 8 shows a view of a banknote provided with a pattern according to the invention;

FIG. 9 shows a stamp provided with a perforation pattern according to a further embodiment of the invention;

FIG. 10 shows a cross-sectional view of an embodiment of a security document according to the invention;

FIG. 11 shows a cross-sectional view of an embodiment of a security document according to the invention;

FIG. 12 shows a cross-sectional view of an embodiment of a security document according to the invention;

FIG. 13 shows a cross-sectional view of an embodiment of a security document according to the invention;

FIG. 14 shows a cross-sectional view of an embodiment of a security document according to the invention;

FIG. 15 shows a schematic perspective detail view of an embodiment of the present invention;

FIG. 16 shows a schematic perspective detail view of an embodiment of the present invention;

FIG. 17 shows a cross-sectional view of an embodiment of the present invention that is also useful for illustrating the method used therein; and

fig. 18 shows a cross-sectional view of an embodiment of the present invention.

Detailed Description

In the following, some embodiments of the invention are explained based on the drawings. It is noted that the drawings illustrate respective embodiments described below, and that further alternative modifications, which are specifically described in the specification, are at least partially not shown. It is expressly noted, however, that the features shown in particular in fig. 5 to 18 can be combined with the security document described in fig. 1 to 4.

Further, the same reference numerals are used in the drawings to denote the same components.

In fig. 1, a second security feature 3 of a front side F of a security document 1 according to the invention is shown, wherein fig. 2 shows the second security feature 3 of a rear side B of the security document 1 according to the invention.

Furthermore, fig. 3 shows a first security feature 2 and a second security feature 3 of the front side F of the security document 1 according to the invention, the first security feature 2 and the second security feature 3 being held such that light is permeable; wherein fig. 4 shows the first security feature 2 and the second security feature 3 of the back side B of the security document 1 of the invention, the first security feature 2 and the second security feature 3 likewise remain light-transmissive.

For convenience and brevity, fig. 1-4 are described together below.

Fig. 1 to 4 show a security document 1 having a front side F (fig. 1 and 3) and a rear side B (fig. 2 and 4).

The security document 1 has: a first security feature 2 comprising a perforation pattern 4, the perforation pattern 4 displaying first image information when viewed against a bright background; and a second security feature 3 comprising an engraved pattern 5, the engraved pattern 5 displaying second image information when light falling on the engraved pattern 5 is reflected.

It is noted that the first security feature 2 and the second security feature 3 represent an image of a person and a photograph of a passport, respectively.

It is further noted that instead of an engraved pattern, an ink jet printed pattern may be used as the second security feature or a laser printed pattern may be used as the second security feature.

Furthermore, as can be readily seen from fig. 1 to 4, the first image information 4 and the second image information 5 displayed on the security document 1 correspond to one another.

Furthermore, the front side F and the rear side B comprise a second security feature 3, wherein the second image information 5 of the rear side B is mirror image information of the second image information 5 of the front side F.

In other words, all the observable first image information 4 and second image information 5 on the back side B are horizontal mirror image information of the observable first image information 4 and second image information 5 on the front side F (see fig. 3 and 4).

Furthermore, on the front side F, the second image information 5 represented by the second security feature 3 corresponds to the second image information 5 on the rear side B.

Furthermore, on the rear side B, the second image information 5 represented by the second security feature 3 is identical to the first image information 4 represented by the first security feature 2 (see fig. 4).

And on the rear side B, as can be seen by comparing fig. 2 and 4, the corresponding first image information 4 and second image information 5 of the security features 2, 3 coincide.

As can also be seen from fig. 1 to 4, the second image information 5 of the front side F has a larger size on the document 1 compared to the second image information 5 of the rear side B, wherein the size of the second image information 5 on the rear side B is the same as the size of the first image information 4 (see fig. 4).

Summarizing the above, as shown in fig. 1 to 4, the front side F of the security document comprises a second security feature 3 having an engraved pattern 5, the engraved pattern 5 displaying second image information when light falling on the engraved pattern 5 is reflected.

The back side B comprises a second security feature 3 having an engraved pattern 5, the engraved pattern 5 displaying second image information when light falling on the engraved pattern 5 is reflected.

Furthermore, the security document 1 comprises-as mentioned above-a first security feature 2 with a perforation pattern which, when viewed against a bright background, displays first image information 4, and second image information 5 of the front and back sides F, B corresponds to the first image information 4.

Even further, the second image information 5 of the back side B is mirror image information of the second image information 5 of the front side F.

With reference to all figures 1 to 4, the mentioned figures show: the first security feature 2 in the form of a perforation pattern shows a grey tone when viewed against a bright background.

The security document 1 is made of a material which transmits light to a limited extent, wherein some of the perforations forming part of the perforation pattern extend over only a part of the thickness of the document 1 at the location of the perforations.

Therefore, the thickness of the remaining part of the document 1 at the position of the perforation is adjusted according to the image to be displayed.

In order to achieve different graytones, the density and/or diameter of the perforations of the first security feature 2 is adjusted in order to generate the first image information. Embodiments illustrating the implementation of these different graytones will be described below.

As explained above, the first security feature 2 comprises a perforation pattern 4, the perforation pattern 4 displaying first image information when viewed against a bright background, and the second security feature 3 comprises an engraved pattern 5, the engraved pattern 5 displaying second image information when light falling on the engraved pattern 5 is reflected.

However, it is also possible that the front side F of the security document 1 comprises the second security feature 3 with the pattern of the first printing technique and the back side B comprises the second security feature 3 with the pattern of the second printing technique.

In such embodiments, the first printing technique and the second printing technique are different from each other. This means that the first and second printing techniques comprise laser engraving, inkjet printing or laser printing, wherein in this particular embodiment the first printing technique comprises laser engraving and the second printing technique comprises inkjet printing or laser printing. In other words, the pattern of the second security feature displays the second image information when light falling on the pattern is reflected.

Furthermore, in this particular embodiment with two different printing techniques for the second security feature 3 on the front side F and the back side B, the second image information 5 produced by the first printing technique is applied on the front side F and the second image information 5 produced by the second printing technique is applied on the back side B.

Furthermore, the second image information 5 corresponds to the first image information 4, wherein the second image information 5 of the rear side B is mirror image information of the second image information 5 of the front side F.

Reference is now made to fig. 5 to 9.

Before discussing the techniques shown in fig. 5 to 9, it is noted that in the present technique, as in the graphical technique, the production of the brightness tone can be carried out by means of perforations applied according to a fixed grid, wherein the size of the perforations is a measure of the intensity; and also the brightness tones can be reproduced by using equally sized perforations, where the density of these sizes is a measure of the intensity. Both options can in principle also be combined.

It is noted here that in the graphic arts, the first choice is equivalent to the way black and white photographs are reproduced on a newspaper; an example of the second technique is available in the series of dutch stamps, in which the likeness of the wang behaviours is represented by points of different density.

Shown in fig. 5 is the camera 10 oriented at the passport photograph 11. The camera 10 records an image of the passport photograph 11, converts this image into electronic form and feeds the signal thus obtained to the computer 12, which is stored in the computer 12.

The apparatus shown in fig. 5 further comprises laser beam generating means 13 controlled by the computer 12. This control not only relates to the intensity and focus of the laser beam 14 emitted by the laser device 13, but also to the direction in which the laser beam 14 is emitted. The direction can be changed in two planes to apply the perforation pattern 16 and the first security information, respectively, in the document 15.

It is noted here that such laser devices are known in the prior art; for changing the laser beam, a mirror system not otherwise shown in fig. 5 is used herein. It is also possible to make the laser device 13 stationary and to move the carrier on which the document 15 is placed. It is also possible to move the carrier in one direction and the laser beam in the other direction; the choice between the various possibilities depends on the technology used. It is however essential that the perforation pattern 16 and the first security information comprise perforations of different diameters, respectively, wherein the diameter is a function of the brightness represented in the image. Different densities of perforations can be made by having the laser beam locally create more holes or fewer holes.

This is more clearly shown in fig. 6, which fig. 6 shows a detail of the perforation pattern 16. It can be seen here that in the present embodiment the perforation pattern is formed by the perforations 17, the perforations 17 being arranged in a regular grid, for example a rectangular grid.

The size of the aperture herein is a measure of the brightness of the image represented by the perforation pattern 16, in this case the passport photograph 11. It is to be noted here that the size of the perforations can be adjusted continuously, and thus in principle in an analog manner; however, by processing using a digital computer, a limited but large number of stages is obtained. Experiments have shown that a representation of an image can still be obtained, which forms a suitable rendering of the relevant image and can be easily compared therewith. It will be apparent that in this way, good authenticity features are obtained which are difficult to imitate.

Shown in fig. 7 is a passport 18, in which passport 18 photograph 11 is fixed, for example by means of glue, tubular rivets or other attachment means. On the same page, adjacent to the photograph 11, a perforation pattern 16 is applied which presents the relevant image. A good comparison can be made by lifting the relevant page of the passport against the light. In addition, the perforation pattern may also be applied on another page of the passport, provided that a quick visual comparison can be made. This makes forgery more difficult, since at least two different pages must be forged for this purpose. Images that are enlarged, reduced or otherwise modified in size may also be applied.

Fig. 8 shows a banknote 19 provided with a perforation pattern 20, in the present case in the form of a owl. This perforation pattern is independent of another image arranged on the banknote, but itself exclusively forms a security feature; such security features may be provided for banknotes. Again, the difference from the prior art lies in the fact that: image 20 represents a different luminance tone, such as a gray tone. In addition, a free mesh is used herein, wherein the size of the perforations is the same and the density of the perforations is varied to represent gray tones. The stamp 21 shown in fig. 9 also applies a free grid, the stamp 21 being provided with a perforation pattern 22 in the form of a portrait underlying the wang characters; both forms are herein combined, i.e. a varying grid, wherein the size of the perforations is also different.

It is again noted that the description of fig. 5 to 9 can be applied to the first security feature 2 shown in fig. 1 to 4.

Thus, some or all of the mentioned features of fig. 5-9 may be incorporated into the embodiments shown in fig. 1-4.

Reference is now made to fig. 10 to 17.

Fig. 10 shows a cross section of a security document 1. Document 1 is made of plastic, but could equally be made of another material such as paper, textile, and document 1 could also be made of a laminate, where a combination of different material types is used.

This document 1 is provided with perforations. In fig. 10, perforations 32 have been arranged. In this embodiment of the invention, perforations 32 do not extend through the entire thickness of document 1, but leave a portion 33 of document 1 intact.

The remaining portions 33 of the different perforations herein differ in thickness. Thus, these remaining portions 33 transmit more or less light, and an image including a gray tone will be affected by the thickness of the remaining portions 33 and the depth of the perforations 32 while holding the document against the light.

According to the embodiment shown in fig. 11, the perforations are arranged obliquely, i.e. at an angle different from 90 ° with respect to the main plane of the document. The adjustment of the grey tone can herein be obtained by varying the relevant angle. This is illustrated in fig. 11 with a dashed line.

The width, i.e. the diameter of the hole 34, can also be adjusted as shown in fig. 12. Of course, both forms of regulation can be combined herein. Furthermore, one of the two forms of adjustment can be combined with the adjustment of the perforation density, or both forms of adjustment can be combined with the adjustment of the perforation density. Of course, the determined characteristics can be assigned to a combination of such adjustment methods. An example of which is shown in fig. 13.

When the document is viewed directly as indicated by the dashed lines in fig. 12, a similar gray tone is displayed for each perforation herein.

The grey tone can be adjusted by changing the density or by changing the size of the perforations. Herein, an image may be generated according to the present invention. Due to the fact that both perforations 34 are arranged obliquely, it is possible to provide additional information for these perforations, for example by arranging the perforations in the form of letters or logos. This is, of course, only visible when the image is viewed at a certain angle.

In the embodiment shown in fig. 14, perforations of conical form or perforations of truncated conical form are obtained in both cases. Herein, the adjustment of the visible graytone can be obtained by changing the "depth" of the cone or its apex angle. This therefore forms a combination of an adjustment of the depth of the hole and an adjustment of the diameter of the hole. Thus, the perforations 40 are, for example, continuous, while the perforations 41 are blind.

As shown in fig. 15, the perforations may also be arranged in a form other than circular, such as a rectangle 36. Rectangular perforations are difficult to obtain using mechanical means, and therefore lasers are required for the purpose of obtaining rectangular perforations. After all, as long as the focus is sufficiently fine, the laser beam can be controlled such that it produces a perforation having such a profile. It will be apparent that other shapes such as triangular, square, oval, etc. are also possible.

Fig. 16 shows a configuration in which the document is provided with a layer 37, the layer 37 being provided with ink. This layer is not particularly evident when a laser is used to place the perforations; this layer can also be removed by a laser. When trying to provide such documents with perforations by mechanical means, such as drilling, the ink will be smeared and the ink will be clearly visible. Such a construction may also be applied to a laminate card having an inner layer having a different color from the other layers, for example white.

Fig. 17 shows how the same laser light source 38 can be used to provide the same document 1 with straight perforations 35 and subsequently with oblique perforations 34 at different locations. Of course, it is important herein that the laser beam 39 exiting the laser source 38 can be sufficiently deflected. In addition, an accurate stop or the like is necessary for the accuracy required to position the document 1 at different positions. It will be apparent that a file may be punctured from more than two locations.

Finally, fig. 18 shows an embodiment in which the laser light source 38 is placed relatively close to the document 1, so that, due to the angular deviation, perforations extending at different angles are produced. It will also be obvious that within the scope of the invention, it can be varied in an infinite number of ways according to the embodiments shown.

It is again noted that the description of figures 10 to 18 can be applied to the first security feature 2 shown in figures 1 to 4.

Accordingly, some or all of the noted features of fig. 10-18 may be incorporated into the embodiments shown in fig. 1-4.

23页详细技术资料下载
上一篇:一种医用注射器针头装配设备
下一篇:橡胶组合物

相关技术

网友询问留言

已有0条留言

还没有人留言评论。精彩留言会获得点赞!

精彩留言,会给你点赞!