[0001] The invention relates to a carrier provided with an authenticity characteristic comprising
an image. The carrier is in particular a banknote or another carrier such as a passport,
a bank card or credit card.
[0002] EP-A1-1.260.381 regards a document provide with an authenticity characteristic comprising
a series of micro-perforations and a series of marks of the same order of magnitude
as the micro-perforations. The marks and the micro-perforations together form a pattern.
In this way the public is able to perceive whether the micro-perforations are authentic.
Moreover the micro-perforations are difficult to copy as the positioning is fixed
with respect to the marks.
[0003] However, security can always be improved. It has for instance turned out that the
general public often has difficulties with immediately establish whether a document
is authentic.
[0004] It is an object of the invention to offer a further improved security for carriers
that are of value, and of which the authenticity is of importance.
[0005] For that purpose the invention provides a carrier provided with authenticity characteristics
comprising an image, wherein the image is composed of at least two security features,
wherein the security features are mutually in register.
[0006] By choosing for such an image composed of several security features of which the
elements together form an image, and wherein each element is built up from a security
feature, the elements enhance each other. The mutual positioning namely is as good
as fixed.
[0007] In addition the public is able to establish whether the carrier is authentic, as
the various parts together give each other meaning.
[0008] In one embodiment a first security feature comprises a pattern of micro-perforations.
Particularly when seeing through, there clearly is an additional value for the micro-perforations.
Moreover providing micro-perforations forms a separate, mechanic production step as
a result of which the mutual aligning of the security features to form an image together
is difficult to copy, particularly in series in large quantities.
[0009] In one embodiment at least two of the security features have each been provided in
a separate process step in the manufacturing of the carrier, wherein preferably a
first producer provides a first security feature and a second producer provides a
second security feature.
[0010] Preferably the process steps are different manufacturing steps.
[0011] As the various security features are provided in separate process courses, imitation
is rendered more difficult.
[0012] In a further or alternative embodiment, wherein at least two of the security features
have each been provided in a separate process step during the manufacturing of the
carrier, and wherein the manufacturing comprises making the carrier and printing it,
one of the security features is provided during making the carrier and at least one
of the security features is provided after making the carrier.
[0013] Authenticity is even further guaranteed when the security features have been provided
in different process courses. For banknotes the security features may for instance
be the micro-perforations combined with a watermark and printing. These security features
are provided in strictly separated process courses: the watermark during the manufacturing
of paper, subsequently the printing is provided, and not until after that the micro-perforations
are made. The exact positioning of the various characteristics with respect to each
other needs to be very accurate. In addition, as the characteristics together form
an image and therefore give each other meaning, it can immediately be visually verified
whether the authenticity characteristic is authentic. In this way the public can also
immediately establish whether the authenticity characteristic is an original.
[0014] In an embodiment of the carrier according to the invention the first security feature
forms a semantic part of the image. An example of such an embodiment is a portrait
watermark of a writer wherein a book is provided in micro-perforations.
[0015] In one embodiment the security features are in register when the carrier is held
against the light. A known embodiment of a so-called see-through register is the denomination
indication in Euro notes, wherein on both sides of the notes a part of a number is
provided which when seeing through against the light show the full number. By combining
different authenticity characteristics, such as printing, watermark, micro-perforations,
foil parts, security thread, and the like, one single image may become visible when
seeing through, meaning that the security features together form one image.
[0016] In one embodiment the second security feature comprises a watermark.
[0017] In another embodiment, or one combined therewith, the second security feature comprises
a printed image. In particular the second security feature of the at least two security
features is selected from a printed image, a printed image part, or from an optically
variable ink ("OVI"), a so-called "security ink", or a combination thereof. A part
of the image can be made by using an ink or ink combination of the above-mentioned
type. For instance pearlescent particles or other effect particles may be incorporated
in the ink, or components may be incorporated that are active in the infrared or ultra
violet range of the spectrum.
[0018] In yet another embodiment, or one combined therewith, a second or third security
feature forms a see-through register.
[0019] In yet another embodiment, or one combined therewith, a second, third or fourth security
feature comprises a security thread.
[0020] In yet another embodiment, or one combined therewith, a second, third, fourth or
fifth security feature comprises a foil part.
[0021] In yet another embodiment, or one combined therewith, the security features together
form an image.
[0022] In yet another embodiment, or one combined therewith, each security feature forms
a semantic or meaning-providing part of the image. In this way the general public
can also clearly perceive whether the carrier is authentic. It will be difficult for
a counterfeiter to copy the various security features with the same mutual production
tolerances, which will particularly be difficult in mass production.
[0023] The invention further relates to an authenticity characteristic for on a carrier,
particularly a banknote, passport or bank card, comprising an image, wherein the image
is composed of at least two security features that are mutually in register.
[0024] The invention will be further elucidated in the basis of an exemplary embodiment
of an authenticity characteristic according to the invention, and use thereof on a
banknote or other security document, in which:
Figures 1 A, 1B, 2A and 2B show an explanation of the principle of the invention;
Figures 3A-3C show examples of a combination of a watermark and micro-perforation
wherein the micro-perforation forms a part of the image;
Figures 4A-4C show examples of a combination of a watermark wherein the micro-perforation
forms a part of the background of the image;
Figure 5 shows an example of two types of watermarks in combination with a micro-perforation;
Figures 6A-6B show examples of a combination of a printed or watermark image wherein
the micro-perforations form a shadow;
Figure 7 shows a banknote provided with provided with a see-through register and micro-perforations,
wherein the see-through register and the micro-perforations together form an image;
Figure 8 shows an authenticity characteristic wherein a security thread, micro-perforations
and a printed image together form an image.
[0025] The improved security according to the invention is found in making use of the various
production tolerances as are common for a security paper factory and/or security printer.
Said production tolerances are more accurate than the equipment counterfeiters may
have at their disposal. Therefore counterfeiters will not achieve the same accuracy
-at least not in quantities - as an authorised producer.
[0026] The "real" production tolerances show in a composed image. By selecting such an image
composed of several elements, formed by security features A and B (figure 1 A) and/or
A, B and C (figure 1B), of which the elements A, B and C together form an image, and
wherein each element is built up from another security feature, the elements enhance
each other, as shown in figures 1 A and 1 B. The security features may also overlap
each other, as is shown in figures 2A and 2B.
[0027] Figures 3A up to and including 3C show various embodiments of an authenticity characteristic
1 according to the invention, wherein a watermark 2 in the form of a portrait is combined
with micro-perforations 3, 3'. In figure 3A the watermark together with the micro-perforations
form one image, wherein the micro-perforations in this case represent the hair 3 and
a necklace 3'.
[0028] In figure 3B watermark 2 and micro-perforations 3 together form an image 1 wherein
the watermark 2 represents a portrait and the micro-perforations 3 a collar of the
clothing of the person depicted.
[0029] In figure 3C the watermark shows a portrait, which portrait is provided with a necklace
3 in the form of micro-perforations. The figures 3A up to and including 3C therefore
show examples wherein the micro-perforations together with a watermark form an image.
The mutual positioning of the watermark and the micro-perforations needs to be very
accurate as together they form one image. The micro-perforations give meaning to the
image, such as for instance an image of a book in micro-perforations in a portrait
watermark of a writer. As the two security features are provided in two entirely different
process courses, a further authenticity is thus guaranteed.
[0030] Figures 4A up to and including 4C show an example of authenticity characteristics
1 wherein a watermark 2 in the foreground is combined with an image or pattern 3 of
micro-perforations that form the background of the image. The figures 4A up to an
including 4C show a portrait in watermark. Due to the order and mutual distance of
the micro-perforations an image may for instance also be made in the background. The
micro-perforations may in that case for instance represent a building. In this case
as well, due to the interdependency of the micro-perforations and the watermark, particularly
the positioning with respect to each other, an extra security has been built in as
on the one hand the two characteristics are provided in different process courses
whereas their positions depend on each other; in addition the two characteristic together
give meaning to the image, as a result of which for instance they are recognisable
to the public.
[0031] Figure 5 shows an authenticity characteristic that is a combination of a first and
a second watermark (multi-tone watermark with a so-called thread watermark or "high
light watermark" or "electro-type watermark" or "e-type watermark"). The multi-tone
watermark in that case forms the first part 31 of an image, in this case an image
of Wilhelm Tell, the second watermark in this case forms Wilhelm Tell's cross bow
30 and the micro-perforations form the arrow 3.
[0032] Figures 6A-6B show an example of an authenticity characteristic 1 wherein a so-called
electro-type made watermark 2 has been combined with micro-perforations 3. The micro-perforations
3 in this case form a shadow of the numbers of for instance the value of a banknote
or the year. In this case as well the mutual position is of importance.
[0033] Figure 7 shows a banknote 4 provided with a see-through register which together form
a flower when seeing through, provided with micro-perforations. The micro-perforations
3 have here been provided going through the see-through register 5. In another embodiment
the micro-perforations may form a part of the image that does not go through the see-through
register, for instance the stem of the flower shown. In this example the petals may
be provided alternately on the other side of the banknote. Against the light the entire
flower will show.
[0034] Figure 8 shows a banknote 4 having an authenticity characteristic that is a combination
of more than two security features. In this case the banknote 4 is provided with a
security thread 70, forming the stem of a flower 71 in printing, and wherein the stem
is provided with leaves 3 in the form of micro-perforations. The mutual positioning
of the various components of the image is of importance here. The various components
of the image are various security features which as a result together form one image.
Optionally this can be combined with other security features, such as the see-through
register mentioned above. In this case again the mutual positioning of the various
security features is of importance and form an additional security as the various
security features are made in various separate process steps. Moreover the various
security features in this case form a to the public or to the experts clearly distinguishable
image.
1. Carrier, particularly for a banknote, passport or bank card, provided with authenticity
characteristics comprising an image, wherein the image is composed of at least two
security features, wherein the security features are mutually in register.
2. Carrier according to claim 1, wherein each security feature forms a semantic or meaning-providing
part of the image.
3. Carrier according to claim 1 or 2, wherein the authenticity characteristic is made
in at least two separate process steps.
4. Carrier according to claim 1, 2 or 3, wherein the at least two security features of
the authenticity characteristic have each been provided in a separate process step
in the manufacturing of the carrier, wherein preferably a first producer provides
a first security feature and a second producer provides a second security feature.
5. Carrier according to any one of the preceding claims, wherein the at least two security
features of the authenticity characteristic have each been provided in a separate
process step during the manufacturing of the carrier, wherein the manufacturing comprises
making the carrier and printing it, and one of the security features is provided during
making the carrier and at least one of the security features is provided after making
the carrier, particularly during or after printing.
6. Carrier according to any one of the preceding claims, wherein a first security feature
of the at least two security features is selected from a pattern of micro-perforations,
a watermark, a security thread, a foil part, or a combination of those security features.
7. Carrier according to claim 6, wherein a second security feature of the at least two
security features is selected from a printed image, a printed image part, or from
an optically variable ink ("OVI"), a so-called "security ink", or a combination thereof.
8. Carrier according to any one of the preceding claims, wherein a first security feature
comprises a pattern of micro-perforations.
9. Carrier according to any one of the preceding claims, wherein the first security feature
forms a semantic part of the image.
10. Carrier according to any one of the preceding claims, wherein the security features
are in register when the carrier is held against the light.
11. Carrier according to any one of the preceding claims, wherein the security features
are visually contiguous to each other when the carrier is held against the light.
12. Carrier according to any one of the preceding claims, wherein the security features
are visually contiguous to each other when the carrier is held against the light,
wherein each security feature forms a part of the image.
13. Carrier according to any one of the preceding claims, wherein a second security feature
comprises a watermark.
14. Carrier according to any one of the preceding claims, wherein a second security feature
comprises a printed image.
15. Carrier according to one or more of the preceding claims, wherein a second, third
or fourth security feature comprises a security thread.
16. Carrier according to any one of the preceding claims, wherein a second, third, fourth
or fifth security feature comprises a foil part.
17. Carrier according to any one of the preceding claims, wherein a second, third, fourth
or fifth security feature comprises a security ink.
18. Carrier according to one or more of the preceding claims, wherein a second or third
security feature comprises a see-through register.
19. Carrier according to any one of the preceding claims, wherein the security features
together form an image.
20. Authenticity characteristic for on a carrier, particularly a banknote, passport or
bank card, comprising an image, wherein the image is composed of at least two security
features that are mutually in register.