(19)
(11) EP 1 607 235 A1

(12) EUROPEAN PATENT APPLICATION

(43) Date of publication:
21.12.2005 Bulletin 2005/51

(21) Application number: 05076383.8

(22) Date of filing: 14.06.2005
(51) International Patent Classification (IPC)7B42D 15/00
(84) Designated Contracting States:
AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IS IT LI LT LU MC NL PL PT RO SE SI SK TR
Designated Extension States:
AL BA HR LV MK YU

(30) Priority: 14.06.2004 NL 1026418

(71) Applicant: DE NEDERLANDSCHE BANK N.V.
1017 ZR Amsterdam (NL)

(72) Inventors:
  • de Heij, Henricus Anthonius Maria
    2082 EB Santpoort Zuid (NL)
  • Stange, Thomas Ralf
    63486 Bruchköbel (DE)

(74) Representative: De Hoop, Eric 
Octrooibureau Vriesendorp & Gaade B.V. P.O. Box 266
2501 AW Den Haag
2501 AW Den Haag (NL)

   


(54) Authentication mark


(57) The invention relates to a carrier provided with authenticity characteristics comprising an image, wherein the image is composed of at least two security features (A,B), wherein the first security feature (A) comprises a pattern of micro-perforations, wherein the security features are in register.
The carrier particularly regards a banknote or another security paper.




Description


[0001] The invention relates to a carrier provided with an authenticity characteristic comprising an image. The carrier is in particular a banknote or another carrier such as a passport, a bank card or credit card.

[0002] EP-A1-1.260.381 regards a document provide with an authenticity characteristic comprising a series of micro-perforations and a series of marks of the same order of magnitude as the micro-perforations. The marks and the micro-perforations together form a pattern. In this way the public is able to perceive whether the micro-perforations are authentic. Moreover the micro-perforations are difficult to copy as the positioning is fixed with respect to the marks.

[0003] However, security can always be improved. It has for instance turned out that the general public often has difficulties with immediately establish whether a document is authentic.

[0004] It is an object of the invention to offer a further improved security for carriers that are of value, and of which the authenticity is of importance.

[0005] For that purpose the invention provides a carrier provided with authenticity characteristics comprising an image, wherein the image is composed of at least two security features, wherein the security features are mutually in register.

[0006] By choosing for such an image composed of several security features of which the elements together form an image, and wherein each element is built up from a security feature, the elements enhance each other. The mutual positioning namely is as good as fixed.

[0007] In addition the public is able to establish whether the carrier is authentic, as the various parts together give each other meaning.

[0008] In one embodiment a first security feature comprises a pattern of micro-perforations. Particularly when seeing through, there clearly is an additional value for the micro-perforations. Moreover providing micro-perforations forms a separate, mechanic production step as a result of which the mutual aligning of the security features to form an image together is difficult to copy, particularly in series in large quantities.

[0009] In one embodiment at least two of the security features have each been provided in a separate process step in the manufacturing of the carrier, wherein preferably a first producer provides a first security feature and a second producer provides a second security feature.

[0010] Preferably the process steps are different manufacturing steps.

[0011] As the various security features are provided in separate process courses, imitation is rendered more difficult.

[0012] In a further or alternative embodiment, wherein at least two of the security features have each been provided in a separate process step during the manufacturing of the carrier, and wherein the manufacturing comprises making the carrier and printing it, one of the security features is provided during making the carrier and at least one of the security features is provided after making the carrier.

[0013] Authenticity is even further guaranteed when the security features have been provided in different process courses. For banknotes the security features may for instance be the micro-perforations combined with a watermark and printing. These security features are provided in strictly separated process courses: the watermark during the manufacturing of paper, subsequently the printing is provided, and not until after that the micro-perforations are made. The exact positioning of the various characteristics with respect to each other needs to be very accurate. In addition, as the characteristics together form an image and therefore give each other meaning, it can immediately be visually verified whether the authenticity characteristic is authentic. In this way the public can also immediately establish whether the authenticity characteristic is an original.

[0014] In an embodiment of the carrier according to the invention the first security feature forms a semantic part of the image. An example of such an embodiment is a portrait watermark of a writer wherein a book is provided in micro-perforations.

[0015] In one embodiment the security features are in register when the carrier is held against the light. A known embodiment of a so-called see-through register is the denomination indication in Euro notes, wherein on both sides of the notes a part of a number is provided which when seeing through against the light show the full number. By combining different authenticity characteristics, such as printing, watermark, micro-perforations, foil parts, security thread, and the like, one single image may become visible when seeing through, meaning that the security features together form one image.

[0016] In one embodiment the second security feature comprises a watermark.

[0017] In another embodiment, or one combined therewith, the second security feature comprises a printed image. In particular the second security feature of the at least two security features is selected from a printed image, a printed image part, or from an optically variable ink ("OVI"), a so-called "security ink", or a combination thereof. A part of the image can be made by using an ink or ink combination of the above-mentioned type. For instance pearlescent particles or other effect particles may be incorporated in the ink, or components may be incorporated that are active in the infrared or ultra violet range of the spectrum.

[0018] In yet another embodiment, or one combined therewith, a second or third security feature forms a see-through register.

[0019] In yet another embodiment, or one combined therewith, a second, third or fourth security feature comprises a security thread.

[0020] In yet another embodiment, or one combined therewith, a second, third, fourth or fifth security feature comprises a foil part.

[0021] In yet another embodiment, or one combined therewith, the security features together form an image.

[0022] In yet another embodiment, or one combined therewith, each security feature forms a semantic or meaning-providing part of the image. In this way the general public can also clearly perceive whether the carrier is authentic. It will be difficult for a counterfeiter to copy the various security features with the same mutual production tolerances, which will particularly be difficult in mass production.

[0023] The invention further relates to an authenticity characteristic for on a carrier, particularly a banknote, passport or bank card, comprising an image, wherein the image is composed of at least two security features that are mutually in register.

[0024] The invention will be further elucidated in the basis of an exemplary embodiment of an authenticity characteristic according to the invention, and use thereof on a banknote or other security document, in which:

Figures 1 A, 1B, 2A and 2B show an explanation of the principle of the invention;

Figures 3A-3C show examples of a combination of a watermark and micro-perforation wherein the micro-perforation forms a part of the image;

Figures 4A-4C show examples of a combination of a watermark wherein the micro-perforation forms a part of the background of the image;

Figure 5 shows an example of two types of watermarks in combination with a micro-perforation;

Figures 6A-6B show examples of a combination of a printed or watermark image wherein the micro-perforations form a shadow;

Figure 7 shows a banknote provided with provided with a see-through register and micro-perforations, wherein the see-through register and the micro-perforations together form an image;

Figure 8 shows an authenticity characteristic wherein a security thread, micro-perforations and a printed image together form an image.



[0025] The improved security according to the invention is found in making use of the various production tolerances as are common for a security paper factory and/or security printer. Said production tolerances are more accurate than the equipment counterfeiters may have at their disposal. Therefore counterfeiters will not achieve the same accuracy -at least not in quantities - as an authorised producer.

[0026] The "real" production tolerances show in a composed image. By selecting such an image composed of several elements, formed by security features A and B (figure 1 A) and/or A, B and C (figure 1B), of which the elements A, B and C together form an image, and wherein each element is built up from another security feature, the elements enhance each other, as shown in figures 1 A and 1 B. The security features may also overlap each other, as is shown in figures 2A and 2B.

[0027] Figures 3A up to and including 3C show various embodiments of an authenticity characteristic 1 according to the invention, wherein a watermark 2 in the form of a portrait is combined with micro-perforations 3, 3'. In figure 3A the watermark together with the micro-perforations form one image, wherein the micro-perforations in this case represent the hair 3 and a necklace 3'.

[0028] In figure 3B watermark 2 and micro-perforations 3 together form an image 1 wherein the watermark 2 represents a portrait and the micro-perforations 3 a collar of the clothing of the person depicted.

[0029] In figure 3C the watermark shows a portrait, which portrait is provided with a necklace 3 in the form of micro-perforations. The figures 3A up to and including 3C therefore show examples wherein the micro-perforations together with a watermark form an image. The mutual positioning of the watermark and the micro-perforations needs to be very accurate as together they form one image. The micro-perforations give meaning to the image, such as for instance an image of a book in micro-perforations in a portrait watermark of a writer. As the two security features are provided in two entirely different process courses, a further authenticity is thus guaranteed.

[0030] Figures 4A up to and including 4C show an example of authenticity characteristics 1 wherein a watermark 2 in the foreground is combined with an image or pattern 3 of micro-perforations that form the background of the image. The figures 4A up to an including 4C show a portrait in watermark. Due to the order and mutual distance of the micro-perforations an image may for instance also be made in the background. The micro-perforations may in that case for instance represent a building. In this case as well, due to the interdependency of the micro-perforations and the watermark, particularly the positioning with respect to each other, an extra security has been built in as on the one hand the two characteristics are provided in different process courses whereas their positions depend on each other; in addition the two characteristic together give meaning to the image, as a result of which for instance they are recognisable to the public.

[0031] Figure 5 shows an authenticity characteristic that is a combination of a first and a second watermark (multi-tone watermark with a so-called thread watermark or "high light watermark" or "electro-type watermark" or "e-type watermark"). The multi-tone watermark in that case forms the first part 31 of an image, in this case an image of Wilhelm Tell, the second watermark in this case forms Wilhelm Tell's cross bow 30 and the micro-perforations form the arrow 3.

[0032] Figures 6A-6B show an example of an authenticity characteristic 1 wherein a so-called electro-type made watermark 2 has been combined with micro-perforations 3. The micro-perforations 3 in this case form a shadow of the numbers of for instance the value of a banknote or the year. In this case as well the mutual position is of importance.

[0033] Figure 7 shows a banknote 4 provided with a see-through register which together form a flower when seeing through, provided with micro-perforations. The micro-perforations 3 have here been provided going through the see-through register 5. In another embodiment the micro-perforations may form a part of the image that does not go through the see-through register, for instance the stem of the flower shown. In this example the petals may be provided alternately on the other side of the banknote. Against the light the entire flower will show.

[0034] Figure 8 shows a banknote 4 having an authenticity characteristic that is a combination of more than two security features. In this case the banknote 4 is provided with a security thread 70, forming the stem of a flower 71 in printing, and wherein the stem is provided with leaves 3 in the form of micro-perforations. The mutual positioning of the various components of the image is of importance here. The various components of the image are various security features which as a result together form one image. Optionally this can be combined with other security features, such as the see-through register mentioned above. In this case again the mutual positioning of the various security features is of importance and form an additional security as the various security features are made in various separate process steps. Moreover the various security features in this case form a to the public or to the experts clearly distinguishable image.


Claims

1. Carrier, particularly for a banknote, passport or bank card, provided with authenticity characteristics comprising an image, wherein the image is composed of at least two security features, wherein the security features are mutually in register.
 
2. Carrier according to claim 1, wherein each security feature forms a semantic or meaning-providing part of the image.
 
3. Carrier according to claim 1 or 2, wherein the authenticity characteristic is made in at least two separate process steps.
 
4. Carrier according to claim 1, 2 or 3, wherein the at least two security features of the authenticity characteristic have each been provided in a separate process step in the manufacturing of the carrier, wherein preferably a first producer provides a first security feature and a second producer provides a second security feature.
 
5. Carrier according to any one of the preceding claims, wherein the at least two security features of the authenticity characteristic have each been provided in a separate process step during the manufacturing of the carrier, wherein the manufacturing comprises making the carrier and printing it, and one of the security features is provided during making the carrier and at least one of the security features is provided after making the carrier, particularly during or after printing.
 
6. Carrier according to any one of the preceding claims, wherein a first security feature of the at least two security features is selected from a pattern of micro-perforations, a watermark, a security thread, a foil part, or a combination of those security features.
 
7. Carrier according to claim 6, wherein a second security feature of the at least two security features is selected from a printed image, a printed image part, or from an optically variable ink ("OVI"), a so-called "security ink", or a combination thereof.
 
8. Carrier according to any one of the preceding claims, wherein a first security feature comprises a pattern of micro-perforations.
 
9. Carrier according to any one of the preceding claims, wherein the first security feature forms a semantic part of the image.
 
10. Carrier according to any one of the preceding claims, wherein the security features are in register when the carrier is held against the light.
 
11. Carrier according to any one of the preceding claims, wherein the security features are visually contiguous to each other when the carrier is held against the light.
 
12. Carrier according to any one of the preceding claims, wherein the security features are visually contiguous to each other when the carrier is held against the light, wherein each security feature forms a part of the image.
 
13. Carrier according to any one of the preceding claims, wherein a second security feature comprises a watermark.
 
14. Carrier according to any one of the preceding claims, wherein a second security feature comprises a printed image.
 
15. Carrier according to one or more of the preceding claims, wherein a second, third or fourth security feature comprises a security thread.
 
16. Carrier according to any one of the preceding claims, wherein a second, third, fourth or fifth security feature comprises a foil part.
 
17. Carrier according to any one of the preceding claims, wherein a second, third, fourth or fifth security feature comprises a security ink.
 
18. Carrier according to one or more of the preceding claims, wherein a second or third security feature comprises a see-through register.
 
19. Carrier according to any one of the preceding claims, wherein the security features together form an image.
 
20. Authenticity characteristic for on a carrier, particularly a banknote, passport or bank card, comprising an image, wherein the image is composed of at least two security features that are mutually in register.
 




Drawing





































Search report