TECHNICAL FIELD
[0001] The present invention relates to a data carrier according to the preamble of claim
1 and claim 11, a security document comprising such a data carrier according to claim
12, as well as to a method of producing a data carrier according to claims 13 and
15, respectively.
PRIOR ART
[0002] Because of the value and importance associated with data carriers such as identity
cards, passports, credit cards or the like, they are often the subject of unauthorized
copying, alterations and forgeries. Document falsification and product counterfeiting
are significant problems that have been addressed in a variety of ways.
[0003] From
WO 2012/097463 A1 a multilayer data carrier is known which discloses in one embodiment the provision
of a metal layer and an opaque layer. By means of laser ablating the metal layer an
ablated image and an ablated text are formed in the data carrier. In another embodiment
two metal layers are provided, wherein both metal layers are laser ablated. In doing
so two different images with different angles from one another are obtained, whereby
a tilt effect between the two images is obtained.
[0004] Due to the fact that forgery possibilities and skills of forgers are constantly improving
it is the provision of data carriers having an improved security is desired.
SUMMARY OF THE INVENTION
[0005] It is therefore an object of the present invention to provide a data carrier which
possesses an increased safety.
[0006] This object is achieved with a data carrier according to claim 1. In particular,
in a first aspect a data carrier is provided which comprises at least a first processing
layer and a second processing layer which are arranged along an extension direction,
and at least a first security element and a second security element being arranged
on the first processing layer and/or on the second processing layer. At least the
first security element is comprised of at least a first part and a second part, wherein
the first part of the first security element is provided on the first processing layer
and the second part of the first security element is provided on the second processing
layer. The first security element is configured to exhibit a first appearance under
a first viewing angle and a second appearance being different from the first appearance
under a second viewing angle being different from the first viewing angle.
[0007] At this point it should be noted that the data carrier can comprise two or more processing
layers, wherein said two or more processing layers are arranged along the extension
direction. Moreover, it is also conceivable to provide three or more security elements
on the processing layers, wherein the provision of two or more security elements on
only one of the processing layers or on two or on more of the processing layers is
conceivable. In addition, and as will be explained in greater detail further below,
two or more of the security elements can be provided in two or more parts, wherein
said two or more parts are distributed over the processing layers. For reasons of
simplicity, reference is made in the following to a data carrier comprising two processing
layers and two security elements. However, it shall be understood that the different
aspects and explanations provided for such a data carrier likewise apply to a data
carrier comprising more processing layers and more security elements, respectively.
[0008] Hence, a data carrier is provided which comprises at least two security elements,
wherein at least one of them is distributed over at least two processing layers. Moreover,
at least said distributed security element can change its appearance in dependence
of the viewing angle under which the data carrier is observed. In doing so a data
carrier is provided which comprises combined security information due to the presence
of at least two security elements which furthermore exhibit sophisticated optical
effects. As a result, the security provided by the data carrier is increased.
[0009] As just mentioned, it is conceivable that only one of the security elements is provided
in two or more parts, wherein these two or more parts are distributed over the two
or more processing layers. The other security element, presently named the second
security element, can be provided as a single feature on one of the processing layers
only. The provision of the second security element or of any further security elements
in parts is however conceivable too, see further below.
[0010] The first security element and the second security element can at least partially
overlap with each other with respect to the extension direction. In other words, when
viewing from the first processing layer towards the second processing layer along
the extension direction, it is conceivable that the first and security elements are
at least partially overlapping each other.
[0011] For example, if the second security element is arranged on the first processing layer,
it can be arranged such that it at least partially and spatially overlaps with the
first part of the first security element provided on the first processing layer. Likewise,
if the second security element is arranged on the second processing layer, it can
be arranged such that it at least partially and spatially overlaps with the second
part of the first security element provided on the second processing layer.
[0012] The first part of the first security element on the first processing layer and the
second part of the first security element on the second processing layer can at least
partially overlap with each other when viewed along the extension direction. Alternatively,
it is also conceivable that the first part of the first security element on the first
processing layer and the second part of the first security element on the second processing
layer are spaced apart from each other when viewed along the extension direction.
[0013] The first security element can at least partially enclose the second security element
when viewed along the extension direction, or the second security element can at least
partially enclose the first security element when viewed along the extension direction.
For example, it is conceivable to arrange the second security element on the first
processing layer (second processing layer) such, that it at least partially encloses
the first part of the security element provided on the first processing layer (second
part of the first security element on the second processing layer). Likewise, it is
conceivable to arrange the first part of the first security element on the first processing
layer (second part of the first security element on the second processing layer) such,
that it at least partially encloses the second security element if said second security
element is provided on the first processing layer (second processing layer if said
second security element is provided on the second processing layer). To this end only
a partial enclosure but also an entire enclosure is conceivable. Moreover, a partial
as well as an entire enclosure can be realized by the respective security elements
being arranged immediately adjacent to one another on the respective processing layer
or by the respective security elements being arranged laterally spaced apart from
one another on the respective processing layer.
[0014] In addition, and as indicated above, it is conceivable to provide both security elements
in parts. That is, not only the first security element but also the second security
element can be comprised of at least a first part and of a second part, wherein the
first part of the second security element can be provided on the first processing
layer and the second part of the second security element can be provided on the second
processing layer. In this case it is conceivable that the first part of the first
security element at least partially and spatially overlaps the first part of the second
security element arranged on the first processing layer while the second part of the
first security element and the second part of the second security element arranged
on the second processing layer do not spatially overlap but are arranged at a distance
with each other, and vice versa. However, it is also conceivable that both the first
parts of the first and second security elements arranged on the first processing layer
as well as the second parts of the first and second security elements arranged on
the second processing layer in each case overlap with each other or are arranged at
a distance from one another. Moreover, the first part of the second security element
on the first processing layer and the second part of the second security element on
the second processing layer can at least partially overlap with each other when viewed
along the extension direction, or the first part of the second security element on
the first processing layer and the second part of the second security element on the
second processing layer can be spaced apart from each other when viewed along the
extension direction. Likewise, it is conceivable that the first part of the first
security element at least partially encloses the first part of the second security
element arranged on the first processing layer and/or that the second part of the
first security element at least partially encloses the second part of the second security
element arranged on the second processing layer and vice versa. Hence, in short, any
sort of overlap or enclosure of the parts is conceivable with respect to the extension
direction as well as with respect to a direction running perpendicularly to the extension
direction, i.e. with respect to a direction running parallel to a plane extending
through the processing layers, the latter being considered as a spatial overlap or
enclosure.
[0015] It is conceivable to provide the second security element, in particular the at least
first and second parts of the second security element, such that it can alter its
appearance in dependence of the viewing angle under which the data carrier is observed.
Hence, the second security element can be configured to exhibit a third appearance
under a third viewing angle and a fourth appearance being different from the third
appearance under a fourth viewing angle being different from the third viewing angle.
It should be noted that the terms "first viewing angle", "second viewing angle" and
"third viewing angle", "fourth viewing angle" do not necessarily mean that these are
in each case different viewing angles. Instead, these terms are used to indicate that
the appearance of the first security element changes when the data carrier is observed
under at least two differing viewing angles and that the appearance of the second
security element changes when the data carrier is observed under at least two differing
viewing angles, respectively. The differing viewing angles referred to with respect
to the first security element can be the same differing viewing angles referred to
with respect to the second security element. Moreover, it is conceivable that the
first security element and/or the second security element are capable to alter their
appearance between three or more different forms of appearance. Said three or more
different forms of appearance can be caused by viewing the data carrier under three
or more different viewing angles.
[0016] The first security element can at least partially complement the second security
element when viewed along the extension direction and/or the second security element
can at least partially complement the first security element when viewed along the
extension direction.
[0017] Complement in this context means that one of the security elements participates in
the creation or generation of the other security element. Thus, a complementing security
element can be said to fulfil a double function, namely providing a security element
on its own as well as participating in the formation of another security element,
wherein the security is even further increased.
[0018] In particular, the first part of the first security element on the first processing
layer and the second part of the first security element on the second processing layer
can be configured complementary to one another, the first part of the first security
element on the first processing layer preferably being configured as a recess and
the second part of the first security element on the second processing layer being
preferably configured as a corresponding elevation or vice versa. Likewise, the first
part of the second security element on the first processing layer and the second part
of the second security element on the second processing layer can be configured complementary
to one another, the first part of the second security element on the first processing
layer preferably being configured as a recess and the second part of the second security
element on the second processing layer being preferably configured as a corresponding
elevation or vice versa.
[0019] For example, it is conceivable to provide the first part of the first security element
with a particular recess and to provide the second part of the second security element
with an elevation corresponding to said recess, wherein said recess and elevation
are arranged on the respective processing layers such that they coincide with respect
to the extension direction. In this case, the second part of the second security element
complements the recess in the first part of the first security element by means of
its elevation.
[0020] The first security element and/or the second security element are preferably provided
in the form of an image, an alphanumeric character, a pattern or a fringe, preferably
a Moire fringe, the first security element and the second security element are preferably
provided in different forms. Security elements in the form of an image can be the
portrait of the data carrier holder or the shape of the country of issue of the data
carrier, and an alphanumeric character could correspond to the date of issuance or
the date of birth of the holder, for example. However, a variety of other images or
alphanumeric characters are possible.
[0021] The first processing layer and/or the second processing layer can be configured to
interact with electromagnetic radiation, the first processing layer and/or the second
processing layer preferably comprising at least one of: one or more metals, one or
more metal-compounds, one or more pigments, and one or more colorants.
[0022] An interaction of the processing layers with the electromagnetic radiation could
be a partial or entire ablation or a partial or entire bleaching of the processing
layer at the region of interaction of the processing layer with the electromagnetic
radiation. The electromagnetic radiation preferably corresponds to laser radiation.
[0023] The data carrier can further comprise at least one protection structure which is
arranged between the first processing layer and the second processing layer, wherein
the protection structure is configured such that, upon irradiation of electromagnetic
radiation constituting a first spectrum along the extension direction, the protection
structure essentially entirely prevents said electromagnetic radiation from impinging
on the second processing layer.
[0024] That is to say, the data carrier can be processed by irradiating electromagnetic
radiation constituting a first spectrum of particular one or more wavelengths, wherein
the protection structure allows an impingement of said radiation only on the first,
i.e. upper processing layer but prevents an impingement on the second, i.e. underlying
processing layer. The protection structure can thus be seen as a blockage or barrier
that eliminates electromagnetic radiation which is used to process the first processing
layer and which passes the first processing layer towards the underlying second processing
layer. In this way, the contrast of information introduced into the data carrier,
i.e. the security elements, by means of the electromagnetic irradiation is enhanced
and, as a result, a data carrier having an increased level of security is obtained.
[0025] An essentially entire prevention in the context of the present invention means that
typically more than 80%, preferably more than 90% of the irradiated electromagnetic
radiation are blocked.
[0026] The data carrier preferably comprises a cover layer and a base layer, between which
the first processing layer and the second processing layer are arranged. The region
of the cover layer can be referred to as the front side of the data carrier and the
region of the base layer can be referred to as the back side of the data carrier,
respectively. The cover layer and/or the base layer are preferably transparent and
are preferably made of plastics, particularly preferably made from a polycarbonate,
polyvinylchloride, amorphous polyester, co-polyester (A-ET, PET-G), semi-crystalline
polyester such as polyethylene terephthalate or boPET. In order to allow the irradiated
electromagnetic radiation to reach the first and/or second processing layers, the
cover layer and the base layer should be provided in transparent materials. However,
if an irradiation along the extension direction only is intended, then the base layer
could be provided as opaque material. Conceivable opaque materials are plastic sheets
with filler media as it is known in the state of the art, typically titanium dioxide
(TiO
2) (standard opaque white PC sheets). As already mentioned, the electromagnetic radiation
preferably corresponds to monochromatic radiation, particularly preferably to laser
radiation, wherein the irradiation of laser radiation on the first processing layer
results in an at least partial ablation or bleaching of the first processing layer.
In this way, the first processing layer is modified, wherein the modified region,
potentially together with unmodified regions on the first processing layer and the
unprocessed second processing layer, can represent the security elements.
[0027] The protection structure can be configured such that, upon irradiation of the electromagnetic
radiation constituting the first spectrum along a direction running opposite to the
extension direction, the protection structure essentially entirely prevents said electromagnetic
radiation from impinging on the first processing layer.
[0028] In other words, the protection structure acts as a barrier or blockage for the respectively
underlying processing layer with regard to an irradiation of the electromagnetic radiation
constituting the first spectrum from both sides of the data carrier, i.e. against
irradiation from the front side of the data carrier, wherein the irradiation propagates
along the extension direction, as well as against irradiation from the back side of
the data carrier, wherein the irradiation propagates along a direction running opposite
to the extension direction. In this case the first processing layer is processed from
a front side of the data carrier and the second processing layer is processed from
a back side of the data carrier, wherein the processing of one of the processing layers
does not affect the other processing layer. Hence, a precise production of a security-feature-bearing
data carrier with the security elements provided on the at least two processing layers
is enabled.
[0029] The protection structure is preferably configured such that, upon irradiation of
electromagnetic radiation constituting a second spectrum of particular one or more
wavelengths being different from the wavelengths constituting the first spectrum along
the extension direction, the protection structure allows said electromagnetic radiation
to impinge on the first processing layer and on the second processing layer. In addition
or as an alternative the protection structure can be configured such, that upon irradiation
of electromagnetic radiation constituting the second spectrum along the direction
running opposite to the extension direction, the protection structure allows said
electromagnetic radiation to impinge on the second processing layer and on the first
processing layer.
[0030] Again in other words, the protection structure is preferably wavelength-specific.
That is to say, the protection structure can be configured such that it allows the
transmission of electromagnetic radiation of one or more particular wavelengths but
at the same time prevents the transmission of electromagnetic radiation of other one
or more wavelengths. For example, it is conceivable to provide a protection structure
that is a barrier or blockage for electromagnetic radiation having a wavelength of
λ
1 = 355 nm but which enables the propagation of electromagnetic radiation having a
wavelength of λ
2 = 380 nm. If in a first step radiation λ
1 = 355 nm is irradiated from the front side (back side) of the data carrier along
the extension direction (direction running opposite to extension direction), said
radiation will at least partially ablate only the first processing layer (second processing
layer) because a further propagation towards the second processing layer (first processing
layer) is prevented by the protection structure. If then in a second step radiation
λ
2 = 380 nm is irradiated from the front side (back side) of the data carrier along
the extension direction (direction running opposite to extension direction) at positions
where an ablation of the first processing layer (second processing layer) has already
occurred during the first step, said radiation will propagate through the protection
structure and will at least partially ablate also the second processing layer (first
processing layer). In this way a data carrier is generated wherein data is selectively
generated and visible in the first processing layer and the second processing.
[0031] The protection structure can be configured to absorb impinging electromagnetic radiation
constituting the first spectrum. Such a protection structure has the function of an
optical filter and allows electromagnetic radiation of particular wavelengths to pass
and at the same time prevents the propagation of electromagnetic radiation having
other particular wavelengths.
[0032] The protection structure can comprise one or more additives and/or one or more inks
that are configured to absorb impinging electromagnetic radiation constituting the
first spectrum, the protection structure being preferably configured to absorb in
the ultraviolet region and/or in the infrared region.
[0033] Hence, it is preferred to provide a protection structure which is essentially transparent
in visible light. To this end a variety of additives and inks can be used and which
are well known to the person skilled in the art. An example of an additive which absorbs
electromagnetic radiation in the ultraviolet region is based on a 2-hydroxyphenyl-s-triazine
derivative such as the commercially available Tinuvin® 1600 from BASF. Examples of
inks which absorb in the infrared region are the commercially available spectraCARD
IRB from Printcolor or MSD4800 or MSC3600 from H. W. Sands.
[0034] If the protection structure is provided by means of additives it is preferred to
apply them in the form of a matrix comprising them. For example, the additives can
be dispersed into a polymer matrix by using standard extrusion equipment.
[0035] The protection structure can be configured to reflect impinging electromagnetic radiation
constituting the first spectrum, the protection structure preferably being configured
to fully reflect or diffusely reflect impinging electromagnetic radiation constituting
the first spectrum, or the protection structure can be configured to diffusely transmit
impinging electromagnetic radiation constituting the first spectrum. A full reflection
occurs when the angle of light incident on the protection structure equals the angle
of the light reflected from the protection structure. A diffuse reflection, also known
as scattered reflection, refers to the scattering of incident light at many angles.
In this case the protection structure can be seen as a diffraction grating or an optical
grating. A scattered transmission means that the power of the impinging electromagnetic
radiation is reduced by the protection structure such, that a processing of the processing
layer lying beneath the protection structure by means of the transmitted electromagnetic
radiation is prevented.
[0036] The protection structure can comprise periodical structures that are configured to
diffract impinging electromagnetic radiation constituting the first spectrum, or the
protection structure can comprise nanoparticles, such that impinging electromagnetic
radiation constituting the first spectrum is scattered on a surface of the nanoparticles.
A protection structure in the form of nanoparticles can be provided by means of nanoparticles
embedded in a matrix, preferably in a plastic matrix. Conceivable nanoparticles are
made from silicon dioxide (SiO
2) and titanium dioxide (TiO
2).
[0037] Hence, in view of the above it can be said that the blockage or barrier provided
by means of the protection structure can be based on the reflection, the transmission
or the absorption of the electromagnetic radiation being irradiated in order to process
the processing layers, wherein said reflection, transmission or absorption depends
on the particular wavelength(s) of the irradiated electromagnetic radiation and the
intrinsic properties of the protection structure. To this end, the size and the composition
of the nanoparticles can be used to effectuate a diffraction of electromagnetic radiation
of a particular wavelength. Likewise, a reflection, transmission or absorption occurring
for electromagnetic radiation of a particular wavelength(s) can be set based on the
shape of the periodical structures provided on the protection structure or the chemical
composition or the thickness of the protection structure.
[0038] The protection structure can be provided in the form of one or more layers, wherein
said one or more layers extends at least partially between the first and second processing
layers along an extension direction.
[0039] Hence, it is possible to provide a protection structure in the form of a single layer
that fully extends between the first and second processing layers and thereby completely
separates the first and second processing layers from one another. However, the provision
of two or more layers constituting the protection structure is likewise conceivable,
wherein said two or more layers can be arranged adjacent to one another with respect
to the extension direction. In this case it is preferred that the two or more layers
differ in their intrinsic properties such that they act as a barrier or blockage for
different wavelengths. Moreover, it is also conceivable to provide the protection
structure in the form of several thin multilayer structures, wherein the thin multi-layer
structures effectuate a thin-film interference of the impinging electromagnetic radiation.
That is, depending on the wavelength of the irradiated electromagnetic radiation and
the thickness and the composition of the thin multilayers of the protection structure,
the waves composing the electromagnetic radiation are reflected by the upper and lower
boundaries of the protection structure and interfere with one another such that they
eliminate each other.
[0040] The data carrier can comprise two or more protection structures, wherein the processing
layers and the protection structures are preferably arranged alternating along the
extension direction. In this case it is preferred that the individual protection structures
differ in their wavelength-selectivity. For example, the data carrier can comprise
three processing layers, wherein the first protection structure is arranged between
the first and the second processing layer and a second protection structure is arranged
between the second and the third processing layer. It is then preferred that the first
protection structure is selectively blocking the electromagnetic radiation constituting
the first spectrum and that the second protection structure is selectively blocking
electromagnetic radiation constituting a second spectrum being different from the
first spectrum. In this way the first processing layer can be processed with electromagnetic
radiation constituting the first spectrum while the underlying second and third processing
layers are protected by the first protection structure and the second processing layer
can be processed with electromagnetic radiation constituting the second spectrum while
the underlying third processing layer is protected, for example.
[0041] The data carrier can further comprise at least one filter structure, preferably a
printed filter structure and/or one or more lenses, particularly preferably one or
more lenticular lenses, wherein said filter structure is configured to alter the appearance
of the first security element and/or the second security element, in particular the
appearance of the first part and/or of the second part of the first security element
depending on a viewing angle.
[0042] A printed filter structure could be provided in the form of printed segments of a
light absorbing colour and/or in the form of a light reflecting colour. Moreover,
in case that the second security element is provided in two parts, it is likewise
conceivable that the filter structure is configured to alter the appearance of the
first part and/or the second part of the second security element, depending on the
viewing angle.
[0043] The filter structure, both in the form of one or more lenses as well as in the form
of printed segments, serves the purpose of selectively illuminating the security elements
if the data carrier is exposed to light, for example ambient light. In the case of
the printed filter structure the selective illumination is achieved in that the printed
segments prevent incoming light from propagating towards the security elements. As
a result, the security elements are illuminated only at positions where their illumination
is not prevented by the printed segments. In the case of the one or more lenses said
lenses result in a particular focussing of incoming light onto particular regions
of the security elements. Hence, those parts of the security element where the incoming
light has not been focussed to will not be illuminated. This partial or selective
illumination of the security element confers the security element a changing appearance,
wherein the appearance changes in dependence of the viewing angle.
[0044] In order to make use of the thus described effect the filter structure should be
arranged before the security element and thus before the processing layers with respect
to incoming light. This means that the filter structure is preferably arranged on
the cover layer and/ or on the base layer.
[0045] In a second aspect a data carrier is provided which comprises at least one filter
structure and at least one first processing layer which are arranged along an extension
direction. The first processing layer comprises at least one security element. The
first processing layer is configured to interact with electromagnetic radiation under
generation of the at least one security element. The first processing layer preferably
comprises at least one of one or more metals, one or more metal-compounds, one or
more pigments, and one or more colorants. The filter structure and the security element
at least partially overlap when viewed along the extension direction, and the filter
structure is configured to alter the appearance of the security element depending
on a viewing angle.
[0046] That is, the data carrier comprises at least one processing layer which is configured
to interact with electromagnetic radiation, whereupon the at least one security element
is generated in the processing layer. The filter structure, which preferably corresponds
to one or more lenses, particularly preferably one or more lenticular lenses, and/or
to one or more printed filter structures, results in a partial and selective illumination
of the security element, wherein the appearance of the security element changes in
dependence of the viewing angle as described above.
[0047] With regard to the first and/or second processing layers preferably comprising one
or more metals or metal-compounds, it should be noted that metals, metal-compounds
or pigments that are ablated or bleached upon irradiation with electromagnetic radiation
are conceivable. However, if a security element such as a colored personalization
is desired, a colored metal, metal-compound pigment should be used. For example, conceivable
metals can be selected from Al, Cu, Au, Ag, Ti or combinations thereof and conceivable
metal-compounds can be selected from TiN, TiCN, CrN, ZrN, TiZrN, ZrCN, TiC, TiCrN,
AlTiN, TiAlN, diamond like carbon or combinations thereof. Conceivable pigments or
colorants are pigments or colorants that are commonly used in the field of the invention,
such as the pigments disclosed in
EP0327508,
WO9635585 or
WO0136208. In order to allow the irradiated electromagnetic radiation irradiated along the
first direction or the second direction to reach the first and/or second processing
layers, the cover layer and the base layer should be provided in transparent materials
such as polycarbonate or polyethylene terephthalate mentioned above. Generally, it
can be said that conceivable materials apart from the already mentioned polycarbonate
and the PET are amorphous polyester and co-polyester (A-PET, PET-G) and semi-crystalline
polyester (boPET). However, if an irradiation along the first direction only is intended,
then the base layer could be provided as opaque material. Typically plastic sheets
with filler media, typically titanium dioxide (TiO
2) (standard opaque white PC sheets) are used.
[0048] One or more filter structures can be printed with standard offset or screen printing
inks as they are well known in the field of plastics card printing. To avoid disturbing
interactions with irradiating electromagnetic radiation, printed filter structures
are preferably transparent in a wavelength region that corresponds to the wavelength
region of the irradiated electromagnetic radiation e.g. the printed filter structures
can be transparent in the infrared (IR) wavelength region. An IR transparency can
be reached by using a mixture of standard primary inks called Cyan, Magenta and Yellow
without using carbon black.
[0049] The interaction of the processing layer with the electromagnetic radiation could
be a partial or entire ablation or a partial or entire bleaching of the processing
layer at the regions of interaction of the processing layer with the electromagnetic
radiation, wherein the electromagnetic radiation preferably corresponds to laser radiation,
see above.
[0050] At this point it should be noted that the data carrier according to the second aspect
essentially corresponds to the data carrier according to the first aspect. The main
difference lies in the provision of at least two processing layers and security elements
in the data carrier according to the first aspect and the provision of at least a
filter structure and at least one processing layer and security element in the data
carrier according to the second aspect. However, all features that have been presented
in the context of the data carrier according to the first aspect can likewise be present
in the data carrier according to the second aspect. For the sake of clarity it is
at this point omitted to reproduce the explanations made in the context of the data
carrier according to the first aspect. Instead, reference is made to the above.
[0051] In a further aspect a security document comprising a data carrier as described above
is provided, the security document preferably being an identity card, a passport,
a credit card, a bank note or the like.
[0052] At this point it should be understood that the data carrier
per se can correspond to a security document. This is the case if the data carrier is provided
in the form of an identity card, for example. However, it is likewise conceivable
to introduce or incorporate the data carrier into a security document. In the case
of a passport for example the data carrier could correspond to a page of the passport,
wherein said page is made of plastics, i.e. the cover layer and the base layer, within
which the processing layer(s) with its security element(s) and possibly one or more
protection structures are arranged. To this end it is conceivable that the security
document comprises at least one data carrier according to the first aspect and/or
at least one data carrier according to the second aspect.
[0053] In a further aspect a method of producing a data carrier, preferably a data carrier
according to the first aspect as described above is provided, the method comprising
the steps of:
- Providing at least a first processing layer and a second processing layer along an
extension direction, and
- Providing at least a first security element and a second security element on the first
processing layer and/or on the second processing layer.
[0054] At least the first security element is comprised of a first part and of a second
part, wherein the first part of the first security element is provided on the first
processing layer and the second part of the first security element is provided on
the second processing layer. The first security element is configured to exhibit a
first appearance under a first viewing angle and a second appearance being different
from the first appearance under a second viewing angle being different from the first
viewing angle.
[0055] Electromagnetic radiation can be irradiated along the extension direction and/or
along a direction extending opposite to the extension direction in order to generate
the first security element and/or the second security element. The first security
element and/or the second security element are thereby preferably produced by means
of a partial or entire ablation and/or by means of a partial or entire bleaching of
the processing layers at the positions of the impinging electromagnetic radiation.
Security element(s) on the first processing layer are preferably produced by irradiating
electromagnetic radiation along the extension direction, whereas security element(s)
on the second processing layer are preferably produced by irradiating electromagnetic
radiation along a direction running opposite to the extension direction. In other
words, it is preferred to irradiate the data carrier from both sides such that the
processing layers are processed individually, and wherein the uppermost processing
layer is processed in each case. Security elements being provided in the form of one
or more parts, which can be distributed over the processing layers, are advantageously
produced in this way.
[0056] In order to prevent an unintentional ablation of the underlying processing layer
it is preferred to provide a protection structure as described above between the processing
layers. That is, a protection structure can be provided which acts as a barrier or
blockage for the respectively underlying processing layer with regard to an irradiation
of the particular wavelength(s) it is sensitive to from both sides of the data carrier.
If three or more processing layers are used it is preferred to use two or more protection
structures that are in each case arranged between successive processing layers. These
two or more protection structures are then preferably selective for one or more particular
wavelength(s) only, wherein said selectivity is preferably different for each protection
structure.
[0057] In a further aspect a method of producing a data carrier, preferably a data carrier
according to the second aspect described above is provided, the method comprising
the steps of:
- Providing at least a filter structure and a first processing layer along an extension
direction,
- Providing at least one security element on the first processing layer.
[0058] The first processing layer is configured to interact with electromagnetic radiation,
whereby the at least one security element is generated. The first processing layer
preferably comprises at least one of one or more metals, one or more metal-compounds,
one or more pigments, and one or more colorants. The filter structure and the first
processing layer at least partially overlap when viewed along the extension direction,
and the filter structure is configured to alter the appearance of the security element
depending on a viewing angle.
[0059] All layers of the data carrier such as the processing layers and, if applicable,
the filter structure are preferably fused together by means of lamination in a lamination
step. In case that one or more printed filter structures are provided on the data
carrier then said filter structures are preferably applied to the particular layer(s)
they are intended for by means of printing them to the layer(s) before the lamination
step. In case that one or more filter structures in the form of lenses are provided,
then said filter structures can be provided by means of imprinting them into the layer(s)
they are intended for from an engraved metal plate during the lamination process.
BRIEF DESCRIPTION OF THE DRAWINGS
[0060] Preferred embodiments of the invention are described in the following with reference
to the drawings, which are for the purpose of illustrating the present preferred embodiments
of the invention and not for the purpose of limiting the same. In the drawings,
Fig. 1a shows a front view of a data carrier comprising two processing layers and
a first and a second security element;
Fig. 1b shows an exploded view of the data carrier according to figure 1a;
Fig. 2a shows a first view on a data carrier comprising two processing layers and
a first and second security element according to another embodiment;
Fig. 2b shows a second view on the data carrier according to figure 2a;
Fig. 3 shows a front view on a data carrier comprising two processing layers and security
elements according to another embodiment;
Fig. 4 shows a front view on a data carrier comprising two processing layers and security
elements according to another embodiment;
Fig. 5 shows a front view on a data carrier comprising four processing layers and
security elements according to another embodiment;
Fig. 6a shows a detailed view of the security element on the first processing layer
of the data carrier according to figure 5;
Fig. 6b shows a detailed view of security element on the second processing layer of
the data carrier according to figure 5;
Fig. 6c shows a detailed view of the security element on the third processing layer
of the data carrier according to figure 5;
Fig. 6d shows a detailed view of the security element on the fourth processing layer
of the data carrier according to figure 5;
Fig. 7a shows a cross-sectional view of a data carrier comprising two processing layers
and a spacing layer in an initial state;
Fig. 7b shows a cross-sectional view of the data carrier according to figure 7a in
a processing state;
Fig. 7c shows a cross-sectional view of the data carrier according to figure 7a in
a final state;
Fig. 7d shows a cross-sectional view of the data carrier according to figure 7a in
a final state, wherein two security elements are schematically indicated;
Fig. 8a shows a cross-sectional view of a data carrier comprising two processing layers
and a protection structure in an initial state;
Fig. 8b shows a cross-sectional view of the data carrier according to figure 8a in
a processing state;
Fig. 8c shows a cross-sectional view of the data carrier according to figure 8a in
a final state;
Fig. 8d shows a cross-sectional view of the data carrier according to figure 8a in
the final state, wherein two security elements are schematically indicated;
Fig. 9 shows a cross-sectional view of a data carrier comprising four processing layers
and three spacing layers;
Fig. 10 shows a cross-sectional view of a data carrier comprising two processing layers,
a spacing layer and a filter structure;
Fig. 11 shows a cross-sectional view of a data carrier comprising two processing layers,
a spacing layer and a filter structure according to another embodiment;
Fig. 12 shows a cross-sectional view of a data carrier comprising one processing layer
and a filter structure according to another embodiment;
Fig. 13 shows a cross-sectional view of a data carrier comprising one processing layer
and a filter structure according to another embodiment;
Fig. 14 shows a cross-sectional view of a data carrier comprising one processing layer
and a filter structure according to another embodiment;
Fig. 15 shows a cross-sectional view of a data carrier comprising one processing layer
and a filter structure according to another embodiment.
DESCRIPTION OF PREFERRED EMBODIMENTS
[0061] In figures 1a to 11 several embodiments of a data carrier 1 comprising at least two
processing layers 4a, 4b and at least two security elements 6a, 6b provided on said
processing layers 4a, 4b are disclosed. With respect to figures 12 to 15 several embodiments
of a data carrier 1 comprising one processing layer 4a with one or more security elements
6a provided thereon are disclosed. In the following, aspects of said data carriers
1 are discussed in greater detail.
[0062] In fact, different realizations of a data carrier 1 according to the invention are
discussed primarily phenomenologically with respect to figures 1a to 6d. Their structural
design and their production method are shown and explained in the context of figures
7a to 11. All data carriers 1 have in common that they comprise at least a first processing
layer 4a and a second processing layer 4b which are arranged along an extension direction
E1, wherein at least two security elements 6a, 6b are provided on said processing
layers. Moreover, the first processing layer 4a comprises at least a first part 61a
of a first security element 6a and a first part 61b of a second security element 6b.
In addition, the first security element 6a is configured to exhibit a first appearance
under a first viewing angle α1 and a second appearance being different from the first
appearance under a second viewing angle α2 being different from the first viewing
angle.
[0063] Hence, in figures 1a and 1b a data carrier 1 comprising a first processing layer
4a and a second processing layer 4b is depicted, wherein said data carrier 1 comprises,
inter alia, a first security element 6a in the form of a portrait and a second security
element 6b in the form of the alphabetic characters "Data". As best seen in figure
1b, both security elements 6a, 6b are split into parts, wherein said parts are distributed
over the first and second processing layers 4a, 4b. That is, the first security element
6a in the form of the portrait is split into four parts 61a-64a, wherein two of said
parts 61a-62a are arranged on the first processing layer 4a and the other two of said
parts 63a-64a are arranged on the second processing layer 4b. The two lines L1, L2
dividing the data carrier 1 into the four parts in figure 1a are no real lines being
physically present on the data carrier 1 but are indicated in said figure as an illustration
aid. To this end, the lower left side 61a of the portrait 6a and the upper right side
62a of the portrait 6a are provided on the first processing layer 4a, whereas the
upper left side 63a of the portrait 6a and the lower right side 64a of the portrait
6a are provided on the second processing layer 4b. The four parts 61a-64a comprising
these different sides of the portrait 6a are provided on the first and second processing
layers 4a, 4b such, that the boundaries of the respective parts rest against each
other when viewed from the first processing layer 4a towards the second processing
layer 4b along the extension direction E1. In other words, the four parts 61a-64a
are in each case arranged separate from one another but immediately adjacent to one
another when viewed along the extension direction E1. As already mentioned, also the
second security element 6b provided in the form of the alphabetic characters "Data"
is split into parts 61b, 62b and distributed over the first processing layer 4a and
the second processing layer 4b. Namely, on the first processing layer 4a the letters
"Data" are provided in the form of recesses 61b and on the second processing layer
4b the letters "Data" are provided as elevations 62b. The letters "Data" in the form
of the recesses 61b on the first processing layer 4a and the letters "Data" in the
form of the elevations 62b on the second processing layer 4b are configured complementary
to each other. Moreover, the recesses 61b on the first processing layer 4a are provided
in a region of the first processing layer 4a where also the lower left side 61a of
the portrait 6a is provided, i.e. the recesses 61b overlap said part 61a of the portrait
6a. Thus, the first security element 6a in the form of the portrait, in particular
its first part 61a comprising the lower left side of the portrait 6a, and the second
security element 6b in the form of the alphabetic characters, in particular its first
part 61b comprising the letters "Data" provided by means of recesses, overlap with
each other. In addition, the first part 61a of the security element 6a comprising
the lower left side of the portrait 6a arranged on the first processing layer 4a and
the second part 62b of the second security element 6b comprising the letters "Data"
in the form of the elevations provided on the second processing layer 4b overlap with
each other with respect to the extension direction E1.
[0064] As will be explained in greater detail further below with reference to figures 7a
to 8d, some regions on the first processing layer 4a and on the second processing
layer 4b are partially or even completely removed from these layers. Here, if one
were to define four squared regions A1-A4 on the first processing layer 4a and four
squared regions B1-B4 on the second processing layer 4b that are delimited by the
(fictitious) lines L1, L2 in figure 1a, then the squared region A1 located in the
upper left corner of the first processing layer 4a is essentially entirely removed
in order to unravel the upper left part 63a of the portrait 6a located underneath
in the upper left region B1 of the second processing layer 4b. Likewise, the squared
region B3 located in the upper right corner of the second processing layer 4b is essentially
entirely removed in order to unravel the upper right part 62a of the portrait 6a located
above in the upper right region A3 of the first processing layer 4a, and the squared
region A4 located in the lower right corner of the first processing layer 4a is essentially
entirely removed in order to unravel the lower right part 64a of the portrait 6a located
underneath in the lower right region B4 of the second processing layer 4b, respectively.
Regarding the lower left region A2 on the first processing layer 4a, there too the
first processing layer 4a is essentially entirely removed with the exception of the
area 61a constituting the lower left side of the portrait 6a. Analogously, the lower
left region B2 on the second processing layer 4b is essentially entirely removed with
the exception of the area 62b constituting the letters "Data" in the form of the elevations.
In this context it should be noted that an essentially entirely removed processing
layer 4a, 4b corresponds to a layer which is physically removed, e.g. a metal layer
that is at least partially or entirely ablated, or a layer that is essentially transparent,
e.g. a layer comprising additives or pigments that are partially or entirely bleached.
Hence, a recess can correspond to a physically ablated area on a processing layer
or to a bleached area on a processing layer. Likewise, an elevation can correspond
to an area not being ablated but being surrounded by ablated area or to an unbleached
area being surrounded by a bleached area.
[0065] From figures 2a and 2b the aspect regarding the changing appearances of the first
security element 6a in dependence on the viewing angles α1, α2 will become apparent.
Firstly, it should be noted that the data carrier 1 depicted in these figures essentially
corresponds to the schematic data carrier 1 depicted in figures 1a and 1b. The main
difference lies in the provision of a first security element 6a by means of the numeric
data "20.03.18", which extends along an entire width of the second security element
6b in the form of the portrait, and in that the first security element 6a is provided
in two parts 61a, 62a that are distributed over the two processing layers 4a, 4b.
The second security element 6b, i.e. the portrait, is as well split on the two processing
layers 4a, 4b by using the form of the numeric data "20.03.18", but in contrary to
figures 1a and 1b, the portrait is in this embodiment not quartered to regions. The
first security element 6a in the form of the numeric data is again distributed in
parts over the first processing layer 4a and the second processing layer 4b, wherein
one part is configured as a recess 61a and the other part is configured as a corresponding
elevation 62a. Moreover, the first security element 6a and the second security element
6b at least partially overlap, i.e. the numeric data 6a is provided in regions where
also parts of the portrait 6b are provided.
[0066] In figure 2a, the data carrier 1 is depicted under a first viewing angle α1. Under
this first viewing angle α1, both the first security element 6a and the second security
element 6b are visible. In figure 2b, the data carrier 1 is depicted under a second
viewing angle α2 being different from the first viewing angle α1. Under this second
viewing angle α2 only the second security element 6b in the form of the portrait is
visible, whereas the first security element 6a in the form of the numeric characters
is invisible. The appearance of the first security element 6a has thus changed from
being visible to being invisible. With regard to the second security element 6b it
should be noted that the allegedly change of appearance between figure 2a and 2b does
not correspond to a change of appearance in the sense of the present invention. In
fact, the appearance of the portrait does not change in dependence of the viewing
angle. Instead, the portrait depicted in figure 2a seems to be dark due to the presence
of the background behind the data carrier 1 and the fact that it has not been illuminated
at the moment when the photo of said data carrier 1 has been taken.
[0067] The data carriers 1 depicted in figures 3 and 4 in each case comprise a security
element 6b in the form of a portrait as described with reference to figures 2a and
2b. Moreover, conceivable further arrangements of further security elements 6a, 6c-6d
are schematically indicated on the data carrier 1 by the expression "Data" surrounded
by the arrows within the grey areas. To this end various designs and arrangements
of these other security elements 6a, 6c-6d are conceivable. For example, these other
security elements could be provided as images, as alphanumeric characters, as patterns
or fringes, preferably as Moire fringes. A Moire fringe could be provided by means
of generating a first line grid on the first processing layer 4a which superposes
with a second line grid generated on the second processing layer 4b when viewed along
the extension direction E1. Moreover, one or more of these other security elements
6a, 6c could be arranged such that they at least partially or completely enclose or
complement each other and/or the security element 6b in the form of the portrait.
In addition or alternatively, one or more of these other security elements 6d can
at least partially or entirely overlap with each other and/or with the security element
6b in the form of the portrait. To this end an enclosure or overlap is conceivable
with respect to the extension direction E1 and/or with respect to a direction running
parallel to a plane p extending through the processing layers 4a, 4b, the latter being
considered as a spatial overlap or enclosure of the particular security elements on
a particular processing layer.
[0068] As initially mentioned, in figure 5 a data carrier 1 is depicted which comprises
more than two processing layers 4a, 4b, namely four processing layers 4a-4d in the
present case. The first processing layer 4a, the second processing layer 4b, the third
processing layer 4c and the fourth processing layer 4d are again arranged along the
extension direction E1, wherein several security elements 6a-6c are provided on these
processing layers. The particular security elements on the particular processing layers
are depicted individually in figures 6a to 6d. That is to say, each of the processing
layers 4a-4d has been individually provided with individual parts of the security
elements 6a-6c, here security elements 6a in the form of the numeric character "8"
and in the form of images depicting circles 6c and an essentially triangular structure
6b. All processing layers 4a-4c except the processing layer 4d depicted in figure
6d comprise parts 61a-63a, 61b-63b of two security elements 6a, 6b, namely of the
security element 6a constituting the numeric character "8" and of the security element
6b constituting the essentially triangular image. As becomes evident from figures
6a to 6c, the different parts 61a-63a, 61b-63b of the different security elements
6a, 6b are arranged spatially apart from one another on the particular processing
layers 4a-4c. Moreover, the geometric extension of the parts 61a-63a constituting
the security element 6a in the form of the numeric character "8" and of the parts
constituting 61b-63b the security element 6b in the form of the essentially triangular
structure vary between the different processing layers 4a-4c. By arranging these parts
61a-63a, 61b-63b on the particular processing layer 4a-4c such, that the parts of
the respective security element essentially come to lie one below the other when viewed
along the extension direction E1, security elements exhibiting a depth effect are
generated.
[0069] As mentioned initially, the method of production of data carriers 1 as just described
are disclosed with reference to figures 7a to 9. Throughout these figures a data carrier
1 comprising a cover layer 2 and a base layer 3 is disclosed, wherein the processing
layers 4a, 4b are arranged between the cover layer 2 and the base layer 3. The cover
layer 2 and the base layer 3 are made from plastics, here from polycarbonate (PC)
or polyethylene terephthalate (PET). That is, both layers are essentially transparent.
Regarding the data carriers 1 depicted in figures 7a to 15 it should be noted that
they are depicted in an exploded view for reasons of clarity. That is, the individual
layers are depicted separate from one another, although in the actual data carrier
they are arranged adjoining and immediately on top of each other.
[0070] As becomes evident from figure 7a, the data carrier 1 is comprised of the cover layer
2, the first processing layer 4a, the second processing layer 4b and the base layer
3 being arranged, in this sequence, along the extension direction E1. The processing
layers 4a, 4b are metallic layers and two opaque areas 6 are provided sideways to
the processing layers 4a, 4b. A spacing layer 5a is arranged between the first processing
layer 4a and the second processing layer 4b. This spacing layer 5a serves the purpose
of an intermediate layer which spatially separates the processing layers 4a, 4b from
one another. Depending on the information, i.e. security element, that is to be generated
in the data carrier 1 by means of accordingly processing the processing layers 4a,
4b such spacing between the processing layers is advantageous or even necessary. The
spacing layer is preferably made from a transparent material, particularly preferably
from polycarbonate or polyethylene terephthalate. With respect to figure 7b the generation
of two security elements 6a, 6b on the data carrier 1 is depicted. In particular,
starting from the unprocessed data carrier 1 according to figure 7a, a processing
of the first and second processing layers 4a, 4b is achieved in a first step by irradiating
electromagnetic radiation R along the extension direction E1 in order to selectively
ablate the first processing layer 4a and by irradiating electromagnetic radiation
R along a direction E2 running opposite to the extension direction E1 in order to
selectively ablate the second processing layer 4b in a second step. It should be noted
that this procedure is analogous in case of processing layers that are configured
to be bleached upon the interaction with electromagnetic radiation. Explanations provided
above as well further below with regard to an ablation of the processing layers thus
likewise apply to a bleaching of the processing layers. As follows from figure 7b,
the ablation of the processing layers 4a, 4b in the region of incident laser radiation
R results in several modified regions 41a, 41b corresponding to laser treated areas
as well as unmodified regions 42a, 42b corresponding to untreated areas. The modified
regions 41a, 41b together with the unmodified regions 42a, 42b represent the security
elements 6a, 6b. In the depicted situation the processing layers 4a, 4b are ablated
such, that a first security element 6a comprising a first part 61a located on the
first processing layer 4a and a second part 62a located on the second processing layer
4b is generated, wherein the first part 61a overlaps with a second security element
6b being exclusively formed on the first processing layer 4b. This situation is schematically
illustrated by the rectangles indicated in figure 7d. It should be noted that the
rectangles are fictive rectangles that serve the purpose of an illustration aid. In
fact, the rectangles are intended to indicate the two security elements 6a, 6b. The
second security element 6b could correspond to an image, for example a portrait, on
which the first security element 6a in the form of an alphanumeric character is superposed.
In this example the second processing layer 4b is preferably entirely removed in those
regions that lie beneath the regions of the first processing layer 4a in which only
the second security element 6b in the form of the portrait is formed.
[0071] The data carrier 1 depicted in figures 8a to 8d essentially correspond to the data
carrier 1 depicted in figures 7a to 7d, with the exception that two spacing layers
5a, 5b and a protection structure 9a are arranged between the first processing layer
4a and the second processing layer 4b. The protection structure 9a in this example
corresponds to an ink that is applied between the two transparent spacing layers 5a,
5b which are in turn arranged between the two processing layers 4a, 4b and which ink
is applied along a direction running perpendicularly to the extension direction E1and
parallel to the plane p extending through the processing layers 4a, 4b. Here, the
ink is applied along an entire length of the processing layers 4a, 4b. That is, the
processing layers 4a, 4b are completely separated from each other by the spacing layers
5a, 5b and the protection structure 9a. In figure 8b the irradiation of electromagnetic
radiation R along the extension direction E1 as well as the irradiation of electromagnetic
radiation R along the direction E2 running opposite to the extension direction E1
is shown. As indicated in the figure, the electromagnetic radiation R irradiated along
the extension direction E1 ablates the first processing layer 4a and the electromagnetic
radiation R irradiated along the opposite direction E2 ablates the second processing
layer 4b. In the former case the protection structure 9a prevents the electromagnetic
radiation R from impinging on the second processing layer 4b and in the latter case
the protection structure 9a prevents the electromagnetic radiation R from impinging
on the first processing layer 4a, respectively. Hence, the protection structure 9a
acts as a barrier or blockage for the respectively underlying processing layer 4a,
4b with regard to an irradiation from both sides of the data carrier 1. In the present
case, the blocking of the electromagnetic radiation R is based on absorption of this
radiation by the components constituting the protection structure 9a, i.e. the ink.
Due to the fact that the protection structure 9a prevents an unintentional ablation
of underlying processing layers 4a, 4b, a precise production of the security-feature-bearing
data carrier 1 with several security elements 6a, 6b provided and/or split over several
processing layers is enabled, see figures 8c and 8d. Hence, here again modified regions
41a, 41b and unmodified regions 42a, 42b are generated upon the interaction with the
electromagnetic radiation, which together represent the security elements 6a, 6b.
As in the case of the data carrier according to figure 7d fictive rectangles are used
in figure 8d for illustrating the two generated security elements 6a, 6b of the data
carrier 1.
[0072] In figure 9 a data carrier 1 comprising four processed processing layers 4a-4d and
three transparent spacing layers 5a-5c arranged there between is depicted. To this
end the processing layers 4a-4d and the transparent spacing layers 5a-5c are arranged
alternating with respect to the extension direction E1. A processing of the different
processing layers 4a-4d, and hence the generation of different security elements,
is done by separately and selectively processing the individual processing layers
4a-4d. For example, starting from an unprocessed data carrier 1, in a first step a
processing of the first and fourth processing layers 4a, 4d can be achieved by irradiating
electromagnetic radiation along the extension direction E1 in order to selectively
ablate the first processing layer 4a and by irradiating electromagnetic radiation
along the opposite direction E2 in order to selectively ablate the fourth processing
layer 4d, such that modified regions 41a, 41d are created only in the first and fourth
processing layers 4a, 4d. In a second step, radiation R having a wavelength being
different from the wavelength of the radiation R irradiated in the first step is irradiated
onto the data carrier 1 along the extension direction E1 and along the opposite direction
E2This radiation is irradiated at positions where the first and fourth processing
layers 4a, 4d were already ablated in the first step. In this way, congruent recesses
43a, 43b in the first and second processing layers 4a, 4b and congruent recesses 43c,
43d in the third and fourth processing layers 4c, 4d are generated. Hence, by providing
several processing layers 4a-4dspecifically modified and unmodified regions 41a-41d,
42a-42d and corresponding at least partially congruent recesses 43a-43d as well as
unique recesses 44a-44d are created, which enables the production of a multilayer
data carrier comprising complex security elements distributed and/or split over several
processing layers at high precision.
[0073] In figures 10 and 11 data carriers 1 comprising two processing layers 4a, 4b and
a transparent spacing layer 5a are depicted, wherein said two processing layers 4a,
4b were processed and thus provided with security elements as described above. However,
said data carriers 1 additionally comprise a filter structure 7a, 7b arranged on the
cover layer 2, wherein said filter structure 7a, 7b is configured to alter the appearance
of security elements provided on the processing layers 4a, 4b depending on a viewing
angle. In the data carrier 1 according to figure 10 said filter structure corresponds
to a printed filter structure 7a provided in the form of printed segments of a light
absorbing colour or light reflecting colour. In order to protect the printed filter
structure 7a from external influences another transparent layer, referred to as top
layer 8, is arranged on top of the cover layer 2, i.e. the printed filter 7a structure
is embedded between the top layer 8 and the cover layer 2. In the data carrier 1 according
to figure 11 said filter structure 7b is provided in the form of lenticular lenses.
The filter structure 7a 7b, both in the form of one or more lenses as well as in the
form of printed segments, serves the purpose of selectively illuminating the security
elements if the data carrier 1 is exposed to light, for example ambient light. This
partial or selective illumination of the security elements confers the security elements
a changing appearance, wherein the appearance changes in dependence of the viewing
angle.
[0074] The data carriers 1 depicted in figures 12 to 15 differ from the previously discussed
data carriers 1 in that they comprise only one processing layer 4a. However, it should
be understood that one or more security elements can be generated in the same way
as in the case of the above data carriers 1, namely by selectively irradiating electromagnetic
radiation along the extension direction E1 and along the opposite direction E2. Moreover,
these data carriers 1 in each case comprise a filter structure 7a, 7b as just discussed.
To this end the data carriers 1 according to figures 12 and 13 comprise a filter structure
7b in the form of lenticular lenses, wherein the lenticular lenses are provided along
an entire width of the processing layer 4a (see figure 12) or wherein the lenticular
lenses are provided only in some regions (see figure 13). The same holds for the data
carriers 1 depicted in figures 14 and 15, wherein there the filter structure 7a is
provided in the form of printed segments.
LIST OF REFERENCE SIGNS
1 |
data carrier |
9a |
protection structure |
2 |
cover layer |
E1 |
extension direction |
3 |
base layer |
E2 |
opposite direction |
4a-4d |
processing layer |
p |
plane |
41a-41d |
modified region |
R |
electromagnetic radiation |
42a-42d |
unmodified region |
α1, α2 |
viewing angle |
43a-43d |
congruent recess |
L1, L2 |
line |
44a-44d |
unique recess |
A1-A4 |
region |
5a-5c |
spacing layer |
B1-B4 |
region |
6a-6d |
security element |
|
|
61a-64d |
parts |
|
|
61b-62b |
parts |
|
|
7a, 7b |
filter structure |
|
|
8 |
top layer |
|
|
1. A data carrier (1) comprising:
- at least a first processing layer (4a) and a second processing layer (4b) which
are arranged along an extension direction (E1), and
- at least a first security element (6a) and a second security element (6b) being
arranged on the first processing layer (4a) and/or on the second processing layer
(4b),
characterized in that at least the first security element (6a) is comprised of at least a first part (61a)
and a second part (62a), wherein the first part (61a) of the first security element
(6a) is provided on the first processing layer (4a) and the second part (62a) of the
first security element (6a) is provided on the second processing layer (4b), and
in that the first security element (6a) is configured to exhibit a first appearance under
a first viewing angle (α1) and a second appearance being different from the first
appearance under a second viewing angle (α2) being different from the first viewing
angle (α1).
2. The data carrier (1) according to claim 1, wherein the first security element (6a)
and the second security element (6b) at least partially overlap with each other with
respect to the extension direction (E1).
3. The data carrier (1) according to any one of the preceding claims, wherein the first
part (61a) of the first security element (6a) on the first processing layer (4a) and
the second part (62a) of the first security element (6a) on the second processing
layer (4b) at least partially overlap with each other when viewed along the extension
direction (E1), or
wherein the first part (61a) of the first security element (6a) on the first processing
layer (4a) and the second part (62a) of the first security element (6a) on the second
processing layer (4b) are spaced apart from each other when viewed along the extension
direction (E1).
4. The data carrier (1) according to any one of the preceding claims, wherein the first
security element (6a) at least partially encloses the second security element (6b)
when viewed along the extension direction (E1), or
wherein the second security element (6b) at least partially encloses the first security
element (6a) when viewed along the extension direction (E1).
5. The data carrier (1) according to any one of the preceding claims, wherein the first
security element (6a) at least partially complements the second security element (6b)
when viewed along the extension direction (E1), and/or
wherein the second security element (6b) at least partially complements the first
security element (6a) when viewed along the extension direction (E1).
6. The data carrier (1) according to any one of the preceding claims, wherein the first
part (61a) of the first security element (6a) on the first processing layer (4a) and
the second part (62a) of the first security element (6a) on the second processing
layer (4b) are configured complementary to one another, the first part (61a) of the
first security element (6a) on the first processing layer (4a) preferably being configured
as a recess and the second part (62a) of the first security element (6a) on the second
processing layer (4b) being preferably configured as a corresponding elevation or
vice versa.
7. The data carrier (1) according to any one of the preceding claims, wherein the first
security element (6a) and/or the second security element (6b) is provided in the form
of an image, an alphanumeric character, a pattern or a fringe, preferably a Moire
fringe, or an optical grating, preferably a diffractive structure, the first security
element (6a) and the second security element (6b) are preferably provided in different
forms.
8. The data carrier (1) according to any one of the preceding claims, wherein the first
processing layer (4a) and/or the second processing layer (4b) are configured to interact
with electromagnetic radiation (R), the first processing layer (4a) and/or the second
processing layer (4b) preferably comprising at least one of: one or more metals, one
or more metal-compounds, one or more pigments, and one or more colorants.
9. The data carrier (1) according to any one of the preceding claims, further comprising
at least one protection structure (9a) which is arranged between the first processing
layer (4a) and the second processing layer (4b), wherein the protection structure
(9a) is configured such that, upon irradiation of electromagnetic radiation (R) constituting
a first spectrum along the extension direction (E1), the protection structure (9a)
essentially entirely prevents said electromagnetic radiation (R) from impinging on
the second processing layer (4b).
10. The data carrier (1) according to any one of the preceding claims, further comprising
at least one filter structure (7a; 7b), preferably a printed filter structure (7a)
and/or one or more lenses (7b), particularly preferably one or more lenticular lenses,
wherein said filter structure (7a; 7b) is configured to alter the appearance of the
first security element (6a) and/or of the second security element (6b), in particular
the appearance of the first part (61a) and/or of the second part (62a) of the first
security element (6a) depending on a viewing angle.
11. A data carrier (1) comprising at least one filter structure (7a; 7b) and at least
one first processing layer (4a) which are arranged along an extension direction (E1),
wherein the first processing layer (4a) comprises at least one security element (6a),
characterized in that the first processing layer (4a) is configured to interact with electromagnetic radiation
(R) under generation of the at least one security element (6a), the first processing
layer (4a) preferably comprising at least one of one or more metals, one or more metal-compounds,
one or more pigments, and one or more colorants,
in that the filter structure (7a; 7b) and the security element (6a) at least partially overlap
when viewed along the extension direction (E1), and
in that the filter structure (7a; 7b) is configured to alter the appearance of the security
element (6a) depending on a viewing angle.
12. A security document comprising a data carrier (1) according to any one of the preceding
claims, the security document preferably being an identity card, a passport, a credit
card, a bank note or the like.
13. A method of producing a data carrier, preferably a data carrier (1) according to any
one of the preceding claims 1 to 10, the method comprising the steps of:
- Providing at least a first processing layer (4a) and a second processing layer (4b)
along an extension direction (E1), and
- Providing at least a first security element (6a) and a second security element (6b)
on the first processing layer (4a) and/or on the second processing layer (4b),
wherein at least the first security element (6a) is comprised of a first part (61a)
and of a second part (62a), wherein the first part (61a) of the first security element
(6a) is provided on the first processing layer (4a) and the second part (62a) of the
first security element (6a) is provided on the second processing layer (4b), and
wherein the first security element (6a) is configured to exhibit a first appearance
under a first viewing angle (α1) and a second appearance being different from the
first appearance under a second viewing angle (α2) being different from the first
viewing angle (α1).
14. The method according to claim 13, wherein electromagnetic radiation (R) is irradiated
along the extension direction (E1) and/or along a direction (E2) extending opposite
to the extension direction (E1) in order to generate the first security element (6a)
and/or the second security element (6b).
15. A method of producing a data carrier, preferably a data carrier (1) according to claim
11, the method comprising the steps of:
- Providing at least a filter structure (7a; 7b) and a first processing layer (4a)
along an extension direction (E1),
- Providing at least one security element (6a) on the first processing layer (4a),
wherein the first processing layer (4a) is configured to interact with electromagnetic
radiation (R), the first processing layer (4a) preferably comprising at least one
of one or more metals, one or more metal-compounds, one or more pigments, and one
or more colorants,
wherein the filter structure (7a; 7b) and the first processing layer (4a) at least
partially overlap when viewed along the extension direction (E1), and
wherein the filter structure (7a; 7b) is configured to alter the appearance of the
security element (6a) depending on a viewing angle.