TECHNICAL FIELD
[0001] The present invention relates to method of producing a data carrier, to a data carrier
produced thereof and to a security document comprising or consisting of such a data
carrier.
PRIOR ART
[0002] Data carriers for security documents such as identity cards, passports or the like
typically comprise at least one security element. Said security element can be provided
on a top surface of the data carrier. Well-known method to protect data is surface
embossing made by lamination plates. The weakness of such method is the fact that
the security feature can be copied, removed and/or replaced. It is also possible to
produce look-alike surface embossing by means of desktop printing, combination of
glue & suitable particles, etc. Thus, such security elements are prone to forgery.
SUMMARY OF THE INVENTION
[0003] It is an object of the present invention to provide a method of forming a data carrier
especially for a security document of greater security that is less prone to forgery.
[0004] This object is achieved with a method according to claim 1. In particular, a method
of forming a data carrier for a security document, the method comprising:
- providing a first outer layer and second outer layer,
- forming a first security feature at the interface between at least two adjacent layers,
said first security feature comprising a first deformation of one of the layers,
- forming a stacked structure with said first outer layer and said second outer layer,
said stacked structure being formed by lamination,
wherein said first deformation is formed by laser marking.
[0005] This method allows forming a security feature fully inside the data carrier, said
security feature surviving in lamination, leaving a pre-made and designed deformation
at the interface between some of the layers. This first security feature can also
be referred to as an interfacial security feature, as it is located at the interface
between some of the layers of the data carrier. As the security feature is inside
the data carrier, removal of data becomes more complicated, as grinding of the data
carrier would remove simultaneously also the designed deformation. Also, as the first
deformation is formed before forming the stack structure of the data carrier by lamination,
a modification of said first deformation and the corresponding security feature after
the lamination step would be particularly difficult for a forger. Therefore, the security
feature is less prone to copy, reproduction or modification by a forger. The data
carrier obtained by this method allows subsequent personalization such as laser engraving.
In the same way, this method of marking the data carrier does not interfere with embossing
or diffractive surface elements in a negative way. It enables various possibilities
in terms of design and feature visibility, it can be overt or covert, if required.
Finally, this method can leave the outer surface of the data carrier fully smooth
and intact.
[0006] The deformation of one of the layers is formed by laser marking. Laser marking uses
laser beam as known from the state of the art. The term laser marking encompass different
techniques so that the deformation can be a simple deformation of matter of a layer,
or an ablation of matter of said layer, depending on the laser beam parameters.
[0007] The use of laser marking technique to form the first deformation enables various
possibilities in terms of design and feature visibility. The marking can be planar
or down from a surface of the layer with the first deformation. Laser marking enables
all kinds of designs and markings, like images, alphanumeric elements, guilloche,
latent features.
[0008] Another advantage of this method and notably the use of laser marking for the so
called interfacial security feature, is the strong compatibility with existing methods
and structures. This method can use some already existing card structures. It is compatible
with existing lamination process for forming the stack of layer as no specific parameters
are needed for this step with the method of the invention. The laser marking step
for forming the first deformation is compatible with already existing laser used for
personalization or for forming security feature on the surface of data carriers.
[0009] A first technique of laser marking is laser cutting, also called laser ablation.
Laser cutting technique can be used to form a kiss-cut or a through cut. A kiss cut
of a layer consists in cutting a material layer such that the cut does not go through
the whole thickness of said layer. A through cut of a layer consists in cutting a
material layer such that the cut goes through the whole thickness of said layer.
[0010] The use of laser cutting has a high degree of freedom in terms of design. An entire
sheet can be treated, one sheet at a time. The shape of the deformation, when observed
in a cross cut along a direction perpendicular to the extension direction (E), can
be qualified as rounded or soft. When forming the first deformation of one the layers,
the tooling (i.e. laser) causes ablation of the material.
[0011] This laser cutter technique allows for a high degree of freedom regarding card structure
as a high number of shape is possible to produce when forming the first deformation.
This laser cutting technique also has the advantage not to require consumable to change
along the process.
[0012] Laser marking may cause local thermal degradation of material, notably with polycarbonate,
which produces optically active compounds. These compounds are fluorescent. Visibility
of such fluorescence depends on the treated material and the parameters of the laser
beam. The optically active compounds are particularly visible under UV light.
[0013] The layers of the data carrier preferably comprises or consists of at least one plastics
and/or of one or more polymers such as thermoplastic polymer or thermoset polymer.
The layers of the data carrier preferably comprise or consists of polycarbonate (PC)
and/or polyvinyl chloride (PVC) and/or polyethylene terephthalate (PET) and/or polyethylene
(PE) and/or cross-linked polyethylene and/or polypropylene (PP) and/or copolymers
thereof and/or mixtures thereof. The layers of the data carrier are not necessarily
of the same material. It is furthermore preferred that the data carrier is provided
by means of one or more layers, i.e. it preferably corresponds to a layered structure.
The data carrier particularly preferably corresponds to a card body as it is known
in the field of the invention.
[0014] Advantageously, the first deformation is replicated during lamination such that at
least one replicated deformation is formed inside the data carrier at the interface
between at least some of the layers. The term "replicated deformation" correspond
to the deformation of layers which are adjacent to the layer with the first deformation.
Said replicated deformation is induced by the first deformation through lamination
process. The first deformation of one of the layer is replicated to at least one adjacent
layer. Said first deformation can be replicated to several adjacent layers such that
the data carrier formed by the present method comprises several replicated deformation
of the first deformation of one of the layers. However, the replicated deformation
is not on the outermost surface of the data carrier obtain by the present method.
The replicated deformation and the first deformation are in alignment along the extension
direction (E). The replicated deformation has a profile sensibly similar to the profile
of the first deformation. In other words, if the deformation comprises recesses, bumps
and/or dips, the replicated deformation includes similar recesses, bumps and/or dips.
However, the height and depth of the recesses, bumps and/or dips of the replicated
deformation along the extension direction (E) may be of lower height and depth than
those of the original deformation, the amplitude of the recesses, bumps and/or dips
of the replicated deformation being therefore reduced compared to said original deformation
along the extension direction (E).
[0015] Advantageously, the data carrier comprises at least one inner layer. Said inner layer
preferably comprises the first deformation.
[0016] Advantageously, the method comprises a step of providing at least one revealing layer.
The revealing layer increase and/or improve the visibility of the first deformation
and the security feature once the stacked structure of the data carrier is formed.
The revealing layer is preferably selected with respect to the internal layer carrying
the first deformation. Advantageously, the chemical composition and physical properties
of the revealing layer are not identical with those of the layer with the first deformation.
The revealing layer is preferably adjacent to the layer with the first deformation.
The revealing layer advantageously faces the first deformation of one of the layers
such that said revealing layer is in contact with the first deformation of one of
the layers. The revealing layer can also face the rear side of the layer with the
first deformation on its front side. The revealing layer can also be separated from
the first deformation of one of the layers by some inner layers in between.
[0017] The first deformation is replicated on the revealing layer during lamination such
that said revealing layer comprises a replicated deformation. The first deformation
is not formed directly on the revealing layer. On the contrary, the first deformation
is formed on a different layer, such as a first inner layer, and will be replicated
to the revealing layer only through lamination. Consequently, the revealing layer
can be attached to a second inner layer as a pre form. Once the first deformation
is formed on a layer such as a first inner layer, said pre form is applied onto the
first inner layer, with the revealing layer.
[0018] As the deformation is done on another surface rather than directly on a revealing
layer or an ink layer, said revealing layer is not damaged by the deformation. Another
benefit coming from this approach is that the feature is more attractive and has more
dimensions when the deformation and revealing layer are not precisely in the same
interface.
[0019] The revealing layer does not necessary have the same surface as the first deformation.
According to one embodiment, the at least one revealing layer covers a surface bigger
than the surface covered by the first deformation of one of the layers. The security
feature is therefore not formed only in the portion where the revealing layer is present
but rather on the portion where the first deformation is present. In this case, the
revealing layer does not need to be cut or preformed in order to define the shape
or area of the desired security feature. The revealing layer can cover substantially
all the surface of the layer with the first deformation. According to another embodiment,
the at least one revealing layer covers a surface smaller than the surface covered
by the first deformation of one of the layers. In this case, the whole revealing layer
shows the desired effect while the deformation outside the revealing layer can disappear
during lamination process.
[0020] The first deformation can be formed on any of the layers as it is not on the outermost
surface of the data carrier. For example, the first deformation can be formed on an
inner surface of one of the outer layer. This first deformation can also be formed
on a surface of one of the inner layers. The at least one inner layer preferably comprises
a so-called core layer, the first deformation being formed on the surface of said
core layer. The core layer is preferably substantially at the center of the stacked
structure. Said core layer can also comprises several sub layers. Such a multilayered
core can be deformed and then laminated to the revealing layer along with the outer
layers.
[0021] The core layer carrying the first deformation can be substantially transparent. Alternatively,
said core layer carrying the first deformation can be colored, advantageously white.
Depending on the appearance of the core layer, the revealing layer can have different
composition and appearance.
[0022] Further to the above mentioned advantages, the method according to the invention
is also advantageously compatible with addition of other security features and subsequent
personalization. Indeed, as mentioned before, this method of marking the data carrier
does not interfere with embossing or diffractive surface elements in a negative way.
[0023] Advantageously, the method according to the invention comprises a step of forming
a second security feature. Said second security feature can be formed by a modification
of the surface of the data carrier. In that case, the second security feature can
be of many types as a modification of the uppermost surface of the data carrier will
not interfere with the first security feature as said first security feature is a
so called interfacial feature at the interface between at least some of the layers
of the data carrier. In this case, the step of forming the second security feature
is subsequent the step of forming the stack structure by lamination. Advantageously,
the second security feature is obtained by laser engraving, after the formation of
the stack structure by lamination. The laser engraving of the data carrier according
to the invention allows forming a second security feature with high level of complexity
and reliability while not interfering with the first security feature.
[0024] The second security feature can also be an interfacial feature formed with the method
according to the invention. In that case, the step of forming the second security
feature comes before the step of forming the stack structure by lamination.
[0025] Preferably, the second security feature is at least partially overlapping the first
security feature along the extension direction (E).
[0026] Advantageously, the method comprises a step of forming a personalization element.
Said personalization element can be formed by many different techniques well known
from the state of the art. Advantageously, the personalization element is formed by
laser engraving. Preferably, said personalization element is at least partially overlapping
the first security feature along the extension direction (E). This overlapping allows
forming particularly complex design which would be very difficult for a forger to
reproduce and/or to selectively alter.
[0027] Advantageously, the method comprises a step of forming a see-through portion or a
window. The see-through portion can be produced by forming a void in one or more layers
of the data carrier, allowing visibility through the data carrier. The void can be
formed by punching or cutting away some material from one or more layers of the data
carrier. In the context of the invention, the see-through portion allows viewing at
least part of the deformation and/or the replicated deformation of the security feature.
[0028] Preferably, said see-through portion is at least partially overlapping the first
security feature along the extension direction (E). This overlapping allows forming
particularly complex design which would be very difficult for a forger to reproduce
and/or to selectively alter.
[0029] According to another aspect, the invention concerns a data carrier obtained by the
method previously disclosed. In particular, the data carrier according to the invention
extends along an extension direction (E) and comprises:
- a first outer layer forming a first outer surface of the data carrier, and
- a second outer layer forming a second outer surface of the data carrier, and
said first outer layer and said second outer layer forming a stacked structure, wherein
the data carrier comprises a first security feature at the interface between at least
two adjacent layers, said first security feature comprising a first deformation of
one of the layers, said first deformation being formed by laser marking.
[0030] All the technical advantages presented above in relation with the method of forming
a data carrier applies equally to the data carrier according to the invention.
[0031] Advantageously, the data carrier according to the invention comprises at least one
replicated deformation induced by the first deformation. The at least one replicated
deformation is at the interface between at least some of the layers of the data carrier.
[0032] Advantageously, the data carrier comprises at least one inner layer. Said inner layer
preferably comprises the first deformation.
[0033] Advantageously, the data carrier comprises at least one revealing layer. Said revealing
layer comprises a replicated deformation. The revealing layer increase and/or improve
the visibility of the first deformation and the security feature once the stacked
structure of the data carrier is formed. Visibility means that deformation can be
observed by one way or the other. Possible means of detection methods of normal light,
sidelight, see-through light, UV light is used, or a crosscut is made. Usable devices
are bare eyes, loupe, microscope, etc.
[0034] The revealing layer is preferably selected with respect to the internal layer with
the first deformation. Advantageously, the chemical composition and physical properties
of the revealing layer are not identical with those of the inner layer with the first
deformation. The revealing layer advantageously faces the first deformation of one
of the layers such that said revealing layer is in contact with the first deformation
of one of the layers. The revealing layer can also face the rear side of the layer
with the first deformation on its front side. The revealing layer can also be separated
from the first deformation of one of the layers by some inner layers in between.
[0035] The first deformation is replicated on the revealing layer during lamination such
that said revealing layer comprises a replicated deformation.
[0036] Another advantage of the data carrier according to the invention is the nature of
the security feature formed by laser marking and its level of details. Said first
security feature of the data carrier can be overt and visible for bare eyes. On the
other hand, the marking may be covert and require use of a magnification such as a
loupe, a microscope and/or different lighting conditions in order to be visible. The
security feature or security element preferably has the shape of a pattern. The pattern
can be an ordered pattern or a disordered pattern. An ordered pattern preferably comprises
pattern elements being arranged in a repetitive manner. A disordered pattern preferably
comprises randomly distributed pattern elements. The pattern elements in both cases
can correspond to geometric shapes such as lines or circles or the like, a barcode,
or any random looking set of elements. A security element being inspectable by the
bare human eye is understood as being verifiable without the need of any dedicated
equipment. A machine-readable security element is understood as being verifiable by
means of dedicated equipment, e.g. by means of a mobile phone that takes a photograph
of the security element and being configured to perform a software-based verification
of the pattern. A phone operates in visible light regarding the light source as well
as the capture. However, the verification could likewise require specific lighting
conditions such as ultraviolet lighting or infrared lighting, and the same applied
to the capturing device. Furthermore, the verification could require magnification
of some level if the security element is provided at very high resolution.
[0037] Advantageously, the security feature comprises a watermark-like element. A so called
watermark-like element consists of slightly thicker and slightly thinner areas of
material, and it resembles a real watermark known from security papers, when a see-through
light is used. A security feature comprising a watermark-like element can become visible
or more prominent under backlight conditions compared to any other lighting configuration.
[0038] Advantageously, the security feature comprises a latent image. A security feature
comprising a latent image can become visible when suitably altering the viewing and/or
lighting angle.
[0039] Preferably, the at least one revealing layer comprises offset inks and varnishes,
silk screen printing inks and varnishes, DOVID (Diffractive Optically Variable Image
Device), OVI (Optically Variable Ink), pearlescent inks, metallic inks, metallic foils,
and/or a colored plastic film. The nature of the revealing layer is advantageously
selected depending on the nature of the layer with the first deformation.
[0040] Advantageously, the data carrier comprises a so-called core layer comprising the
first deformation. The core layer is an inner layer of the data carrier. The core
layer is preferably substantially at the center of the stacked structure. Said core
layer can also comprises several sub layers.
[0041] The first outer layer and/or the second outer layer may be formed by different material
adapted for their use in security documents and data carrier such as PVC, PETG, ABS
and so on. Advantageously, the first outer layer and/or the second outer layer comprises
thermoplastic material. Preferably, the first outer layer and/or the second outer
layer comprises polycarbonate.
[0042] In the same way, the at least one core layer may be formed by different material
adapted for their use in security documents and data carrier such as PVC, PETG, ABS
and so on. Advantageously, the at least one core layer comprises thermoplastic material.
Preferably, the at least one core layer comprises polycarbonate and more preferably
transparent polycarbonate.
[0043] The outer layers and the core layer do not have to be of same type. For instance,
a data carrier with PET core and PVC surface layers could be manufactured according
to the method of the invention.
[0044] Advantageously, the data carrier according to the invention comprises a second security
feature. Said second security feature can be formed by a modification of the surface
of the data carrier. In that case, the second security feature can be of many types
as a modification of the uppermost surface of the data carrier will not interfere
with the first security feature as said first security feature is a so called interfacial
feature at the interface between at least some of the layers of the data carrier.
Advantageously, the second security feature is obtained by laser engraving. The laser
engraving of the data carrier according to the invention allows forming a second security
feature with high level of complexity and reliability while not interfering with the
first security feature.
[0045] The second security feature can also be an interfacial feature formed with the method
according to the invention.
[0046] Preferably, the second security feature is at least partially overlapping the first
security feature along the extension direction (E).
[0047] Advantageously, the data carrier comprises a see-through portion or a window. In
this case, the different layers of the data carrier are preferably at least partially
translucent at the region of the see-through portion.
[0048] Preferably, said see-through portion is at least partially overlapping the first
security feature along the extension direction (E). This overlapping allows forming
particularly complex design which would be very difficult for a forger to reproduce
and/or to selectively alter.
[0049] The interaction between the see-through portion and the first security feature involves
the strategic placement of the first deformation and/or the replicated deformation
in alignment with the see-through portion. This configuration allows enhancing the
security of the document by combining different security feature elements in a way
that is challenging to replicate or counterfeit. By integrating interfacial security
feature with the formation of a see-through portion, the data carrier achieves a multilayered
security approach. This makes it even more difficult for counterfeiters to reproduce
all the security elements accurately.
[0050] The see-through portion can be produced by forming a void in one or more layers of
the data carrier, allowing visibility through the data carrier. The void can be formed
by punching or cutting away some material from one or more layers of the data carrier.
In the context of the invention, the see-through portion allows viewing at least part
of the deformation and/or the replicated deformation of the security feature.
[0051] In the described embodiment, the see-through portion is part of a multilayered structure
involving clear and white polycarbonate layers, with the clear layer potentially having
embossed security features. This combination of a see-though portion and embossed
elements contributes to the document security and makes it more resistant to counterfeiting.
[0052] Advantageously, the data carrier comprises a personalization element. Said personalization
element can be formed by many different techniques well known from the state of the
art, such as laser engraving. The personalization element can notably comprise a photograph
of the holder of a security document comprising the data carrier. Advantageously,
said personalization element is at least partially overlapping the first security
feature along the extension direction (E). This overlapping allows forming particularly
complex design which would be very difficult for a forger to reproduce and/or to selectively
alter.
[0053] Preferably, the see-through portion and the personalization element are at least
partially overlapping the first security feature along the extension direction (E).
This overlapping allows forming an even more complex design which would be particularly
difficult for a forger to reproduce and/or to selectively alter.
[0054] According to another aspect, the invention concerns a security document comprising
or consisting of at least one data carrier as previously disclosed. The security document
is preferably a smart card, an identity card, a passport, a credit card, a bank note
or the like.
BRIEF DESCRIPTION OF THE DRAWINGS
[0055] Preferred embodiments of the invention are described in the following with reference
to the drawings, which are for the purpose of illustrating the present preferred embodiments
of the invention and not for the purpose of limiting the same. In the drawings,
- Fig. 1
- shows a first step of the method of forming a data carrier according to the invention
in a cross section view;
- Fig. 2
- shows a second step of the method of forming a data carrier according to the invention
in a cross section view;
- Fig. 3
- shows a third step of the method of forming a data carrier according to the invention
in a cross section view;
- Fig.4
- shows another embodiment of a stacked structure formed according to the invention
in a cross view;
- Fig. 5a
- shows a top view of a data carrier 1 according to the invention with normal light,
- Fig. 5b
- shows the data carrier of figure 5a with UV light,
- Fig. 5c
- shows the data carrier of figure 5a and 5b with transmitted light,
- Fig. 6a
- shows a top view of a data carrier 1 according to the invention with transmitted light,
- Fig. 6b
- shows the data carrier of figure 6a with UV light,
- Fig. 6c
- shows a data carrier similar to the one of figure 6a further comprising a revealing
layer and with transmitted light,
- Fig. 7a
- shows a top view of a data carrier 1 according to the invention with transmitted light,
- Fig. 7b
- shows the data carrier of figure 7a further comprising a revealing layer and with
transmitted light,
- Fig. 7c
- shows the data carrier of figure 7b with UV light,
- Fig. 7d
- shows the data carrier of figure 7b and 7c with normal light,
DESCRIPTION OF PARTICULAR EMBODIMENTS
[0056] Aspects of the invention shall be further illustrated with reference to the figures.
[0057] Figure 1 depicts a first step of the method of forming a data carrier according to
the invention in a cross section view. In this first step, a first outer layer 11,
a second outer layer 12 and several inner layers 20 are provided. The number of inner
layers 20 can vary depending on the desired properties of the data carrier 1. One
of those inner layers 20 is a so-called core layer 22. This core layer 22 is substantially
at the center of the data carrier 1 according to the extension direction (E). Additionally,
a revealing layer 30 is provided. The layers represented in these figures are not
in scale. The revealing layer 30 is, in most of cases, much thinner than the other
layers.
[0058] In the second step as depicted in figure 2, a first deformation 40 of the core layer
22 is formed by laser marking. This first deformation 40 of the core layer 22 will
form a first security feature 50 at the interface between the core layer 22, the revealing
layer 30 and an upper inner layer 20 facing the revealing layer 30.
[0059] In the third step as depicted in figure 3, a stacked structure is formed with the
first outer layer 11, a first inner layer 20, the revealing layer 30, the core layer
22, a second inner layer 20 and the second outer layer 12. This stacked structure
is formed by lamination. The parameters of the lamination process will depend on the
nature of the layers of the data carrier, on their thickness and so on. During lamination,
heat and pressure in applied on the stack of layers, some material of the layers adjacent
to the core layer with the first deformation flow and follows the shape of the first
deformation. Therefore, during said lamination, the first deformation 40 of the surface
of the core layer 22 is replicated such that at least one replicated deformation 42
is formed inside the data carrier 1 at the interface between at least some of the
layers. In the embodiment shown in figure 3, a replicated deformation 42 is located
at the interface between the core layer 22 and the revealing layer 30 and another
replicated deformation 42 is located at the interface between the revealing layer
30 and the above inner layer 20 facing the revealing layer 30. Depending on the intensity
of the deformation 40, the height and depth of the resulting recesses and the thickness
of the layers, bumps and/or dips, the replicated deformation 42 could be replicated
to more adjacent layers. For example, for a stronger deformation with higher intensity,
some replicated deformation could be also located at the interface between the upper
inner layer 20 and the first outer layer 11.
[0060] It has to be noted that figures have only an illustrative purpose.
[0061] Figure 4 is another embodiment of a stacked structure formed according to the method
described above. This structure further comprises a see-through portion 70. The first
outer layer 11 and second outer layer 12 are opaque layers. This opacity is represented
in figure 4 by a hatched pattern. On the contrary, the core layer 22 and the inner
layers 20 are translucent or sensibly transparent. This illustration is for explanatory
purposes only, it is obviously not excluded that the layers shown without a hatched
pattern in the other figures could also be opaque layers. The opaque layers of the
stacked structure comprise an opening, advantageously formed before the lamination
step. The opaque layers of the stacked structure comprise translucent or sensibly
transparent material, such as clear polycarbonate for example, at the area corresponding
to the see-through portion. This clear portion of the opaque layers can be formed
by removing a part of the opaque material before the lamination step. During lamination,
the clear material of adjacent layers flows and fill the void in the opaque layer.
In the embodiment shown in figure 4, the clear polycarbonate of inner layers 20 flows
during lamination and fill the void in the first outer layer 11 and second outer layer
12. The see through portion is represented by the area 70. At least part of the first
security feature 50 overlaps the see through portion 70. In other words, the first
security feature 50 is at least partially in alignment with the see-through portion
70.
[0062] Figures 5a to 5c depicts a top view of a data carrier 1 according to the invention
comprising a first security feature 50. In this data carrier, the first deformation
40 is a kiss cut formed by laser marking of a core layer made of polycarbonate. The
first deformation and the corresponding first security feature forms a bolt like shape.
The revealing layer 30 used in this data carrier 1 is a metallic ink layer. Figure
5a shows the data carrier with normal light. Figure 5b shows the data carrier with
UV light. Figure 5c shows the data carrier with transmitted light. The first security
feature 50 is visible to the naked eye and even more visible with specific lighting
conditions.
[0063] Figures 6a to 6c depicts a top view of a data carrier 1 according to the invention
comprising a first security feature 50. In this data carrier, the first deformation
40 is a kiss cut formed by laser marking of a core layer made of polycarbonate. The
first deformation and the corresponding first security feature form a pattern of lines
forming the letters "UTO".
[0064] The data carrier 1 of figures 6a and 6b does not comprise a revealing layer. Figure
6a shows the data carrier 1 with transmitted light. Figure 6b shows the same data
carrier 1 with UV light. The first security feature 50 is barely visible to the naked
eye and more visible with UV light.
[0065] The data carrier 1 of figure 6c corresponds to a data carrier similar to the data
carrier of figures 6a and 6b and that further comprises a revealing layer 30. The
revealing layer 30 of the data carrier 1 of figure 6c is an ink layer. Figure 6c shows
the data carrier 1 with transmitted light. The first security feature 50 in figure
6c is visible to the naked eye and particularly more visible than without the revealing
layer as shown in figure 6a.
[0066] Figures 7a to 7d depicts a top view of a data carrier 1 according to the invention
comprising a first security feature 50. In this data carrier, the first deformation
40 is a through cut formed by laser marking of a core layer made of polycarbonate.
The first deformation and the corresponding first security feature form a pattern
of lines forming series of hexagonal shapes.
[0067] The data carrier 1 of figures 7a does not comprise a revealing layer. Figure 7a shows
the data carrier 1 with transmitted light. The first security feature 50 is visible
to the naked eye.
[0068] The data carrier 1 of figure 7b, 7c and 7d correspond to a data carrier similar to
the data carrier of figures 7a and that further comprises a revealing layer 30. The
revealing layer 30 of the data carrier 1 of figures 7b to 7d is an ink layer.
[0069] Figure 7b shows the data carrier 1 with transmitted light. The first security feature
50 in figure 7b is visible to the naked eye and notably more visible than without
the revealing layer as shown in figure 7a. In the example of this data carrier, the
revealing layer is not mandatory for the security to be visible but it improves its
visibility.
[0070] Figure 7c shows the data carrier 1 with UV light. Figure 7d shows the data carrier
1 with normal light. In these two figures, the first security feature 50 is visible
both to the naked eye and with UV light.
1. A method of forming a data carrier (1) for a security document (100), the method comprising:
- providing a first outer layer (11) and second outer layer (12),
- forming a first security feature (50) at the interface between at least two adjacent
layers, said first security feature (50) comprising a first deformation (40) of one
of the layers,
- forming a stacked structure with said first outer layer (11) and said second outer
layer (12), said stacked structure being formed by lamination,
wherein said first deformation (40) is formed by laser marking.
2. The method of claim 1, wherein the first deformation is formed by laser marking .
3. A method according to any of the preceding claims, wherein the first deformation (40)
is replicated during lamination such that at least one replicated deformation (42)
is formed inside the data carrier (1) at the interface between at least some of the
layers.
4. A method according to any of the preceding claims, wherein it comprises the step of
providing at least one revealing layer (30), said revealing layer (30) comprising
a replicated deformation (42).
5. A method according to any of the preceding claims, wherein it comprises a step of
forming a see-through portion (70), said see through portion (70) at least partially
overlapping the first security feature (50) along an extension direction (E).
6. A method according to any of the preceding claims, wherein the data carrier comprises
at least one inner layer (20), said at least one inner layer (20) comprising the first
deformation (40).
7. The method according to any of the previous claims, wherein it comprises a step of
forming a personalization element (60), said personalization element (60) preferably
at least partially overlapping the first security feature (50) along the extension
direction.
8. Data carrier (1) for a security document (100), said data carrier (1) extending along
an extension direction (E) and comprising:
- a first outer layer (11) forming a first outer surface of the data carrier (1),
and
- a second outer layer (12) forming a second outer surface of the data carrier (1),
and
said first outer layer (11) and said second outer layer (12) forming a stacked structu
re,
wherein the data carrier (1) comprises a first security feature (50) at the interface
between at least two adjacent layers, said first security feature (50) comprising
a first deformation (40) of one of the layers, said first deformation being formed
by laser marking.
9. Data carrier (1) according to claim 8, wherein it comprises at least one replicated
deformation (42) induced by the first deformation (40), said at least one replicated
deformation (42) being at the interface between at least some of the layers of the
data carrier (1).
10. Data carrier (1) according to claim 8 to 9, wherein it comprises at least one revealing
layer (30), said revealing layer (30) comprising a replicated deformation (42).
11. Data carrier (1) according to claims 8 to 10, wherein it comprises at least one inner
layer (20), said at least one inner layer (20) comprising the first deformation (40).
12. Data carrier (1) according to claims 8 to 11, wherein the first security feature (50)
comprises an optically active element, preferably a fluorescent element, and/or at
least one latent image.
13. Data carrier (1) according to claim 8 to 12, wherein the at least one revealing layer
(30) comprises offset inks and varnishes, silk screen printing inks and varnishes,
DOVID, OVI, pearlescent inks, metallic inks, metallic foils, and/or a colored plastic
film.
14. Data carrier (1) according to any of claims 8 to 13, wherein it comprises a see-through
portion (70), said see through portion (70) at least partially overlapping the first
security feature (50) along an extension direction (E).
15. A security document (100) comprising or consisting of at least one data carrier (1)
according to claims 8 to 14, the security document (100) preferably being a smart
card, an identity card, a passport, a credit card, a bank note or the like.