(19)
(11) EP 4 578 657 A1

(12) EUROPEAN PATENT APPLICATION

(43) Date of publication:
02.07.2025 Bulletin 2025/27

(21) Application number: 23307408.7

(22) Date of filing: 28.12.2023
(51) International Patent Classification (IPC): 
B42D 25/324(2014.01)
B42D 25/45(2014.01)
B42D 25/41(2014.01)
(52) Cooperative Patent Classification (CPC):
B42D 25/41; B42D 25/324; B42D 25/45; B42D 25/46; B42D 25/455
(84) Designated Contracting States:
AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC ME MK MT NL NO PL PT RO RS SE SI SK SM TR
Designated Extension States:
BA
Designated Validation States:
KH MA MD TN

(71) Applicant: THALES DIS FRANCE SAS
92190 Meudon (FR)

(72) Inventors:
  • LAPPALAINEN, Kristian
    02940 Espoo (FI)
  • SYRJANEN, Taru
    01400 Vantaa (FI)
  • COURBET, Stephane
    81738 Sopot (PL)
  • KREFT, Jaroslaw
    83-110 Tczew (PL)

(74) Representative: Castelo, Jérôme 
Thales Dis France SAS Intellectual Property Department 6, rue de la Verrerie
92190 Meudon
92190 Meudon (FR)

   


(54) METHOD FOR PRODUCING DATA CARRIER AND DATA CARRIER PRODUCED THEREOF


(57) A method of forming a data carrier for a security document, the method comprising: providing a first outer layer and second outer layer, forming a first security feature at the interface between at least two adjacent layers, said first security feature comprising a first deformation of one of the layers, forming a stacked structure with said first outer layer and said second outer layer, said stacked structure being formed by lamination, wherein said first deformation is formed by laser marking.




Description

TECHNICAL FIELD



[0001] The present invention relates to method of producing a data carrier, to a data carrier produced thereof and to a security document comprising or consisting of such a data carrier.

PRIOR ART



[0002] Data carriers for security documents such as identity cards, passports or the like typically comprise at least one security element. Said security element can be provided on a top surface of the data carrier. Well-known method to protect data is surface embossing made by lamination plates. The weakness of such method is the fact that the security feature can be copied, removed and/or replaced. It is also possible to produce look-alike surface embossing by means of desktop printing, combination of glue & suitable particles, etc. Thus, such security elements are prone to forgery.

SUMMARY OF THE INVENTION



[0003] It is an object of the present invention to provide a method of forming a data carrier especially for a security document of greater security that is less prone to forgery.

[0004] This object is achieved with a method according to claim 1. In particular, a method of forming a data carrier for a security document, the method comprising:
  • providing a first outer layer and second outer layer,
  • forming a first security feature at the interface between at least two adjacent layers, said first security feature comprising a first deformation of one of the layers,
  • forming a stacked structure with said first outer layer and said second outer layer, said stacked structure being formed by lamination,
wherein said first deformation is formed by laser marking.

[0005] This method allows forming a security feature fully inside the data carrier, said security feature surviving in lamination, leaving a pre-made and designed deformation at the interface between some of the layers. This first security feature can also be referred to as an interfacial security feature, as it is located at the interface between some of the layers of the data carrier. As the security feature is inside the data carrier, removal of data becomes more complicated, as grinding of the data carrier would remove simultaneously also the designed deformation. Also, as the first deformation is formed before forming the stack structure of the data carrier by lamination, a modification of said first deformation and the corresponding security feature after the lamination step would be particularly difficult for a forger. Therefore, the security feature is less prone to copy, reproduction or modification by a forger. The data carrier obtained by this method allows subsequent personalization such as laser engraving. In the same way, this method of marking the data carrier does not interfere with embossing or diffractive surface elements in a negative way. It enables various possibilities in terms of design and feature visibility, it can be overt or covert, if required. Finally, this method can leave the outer surface of the data carrier fully smooth and intact.

[0006] The deformation of one of the layers is formed by laser marking. Laser marking uses laser beam as known from the state of the art. The term laser marking encompass different techniques so that the deformation can be a simple deformation of matter of a layer, or an ablation of matter of said layer, depending on the laser beam parameters.

[0007] The use of laser marking technique to form the first deformation enables various possibilities in terms of design and feature visibility. The marking can be planar or down from a surface of the layer with the first deformation. Laser marking enables all kinds of designs and markings, like images, alphanumeric elements, guilloche, latent features.

[0008] Another advantage of this method and notably the use of laser marking for the so called interfacial security feature, is the strong compatibility with existing methods and structures. This method can use some already existing card structures. It is compatible with existing lamination process for forming the stack of layer as no specific parameters are needed for this step with the method of the invention. The laser marking step for forming the first deformation is compatible with already existing laser used for personalization or for forming security feature on the surface of data carriers.

[0009] A first technique of laser marking is laser cutting, also called laser ablation. Laser cutting technique can be used to form a kiss-cut or a through cut. A kiss cut of a layer consists in cutting a material layer such that the cut does not go through the whole thickness of said layer. A through cut of a layer consists in cutting a material layer such that the cut goes through the whole thickness of said layer.

[0010] The use of laser cutting has a high degree of freedom in terms of design. An entire sheet can be treated, one sheet at a time. The shape of the deformation, when observed in a cross cut along a direction perpendicular to the extension direction (E), can be qualified as rounded or soft. When forming the first deformation of one the layers, the tooling (i.e. laser) causes ablation of the material.

[0011] This laser cutter technique allows for a high degree of freedom regarding card structure as a high number of shape is possible to produce when forming the first deformation. This laser cutting technique also has the advantage not to require consumable to change along the process.

[0012] Laser marking may cause local thermal degradation of material, notably with polycarbonate, which produces optically active compounds. These compounds are fluorescent. Visibility of such fluorescence depends on the treated material and the parameters of the laser beam. The optically active compounds are particularly visible under UV light.

[0013] The layers of the data carrier preferably comprises or consists of at least one plastics and/or of one or more polymers such as thermoplastic polymer or thermoset polymer. The layers of the data carrier preferably comprise or consists of polycarbonate (PC) and/or polyvinyl chloride (PVC) and/or polyethylene terephthalate (PET) and/or polyethylene (PE) and/or cross-linked polyethylene and/or polypropylene (PP) and/or copolymers thereof and/or mixtures thereof. The layers of the data carrier are not necessarily of the same material. It is furthermore preferred that the data carrier is provided by means of one or more layers, i.e. it preferably corresponds to a layered structure. The data carrier particularly preferably corresponds to a card body as it is known in the field of the invention.

[0014] Advantageously, the first deformation is replicated during lamination such that at least one replicated deformation is formed inside the data carrier at the interface between at least some of the layers. The term "replicated deformation" correspond to the deformation of layers which are adjacent to the layer with the first deformation. Said replicated deformation is induced by the first deformation through lamination process. The first deformation of one of the layer is replicated to at least one adjacent layer. Said first deformation can be replicated to several adjacent layers such that the data carrier formed by the present method comprises several replicated deformation of the first deformation of one of the layers. However, the replicated deformation is not on the outermost surface of the data carrier obtain by the present method. The replicated deformation and the first deformation are in alignment along the extension direction (E). The replicated deformation has a profile sensibly similar to the profile of the first deformation. In other words, if the deformation comprises recesses, bumps and/or dips, the replicated deformation includes similar recesses, bumps and/or dips. However, the height and depth of the recesses, bumps and/or dips of the replicated deformation along the extension direction (E) may be of lower height and depth than those of the original deformation, the amplitude of the recesses, bumps and/or dips of the replicated deformation being therefore reduced compared to said original deformation along the extension direction (E).

[0015] Advantageously, the data carrier comprises at least one inner layer. Said inner layer preferably comprises the first deformation.

[0016] Advantageously, the method comprises a step of providing at least one revealing layer. The revealing layer increase and/or improve the visibility of the first deformation and the security feature once the stacked structure of the data carrier is formed. The revealing layer is preferably selected with respect to the internal layer carrying the first deformation. Advantageously, the chemical composition and physical properties of the revealing layer are not identical with those of the layer with the first deformation. The revealing layer is preferably adjacent to the layer with the first deformation. The revealing layer advantageously faces the first deformation of one of the layers such that said revealing layer is in contact with the first deformation of one of the layers. The revealing layer can also face the rear side of the layer with the first deformation on its front side. The revealing layer can also be separated from the first deformation of one of the layers by some inner layers in between.

[0017] The first deformation is replicated on the revealing layer during lamination such that said revealing layer comprises a replicated deformation. The first deformation is not formed directly on the revealing layer. On the contrary, the first deformation is formed on a different layer, such as a first inner layer, and will be replicated to the revealing layer only through lamination. Consequently, the revealing layer can be attached to a second inner layer as a pre form. Once the first deformation is formed on a layer such as a first inner layer, said pre form is applied onto the first inner layer, with the revealing layer.

[0018] As the deformation is done on another surface rather than directly on a revealing layer or an ink layer, said revealing layer is not damaged by the deformation. Another benefit coming from this approach is that the feature is more attractive and has more dimensions when the deformation and revealing layer are not precisely in the same interface.

[0019] The revealing layer does not necessary have the same surface as the first deformation. According to one embodiment, the at least one revealing layer covers a surface bigger than the surface covered by the first deformation of one of the layers. The security feature is therefore not formed only in the portion where the revealing layer is present but rather on the portion where the first deformation is present. In this case, the revealing layer does not need to be cut or preformed in order to define the shape or area of the desired security feature. The revealing layer can cover substantially all the surface of the layer with the first deformation. According to another embodiment, the at least one revealing layer covers a surface smaller than the surface covered by the first deformation of one of the layers. In this case, the whole revealing layer shows the desired effect while the deformation outside the revealing layer can disappear during lamination process.

[0020] The first deformation can be formed on any of the layers as it is not on the outermost surface of the data carrier. For example, the first deformation can be formed on an inner surface of one of the outer layer. This first deformation can also be formed on a surface of one of the inner layers. The at least one inner layer preferably comprises a so-called core layer, the first deformation being formed on the surface of said core layer. The core layer is preferably substantially at the center of the stacked structure. Said core layer can also comprises several sub layers. Such a multilayered core can be deformed and then laminated to the revealing layer along with the outer layers.

[0021] The core layer carrying the first deformation can be substantially transparent. Alternatively, said core layer carrying the first deformation can be colored, advantageously white. Depending on the appearance of the core layer, the revealing layer can have different composition and appearance.

[0022] Further to the above mentioned advantages, the method according to the invention is also advantageously compatible with addition of other security features and subsequent personalization. Indeed, as mentioned before, this method of marking the data carrier does not interfere with embossing or diffractive surface elements in a negative way.

[0023] Advantageously, the method according to the invention comprises a step of forming a second security feature. Said second security feature can be formed by a modification of the surface of the data carrier. In that case, the second security feature can be of many types as a modification of the uppermost surface of the data carrier will not interfere with the first security feature as said first security feature is a so called interfacial feature at the interface between at least some of the layers of the data carrier. In this case, the step of forming the second security feature is subsequent the step of forming the stack structure by lamination. Advantageously, the second security feature is obtained by laser engraving, after the formation of the stack structure by lamination. The laser engraving of the data carrier according to the invention allows forming a second security feature with high level of complexity and reliability while not interfering with the first security feature.

[0024] The second security feature can also be an interfacial feature formed with the method according to the invention. In that case, the step of forming the second security feature comes before the step of forming the stack structure by lamination.

[0025] Preferably, the second security feature is at least partially overlapping the first security feature along the extension direction (E).

[0026] Advantageously, the method comprises a step of forming a personalization element. Said personalization element can be formed by many different techniques well known from the state of the art. Advantageously, the personalization element is formed by laser engraving. Preferably, said personalization element is at least partially overlapping the first security feature along the extension direction (E). This overlapping allows forming particularly complex design which would be very difficult for a forger to reproduce and/or to selectively alter.

[0027] Advantageously, the method comprises a step of forming a see-through portion or a window. The see-through portion can be produced by forming a void in one or more layers of the data carrier, allowing visibility through the data carrier. The void can be formed by punching or cutting away some material from one or more layers of the data carrier. In the context of the invention, the see-through portion allows viewing at least part of the deformation and/or the replicated deformation of the security feature.

[0028] Preferably, said see-through portion is at least partially overlapping the first security feature along the extension direction (E). This overlapping allows forming particularly complex design which would be very difficult for a forger to reproduce and/or to selectively alter.

[0029] According to another aspect, the invention concerns a data carrier obtained by the method previously disclosed. In particular, the data carrier according to the invention extends along an extension direction (E) and comprises:
  • a first outer layer forming a first outer surface of the data carrier, and
  • a second outer layer forming a second outer surface of the data carrier, and
said first outer layer and said second outer layer forming a stacked structure, wherein the data carrier comprises a first security feature at the interface between at least two adjacent layers, said first security feature comprising a first deformation of one of the layers, said first deformation being formed by laser marking.

[0030] All the technical advantages presented above in relation with the method of forming a data carrier applies equally to the data carrier according to the invention.

[0031] Advantageously, the data carrier according to the invention comprises at least one replicated deformation induced by the first deformation. The at least one replicated deformation is at the interface between at least some of the layers of the data carrier.

[0032] Advantageously, the data carrier comprises at least one inner layer. Said inner layer preferably comprises the first deformation.

[0033] Advantageously, the data carrier comprises at least one revealing layer. Said revealing layer comprises a replicated deformation. The revealing layer increase and/or improve the visibility of the first deformation and the security feature once the stacked structure of the data carrier is formed. Visibility means that deformation can be observed by one way or the other. Possible means of detection methods of normal light, sidelight, see-through light, UV light is used, or a crosscut is made. Usable devices are bare eyes, loupe, microscope, etc.

[0034] The revealing layer is preferably selected with respect to the internal layer with the first deformation. Advantageously, the chemical composition and physical properties of the revealing layer are not identical with those of the inner layer with the first deformation. The revealing layer advantageously faces the first deformation of one of the layers such that said revealing layer is in contact with the first deformation of one of the layers. The revealing layer can also face the rear side of the layer with the first deformation on its front side. The revealing layer can also be separated from the first deformation of one of the layers by some inner layers in between.

[0035] The first deformation is replicated on the revealing layer during lamination such that said revealing layer comprises a replicated deformation.

[0036] Another advantage of the data carrier according to the invention is the nature of the security feature formed by laser marking and its level of details. Said first security feature of the data carrier can be overt and visible for bare eyes. On the other hand, the marking may be covert and require use of a magnification such as a loupe, a microscope and/or different lighting conditions in order to be visible. The security feature or security element preferably has the shape of a pattern. The pattern can be an ordered pattern or a disordered pattern. An ordered pattern preferably comprises pattern elements being arranged in a repetitive manner. A disordered pattern preferably comprises randomly distributed pattern elements. The pattern elements in both cases can correspond to geometric shapes such as lines or circles or the like, a barcode, or any random looking set of elements. A security element being inspectable by the bare human eye is understood as being verifiable without the need of any dedicated equipment. A machine-readable security element is understood as being verifiable by means of dedicated equipment, e.g. by means of a mobile phone that takes a photograph of the security element and being configured to perform a software-based verification of the pattern. A phone operates in visible light regarding the light source as well as the capture. However, the verification could likewise require specific lighting conditions such as ultraviolet lighting or infrared lighting, and the same applied to the capturing device. Furthermore, the verification could require magnification of some level if the security element is provided at very high resolution.

[0037] Advantageously, the security feature comprises a watermark-like element. A so called watermark-like element consists of slightly thicker and slightly thinner areas of material, and it resembles a real watermark known from security papers, when a see-through light is used. A security feature comprising a watermark-like element can become visible or more prominent under backlight conditions compared to any other lighting configuration.

[0038] Advantageously, the security feature comprises a latent image. A security feature comprising a latent image can become visible when suitably altering the viewing and/or lighting angle.

[0039] Preferably, the at least one revealing layer comprises offset inks and varnishes, silk screen printing inks and varnishes, DOVID (Diffractive Optically Variable Image Device), OVI (Optically Variable Ink), pearlescent inks, metallic inks, metallic foils, and/or a colored plastic film. The nature of the revealing layer is advantageously selected depending on the nature of the layer with the first deformation.

[0040] Advantageously, the data carrier comprises a so-called core layer comprising the first deformation. The core layer is an inner layer of the data carrier. The core layer is preferably substantially at the center of the stacked structure. Said core layer can also comprises several sub layers.

[0041] The first outer layer and/or the second outer layer may be formed by different material adapted for their use in security documents and data carrier such as PVC, PETG, ABS and so on. Advantageously, the first outer layer and/or the second outer layer comprises thermoplastic material. Preferably, the first outer layer and/or the second outer layer comprises polycarbonate.

[0042] In the same way, the at least one core layer may be formed by different material adapted for their use in security documents and data carrier such as PVC, PETG, ABS and so on. Advantageously, the at least one core layer comprises thermoplastic material. Preferably, the at least one core layer comprises polycarbonate and more preferably transparent polycarbonate.

[0043] The outer layers and the core layer do not have to be of same type. For instance, a data carrier with PET core and PVC surface layers could be manufactured according to the method of the invention.

[0044] Advantageously, the data carrier according to the invention comprises a second security feature. Said second security feature can be formed by a modification of the surface of the data carrier. In that case, the second security feature can be of many types as a modification of the uppermost surface of the data carrier will not interfere with the first security feature as said first security feature is a so called interfacial feature at the interface between at least some of the layers of the data carrier. Advantageously, the second security feature is obtained by laser engraving. The laser engraving of the data carrier according to the invention allows forming a second security feature with high level of complexity and reliability while not interfering with the first security feature.

[0045] The second security feature can also be an interfacial feature formed with the method according to the invention.

[0046] Preferably, the second security feature is at least partially overlapping the first security feature along the extension direction (E).

[0047] Advantageously, the data carrier comprises a see-through portion or a window. In this case, the different layers of the data carrier are preferably at least partially translucent at the region of the see-through portion.

[0048] Preferably, said see-through portion is at least partially overlapping the first security feature along the extension direction (E). This overlapping allows forming particularly complex design which would be very difficult for a forger to reproduce and/or to selectively alter.

[0049] The interaction between the see-through portion and the first security feature involves the strategic placement of the first deformation and/or the replicated deformation in alignment with the see-through portion. This configuration allows enhancing the security of the document by combining different security feature elements in a way that is challenging to replicate or counterfeit. By integrating interfacial security feature with the formation of a see-through portion, the data carrier achieves a multilayered security approach. This makes it even more difficult for counterfeiters to reproduce all the security elements accurately.

[0050] The see-through portion can be produced by forming a void in one or more layers of the data carrier, allowing visibility through the data carrier. The void can be formed by punching or cutting away some material from one or more layers of the data carrier. In the context of the invention, the see-through portion allows viewing at least part of the deformation and/or the replicated deformation of the security feature.

[0051] In the described embodiment, the see-through portion is part of a multilayered structure involving clear and white polycarbonate layers, with the clear layer potentially having embossed security features. This combination of a see-though portion and embossed elements contributes to the document security and makes it more resistant to counterfeiting.

[0052] Advantageously, the data carrier comprises a personalization element. Said personalization element can be formed by many different techniques well known from the state of the art, such as laser engraving. The personalization element can notably comprise a photograph of the holder of a security document comprising the data carrier. Advantageously, said personalization element is at least partially overlapping the first security feature along the extension direction (E). This overlapping allows forming particularly complex design which would be very difficult for a forger to reproduce and/or to selectively alter.

[0053] Preferably, the see-through portion and the personalization element are at least partially overlapping the first security feature along the extension direction (E). This overlapping allows forming an even more complex design which would be particularly difficult for a forger to reproduce and/or to selectively alter.

[0054] According to another aspect, the invention concerns a security document comprising or consisting of at least one data carrier as previously disclosed. The security document is preferably a smart card, an identity card, a passport, a credit card, a bank note or the like.

BRIEF DESCRIPTION OF THE DRAWINGS



[0055] Preferred embodiments of the invention are described in the following with reference to the drawings, which are for the purpose of illustrating the present preferred embodiments of the invention and not for the purpose of limiting the same. In the drawings,
Fig. 1
shows a first step of the method of forming a data carrier according to the invention in a cross section view;
Fig. 2
shows a second step of the method of forming a data carrier according to the invention in a cross section view;
Fig. 3
shows a third step of the method of forming a data carrier according to the invention in a cross section view;
Fig.4
shows another embodiment of a stacked structure formed according to the invention in a cross view;
Fig. 5a
shows a top view of a data carrier 1 according to the invention with normal light,
Fig. 5b
shows the data carrier of figure 5a with UV light,
Fig. 5c
shows the data carrier of figure 5a and 5b with transmitted light,
Fig. 6a
shows a top view of a data carrier 1 according to the invention with transmitted light,
Fig. 6b
shows the data carrier of figure 6a with UV light,
Fig. 6c
shows a data carrier similar to the one of figure 6a further comprising a revealing layer and with transmitted light,
Fig. 7a
shows a top view of a data carrier 1 according to the invention with transmitted light,
Fig. 7b
shows the data carrier of figure 7a further comprising a revealing layer and with transmitted light,
Fig. 7c
shows the data carrier of figure 7b with UV light,
Fig. 7d
shows the data carrier of figure 7b and 7c with normal light,

DESCRIPTION OF PARTICULAR EMBODIMENTS



[0056] Aspects of the invention shall be further illustrated with reference to the figures.

[0057] Figure 1 depicts a first step of the method of forming a data carrier according to the invention in a cross section view. In this first step, a first outer layer 11, a second outer layer 12 and several inner layers 20 are provided. The number of inner layers 20 can vary depending on the desired properties of the data carrier 1. One of those inner layers 20 is a so-called core layer 22. This core layer 22 is substantially at the center of the data carrier 1 according to the extension direction (E). Additionally, a revealing layer 30 is provided. The layers represented in these figures are not in scale. The revealing layer 30 is, in most of cases, much thinner than the other layers.

[0058] In the second step as depicted in figure 2, a first deformation 40 of the core layer 22 is formed by laser marking. This first deformation 40 of the core layer 22 will form a first security feature 50 at the interface between the core layer 22, the revealing layer 30 and an upper inner layer 20 facing the revealing layer 30.

[0059] In the third step as depicted in figure 3, a stacked structure is formed with the first outer layer 11, a first inner layer 20, the revealing layer 30, the core layer 22, a second inner layer 20 and the second outer layer 12. This stacked structure is formed by lamination. The parameters of the lamination process will depend on the nature of the layers of the data carrier, on their thickness and so on. During lamination, heat and pressure in applied on the stack of layers, some material of the layers adjacent to the core layer with the first deformation flow and follows the shape of the first deformation. Therefore, during said lamination, the first deformation 40 of the surface of the core layer 22 is replicated such that at least one replicated deformation 42 is formed inside the data carrier 1 at the interface between at least some of the layers. In the embodiment shown in figure 3, a replicated deformation 42 is located at the interface between the core layer 22 and the revealing layer 30 and another replicated deformation 42 is located at the interface between the revealing layer 30 and the above inner layer 20 facing the revealing layer 30. Depending on the intensity of the deformation 40, the height and depth of the resulting recesses and the thickness of the layers, bumps and/or dips, the replicated deformation 42 could be replicated to more adjacent layers. For example, for a stronger deformation with higher intensity, some replicated deformation could be also located at the interface between the upper inner layer 20 and the first outer layer 11.

[0060] It has to be noted that figures have only an illustrative purpose.

[0061] Figure 4 is another embodiment of a stacked structure formed according to the method described above. This structure further comprises a see-through portion 70. The first outer layer 11 and second outer layer 12 are opaque layers. This opacity is represented in figure 4 by a hatched pattern. On the contrary, the core layer 22 and the inner layers 20 are translucent or sensibly transparent. This illustration is for explanatory purposes only, it is obviously not excluded that the layers shown without a hatched pattern in the other figures could also be opaque layers. The opaque layers of the stacked structure comprise an opening, advantageously formed before the lamination step. The opaque layers of the stacked structure comprise translucent or sensibly transparent material, such as clear polycarbonate for example, at the area corresponding to the see-through portion. This clear portion of the opaque layers can be formed by removing a part of the opaque material before the lamination step. During lamination, the clear material of adjacent layers flows and fill the void in the opaque layer. In the embodiment shown in figure 4, the clear polycarbonate of inner layers 20 flows during lamination and fill the void in the first outer layer 11 and second outer layer 12. The see through portion is represented by the area 70. At least part of the first security feature 50 overlaps the see through portion 70. In other words, the first security feature 50 is at least partially in alignment with the see-through portion 70.

[0062] Figures 5a to 5c depicts a top view of a data carrier 1 according to the invention comprising a first security feature 50. In this data carrier, the first deformation 40 is a kiss cut formed by laser marking of a core layer made of polycarbonate. The first deformation and the corresponding first security feature forms a bolt like shape. The revealing layer 30 used in this data carrier 1 is a metallic ink layer. Figure 5a shows the data carrier with normal light. Figure 5b shows the data carrier with UV light. Figure 5c shows the data carrier with transmitted light. The first security feature 50 is visible to the naked eye and even more visible with specific lighting conditions.

[0063] Figures 6a to 6c depicts a top view of a data carrier 1 according to the invention comprising a first security feature 50. In this data carrier, the first deformation 40 is a kiss cut formed by laser marking of a core layer made of polycarbonate. The first deformation and the corresponding first security feature form a pattern of lines forming the letters "UTO".

[0064] The data carrier 1 of figures 6a and 6b does not comprise a revealing layer. Figure 6a shows the data carrier 1 with transmitted light. Figure 6b shows the same data carrier 1 with UV light. The first security feature 50 is barely visible to the naked eye and more visible with UV light.

[0065] The data carrier 1 of figure 6c corresponds to a data carrier similar to the data carrier of figures 6a and 6b and that further comprises a revealing layer 30. The revealing layer 30 of the data carrier 1 of figure 6c is an ink layer. Figure 6c shows the data carrier 1 with transmitted light. The first security feature 50 in figure 6c is visible to the naked eye and particularly more visible than without the revealing layer as shown in figure 6a.

[0066] Figures 7a to 7d depicts a top view of a data carrier 1 according to the invention comprising a first security feature 50. In this data carrier, the first deformation 40 is a through cut formed by laser marking of a core layer made of polycarbonate. The first deformation and the corresponding first security feature form a pattern of lines forming series of hexagonal shapes.

[0067] The data carrier 1 of figures 7a does not comprise a revealing layer. Figure 7a shows the data carrier 1 with transmitted light. The first security feature 50 is visible to the naked eye.

[0068] The data carrier 1 of figure 7b, 7c and 7d correspond to a data carrier similar to the data carrier of figures 7a and that further comprises a revealing layer 30. The revealing layer 30 of the data carrier 1 of figures 7b to 7d is an ink layer.

[0069] Figure 7b shows the data carrier 1 with transmitted light. The first security feature 50 in figure 7b is visible to the naked eye and notably more visible than without the revealing layer as shown in figure 7a. In the example of this data carrier, the revealing layer is not mandatory for the security to be visible but it improves its visibility.

[0070] Figure 7c shows the data carrier 1 with UV light. Figure 7d shows the data carrier 1 with normal light. In these two figures, the first security feature 50 is visible both to the naked eye and with UV light.


Claims

1. A method of forming a data carrier (1) for a security document (100), the method comprising:

- providing a first outer layer (11) and second outer layer (12),

- forming a first security feature (50) at the interface between at least two adjacent layers, said first security feature (50) comprising a first deformation (40) of one of the layers,

- forming a stacked structure with said first outer layer (11) and said second outer layer (12), said stacked structure being formed by lamination,

wherein said first deformation (40) is formed by laser marking.
 
2. The method of claim 1, wherein the first deformation is formed by laser marking .
 
3. A method according to any of the preceding claims, wherein the first deformation (40) is replicated during lamination such that at least one replicated deformation (42) is formed inside the data carrier (1) at the interface between at least some of the layers.
 
4. A method according to any of the preceding claims, wherein it comprises the step of providing at least one revealing layer (30), said revealing layer (30) comprising a replicated deformation (42).
 
5. A method according to any of the preceding claims, wherein it comprises a step of forming a see-through portion (70), said see through portion (70) at least partially overlapping the first security feature (50) along an extension direction (E).
 
6. A method according to any of the preceding claims, wherein the data carrier comprises at least one inner layer (20), said at least one inner layer (20) comprising the first deformation (40).
 
7. The method according to any of the previous claims, wherein it comprises a step of forming a personalization element (60), said personalization element (60) preferably at least partially overlapping the first security feature (50) along the extension direction.
 
8. Data carrier (1) for a security document (100), said data carrier (1) extending along an extension direction (E) and comprising:

- a first outer layer (11) forming a first outer surface of the data carrier (1), and

- a second outer layer (12) forming a second outer surface of the data carrier (1), and

said first outer layer (11) and said second outer layer (12) forming a stacked structu re,

wherein the data carrier (1) comprises a first security feature (50) at the interface between at least two adjacent layers, said first security feature (50) comprising a first deformation (40) of one of the layers, said first deformation being formed by laser marking.


 
9. Data carrier (1) according to claim 8, wherein it comprises at least one replicated deformation (42) induced by the first deformation (40), said at least one replicated deformation (42) being at the interface between at least some of the layers of the data carrier (1).
 
10. Data carrier (1) according to claim 8 to 9, wherein it comprises at least one revealing layer (30), said revealing layer (30) comprising a replicated deformation (42).
 
11. Data carrier (1) according to claims 8 to 10, wherein it comprises at least one inner layer (20), said at least one inner layer (20) comprising the first deformation (40).
 
12. Data carrier (1) according to claims 8 to 11, wherein the first security feature (50) comprises an optically active element, preferably a fluorescent element, and/or at least one latent image.
 
13. Data carrier (1) according to claim 8 to 12, wherein the at least one revealing layer (30) comprises offset inks and varnishes, silk screen printing inks and varnishes, DOVID, OVI, pearlescent inks, metallic inks, metallic foils, and/or a colored plastic film.
 
14. Data carrier (1) according to any of claims 8 to 13, wherein it comprises a see-through portion (70), said see through portion (70) at least partially overlapping the first security feature (50) along an extension direction (E).
 
15. A security document (100) comprising or consisting of at least one data carrier (1) according to claims 8 to 14, the security document (100) preferably being a smart card, an identity card, a passport, a credit card, a bank note or the like.
 




Drawing

























Search report












Search report