Security element, and value document comprising such a security element

一种防伪元件、有价文件的技术,应用在光学元件、制造工具、特种图样等方向,能够解决防伪元件难以仿造、微光学构造难仿制或复制等问题

Active Publication Date: 2013-04-24
GIESECKE & DEVRIENT CURRENCY TECHNOLOGY GMBH
View PDF12 Cites 34 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

At the same time, such security elements are difficult to imitate, because the micro-optical structure is difficult to imitate or reproduce
However, since known security elements are constantly being forged by counterfeiters, there is a need for security elements with increased forgery resistance

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security element, and value document comprising such a security element
  • Security element, and value document comprising such a security element
  • Security element, and value document comprising such a security element

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0059] exist figure 1 In the shown embodiment, the security element 1 according to the invention is integrated in the banknote 2, so that it can be obtained from figure 1 The security element 1 is seen on the front side of the banknote 2 shown in .

[0060] The security element 1 is designed as a reflective security element 1 with a rectangular graphic area 3 which is divided into a first graphic section 4 and a second graphic section 5 .

[0061] Here, the first graphic part 4 surrounds the second graphic part 5, just as from figure 2 As inferred from the enlarged illustration in .

[0062] especially if image 3 As shown in the schematic sectional view of the graphic area 3 in , the graphic area 3 has a carrier foil 6 (which can be, for example, a PET foil) and an upper 7 and a lower embossing varnish layer 8 . In the lower embossing varnish layer 8, the microstructures 9 are arranged in a grid with a fixed geometry (here, for example, a hexagonal grid) perpendicular to...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a security element for a security paper, value document or the like, comprising a support having a motif region (3), which provides a visually perceptible motif having a first and a second motif part (4, 5), wherein the motif region (3) comprises a first micro-optical representation arrangement (11), (e.g. microlenses (10) and microstructures (9), forming a moire magnification arrangement; a partially demetallized perforated screen (31); or a diffractive structure), which presents at least two different images as the first motif part in a manner dependent on the viewing angle, and a second micro-optical representation arrangement (17) (e.g. a plurality of reflecting facets (or embossed structures such as reflective fresnel structures, diffraction structures, or mat structures) which can also be partially demetallized), which presents a reflective surface as the second motif part (5), said reflective surface appearing curved relative to the actual macroscopic spatial form of the second micro-optical representation arrangement (17). Special effects appear in transmitted light.

Description

technical field [0001] The invention relates to a security element for security paper, value documents, etc., and a value document with such a security element. Background technique [0002] Objects to be protected are often provided with security elements which allow the authenticity of the object to be checked and at the same time serve to prevent unauthorized copying. [0003] Objects to be protected are, for example, security papers, identity documents and value documents (e.g. banknotes, chip cards, passports, identification cards, identity cards, share certificates, exhibits, deeds, receipts, checks, admission tickets, credit cards, health cards, etc.) and Product authentication elements (e.g. labels, seals, packaging, etc.). [0004] Known security elements have a micro-optical representation arrangement in the form of a moiré magnification arrangement, e.g. impression. At the same time, such a security element is difficult to imitate, since the micro-optical struc...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): B24D15/00B42D15/10B44F7/00G02B5/18G02B27/22
CPCB42D2035/22B42D2035/44G02B5/1861G02B27/2214B44F7/00B42D15/00B42D25/342B42D15/002B42D25/328B42D25/324B42D25/351B42D25/373B42D25/355B42D25/45
Inventor C.富斯M.拉姆A.劳赫
Owner GIESECKE & DEVRIENT CURRENCY TECHNOLOGY GMBH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products