This helps you quickly interpret patents by identifying the three key elements:
Problems solved by technology
Method used
Benefits of technology
Problems solved by technology
At the same time, such security elements are difficult to imitate, because the micro-optical structure is difficult to imitate or reproduce
However, since known security elements are constantly being forged by counterfeiters, there is a need for security elements with increased forgery resistance
Method used
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more
Image
Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
Click on the blue label to locate the original text in one second.
Reading with bidirectional positioning of images and text.
Smart Image
Examples
Experimental program
Comparison scheme
Effect test
Embodiment Construction
[0059] exist figure 1 In the shown embodiment, the security element 1 according to the invention is integrated in the banknote 2, so that it can be obtained from figure 1 The security element 1 is seen on the front side of the banknote 2 shown in .
[0060] The security element 1 is designed as a reflective security element 1 with a rectangular graphic area 3 which is divided into a first graphic section 4 and a second graphic section 5 .
[0061] Here, the first graphic part 4 surrounds the second graphic part 5, just as from figure 2 As inferred from the enlarged illustration in .
[0062] especially if image 3 As shown in the schematic sectional view of the graphic area 3 in , the graphic area 3 has a carrier foil 6 (which can be, for example, a PET foil) and an upper 7 and a lower embossing varnish layer 8 . In the lower embossing varnish layer 8, the microstructures 9 are arranged in a grid with a fixed geometry (here, for example, a hexagonal grid) perpendicular to...
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More
PUM
Login to View More
Abstract
The invention relates to a security element for a security paper, value document or the like, comprising a support having a motif region (3), which provides a visually perceptible motif having a first and a second motif part (4, 5), wherein the motif region (3) comprises a first micro-optical representation arrangement (11), (e.g. microlenses (10) and microstructures (9), forming a moire magnification arrangement; a partially demetallized perforated screen (31); or a diffractive structure), which presents at least two different images as the first motif part in a manner dependent on the viewing angle, and a second micro-optical representation arrangement (17) (e.g. a plurality of reflecting facets (or embossed structures such as reflective fresnel structures, diffraction structures, or mat structures) which can also be partially demetallized), which presents a reflective surface as the second motif part (5), said reflective surface appearing curved relative to the actual macroscopic spatial form of the second micro-optical representation arrangement (17). Special effects appear in transmitted light.
Description
technical field [0001] The invention relates to a security element for security paper, value documents, etc., and a value document with such a security element. Background technique [0002] Objects to be protected are often provided with security elements which allow the authenticity of the object to be checked and at the same time serve to prevent unauthorized copying. [0003] Objects to be protected are, for example, security papers, identity documents and value documents (e.g. banknotes, chip cards, passports, identification cards, identity cards, share certificates, exhibits, deeds, receipts, checks, admission tickets, credit cards, health cards, etc.) and Product authentication elements (e.g. labels, seals, packaging, etc.). [0004] Known security elements have a micro-optical representation arrangement in the form of a moiré magnification arrangement, e.g. impression. At the same time, such a security element is difficult to imitate, since the micro-optical struc...
Claims
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More
Application Information
Patent Timeline
Application Date:The date an application was filed.
Publication Date:The date a patent or application was officially published.
First Publication Date:The earliest publication date of a patent with the same application number.
Issue Date:Publication date of the patent grant document.
PCT Entry Date:The Entry date of PCT National Phase.
Estimated Expiry Date:The statutory expiry date of a patent right according to the Patent Law, and it is the longest term of protection that the patent right can achieve without the termination of the patent right due to other reasons(Term extension factor has been taken into account ).
Invalid Date:Actual expiry date is based on effective date or publication date of legal transaction data of invalid patent.