Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Security element and method to inspect authenticity of a print

A technology of security elements and content, applied in the field of security elements, can solve the problems of expensive ink, limited application of security elements, and inability to identify hidden watermarks

Active Publication Date: 2014-10-22
格莱尼赛斯匈牙利公司
View PDF16 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The biggest disadvantage of these solutions is that the inks are expensive due to their specificity (for example, printing inks with optically variable pigments) or require the use of specific printing substrates (such printing substrates can also be produced at a higher cost)
This means that this print protection can only be used on very special prints
Also, each printer / scanner driver must be "taught" about the forbidden watermark
Another drawback of this technology is that the printing units manufactured before the agreement were not able to recognize the hidden watermark and thus print a print protected by said watermark
The drawback of this solution is that, for inspection, in each case access to a remote database is required, which necessitates a data communication connection with an appropriate bandwidth
The disadvantage of this technique is that it requires a high-resolution digital device for learning
Their disadvantage lies in the fact that, in general, they do not contain copy protection, so their use as security elements is very limited
[0011] In light of this, it is clear that while various print protection technologies exist for protecting printed content with copy protection and printed substrates / documents with such printed content, these technologies are either too expensive or require specific kits for create and / or check these technologies

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security element and method to inspect authenticity of a print
  • Security element and method to inspect authenticity of a print
  • Security element and method to inspect authenticity of a print

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] Figure 1A A general method of generating a security element formed of combined codes according to the invention is shown in . Accordingly, a code carrying the information is selected (step 100 ), formed of well-known code symbols (eg barcode, QR code, Data Matrix code, mobile code) or a uniquely coded line or point code. According to another possibility, the code carrying the primary information can also be formed by a line code or a point code hidden in a decorative graphic illustration of the printed content. Furthermore, the code carrying the primary information may be the primary information itself, which is simply printed in an uncoded manner onto the printed substrate. The printed substrate can be any document or the surface of an object to be protected, especially for example bank rolls, securities, invoices, product packaging, ID cards / labels, covers, tickets, certificates, personal documents, vouchers or any other similar documents . Primary information refe...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

PropertyMeasurementUnit
Sizeaaaaaaaaaa
Wavelengthaaaaaaaaaa
Login to View More

Abstract

The invention relates to a security element applied onto printing substrates (bank¬ notes, securities, product packagings, identity cards / labels or other similar documents) by printing, comprising a unique identifier as primary information visible to the naked eye and secondary information protecting against copying non-visible to the naked eye. The unique identifier is typically a point code. Said secondary information is represented by a structure with the largest dimension of 2 to 40 microns, and due to printing distortions arising when the security element is applied onto a printing substrate, said secondary information is non-reconstructable from the print of the security element and a statistically analyzable inherent feature is associated to it. The invention also relates to a printed matter with such an inventive security element and to a method to check authenticity of a printed matter with the inventive security element in visible light (380-750nm).

Description

field of invention [0001] The invention relates to a security element and a method for determining the authenticity of printed content provided on a printed substrate. Its field of application concerns the field of protection of prints produced by printing presses or the anti-counterfeiting of documents produced with inkjet and / or laser printers. Background of the invention [0002] To date, photocopying and laser printing technologies have come a long way. Thus, high-quality reproduction of all types of printed matter is considerably simplified using such techniques. At the same time, however, it has unfortunately become easier to counterfeit valuable or personal prints. Therefore, the anti-counterfeiting protection of this type of document has just been put on the agenda. Documentation provided, for example, by a printing press or on a data carrier (such as, for example, text or drawings) produced by an inkjet and / or laser printer may constitute a claimed printed matter...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04N1/32G07D7/00G07D7/20G06V30/224
CPCG07D7/008G07D7/2041H04N1/32251H04N1/32325H04N1/32352G07D7/0056H04L9/3226G06K19/06028G06K19/06037G06K19/06056G06T1/005G06T2201/0051G06T2201/0062G06T2201/0065G06V10/26G06V20/80G06V20/95G06V30/224G06V30/413
Inventor 伽博尔·克里斯托皮罗什卡·瑞迈恩尼
Owner 格莱尼赛斯匈牙利公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products