EP3548298B1 - Zwei sicherheitsmerkmale, die zusammen ein drittes sicherheitsmerkmal formen - Google Patents

Zwei sicherheitsmerkmale, die zusammen ein drittes sicherheitsmerkmal formen Download PDF

Info

Publication number
EP3548298B1
EP3548298B1 EP17808469.5A EP17808469A EP3548298B1 EP 3548298 B1 EP3548298 B1 EP 3548298B1 EP 17808469 A EP17808469 A EP 17808469A EP 3548298 B1 EP3548298 B1 EP 3548298B1
Authority
EP
European Patent Office
Prior art keywords
security
authentication mark
authentication
image
sign
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
EP17808469.5A
Other languages
English (en)
French (fr)
Other versions
EP3548298A1 (de
Inventor
Frédéric Beauchet
Michel Blanc
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Banque de France
Original Assignee
Banque de France
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Family has litigation
First worldwide family litigation filed litigation Critical https://patents.darts-ip.com/?family=58737621&utm_source=***_patent&utm_medium=platform_link&utm_campaign=public_patent_search&patent=EP3548298(B1) "Global patent litigation dataset” by Darts-ip is licensed under a Creative Commons Attribution 4.0 International License.
Application filed by Banque de France filed Critical Banque de France
Priority to PL17808469T priority Critical patent/PL3548298T3/pl
Publication of EP3548298A1 publication Critical patent/EP3548298A1/de
Application granted granted Critical
Publication of EP3548298B1 publication Critical patent/EP3548298B1/de
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • BPERFORMING OPERATIONS; TRANSPORTING
    • B42BOOKBINDING; ALBUMS; FILES; SPECIAL PRINTED MATTER
    • B42DBOOKS; BOOK COVERS; LOOSE LEAVES; PRINTED MATTER CHARACTERISED BY IDENTIFICATION OR SECURITY FEATURES; PRINTED MATTER OF SPECIAL FORMAT OR STYLE NOT OTHERWISE PROVIDED FOR; DEVICES FOR USE THEREWITH AND NOT OTHERWISE PROVIDED FOR; MOVABLE-STRIP WRITING OR READING APPARATUS
    • B42D25/00Information-bearing cards or sheet-like structures characterised by identification or security features; Manufacture thereof
    • B42D25/20Information-bearing cards or sheet-like structures characterised by identification or security features; Manufacture thereof characterised by a particular use or purpose
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B42BOOKBINDING; ALBUMS; FILES; SPECIAL PRINTED MATTER
    • B42DBOOKS; BOOK COVERS; LOOSE LEAVES; PRINTED MATTER CHARACTERISED BY IDENTIFICATION OR SECURITY FEATURES; PRINTED MATTER OF SPECIAL FORMAT OR STYLE NOT OTHERWISE PROVIDED FOR; DEVICES FOR USE THEREWITH AND NOT OTHERWISE PROVIDED FOR; MOVABLE-STRIP WRITING OR READING APPARATUS
    • B42D25/00Information-bearing cards or sheet-like structures characterised by identification or security features; Manufacture thereof
    • B42D25/30Identification or security features, e.g. for preventing forgery
    • B42D25/36Identification or security features, e.g. for preventing forgery comprising special materials
    • B42D25/373Metallic materials
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B42BOOKBINDING; ALBUMS; FILES; SPECIAL PRINTED MATTER
    • B42DBOOKS; BOOK COVERS; LOOSE LEAVES; PRINTED MATTER CHARACTERISED BY IDENTIFICATION OR SECURITY FEATURES; PRINTED MATTER OF SPECIAL FORMAT OR STYLE NOT OTHERWISE PROVIDED FOR; DEVICES FOR USE THEREWITH AND NOT OTHERWISE PROVIDED FOR; MOVABLE-STRIP WRITING OR READING APPARATUS
    • B42D25/00Information-bearing cards or sheet-like structures characterised by identification or security features; Manufacture thereof
    • B42D25/30Identification or security features, e.g. for preventing forgery
    • B42D25/36Identification or security features, e.g. for preventing forgery comprising special materials
    • B42D25/378Special inks
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B42BOOKBINDING; ALBUMS; FILES; SPECIAL PRINTED MATTER
    • B42DBOOKS; BOOK COVERS; LOOSE LEAVES; PRINTED MATTER CHARACTERISED BY IDENTIFICATION OR SECURITY FEATURES; PRINTED MATTER OF SPECIAL FORMAT OR STYLE NOT OTHERWISE PROVIDED FOR; DEVICES FOR USE THEREWITH AND NOT OTHERWISE PROVIDED FOR; MOVABLE-STRIP WRITING OR READING APPARATUS
    • B42D25/00Information-bearing cards or sheet-like structures characterised by identification or security features; Manufacture thereof
    • B42D25/30Identification or security features, e.g. for preventing forgery
    • B42D25/36Identification or security features, e.g. for preventing forgery comprising special materials
    • B42D25/378Special inks
    • B42D25/382Special inks absorbing or reflecting infrared light
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B42BOOKBINDING; ALBUMS; FILES; SPECIAL PRINTED MATTER
    • B42DBOOKS; BOOK COVERS; LOOSE LEAVES; PRINTED MATTER CHARACTERISED BY IDENTIFICATION OR SECURITY FEATURES; PRINTED MATTER OF SPECIAL FORMAT OR STYLE NOT OTHERWISE PROVIDED FOR; DEVICES FOR USE THEREWITH AND NOT OTHERWISE PROVIDED FOR; MOVABLE-STRIP WRITING OR READING APPARATUS
    • B42D25/00Information-bearing cards or sheet-like structures characterised by identification or security features; Manufacture thereof
    • B42D25/30Identification or security features, e.g. for preventing forgery
    • B42D25/36Identification or security features, e.g. for preventing forgery comprising special materials
    • B42D25/378Special inks
    • B42D25/387Special inks absorbing or reflecting ultraviolet light

Definitions

  • the invention relates to a set of at least two security signs.
  • the invention relates in particular, although not exclusively, to a set of two security signs for protecting a security document such as a bank note or an identity paper or even a bank card.
  • This type of security sign has the advantage of offering a good level of security since the two parts of the security sign must be placed adequately on the two different sides of the banknote so that, when combined, they can form the sign. of security.
  • this type of security sign is relatively easy to recognize by the general public who do not need special equipment to detect a fraudulent ticket.
  • the document WO 2015/184556 discloses three elements allowing a user, depending on how the document bearing said three elements is illuminated, to perceive three different images.
  • An aim of the invention is to provide a set of security signs that make fraudulent reproduction of these security signs even more complex.
  • the invention proposes a set of N security signs, N being at least equal to two, each security sign alone forming an authentication mark different from those formed by the other security signs, the different signs of security being conformed to form jointly by superposition of the N security signs, an N + 1-th authentication mark unrelated to the N other authentication marks each formed respectively by one of the N security signs.
  • the N + 1-th authentication mark is different from a simple combination of the other authentication marks such as a juxtaposition, a filling, a complement of the other authentication marks between them.
  • N + 1-th authentication mark only exists by the superposition of the various security signs and is therefore not connected to any tangible element, which makes it all the more difficult to reproduce.
  • the assembly comprises at least two security signs, a first security sign alone forming a first authentication mark and a second security sign alone forming a second authentication mark, different from the first authentication mark.
  • authentication the two security signs being shaped to form jointly by superimposing at least the two security signs, a third authentication mark unrelated to the first authentication mark and the second authentication mark.
  • each authentication mark alone forms an identifiable image having a meaning in its own right.
  • the authentication mark can thus be an alphanumeric sign, a drawing, a geometric figure, a bar code, etc.
  • a document 1 such as a security document (banknote, identity card, passport, bank card, etc.) or another type of document (banknote lottery 7), comprises a support 2 carrying a security assembly according to the first embodiment of the invention.
  • a security document banknote, identity card, passport, bank card, etc.
  • another type of document banknote lottery
  • the same document 1 carries the security assembly and therefore here two security signs.
  • the support 2 is shaped so that a first main face 3 of the support 2 bears the first security sign 5 and so that the second main face 4, opposite the first main face 3, bears the second sign security 6.
  • the two security signs 5, 6 are here arranged so as to be located in the same area of the support 2. Thus, the two security signs 5, 6 are naturally superimposed on each other (although than separated by the thickness of the support 2).
  • the support 2 is here shaped to allow both a study in reflection of the two main faces 3, 4 and at the same time a study in transmission of each of said faces.
  • a support 2 such as that used in banknotes is for example suitable.
  • the support 2 is for example made of paper or of a polymer material.
  • the support 2 is adapted to be more transparent than in the rest of the support 2 in order to further improve the study in transmission.
  • an area can be made more transparent mechanically by locally reducing the thickness of the support 2 (by a watermark technique, by calendering, etc.) or chemically using a varnish, a ink or a solution at the time of forming the support 2 or after the support 2 has been created.
  • the printing density of the inks can be adapted so that one side of the document 7 is darker than the other. In this way, this makes it possible to observe with an identical or almost identical rendering on the less dark face, in reflection the sign carried by said face and in transmission the sign carried by the darker face.
  • security signs 5, 6 are here printed in inks other than those used for the rest of the support 2.
  • the security signs 5, 6 are printed in inks having a strong contrast with those used for the rest of the support 2 to facilitate the study in reflection, said inks being moreover relatively opaque to facilitate the study in transmission.
  • the inks here are inks visible in daylight.
  • the first authentication mark 7 formed by the first security sign 5 is clearly visible.
  • the second authentication mark 8 formed by the second security sign 6 is also clearly visible.
  • the second authentication mark 8 has a word (Einstein).
  • the two security signs 5, 6 then draw a third authentication mark 9 unrelated to the first mark authentication mark 7 and the second authentication mark 8.
  • the third authentication mark 9 proves to be particularly difficult to reproduce since it only exists by the superposition of the two security signs 5, 6 and can thus not be linked to any security sign 5, 6 taken. isolation.
  • the third authentication mark 9 is here a drawing (schematizing electrons orbiting around a nucleus).
  • the security package is based on the following general principle.
  • An image M (also called a mask) is created here randomly composed of black and white pixels, therefore having no meaning.
  • an image S also called a secret image
  • an image C (also called an encrypted image) is created using a logical “or exclusive” operator between the image M and the image S. The image C then has no meaning.
  • the safety assembly is here manufactured as follows.
  • the images I1, I2, I3 which will ultimately correspond respectively to the first authentication mark 7, the second authentication mark 8 and the third authentication mark 9.
  • the three images I1 , I2, I3 each have a meaning but the three images I1, I2, I3 have no relation to each other.
  • the images I1, I2, I3 are all of identical sizes, each pixel of each image being either black or white.
  • the images I1, I2, I3 thus exhibit a strong contrast since there is a 100% contrast between the black and white pixels of these images.
  • the first image I1 is broken down into a mask M1, each pixel of which actually forms a matrix of size 2 * 2.
  • the mask M1 does not have the same size as the first image I1.
  • a so-called white pixel is created in the mask M1, that is to say a pixel whose matrix comprises two white zones and two black zones.
  • a so-called white pixel in the mask M1 is therefore composed of 50% of white areas.
  • the distribution of the black and white areas in the pixel is carried out randomly.
  • a so-called white pixel in the mask M1 is therefore chosen randomly among the following possibilities:
  • a so-called black pixel is created in the mask M1, that is to say a pixel comprising a white zone and three black zones.
  • a so-called black pixel in the mask M1 is therefore composed of 75% of black areas.
  • the distribution of the black and white areas in the pixel is carried out randomly.
  • a so-called black pixel in the mask M1 is therefore chosen randomly from among the following possibilities:
  • a mask M1 is thus obtained, since it is randomly constructed at the level of its pixels, which nevertheless forms the first authentication mark 7, that is to say an image identifiable in itself, since the pixels of the matrix M1 are defined from image I1.
  • the first authentication mark 7 is identical to the image I1 but just exhibits less contrast than the image I1 since the pixels white areas of the mask M1 are formed with 50% white areas and the black pixels of the mask M1 are formed with 75% black areas.
  • the second image I2 is decomposed into an encrypted image C2, each pixel of which actually forms a matrix of size 2 * 2.
  • the second image I2 and the encrypted image C2 therefore do not have the same size.
  • a so-called white pixel in the encrypted image C2 is a pixel comprising two white areas and two black areas so that a so-called white pixel in the encrypted image C2 is 50% composed white areas.
  • a so-called black pixel in the encrypted image C2 it is a pixel comprising three areas black and a white area is a pixel composed of 75% black areas.
  • the distribution of the black and white areas within each pixel of the encrypted image C2 is not chosen randomly.
  • the encrypted image C2 must first of all correspond to the second image 12 in order to form the second authentication mark 8 (ie here the word Einstein).
  • the second authentication mark 8 ie here the word Einstein.
  • the corresponding pixel of the encrypted image C2 must also be a so-called black pixel and if a pixel is white in the second image I2, the corresponding pixel in the image encrypted C2 must also be a so-called white pixel.
  • the encrypted image C2 must also be shaped so that the superposition of the mask M1 and of the encrypted image C2 forms the third authentication mark 9 linked to the third image I3.
  • the third authentication mark 9 corresponds here to the unveiled image D3.
  • the revealed image D3 is such that each pixel actually forms a matrix of size 2 * 2.
  • the third image I3 (which therefore corresponds to the secret image) and the revealed image D3 therefore do not have the same size.
  • a so-called white pixel in the exposed image D3 is a pixel comprising a white area and three black areas so that a so-called white pixel in the exposed image D3 is composed of 75% black areas.
  • black pixel in the revealed image D3 it is a pixel comprising four black areas, ie a pixel composed of 100% black areas.
  • a black pixel of I3 corresponds to a so-called black pixel of D3 composed 100% of black areas, we must also have:
  • the shape of the pixel of C2 is randomly chosen from among the two possible ones.
  • the encrypted image C2 is thus constructed which forms the second authentication mark, that is to say an image identifiable in itself, since the pixels of the encrypted image C2 are defined from the image I2 .
  • the encrypted image C2 forming the second authentication mark is identical to the image I2 but just exhibits less contrast than the image I2 since the so-called white pixels of the encrypted image C2 are formed at 50% of white areas and the so-called black pixels of the encrypted image C2 are 75% formed of black areas.
  • the unveiled image D3 is therefore obtained.
  • the revealed image D3, which is also the third authentication mark 9 is identical to the image I3 but has just a lower contrast than the image I3 since the white pixels of the exposed image D3 are 25% white areas and the black pixels of the exposed image D3 are 100% black areas.
  • the images represented in the various figures of the present application are schematic since they do not represent (for reasons of visibility) the less significant contrast of the mask M1 and of the encrypted image C2 vis-à-vis the initial images , or again the less significant contrast of the revealed image D3 with the initial corresponding image on the one hand or with the mask M1 and the encrypted image C2 on the other hand.
  • the second embodiment is here identical to the first embodiment with the difference that the security assembly includes a third security sign 110 arranged inside the support 102.
  • the support 102 is shaped so that the third security sign 110 is arranged in the same area of the support 102 as the other two security signs 105, 106.
  • the three security signs 105, 106, 110 are found naturally superimposed (but not joined by the thickness of the support).
  • the signs are arranged so that at least two of the three signs are contiguous (for example by making two separate films each bearing a security sign and by subsequent affixing of said films).
  • the third security sign 110 is here shaped to form a fourth authentication mark 111 in reflection (for example an apple) unrelated to the first authentication mark 107, the second authentication mark 108 and the third authentication mark.
  • the second authentication mark 108 formed by the second security sign 106 is also clearly visible.
  • the three security signs 105, 106, 110 are visible by superposition. Due to their superposition, the three security signs 105, 106, 110 then draw a fifth authentication mark 112 (here a star) unrelated to the first authentication mark 107, the second authentication mark 108, the third authentication mark 109 and the fourth authentication mark 111.
  • a fifth authentication mark 112 here a star
  • the mask / encrypted image / revealed image principle is applied to the first authentication mark 107, to the second authentication mark 108 and to the fifth authentication mark 112 but through three safety signs 105, 106, 110.
  • the three security signs 105, 106, 110 are printed in inks having at least one absorption / excitation wavelength common to the three security signs.
  • the third security sign 111 is moreover printed in inks also having at least one absorption / excitation wavelength different from those of the other two security signs.
  • the three security signs 105, 106, 110 are all visible in daylight and the third security sign 110 is additionally the only one that is visible in infrared light.
  • the third authentication mark 109 may thus not exist.
  • the superposition of the first authentication mark 107 and of the second authentication mark 108 then gives no authentication mark (whether it is interpretable or not). However, this is not a problem for obtaining the fifth authentication mark 112.
  • the third security sign 110 is shaped so that the fourth authentication mark 111 relates to the third authentication mark 109 which is formed by the superposition of the first security sign 105 and the second security sign. 106.
  • the third embodiment is here identical to the second embodiment with the difference that the fourth authentication mark 213 cannot be interpreted being without any figurative sign.
  • the first security sign 205 and the second security sign 206 are also shaped so that the superposition of only these two security signs 205, 206 does not form a third interpretable authentication mark.
  • the superposition of the first security sign 205 and of the second security sign 206 thus form a third non-interpretable authentication mark 214 without any figurative sign (for reasons of visibility the marks of authentication 213 and 214 are represented by a white square but are actually formed by a cloud of points forming a more opaque area than what is represented).
  • the three security signs 205, 206, 210 are always shaped to form together by superposition a fifth authentication mark 212 unrelated to the first authentication mark 207, the second authentication mark 208, the fourth authentication mark. authentication 213 and here the third authentication mark 214.
  • the second authentication mark 208 formed by the second security sign 206 is also clearly visible (here the electrons orbiting around the nucleus).
  • the three security signs 205, 206, 210 are visible by superposition. Due to their superposition, the three security signs 205, 206, 210 then draw the fifth authentication mark 212 (here a star) unrelated to the first authentication mark 207, the second authentication mark 208, the fourth authentication mark 213 and not related here either to the third authentication mark 214.
  • the mask / encrypted image / revealed image principle is applied to the first authentication mark 207, to the second authentication mark 208 and to the fifth authentication mark 212 but through three safety signs 205, 206, 210.
  • the fifth authentication mark 212 proves to be particularly difficult to reproduce since it only exists by the superposition of the three security signs 205, 206, 210 and thus cannot be linked to any security sign 205, 206, 210 taken in isolation.
  • only the third security sign 210 or only the superposition of the first security sign 205 and the second security sign 206 will not form an interpretable authentication mark.
  • the third authentication mark 214 may not exist.
  • the superposition of the first authentication mark 207 and of the second authentication mark 208 then gives no authentication mark (whether it is interpretable or not). However, this is not a problem for obtaining the fifth authentication mark 212.
  • This embodiment is identical to the first embodiment except that the second security sign 308 is arranged in a window 315 formed in the support 302 so that the second security sign 308 is visible on both sides of the support 302. by reflection.
  • the window 315 is arranged in a different area of the support 302 than that where the first security sign 305 is located.
  • the first authentication mark 307 formed by the first security sign 305 is clearly visible (here the @ sign). Furthermore, the second authentication mark 308 formed by the second security sign 306 is also visible (here a gear).
  • the second authentication mark 308 formed by the second security sign 306 is also visible due to the window 315.
  • the first authentication mark 307 is however not visible. by reflection.
  • the third authentication mark 309 (and possibly the fourth authentication mark) turns out to be particularly difficult to reproduce since it only exists by the superposition of the two security signs 305, 306 and thus cannot be connected to no security sign 305, 306 taken in isolation.
  • the first security sign 405 is still carried by the document 401 but the second security sign 406 is displayed on the screen 417 of an apparatus 416.
  • the apparatus 416 is here a mobile telephone.
  • the first authentication mark 407 formed by the first security sign 405 is clearly visible (here the € sign).
  • the second authentication mark 408 formed by the second security sign 406 is also visible (here a star).
  • the device 416 forms part of an overlay device comprising a camera 421 connected to the device 416 for measuring the relative position of the document 401 on the screen 417. From the data provided by the camera 421, the device 416 automatically reposition the second security sign 406 so that it is arranged under the first security sign 405.
  • the camera 421 is integrated into the device 416.
  • the camera 421 is thus the camera of the mobile telephone.
  • the device comprises a locating system 418 of the position of the document 401 on the screen 417.
  • the locating system here comprises a plate 419 arranged on the device 416.
  • the plate 419 comprises for example means for snap-fastening to the device 416 in order to be able to be easily removable.
  • the plate 419 is here arranged at the end of the device 416 at the level of the camera 421, the plate 419 extending substantially perpendicular to the device 416.
  • the plate 419 also comprises a mirror 420 arranged at the top end of the plate 419 so as to overhang the camera 421.
  • the mirror 420 is arranged so that the measurement field of the camera 421 (centered on a sighting direction A) passes through said mirror 420 and is further arranged to reflect the screen 417 of the device 416 in the measurement field of the camera. In this way, the camera 421 can view the screen 417 via the mirror 420. From the images reflected on the mirror 420, the camera 421 transmits the corresponding images of the position of the document 401 on the screen 417 to the apparatus 416 which allows the apparatus 416 to determine the relative position of the first security sign 405 and to position the second security sign 406 accordingly.
  • the mirror 420 is here arranged so as to reflect the entire surface of the screen 417 in the measurement field of the camera.
  • the security assembly is shaped so that the different authentication marks can be studied only by reflection and without folding the object 501 carrying the security assembly.
  • the two security signs are printed directly on top of each other in inks having both at least one common absorption / excitation wavelength and at least one wavelength. absorption / excitation different from that of the other ink.
  • the third authentication mark is revealed when one illuminates the set of two security signs in the domain of their common absorption / excitation wavelength.
  • the first safety sign is printed using ink visible in daylight and under infrared excitation for a wavelength around 800 nanometers.
  • the second safety sign is printed using ink visible in daylight and under infrared excitation for a wavelength around 900 nanometers.
  • the two signs are printed on top of each other either directly on object 501 or on a element attached to the object 501. The two signs are thus arranged on the same zone of the object 501.
  • the object 501 is illuminated under infrared lighting centered on the wavelength of 800 nanometers, only the first security sign will react so as to reveal the first authentication mark 507 (here a cross surrounded by a circle) which is therefore visible in reflection.
  • the two security signs will react so as to reveal, by superimposing the two security signs, the third authentication mark 509 (here a heart) which is therefore also visible in reflection.
  • the first authentication mark 507, the second authentication mark 508 or the third authentication mark 509 appear.
  • the third authentication mark 509 turns out to be particularly difficult to reproduce since it only exists by the superposition of the two security signs and cannot thus be linked to any security sign taken in isolation.
  • the assembly according to the invention is carried by the same document or by a document and a device provided with a screen, this is not limiting and the assembly according to the invention may be carried by any other manner.
  • the assembly according to the invention may be carried in part or in whole by an object other than a document such as for example a token or a coin.
  • the assembly according to the invention may be carried in part by a first object and in part by another second object attached to the first to reveal at least a third authentication mark.
  • the second object is a polarizing filter.
  • the security signs are printed directly on the support carrying them, the security signs can be formed directly on a dedicated base which is then itself attached to the support.
  • the base could be a wire carrying at least one of the security signs, the security sign being inserted on the base before or after the arrangement of the base on the support.
  • One or more security signs will then be arranged in the support instead of being on one of the main faces of the support as has been described.
  • the security sign will for example be inserted into the support at the level of a window formed in the support so that the wire is accessible from both sides of the support.
  • the wire will then be shaped to allow a study in reflection and / or a study in transmission of said wire.
  • the wire could be in a multilayer film with interference effects such as that described in the patent application. FR 3 011 508 of the present plaintiff.
  • the base could be a patch, a film strip such as a polymer film, etc. bearing at least one of the security signs, the security sign being inserted on the base before or after the arrangement of the base on the support.
  • the base may cover or fill a hole formed in the support in order to form a window so that the security sign is then accessible from both sides of the support.
  • the base will then preferably, although not exclusively, be shaped to allow a study in reflection and / or in transmission of said sign.
  • At least one of the security signs can be arranged in a way on the support and at least one other of the security signs can be arranged in another way on the support: we can thus have a security sign. arranged on a wire and a security sign arranged on a patch.
  • the inks used here are inks visible in daylight, the inks used may in addition or as a replacement be inks visible under other wavelengths, typically under infra-red or ultraviolet. It will be preferred that the inks be visible in daylight when it is desired that an average user can easily detect a counterfeit or on the contrary that the inks are invisible in daylight to complicate a fraudulent reproduction of the whole. of security.
  • the inks may be invisible in daylight and visible under ultraviolet or infrared excitation.
  • the inks may be visible in daylight and fluorescent under ultraviolet or infrared excitation. It is also possible to use inks which re-emit different colors on a first face of the support and on the second face of the support: in this way when will superimpose two security signs, the third authentication mark will appear in a panel of colors comprising the first color of the first authentication mark, the second color of the second authentication mark and in a third color resulting from the combination of said two colors to further complicate a fraudulent reproduction of the whole of the invention.
  • the security signs are printed here, the security signs can be formed in a different way on the support or a base attached to the support such as for example by embossing, by metallization, by demetallization, etc.
  • the authentication marks may be different.
  • At least one of the authentication marks may thus comprise an authentication code of the medium or of the object carrying it, such as for example a one-dimensional bar code, a two-dimensional bar code, a serial number, a Sealgn code. @ture (registered trademark) ...
  • at least the authentication mark revealed by superimposing the various security signs will include such an authentication code.
  • the security assembly was made from images broken down into a mask / encrypted image / revealed image whose pixels were 2 * 2 matrices
  • said matrices could be of different size. , for example 2 * 3 or 3 * 2, in particular although not exclusively to create different levels of contrast or to allow superimposition more safety signs.
  • the matrices may also have shapes other than square or rectangular matrices and be for example circular or hexagonal in order to reinforce the difficulty of fraudulent reproduction.
  • the authentication marks are visible and controllable with the naked eye, it could be otherwise. Ultraviolet or infrared lighting may thus be needed to study at least one authentication mark or even a polarizing filter (linear or circular).
  • the device equipped with a screen may include and / or be associated with other sensors than a camera to estimate the position of the object on the screen.
  • the screen is touch-sensitive, it could be directly the touch sensors of the screen which will make it possible to determine the relative position of the object on the screen.
  • the device may be different from a cell phone.
  • the device could for example be a computer, a touchscreen tablet and in general any equipment provided with a screen.
  • the senor is integrated into the device, the sensor can be external and deported from the device.
  • the sensor will then be connected to the device in a wired way (for example by USB cable) or in a non-wired way (for example by Bluetooth).
  • the tracking system may include a different number of mirrors.
  • the tracking system may include optical elements other than a mirror such as one or more optical fibers, one or more lenses, etc.
  • the screen could be used to improve the contrast of the third authentication mark and / or the second security sign.
  • the second security sign displayed on the screen is fixed, we can have as a variant a second security sign which is regularly modified on the screen so that with the same first security sign affixed to it, the third authentication mark also changes regularly (each time the second security sign is modified). We will thus have an evolution, a movement of the third authentication mark.
  • the device can be used to authenticate an object, the detection of a counterfeit can then come directly from the device thanks to the possible observation of the third authentication mark by the camera of the device or it can be left to the discretion of the device. the user who will visualize the effects produced.

Landscapes

  • Credit Cards Or The Like (AREA)
  • Collating Specific Patterns (AREA)
  • Air Bags (AREA)
  • Burglar Alarm Systems (AREA)
  • Magnetic Record Carriers (AREA)
  • Alarm Systems (AREA)

Claims (11)

  1. Satz aus N Sicherheitszeichen (5, 6; 105, 106, 110; 205, 206, 210; 305, 306; 405, 406), wobei jedes Sicherheitszeichen allein eine Authentifizierungsmarke bildet, die von denen, die von den anderen Sicherheitszeichen gebildet werden, verschieden ist, dadurch gekennzeichnet, dass die verschiedenen Sicherheitszeichen so ausgebildet sind, dass sie gemeinsam durch Überlagerung der N Sicherheitszeichen eine N+1 Authentifizierungsmarke (9; 112; 212; 309; 509) ohne Bezug zu den N anderen Authentifizierungsmarken bilden, die jeweils durch eines der N Sicherheitszeichen gebildet werden.
  2. Satz nach Anspruch 1, bei dem mindestens zwei Sicherheitszeichen von einem selben Objekt (5, 6; 105, 106, 110; 205, 206, 210; 305, 306) getragen werden.
  3. Satz nach Anspruch 2, bei dem mindestens eines der Sicherheitszeichen (5, 6; 105, 106; 205, 206) auf der ersten Hauptfläche des Objekts angeordnet ist und mindestens das andere der Sicherheitszeichen auf der zweiten Hauptfläche des Objekts angeordnet ist, wobei die beiden Zeichen in einem selben Abschnitt des Objekts angeordnet sind.
  4. Satz nach Anspruch 2 oder Anspruch 3, bei dem mindestens zwei Sicherheitszeichen (305, 306) auf einer selben Hauptfläche des Objekts angeordnet sind, wobei ein Falten des Objekts eine Überlagerung der beiden Sicherheitszeichen ermöglicht.
  5. Satz nach einem der vorhergehenden Ansprüche, bei dem N mindestens gleich drei ist.
  6. Satz nach Anspruch 5, bei dem die mindestens drei Sicherheitszeichen mit Hilfe von Druckfarben aufgedruckt werden, die mindestens eine Absorptions-/Anregungswellenlänge aufweisen, die den drei Sicherheitszeichen gemeinsam ist, wobei das dritte Sicherheitszeichen ferner in einer Druckfarbe ist, die mindestens eine Absorptions-/Anregungswellenlänge aufweist, die ihr eigen ist und bei der die beiden anderen Sicherheitszeichen nicht reagieren.
  7. Satz nach einem der vorhergehenden Ansprüche, bei dem mindestens eines der Sicherheitszeichen (406) auf einem Gerät (416) angezeigt wird, das mit einem Bildschirm (417) versehen ist, und mindestens ein weiteres der Sicherheitszeichen (405) von einem Objekt (401) getragen wird.
  8. Satz nach einem der vorhergehenden Ansprüche, bei dem mindestens eines der Sicherzeitzeichen, die von einem Objekt getragen werden, in einer Druckfarbe ist, die von denen des Rests des Objekts verschieden ist.
  9. Satz nach einem der vorhergehenden Ansprüche, bei dem mindestens eines der Sicherheitszeichen (5, 6; 105, 106, 110; 205, 206, 210; 305, 306; 405) in einer Druckfarbe ist, die bei Tageslicht sichtbar ist.
  10. Satz nach einem der vorhergehenden Ansprüche, bei dem mindestens ein erstes Sicherheitszeichen mit Hilfe einer Druckfarbe aufgedruckt ist, die eine erste Absorptions-/Anregungswellenlänge und eine zweite Absorptions-/Anregungswellenlänge aufweist, und mindestens ein zweites Sicherheitszeichen auf das mindestens eine erste Sicherheitszeichen in einer Druckfarbe aufgedruckt ist, die die erste Absorptions-/Anregungswellenlänge und eine dritte Absorptions-/Anregungswellenlänge aufweist, die von der zweiten Absorptions-/Anregungswellenlänge verschieden ist.
  11. Satz nach einem der vorhergehenden Ansprüche, bei dem das mindestens eine erste Sicherheitszeichen und das mindestens eine zweite Sicherheitszeichen mit Hilfe von Druckfarben aufgedruckt sind, die unterschiedliche Farben reemittieren, damit die dritte Authentifizierungsmarke in einer Farbpalette erscheint, die eine Farbe umfasst, die aus der Kombination der genannten Farben des mindestens einen ersten Sicherheitszeichens und des mindestens einen zweiten Sicherheitszeichens resultiert.
EP17808469.5A 2016-12-02 2017-12-04 Zwei sicherheitsmerkmale, die zusammen ein drittes sicherheitsmerkmal formen Active EP3548298B1 (de)

Priority Applications (1)

Application Number Priority Date Filing Date Title
PL17808469T PL3548298T3 (pl) 2016-12-02 2017-12-04 Dwa znaki zabezpieczające tworzące razem trzeci znak zabezpieczający

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
FR1661896A FR3059594B1 (fr) 2016-12-02 2016-12-02 Deux signes de securite formant conjointement un troisieme signe de securite
PCT/EP2017/081336 WO2018100203A1 (fr) 2016-12-02 2017-12-04 Deux signes de securite formant conjointement un troisieme signe de securite

Publications (2)

Publication Number Publication Date
EP3548298A1 EP3548298A1 (de) 2019-10-09
EP3548298B1 true EP3548298B1 (de) 2021-11-10

Family

ID=58737621

Family Applications (1)

Application Number Title Priority Date Filing Date
EP17808469.5A Active EP3548298B1 (de) 2016-12-02 2017-12-04 Zwei sicherheitsmerkmale, die zusammen ein drittes sicherheitsmerkmal formen

Country Status (8)

Country Link
EP (1) EP3548298B1 (de)
AU (1) AU2017367204B2 (de)
CA (1) CA3045099C (de)
FR (1) FR3059594B1 (de)
MX (1) MX2019006335A (de)
MY (1) MY195594A (de)
PL (1) PL3548298T3 (de)
WO (1) WO2018100203A1 (de)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP4019270A1 (de) * 2020-12-23 2022-06-29 Thales DIS France SA Sicherheitsanordnung und verfahren zur herstellung derselben

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2013138486A1 (en) 2012-03-13 2013-09-19 Graphic Security Systems Corporation Multi-image optical device
EP2170622B1 (de) 2007-07-19 2014-04-02 De La Rue International Limited Sicherheitsmerkmal und verfahren
EP2331345B1 (de) 2008-10-09 2015-02-25 Bundesdruckerei GmbH Sicherheitsmerkmal auf basis lumineszenz emittierender stoffe
EP2229287B1 (de) 2007-12-27 2015-03-04 Giesecke & Devrient GmbH Sicherheitsmerkmale mit gitter für hohe kippwinkel
WO2017144911A1 (en) 2016-02-26 2017-08-31 De La Rue International Limited Methods of manufacturing security devices

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR100855940B1 (ko) * 2006-10-14 2008-09-02 (주)삼원 경량화와 흡음성을 개선한 내장 흡음단열재 및 이의 제조 방법
FR2961622B1 (fr) * 2010-06-22 2013-02-08 Arjowiggins Security Procede d'authentification et/ou d'identification d'un article de securite.
DE102011117044B4 (de) * 2011-10-27 2019-05-29 Bundesdruckerei Gmbh Sicherheitselement
FR3011508B1 (fr) 2013-10-08 2021-05-28 Banque De France Document de securite comprenant un film a effets interferentiels, procede de determination de l'authenticite d'un tel document et dispositif pour la mise en œuvre d'un tel procede.
WO2015184556A1 (en) * 2014-06-06 2015-12-10 Orell Füssli Sicherheitsdruck Ag Manufacturing method for security device

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2170622B1 (de) 2007-07-19 2014-04-02 De La Rue International Limited Sicherheitsmerkmal und verfahren
EP2229287B1 (de) 2007-12-27 2015-03-04 Giesecke & Devrient GmbH Sicherheitsmerkmale mit gitter für hohe kippwinkel
EP2331345B1 (de) 2008-10-09 2015-02-25 Bundesdruckerei GmbH Sicherheitsmerkmal auf basis lumineszenz emittierender stoffe
WO2013138486A1 (en) 2012-03-13 2013-09-19 Graphic Security Systems Corporation Multi-image optical device
WO2017144911A1 (en) 2016-02-26 2017-08-31 De La Rue International Limited Methods of manufacturing security devices

Also Published As

Publication number Publication date
PL3548298T3 (pl) 2022-03-28
CA3045099C (fr) 2021-10-26
EP3548298A1 (de) 2019-10-09
AU2017367204A1 (en) 2019-06-13
AU2017367204B2 (en) 2020-05-21
CA3045099A1 (fr) 2018-06-07
WO2018100203A1 (fr) 2018-06-07
MY195594A (en) 2023-02-02
MX2019006335A (es) 2019-09-26
FR3059594A1 (fr) 2018-06-08
FR3059594B1 (fr) 2021-05-28

Similar Documents

Publication Publication Date Title
EP2367695B1 (de) Sicherheitsdokument mit mindestens einem kombinierten bild und einem enthüllungsmittel sowie zugehoeriges verfahren
WO2012136902A1 (fr) Code-barres de sécurité
EP3380987B1 (de) Verfahren zur authentifizierung und/oder überprüfung der integrität einer person
EP2275279B1 (de) Sicherheitsdokument und verfahren zu dessen überprüfung
WO2017114801A1 (fr) Article securise comportant une image combinee et/ou une trame de revelation
EP3397502B1 (de) Sicherer artikel mit einem kombinierten bild und/oder einem aufdeckungsbildschirm
EP3548298B1 (de) Zwei sicherheitsmerkmale, die zusammen ein drittes sicherheitsmerkmal formen
EP3390064B1 (de) Sicherheitselement mit verborgener information
EP2637875A1 (de) Optisch variable sicherheitsvorrichtung für wertdokumente
OA19095A (fr) Deux signes de sécurité formant conjointement un troisième signe de sécurité.
FR3011508A1 (fr) Document de securite comprenant un film a effets interferentiels, procede de determination de l'authenticite d'un tel document et dispositif pour la mise en œuvre d'un tel procede.
EP3397500B1 (de) Sicherer artikel mit enthüllendem schirm und kombiniertem bild
WO2018100200A1 (fr) Repositionnement d'une image sur l'ecran d'un appareil
CA2726968C (fr) Document fiduciaire ou assimile comportant des motifs sous forme d'a-plats ainsi qu'une impression en taille douce, et son procede de fabrication
FR3078015A1 (fr) Intégration de motif de micro-imagerie
FR2973910A1 (fr) Procede et dispositif d'authentification a reflets
FR3069482B1 (fr) Procede de gravure laser d'images multiples dans un document de securite
WO2022263772A1 (fr) Formation d'une image 3d a partir d'une structure lenticulaire
FR3120567A1 (fr) Article de sécurité ou ensemble d’un article de sécurité et d’un autre objet comportant une première et une deuxième trame
WO2020119986A1 (fr) Document de sécurité intégrant un motif de contrôle
FR2976381A3 (fr) Procede et dispositif a codes barres 3d
FR3044451A3 (fr) Procede d'authentification par motif de glass
FR2986353A3 (fr) Code optique securise
FR2979733A3 (fr) Code optique securise

Legal Events

Date Code Title Description
STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: UNKNOWN

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: THE INTERNATIONAL PUBLICATION HAS BEEN MADE

PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text: ORIGINAL CODE: 0009012

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: REQUEST FOR EXAMINATION WAS MADE

17P Request for examination filed

Effective date: 20190524

AK Designated contracting states

Kind code of ref document: A1

Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR

AX Request for extension of the european patent

Extension state: BA ME

DAV Request for validation of the european patent (deleted)
DAX Request for extension of the european patent (deleted)
STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: EXAMINATION IS IN PROGRESS

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: EXAMINATION IS IN PROGRESS

17Q First examination report despatched

Effective date: 20201124

GRAP Despatch of communication of intention to grant a patent

Free format text: ORIGINAL CODE: EPIDOSNIGR1

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: GRANT OF PATENT IS INTENDED

INTG Intention to grant announced

Effective date: 20210708

GRAS Grant fee paid

Free format text: ORIGINAL CODE: EPIDOSNIGR3

GRAA (expected) grant

Free format text: ORIGINAL CODE: 0009210

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: THE PATENT HAS BEEN GRANTED

AK Designated contracting states

Kind code of ref document: B1

Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR

REG Reference to a national code

Ref country code: GB

Ref legal event code: FG4D

Free format text: NOT ENGLISH

REG Reference to a national code

Ref country code: AT

Ref legal event code: REF

Ref document number: 1445734

Country of ref document: AT

Kind code of ref document: T

Effective date: 20211115

Ref country code: CH

Ref legal event code: EP

REG Reference to a national code

Ref country code: DE

Ref legal event code: R096

Ref document number: 602017049184

Country of ref document: DE

REG Reference to a national code

Ref country code: IE

Ref legal event code: FG4D

Free format text: LANGUAGE OF EP DOCUMENT: FRENCH

REG Reference to a national code

Ref country code: LT

Ref legal event code: MG9D

REG Reference to a national code

Ref country code: NL

Ref legal event code: MP

Effective date: 20211110

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: RS

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20211110

Ref country code: LT

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20211110

Ref country code: FI

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20211110

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: IS

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20220310

Ref country code: SE

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20211110

Ref country code: PT

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20220310

Ref country code: NO

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20220210

Ref country code: NL

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20211110

Ref country code: LV

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20211110

Ref country code: HR

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20211110

Ref country code: GR

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20220211

Ref country code: ES

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20211110

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: SM

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20211110

Ref country code: SK

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20211110

Ref country code: RO

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20211110

Ref country code: EE

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20211110

Ref country code: DK

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20211110

Ref country code: CZ

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20211110

REG Reference to a national code

Ref country code: DE

Ref legal event code: R026

Ref document number: 602017049184

Country of ref document: DE

PLBI Opposition filed

Free format text: ORIGINAL CODE: 0009260

PLAX Notice of opposition and request to file observation + time limit sent

Free format text: ORIGINAL CODE: EPIDOSNOBS2

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: MC

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20211110

26 Opposition filed

Opponent name: DE LA RUE INTERNATIONAL LIMITED

Effective date: 20220810

REG Reference to a national code

Ref country code: BE

Ref legal event code: MM

Effective date: 20211231

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: LU

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20211204

Ref country code: IE

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20211204

Ref country code: AL

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20211110

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: SI

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20211110

Ref country code: BE

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20211231

PLBB Reply of patent proprietor to notice(s) of opposition received

Free format text: ORIGINAL CODE: EPIDOSNOBS3

REG Reference to a national code

Ref country code: AT

Ref legal event code: UEP

Ref document number: 1445734

Country of ref document: AT

Kind code of ref document: T

Effective date: 20211110

P01 Opt-out of the competence of the unified patent court (upc) registered

Effective date: 20230522

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: CY

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20211110

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: HU

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT; INVALID AB INITIO

Effective date: 20171204

PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code: GB

Payment date: 20231220

Year of fee payment: 7

PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code: MT

Payment date: 20231124

Year of fee payment: 7

Ref country code: IT

Payment date: 20231228

Year of fee payment: 7

Ref country code: FR

Payment date: 20231222

Year of fee payment: 7

Ref country code: DE

Payment date: 20231214

Year of fee payment: 7

Ref country code: BG

Payment date: 20231221

Year of fee payment: 7

Ref country code: AT

Payment date: 20231221

Year of fee payment: 7

PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code: PL

Payment date: 20231124

Year of fee payment: 7

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: MK

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20211110

PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code: CH

Payment date: 20240101

Year of fee payment: 7