WO2018100203A1 - Deux signes de securite formant conjointement un troisieme signe de securite - Google Patents

Deux signes de securite formant conjointement un troisieme signe de securite Download PDF

Info

Publication number
WO2018100203A1
WO2018100203A1 PCT/EP2017/081336 EP2017081336W WO2018100203A1 WO 2018100203 A1 WO2018100203 A1 WO 2018100203A1 EP 2017081336 W EP2017081336 W EP 2017081336W WO 2018100203 A1 WO2018100203 A1 WO 2018100203A1
Authority
WO
WIPO (PCT)
Prior art keywords
security
signs
sign
authentication
authentication mark
Prior art date
Application number
PCT/EP2017/081336
Other languages
English (en)
French (fr)
Inventor
Frédéric Beauchet
Michel Blanc
Original Assignee
Banque De France
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Family has litigation
First worldwide family litigation filed litigation Critical https://patents.darts-ip.com/?family=58737621&utm_source=***_patent&utm_medium=platform_link&utm_campaign=public_patent_search&patent=WO2018100203(A1) "Global patent litigation dataset” by Darts-ip is licensed under a Creative Commons Attribution 4.0 International License.
Application filed by Banque De France filed Critical Banque De France
Priority to MX2019006335A priority Critical patent/MX2019006335A/es
Priority to AU2017367204A priority patent/AU2017367204B2/en
Priority to PL17808469T priority patent/PL3548298T3/pl
Priority to MYPI2019003127A priority patent/MY195594A/en
Priority to CA3045099A priority patent/CA3045099C/fr
Priority to EP17808469.5A priority patent/EP3548298B1/de
Publication of WO2018100203A1 publication Critical patent/WO2018100203A1/fr

Links

Classifications

    • BPERFORMING OPERATIONS; TRANSPORTING
    • B42BOOKBINDING; ALBUMS; FILES; SPECIAL PRINTED MATTER
    • B42DBOOKS; BOOK COVERS; LOOSE LEAVES; PRINTED MATTER CHARACTERISED BY IDENTIFICATION OR SECURITY FEATURES; PRINTED MATTER OF SPECIAL FORMAT OR STYLE NOT OTHERWISE PROVIDED FOR; DEVICES FOR USE THEREWITH AND NOT OTHERWISE PROVIDED FOR; MOVABLE-STRIP WRITING OR READING APPARATUS
    • B42D25/00Information-bearing cards or sheet-like structures characterised by identification or security features; Manufacture thereof
    • B42D25/20Information-bearing cards or sheet-like structures characterised by identification or security features; Manufacture thereof characterised by a particular use or purpose
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B42BOOKBINDING; ALBUMS; FILES; SPECIAL PRINTED MATTER
    • B42DBOOKS; BOOK COVERS; LOOSE LEAVES; PRINTED MATTER CHARACTERISED BY IDENTIFICATION OR SECURITY FEATURES; PRINTED MATTER OF SPECIAL FORMAT OR STYLE NOT OTHERWISE PROVIDED FOR; DEVICES FOR USE THEREWITH AND NOT OTHERWISE PROVIDED FOR; MOVABLE-STRIP WRITING OR READING APPARATUS
    • B42D25/00Information-bearing cards or sheet-like structures characterised by identification or security features; Manufacture thereof
    • B42D25/30Identification or security features, e.g. for preventing forgery
    • B42D25/36Identification or security features, e.g. for preventing forgery comprising special materials
    • B42D25/373Metallic materials
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B42BOOKBINDING; ALBUMS; FILES; SPECIAL PRINTED MATTER
    • B42DBOOKS; BOOK COVERS; LOOSE LEAVES; PRINTED MATTER CHARACTERISED BY IDENTIFICATION OR SECURITY FEATURES; PRINTED MATTER OF SPECIAL FORMAT OR STYLE NOT OTHERWISE PROVIDED FOR; DEVICES FOR USE THEREWITH AND NOT OTHERWISE PROVIDED FOR; MOVABLE-STRIP WRITING OR READING APPARATUS
    • B42D25/00Information-bearing cards or sheet-like structures characterised by identification or security features; Manufacture thereof
    • B42D25/30Identification or security features, e.g. for preventing forgery
    • B42D25/36Identification or security features, e.g. for preventing forgery comprising special materials
    • B42D25/378Special inks
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B42BOOKBINDING; ALBUMS; FILES; SPECIAL PRINTED MATTER
    • B42DBOOKS; BOOK COVERS; LOOSE LEAVES; PRINTED MATTER CHARACTERISED BY IDENTIFICATION OR SECURITY FEATURES; PRINTED MATTER OF SPECIAL FORMAT OR STYLE NOT OTHERWISE PROVIDED FOR; DEVICES FOR USE THEREWITH AND NOT OTHERWISE PROVIDED FOR; MOVABLE-STRIP WRITING OR READING APPARATUS
    • B42D25/00Information-bearing cards or sheet-like structures characterised by identification or security features; Manufacture thereof
    • B42D25/30Identification or security features, e.g. for preventing forgery
    • B42D25/36Identification or security features, e.g. for preventing forgery comprising special materials
    • B42D25/378Special inks
    • B42D25/382Special inks absorbing or reflecting infrared light
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B42BOOKBINDING; ALBUMS; FILES; SPECIAL PRINTED MATTER
    • B42DBOOKS; BOOK COVERS; LOOSE LEAVES; PRINTED MATTER CHARACTERISED BY IDENTIFICATION OR SECURITY FEATURES; PRINTED MATTER OF SPECIAL FORMAT OR STYLE NOT OTHERWISE PROVIDED FOR; DEVICES FOR USE THEREWITH AND NOT OTHERWISE PROVIDED FOR; MOVABLE-STRIP WRITING OR READING APPARATUS
    • B42D25/00Information-bearing cards or sheet-like structures characterised by identification or security features; Manufacture thereof
    • B42D25/30Identification or security features, e.g. for preventing forgery
    • B42D25/36Identification or security features, e.g. for preventing forgery comprising special materials
    • B42D25/378Special inks
    • B42D25/387Special inks absorbing or reflecting ultraviolet light

Definitions

  • the invention relates to a set of at least two safety signs.
  • the invention relates in particular, although not exclusively, to a set of two security signs to protect a security document such as a banknote or an identity document or a bank card.
  • An object of the invention is to provide a set of security signs further complicating fraudulent reproduction of these security signs.
  • the invention proposes a set of N security signs, N being at least two, each security sign forming only an authentication mark different from those formed by the other signs of security. security, the various security signs being designed to form jointly N superimposed security signs, an N + l - th authentication mark unrelated to the other N authentication marks each formed respectively by one of the N signs of security.
  • the N + 1 - th authentication mark is different from a simple combination of the other authentication marks such as a juxtaposition, a filling, a complement of the other authentication marks between them.
  • N + 1-th authentication mark exists only by the superposition of the various security signs and is therefore not related to any tangible element which makes it all the more difficult to reproduce.
  • the set comprises at least two security signs, a first security sign forming only a first authentication mark and a second security sign forming only a second authentication mark, different from the first mark of security.
  • authentication the two security signs being conformed to form jointly by superimposing at least the two security signs, a third authentication mark unrelated to the first authentication mark and the second authentication mark.
  • each authentication mark forms only a locatable image having a full meaning.
  • the authentication mark can thus be an alphanumeric sign, a drawing, a geometrical figure, a bar code ...
  • At least two security signs are carried by the same object.
  • At least one of the security signs is arranged on the first main face of the object and at least one of the other security signs is arranged on the second main face of the object, the two signs being arranged in the same portion of the object.
  • At least two of the security signs are arranged on the same main face of the object, a folding of the object allowing a superposition of the two security signs.
  • N is at least three.
  • the at least three security signs are printed using inks having at least one absorption / excitation wavelength common to the three security signs, the third sign being further in an ink exhibiting at least one absorption / excitation wavelength of its own and to which the other two safety signs do not react.
  • At least one of the security signs is displayed on a device with a screen and at least one other security element is carried by an object.
  • At least one of the security signs carried by the object is in an ink different from those of the rest of the object.
  • At least one of the security signs is in an ink visible in the light of day.
  • at least one first security sign is printed using an ink comprising a first absorption / excitation wavelength and a second absorption / excitation wavelength
  • at least one second security sign is printed on the at least one first security sign in an ink comprising the first absorption / excitation wavelength and a third absorption / excitation wavelength different from the second wavelength absorption / excitation.
  • the at least one first security sign and the at least one second security sign are printed with inks reissuing different colors so that the N + 1-th authentication mark appears in a panel color scheme comprising a color resulting from the combination of said colors of the at least one first security sign and the at least one second security sign.
  • FIG. 1 is a very schematic sectional view of a document comprising an assembly according to a first embodiment of the invention
  • FIG. 2 is a view from above of the document illustrated in FIG. 1 and studied by reflection
  • FIG. 3 is a view from below of the document illustrated in FIG. 1 and studied by reflection
  • FIG. 4 is a view from above or from below of the document illustrated in FIG. 1 and studied by transmission
  • FIG. 5 is a very schematic sectional view of a document comprising an assembly according to a second embodiment of the invention as well as a representation of the various security signs studied in reflection and in transmission,
  • FIG. 6 is a very schematic sectional view of a document comprising an assembly according to a third embodiment of the invention as well as a representation of the various security signs studied in reflection and in transmission,
  • FIG. 7 is a very diagrammatic view from above of a document comprising an assembly according to a fourth embodiment of the invention before and after folding of the document,
  • FIG. 8 is a very diagrammatic view of a document and a device provided with a screen comprising an assembly according to a fifth embodiment of the invention
  • FIGS. 9a to 9c are very schematic views from above of an object comprising an assembly according to a sixth embodiment of the invention according to different lighting of the object.
  • a document 1 such as a security document (banknote, identity card, passport, bank card, etc.) or a document another type of document (lottery ticket (7) comprises a support 2 carrying a security assembly according to the first embodiment of the invention.
  • a security document banknote, identity card, passport, bank card, etc.
  • a document another type of document lottery ticket
  • the same document 1 carries the security assembly and thus here two security signs.
  • the support 2 is shaped so that a first main face 3 of the support 2 carries the first safety sign 5 and so that the second main face 4, opposite the first main face 3, bears the second sign 6.
  • the two security signs 5, 6 are here arranged to be located in the same area of the support 2. Thus, the two security signs 5, 6 are naturally superimposed on each other (well only separated by the thickness of the support 2).
  • the support 2 is here shaped to allow both a study in reflection of the two main faces 3, 4 and at the same time a study in transmission of each of said faces.
  • a support 2 like that used in the banknotes is for example appropriate.
  • the support 2 is for example paper or polymeric material.
  • the support 2 is adapted to be more transparent than in the rest of the support 2 to further improve the transmission study.
  • a zone can be made more mechanically transparent by locally reducing the thickness of the support 2 (by a watermark technique, by calendering, etc.) or chemically by means of a varnish, a ink or solution at the time of forming the support 2 or once the support 2 created.
  • the print density of the inks can be adapted so that one of the faces of the document 7 is darker than the other. In this way, this makes it possible to observe with identical or almost identical the least dark face, in reflection the sign carried by said face and in transmission the sign carried by the darkest face.
  • the security signs 5, 6 are printed in inks having a high contrast with those used for the rest of the support 2 to facilitate the study in reflection, said inks being otherwise relatively opaque to facilitate the study in transmission. Inks are here inks visible in the light of day.
  • the first authentication mark 7 formed by the first security sign 5 is clearly visible.
  • the second authentication mark 8 formed by the second security sign 6 is also clearly visible.
  • the second authentication mark 8 has a word (Einstein).
  • the third authentication mark 9 is particularly difficult to reproduce because it exists only by the superposition of the two security signs 5, 6 and can not be connected to any security sign 5, 6 taken isolation.
  • the third authentication mark 9 is here a drawing (schematizing electrons gravitating around a nucleus).
  • the security package is based on the following general principle.
  • the security assembly is here manufactured as follows.
  • the three images II, 12, 13 which will correspond to the final respectively to the first authentication mark 7, the second authentication mark 8 and the third authentication mark 9.
  • the images I1, 12, 13 each have a meaning but the three images II, 12, 13 have no relation to each other.
  • the images I1, 12, 13 are all of identical size, each pixel of each image being either black or white.
  • the images I1, 12, 13 thus have a high contrast and there is a 100% contrast between the black and white pixels of these images.
  • the images I1, 12, 13 are then processed in the following manner.
  • the first image II is broken down into a mask M1, each pixel of which in fact forms a matrix of size 2 * 2.
  • the mask M1 is not the same size as the first image II.
  • a so-called white pixel is created in the mask M1, that is to say a pixel whose matrix comprises two white zones and two black zones.
  • a so-called white pixel in the mask M1 is composed of 50% white areas.
  • the distribution of the black and white areas in the pixel is performed randomly.
  • a so-called white pixel in the mask M1 is therefore randomly chosen from the following possibilities:
  • a so-called black pixel is created in the mask M1, ie a pixel comprising a white zone and three black zones.
  • a pixel said black in the mask M1 is composed of 75% black areas.
  • the distribution of the black and white areas in the pixel is performed randomly.
  • a black pixel in the mask M1 is therefore randomly selected from the following possibilities:
  • a mask M1 is obtained, since it is randomly constructed at its pixels, which however forms the first authentication mark 7, that is to say an image that can be identified in itself, since the pixels of the matrix M1 are defined from image II.
  • the first authentication mark 7 is identical to the image II but has just a lower contrast than the image II since the pixels Ml mask blanks are 50% white, and the black M M pixels are 75% black.
  • the second image 12 is broken down into an encrypted image C2, each pixel of which in fact forms a matrix of size 2 * 2.
  • the second image 12 and the encrypted image C2 therefore do not have the same size.
  • a so-called white pixel in the encrypted image C2 is a pixel comprising two white zones and two black zones so that a so-called white pixel in the encrypted image C2 is composed at 50% white areas.
  • a so-called black pixel in the encrypted image C2 it is a pixel comprising three zones black and a white area is a pixel composed of 75% black areas.
  • the distribution of the black and white areas within each pixel of the encrypted image C2 is not chosen randomly.
  • the encrypted image C2 must first correspond to the second image 12 to form the second authentication mark 8 (here the word Einstein). In this way, if a pixel is black in the second image 12, the corresponding pixel of the encrypted image C2 must also be a so-called black pixel and if a pixel is white in the second image 12, the corresponding pixel in the image encrypted C2 must also be a so-called white pixel.
  • the encrypted image C2 must also be shaped so that the superposition of the mask M1 and the encrypted image C2 forms the third authentication mark 9 linked to the third image 13.
  • the third authentication mark 9 corresponds here to the unveiled image D3.
  • the unveiled image D3 is such that each pixel actually forms a matrix of size 2 * 2.
  • a so-called white pixel in the unveiled image D3 is a pixel comprising a white zone and three black zones so that a so-called white pixel in the unveiled image D3 is composed of 75% black areas.
  • a pixel said to be black in the unveiled image D3 it is a pixel comprising four black zones, ie a pixel composed of 100% black areas.
  • the superposition of the mask M1 and the encrypted image C2 corresponds to the logical operator "or” that is to say that: for a superimposed black and white pixel of the mask M1 and the encrypted image C2 (or vice versa), the corresponding pixel of the unveiled image D3 will be black,
  • the corresponding pixel of the unveiled image D3 will be black
  • the corresponding pixel of the unveiled image D3 will be white.
  • the encrypted image C2 must therefore be constructed according to the following rules:
  • the encrypted image C2 which forms the second authentication mark that is to say an image that is identifiable in itself, is thus constructed, since the pixels of the encrypted image C2 are defined from the image 12
  • the encrypted image C2 forming the second authentication mark is identical to the image 12 but just has a lower contrast than the image 12 since the so-called white pixels of the encrypted image C2 are formed at 50. % of white areas and so-called black pixels of the encrypted image C2 are formed at 75% of black areas.
  • the unveiled image S3 which is also the third authentication mark 9, is identical to the image 13 but only has a less significant contrast than the image 13 since the white pixels of the unveiled image D3 are formed at 25% of white areas and the black pixels of the unveiled image D3 are formed at 100% black areas.
  • the images represented in the various figures of the present application are diagrammatic since they do not represent (for questions of visibility) the less important contrast of the mask M1 and the encrypted image C2 vis-à-vis the initial images , or the less important contrast of the unveiled image S3 with the corresponding initial image on the one hand or with the mask M1 and the encrypted image C2 on the other hand.
  • the second embodiment is here identical to the first embodiment, with the difference that the security assembly comprises a third security sign 110 arranged inside the support 102.
  • the support 102 is shaped so that the third security sign 110 is arranged in the same area of the support 102 as the other two security signs 105, 106.
  • the three security signs 105, 106, 110 are naturally superimposed (but not contiguous by the thickness of the support).
  • the signs are arranged so that at least two of the three signs are contiguous (for example by making two separate films each carrying a security sign and by subsequent joining of said films).
  • the third security sign 110 is here shaped to form a fourth authentication mark 111 in reflection (for example an apple) unrelated to the first authentication mark 107, the second authentication mark 108 and the third mark of authentication.
  • the second authentication mark 108 formed by the second security sign 106 is also clearly visible.
  • the three security signs 105, 106, 110 are visible by superposition. Because of their superposition, the three security signs 105, 106, 110 then draw a fifth authentication mark 112 (here a star) unrelated to the first authentication mark 107, the second authentication mark 108, the third authentication mark 109 and the fourth authentication mark 111.
  • a fifth authentication mark 112 here a star
  • the fifth authentication mark 112 proves particularly difficult to reproduce since it exists only by the superposition of the three signs of security and can not be linked to any security sign taken in isolation.
  • the mask / image encrypted / unveiled image principle is applied to the first authentication mark 107, to the second authentication mark 108 and to the fifth authentication mark 112 but via three safety signs 105, 106, 110.
  • a person attempts to copy the document by scanner, it will scan both sides of the ticket and thus scan the authentication marks 107, 108 but without being able to scan the fourth authentication mark 111 which is inaccessible.
  • the fraudulent document when we look by transmission at the level of the reproduction of the authentication marks 107, 108, we will see the symbol "false" indicating that the ticket has been reproduced fraudulently.
  • the three security signs 105, 106, 110 are printed in inks having at least one absorption / excitation wavelength common to the three security signs.
  • the third security sign 111 is also printed in inks also having at least one absorption / excitation wavelength different from those of the two other security signs.
  • the three security signs 105, 106, 110 are all visible in daylight and the third security sign 110 is furthermore the only one to be visible in infrared light.
  • the third authentication mark 109 may thus not exist.
  • the superposition of the first authentication mark 107 and the second authentication mark 108 then gives no authentication mark (whether interpretable or not). However, this is not a problem for obtaining the fifth authentication mark 112.
  • the third security sign 110 is shaped so that the fourth authentication mark 111 is related to the third authentication mark 109 which is formed by the superposition of the first security sign 105 and the second security sign. 106.
  • the third embodiment is here identical to the second embodiment, with the difference that the fourth authentication mark 213 is not interpretable without any figurative sign.
  • the first security sign 205 and the second security sign 206 are also conformed so that the superposition of these only two security signs 205, 206 does not form a third interpretable authentication mark.
  • the superimposition of the first security sign 205 and the second security sign 206 thus form a third non-interpretable authentication mark 214 without any figurative sign (for questions of visibility the marks of authentication 213 and 214 are represented by a white square but are actually formed by a point cloud forming a more opaque area than is shown).
  • the three security signs 205, 206, 210 are always shaped to form together by superposition a fifth authentication mark 212 unrelated to the first authentication mark 207, the second authentication mark 208, the fourth mark of authentication 213 and here the third authentication mark 214.
  • the second authentication mark 208 formed by the second security sign 206 is also clearly visible (here the electrons gravitating around the core).
  • the three security signs 205, 206, 210 are visible by superposition. Because of their superposition, the three security signs 205, 206, 210 then draw the fifth authentication mark 212 (here a star) unrelated to the first authentication mark 207, the second authentication mark 208, the fourth authentication mark 213 and also irrelevant here with the third authentication mark 214.
  • the principle mask / image encrypted / unveiled image is applied to the first authentication mark 207, the second authentication mark 208 and the fifth authentication mark 212 but through three safety signs 205, 206, 210.
  • the third authentication mark 214 may not exist.
  • the superposition of the first authentication mark 207 and the second authentication mark 208 then gives no authentication mark (whether interpretable or not). However, this is not a problem for obtaining the fifth authentication mark 212.
  • This embodiment is identical to the first embodiment except that the second security sign 308 is arranged in a window 315 formed in the support 302 so that the second security sign 308 is visible on both sides of the support 302. by reflection.
  • the window 315 is arranged in another area of the support 302 than the one where the first security sign 305 is located.
  • the first authentication mark 307 formed by the first security sign 305 is clearly visible (here the sign @). Furthermore, the second authentication mark 308 formed by the second security sign 306 is also visible (here a gear). If we observe the second main face in reflection, the second authentication mark 308 formed by the second security sign 306 is also visible because of the window 315. The first authentication mark 307 is however not visible. by reflection.
  • the third authentication mark 309 (and possibly the fourth authentication mark) is particularly difficult to reproduce since it only exists by superimposing the two security signs 305, 306 and can not be connected to any security sign 305, 306 taken alone.
  • the set of security signs was carried by the same document
  • the first security sign 405 is still carried by the document 401 but the second security sign 406 is displayed on the screen 417 of a device 416.
  • the device 416 is here a mobile phone.
  • the first authentication mark 407 formed by the first security sign 405 is clearly visible (here the sign €).
  • the second authentication mark 408 formed by the second security sign 406 is also visible (here a star).
  • the apparatus 416 is part of an overlay device including a camera 421 connected to the apparatus 416 for measuring the relative position of the document 401 on the screen 417. From the data provided by the camera 421, the apparatus 416 automatically repositions the second security sign 406 to be arranged under the first security sign 405.
  • the camera 421 is integrated in the camera 416. The camera 421 is thus the camera of the mobile phone.
  • the device comprises a tracking system 418 of the position of the document 401 on the screen 417.
  • the tracking system here comprises a plate 419 arranged on the apparatus 416.
  • the plate 419 comprises for example snap means 416 device to be easily removable.
  • the plate 419 is here arranged at the end of the camera 416 at the camera 421, the plate 419 extending substantially perpendicular to the apparatus 416.
  • the plate 419 further includes a mirror 420 arranged at the upper end of the plate 419 so as to overlie the camera 421.
  • the mirror 420 is arranged so that the measurement field of the camera 421 (centered on a viewing direction A) passes through said mirror 420 and is further arranged to reflect the screen 417 of the apparatus 416 in the measurement field of the camera. In this way, the camera 421 can view the screen 417 via the mirror 420. From the images reflected on the mirror 420, the camera 421 transmits the corresponding images of the position of the document 401 on the screen 417 to the apparatus 416 which allows the apparatus 416 to determine the relative position of the first security sign 405 and to position the second security sign 406 accordingly.
  • the mirror 420 is here arranged to reflect the entire surface of the screen 417 in the measurement field of the camera.
  • the third authentication mark is particularly difficult to reproduce since it exists only by the superposition of the two security signs 405, 406 and can not be connected to any security sign 405, 406 taken in isolation.
  • the security assembly is shaped so that the different authentication marks are studied only by reflection and without folding of the object 501 carrying the security assembly.
  • the two security signs are directly printed on each other in inks having both at least one common absorption / excitation wavelength and at least one wavelength. absorption / excitation different from that of the other ink. In this way, the third authentication mark is revealed when all the two security signs are illuminated in the field of their common absorption / excitation wavelength.
  • the first safety sign is printed using a visible ink in daylight and under infra-red excitation for a wavelength around 800 nanometers.
  • the second security sign is printed using a visible ink in daylight and under infra-red excitation for a wavelength around 900 nanometers.
  • the two signs are printed on each other either directly on the object 501 or on a element reported on the object 501. The two signs are found and arranged on the same area of the object 501.
  • the object 501 is illuminated under an infrared illumination centered on the wavelength of 800 nanometers, only the first security sign will react so as to reveal the first authentication mark 507 ( here a cross surrounded by a circle) which is visible in reflection.
  • the object 501 is illuminated under infrared illumination centered on the wavelength of 900 nanometers, only the second security sign will react so as to reveal the second authentication mark 508 ( here a star) which is visible in reflection.
  • the object 501 is illuminated in the visible, the two security signs will react so as to show, by superposition of the two security signs, the third authentication mark 509 (here a heart) which is therefore also visible in reflection.
  • the third authentication mark 509 here a heart
  • the first authentication mark 507, the second authentication mark 508 or the third authentication mark 509 appear.
  • the third authentication mark 509 is particularly difficult to reproduce since it exists only by the superposition of the two security signs and can not be connected to any security sign alone.
  • the assembly according to the invention is carried by the same document or by a document and an apparatus provided with a screen, this is not limiting and the assembly according to the invention may be worn from any other way.
  • the assembly according to the invention may be worn in part or in whole by another object than a document such as for example a token or a coin.
  • the assembly according to the invention may be carried in part by a first object and partly by another second object reported on the first to show at least a third authentication mark.
  • the second object is a polarizing filter.
  • the security signs are directly printed on the support carrying them, the security signs can be formed directly on a dedicated base then reported itself on the support.
  • the base may be a wire carrying at least one of the security signs, the security sign being inserted on the base before or after the arrangement of the base on the support.
  • One or more safety signs will then be arranged in the support instead of being on one of the main faces of the support as described.
  • the safety sign will for example be inserted into the support at a window formed in the support so that the wire is accessible from both sides of the support.
  • the wire will then be shaped to allow a study in reflection and / or a study in transmission of said wire.
  • the wire may be in a multilayer film with interferential effects such as that described in the patent application FR 3,011,508 of the present applicant.
  • the base may be a patch, a film of film such as a polymer film ... bearing at least one of the security signs, the security sign being inserted on the base before or after the arrangement of the base on the support.
  • the base may cover or fill a hole formed in the support to form a window so that the security sign is then accessible on both sides of the support.
  • the base will then preferably, although not exclusively, shaped to allow study in reflection and / or transmission of said sign.
  • At least one of the security signs may be arranged in one way on the support and at least one other security signs may be arranged in another way on the support: it will thus be possible to have a security sign arranged on a wire and a security sign arranged on a patch.
  • the inks used are inks visible in the light of day
  • the inks used may in addition or in replacement be inks visible under other wavelengths typically under infra-red or ultraviolet. It is preferable that the inks are visible in the light of day when it is desired that a lambda user can easily detect a counterfeit or otherwise that the inks are invisible in the light of day to complicate a fraudulent reproduction of all of security.
  • Inks may be invisible in daylight and visible under ultraviolet or infrared excitation.
  • the inks may be visible in daylight and fluorescent under ultraviolet or infrared excitation.
  • We can also use inks re-emitting different colors on a first side of the support and on the second side of the support: so when will superimpose two security signs, the third authentication mark will appear in a color panel comprising the first color of the first authentication mark, the second color of the second authentication mark and in a third color resulting from the combination of the two colors. two colors to further complicate a fraudulent reproduction of the whole of the invention.
  • security signs are printed, it will be possible to form the security signs in a different way on the support or a base attached to the support, for example by embossing, by metallization, by metallization, etc.
  • the authentication marks may be different. At least one of the authentication marks may thus comprise an authentication code for the medium or the object carrying it, such as for example a one - dimensional bar code, a two - dimensional bar code, a serial number, a SealgnOture code. (Trademark) ... Preferably, at least the authentication mark unveiled by superimposing the various security signs will include such an authentication code.
  • the security assembly was made from images decomposed in mask / image encrypted / unveiled image whose pixels were matrices 2 * 2, it is understood that said matrices may be of different size eg 2 * 3 or 3 * 2, especially although not exclusively to create different levels of contrast or to allow overlapping more safety signs.
  • the dies may also have other shapes than square or rectangular matrices and be for example of circular or hexagonal shape to reinforce the difficulty of fraudulent reproduction.
  • the authentication marks are visible and controllable to the naked eye, it may be otherwise. It will thus be possible to use ultraviolet or infrared illumination to study at least one authentication mark or a polarizing filter (linear or circular).
  • the device with a screen may include and / or be associated with other sensors than a camera to estimate the position of the object on the screen.
  • the screen is touch, it can be directly the touch screen sensors that will determine the relative position of the object on the screen.
  • the device may be different from a mobile phone.
  • the device may for example be a computer, a touch pad and generally any equipment with a screen.
  • the senor may be external and remote from the device.
  • the sensor will then be connected to the device wired (for example by USB cable) or non-wired (for example by Bluetooth).
  • the tracking system may have a different number of mirrors.
  • the tracking system may comprise other optical elements such as a mirror such as one or more optical fibers, one or more lenses.
  • the screen may be used to enhance the contrast of the third authentication mark and / or the second security sign.
  • the second security sign displayed on the screen is fixed, there may be alternatively a second security sign that is regularly changed on the screen so that with the same first security sign affixed to it, the third authentication mark also changes regularly (with each change of the second security sign). We will thus have an evolution, a movement of the third authentication mark.
  • the device may be used to authenticate an object, the detection of a counterfeit can then come directly from the device through the possible observation of the third authentication mark by the camera of the device or may be left to the discretion of the user who will visualize the effects produced.

Landscapes

  • Credit Cards Or The Like (AREA)
  • Collating Specific Patterns (AREA)
  • Air Bags (AREA)
  • Magnetic Record Carriers (AREA)
  • Burglar Alarm Systems (AREA)
  • Alarm Systems (AREA)
PCT/EP2017/081336 2016-12-02 2017-12-04 Deux signes de securite formant conjointement un troisieme signe de securite WO2018100203A1 (fr)

Priority Applications (6)

Application Number Priority Date Filing Date Title
MX2019006335A MX2019006335A (es) 2016-12-02 2017-12-04 Dos caracteristicas de seguridad que juntas forman una tercera caracteristica de seguridad.
AU2017367204A AU2017367204B2 (en) 2016-12-02 2017-12-04 Two security features that together form a third security feature
PL17808469T PL3548298T3 (pl) 2016-12-02 2017-12-04 Dwa znaki zabezpieczające tworzące razem trzeci znak zabezpieczający
MYPI2019003127A MY195594A (en) 2016-12-02 2017-12-04 Two Security Features That Together Form A Third Security Feature
CA3045099A CA3045099C (fr) 2016-12-02 2017-12-04 Deux signes de securite formant conjointement un troisieme signe de securite
EP17808469.5A EP3548298B1 (de) 2016-12-02 2017-12-04 Zwei sicherheitsmerkmale, die zusammen ein drittes sicherheitsmerkmal formen

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
FR1661896 2016-12-02
FR1661896A FR3059594B1 (fr) 2016-12-02 2016-12-02 Deux signes de securite formant conjointement un troisieme signe de securite

Publications (1)

Publication Number Publication Date
WO2018100203A1 true WO2018100203A1 (fr) 2018-06-07

Family

ID=58737621

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/EP2017/081336 WO2018100203A1 (fr) 2016-12-02 2017-12-04 Deux signes de securite formant conjointement un troisieme signe de securite

Country Status (8)

Country Link
EP (1) EP3548298B1 (de)
AU (1) AU2017367204B2 (de)
CA (1) CA3045099C (de)
FR (1) FR3059594B1 (de)
MX (1) MX2019006335A (de)
MY (1) MY195594A (de)
PL (1) PL3548298T3 (de)
WO (1) WO2018100203A1 (de)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP4019270A1 (de) * 2020-12-23 2022-06-29 Thales DIS France SA Sicherheitsanordnung und verfahren zur herstellung derselben

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2444245A (en) * 2006-10-14 2008-06-04 Ims Won Co Ltd Magic code to hide messages using complementary colours.
FR2961622A1 (fr) * 2010-06-22 2011-12-23 Arjowiggins Security Procede d'authentification et/ou d'identification d'un article de securite.
DE102011117044A1 (de) * 2011-10-27 2013-05-02 Bundesdruckerei Gmbh Sicherheitselement
FR3011508A1 (fr) 2013-10-08 2015-04-10 Banque De France Document de securite comprenant un film a effets interferentiels, procede de determination de l'authenticite d'un tel document et dispositif pour la mise en œuvre d'un tel procede.
WO2015184556A1 (en) * 2014-06-06 2015-12-10 Orell Füssli Sicherheitsdruck Ag Manufacturing method for security device

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB0714141D0 (en) 2007-07-19 2007-08-29 Rue De Int Ltd security device
DE102007063275A1 (de) 2007-12-27 2009-07-02 Giesecke & Devrient Gmbh Sicherheitsmerkmal für hohe Kippwinkel
DE102008050768C5 (de) 2008-10-09 2017-11-02 Bundesdruckerei Gmbh Sicherheitsmerkmal auf Basis Lumineszenz emittierender Stoffe, Wert- und Sicherheitsdokument mit einem solchen Sicherheitsmerkmal, ein Verfahren sowie eine Vorrichtung zur Verifikation eines solchen Sicherheitsmerkmals
CA2867336A1 (en) 2012-03-13 2013-09-19 Graphic Security Systems Corporation Multi-image optical device
MA44826A (fr) 2016-02-26 2019-01-02 De La Rue Int Ltd Procédés de fabrication de dispositifs de sécurité

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2444245A (en) * 2006-10-14 2008-06-04 Ims Won Co Ltd Magic code to hide messages using complementary colours.
FR2961622A1 (fr) * 2010-06-22 2011-12-23 Arjowiggins Security Procede d'authentification et/ou d'identification d'un article de securite.
DE102011117044A1 (de) * 2011-10-27 2013-05-02 Bundesdruckerei Gmbh Sicherheitselement
FR3011508A1 (fr) 2013-10-08 2015-04-10 Banque De France Document de securite comprenant un film a effets interferentiels, procede de determination de l'authenticite d'un tel document et dispositif pour la mise en œuvre d'un tel procede.
WO2015184556A1 (en) * 2014-06-06 2015-12-10 Orell Füssli Sicherheitsdruck Ag Manufacturing method for security device

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP4019270A1 (de) * 2020-12-23 2022-06-29 Thales DIS France SA Sicherheitsanordnung und verfahren zur herstellung derselben
WO2022136241A1 (en) * 2020-12-23 2022-06-30 Thales Dis France Sas A security assembly and method for manufacturing the same

Also Published As

Publication number Publication date
MY195594A (en) 2023-02-02
MX2019006335A (es) 2019-09-26
PL3548298T3 (pl) 2022-03-28
CA3045099C (fr) 2021-10-26
AU2017367204A1 (en) 2019-06-13
CA3045099A1 (fr) 2018-06-07
FR3059594A1 (fr) 2018-06-08
EP3548298B1 (de) 2021-11-10
EP3548298A1 (de) 2019-10-09
FR3059594B1 (fr) 2021-05-28
AU2017367204B2 (en) 2020-05-21

Similar Documents

Publication Publication Date Title
EP2367695B1 (de) Sicherheitsdokument mit mindestens einem kombinierten bild und einem enthüllungsmittel sowie zugehoeriges verfahren
WO2011161636A1 (fr) Procede d'autentification et/ou d'identification d'un article de securite
EP3397501B1 (de) Sicheres element mit einem kombinierten bild und/oder einem aufdeckungsbildschirm
EP2586014A1 (de) Verfahren zur authentifizierung und/oder identifizierung eines sicherheitsartikels
FR2969670A1 (fr) Element pour document de securite comportant une structure optique
EP2275279B1 (de) Sicherheitsdokument und verfahren zu dessen überprüfung
EP3397502B1 (de) Sicherer artikel mit einem kombinierten bild und/oder einem aufdeckungsbildschirm
EP3548298B1 (de) Zwei sicherheitsmerkmale, die zusammen ein drittes sicherheitsmerkmal formen
EP2637875A1 (de) Optisch variable sicherheitsvorrichtung für wertdokumente
EP3390064B1 (de) Sicherheitselement mit verborgener information
OA19095A (fr) Deux signes de sécurité formant conjointement un troisième signe de sécurité.
EP3397500B1 (de) Sicherer artikel mit enthüllendem schirm und kombiniertem bild
WO2018100200A1 (fr) Repositionnement d'une image sur l'ecran d'un appareil
FR3078015A1 (fr) Intégration de motif de micro-imagerie
FR2973910A1 (fr) Procede et dispositif d'authentification a reflets
FR3120567A1 (fr) Article de sécurité ou ensemble d’un article de sécurité et d’un autre objet comportant une première et une deuxième trame
EP4355581A1 (de) Erzeugung eines 3d-bildes aus einer linsenförmigen struktur
BE1021244B1 (fr) Document et methode pour fabriquer un tel docment
WO2020119986A1 (fr) Document de sécurité intégrant un motif de contrôle
FR2976381A3 (fr) Procede et dispositif a codes barres 3d

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 17808469

Country of ref document: EP

Kind code of ref document: A1

ENP Entry into the national phase

Ref document number: 3045099

Country of ref document: CA

NENP Non-entry into the national phase

Ref country code: DE

ENP Entry into the national phase

Ref document number: 2017367204

Country of ref document: AU

Date of ref document: 20171204

Kind code of ref document: A

ENP Entry into the national phase

Ref document number: 2017808469

Country of ref document: EP

Effective date: 20190702