WO2020212288A1 - Multilayer ablation features - Google Patents

Multilayer ablation features Download PDF

Info

Publication number
WO2020212288A1
WO2020212288A1 PCT/EP2020/060341 EP2020060341W WO2020212288A1 WO 2020212288 A1 WO2020212288 A1 WO 2020212288A1 EP 2020060341 W EP2020060341 W EP 2020060341W WO 2020212288 A1 WO2020212288 A1 WO 2020212288A1
Authority
WO
WIPO (PCT)
Prior art keywords
security element
processing layer
data carrier
extension direction
processing
Prior art date
Application number
PCT/EP2020/060341
Other languages
French (fr)
Inventor
Stefan Egli
Jonas Mueller
Thomas Neuenschwander
Original Assignee
Gemalto Ag
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from EP19170407.1A external-priority patent/EP3674100A1/en
Application filed by Gemalto Ag filed Critical Gemalto Ag
Priority to EP20716530.9A priority Critical patent/EP3956149A1/en
Publication of WO2020212288A1 publication Critical patent/WO2020212288A1/en

Links

Classifications

    • BPERFORMING OPERATIONS; TRANSPORTING
    • B42BOOKBINDING; ALBUMS; FILES; SPECIAL PRINTED MATTER
    • B42DBOOKS; BOOK COVERS; LOOSE LEAVES; PRINTED MATTER CHARACTERISED BY IDENTIFICATION OR SECURITY FEATURES; PRINTED MATTER OF SPECIAL FORMAT OR STYLE NOT OTHERWISE PROVIDED FOR; DEVICES FOR USE THEREWITH AND NOT OTHERWISE PROVIDED FOR; MOVABLE-STRIP WRITING OR READING APPARATUS
    • B42D25/00Information-bearing cards or sheet-like structures characterised by identification or security features; Manufacture thereof
    • B42D25/30Identification or security features, e.g. for preventing forgery
    • B42D25/324Reliefs
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B42BOOKBINDING; ALBUMS; FILES; SPECIAL PRINTED MATTER
    • B42DBOOKS; BOOK COVERS; LOOSE LEAVES; PRINTED MATTER CHARACTERISED BY IDENTIFICATION OR SECURITY FEATURES; PRINTED MATTER OF SPECIAL FORMAT OR STYLE NOT OTHERWISE PROVIDED FOR; DEVICES FOR USE THEREWITH AND NOT OTHERWISE PROVIDED FOR; MOVABLE-STRIP WRITING OR READING APPARATUS
    • B42D25/00Information-bearing cards or sheet-like structures characterised by identification or security features; Manufacture thereof
    • B42D25/30Identification or security features, e.g. for preventing forgery
    • B42D25/328Diffraction gratings; Holograms
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B42BOOKBINDING; ALBUMS; FILES; SPECIAL PRINTED MATTER
    • B42DBOOKS; BOOK COVERS; LOOSE LEAVES; PRINTED MATTER CHARACTERISED BY IDENTIFICATION OR SECURITY FEATURES; PRINTED MATTER OF SPECIAL FORMAT OR STYLE NOT OTHERWISE PROVIDED FOR; DEVICES FOR USE THEREWITH AND NOT OTHERWISE PROVIDED FOR; MOVABLE-STRIP WRITING OR READING APPARATUS
    • B42D25/00Information-bearing cards or sheet-like structures characterised by identification or security features; Manufacture thereof
    • B42D25/30Identification or security features, e.g. for preventing forgery
    • B42D25/342Moiré effects
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B42BOOKBINDING; ALBUMS; FILES; SPECIAL PRINTED MATTER
    • B42DBOOKS; BOOK COVERS; LOOSE LEAVES; PRINTED MATTER CHARACTERISED BY IDENTIFICATION OR SECURITY FEATURES; PRINTED MATTER OF SPECIAL FORMAT OR STYLE NOT OTHERWISE PROVIDED FOR; DEVICES FOR USE THEREWITH AND NOT OTHERWISE PROVIDED FOR; MOVABLE-STRIP WRITING OR READING APPARATUS
    • B42D25/00Information-bearing cards or sheet-like structures characterised by identification or security features; Manufacture thereof
    • B42D25/30Identification or security features, e.g. for preventing forgery
    • B42D25/351Translucent or partly translucent parts, e.g. windows
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B42BOOKBINDING; ALBUMS; FILES; SPECIAL PRINTED MATTER
    • B42DBOOKS; BOOK COVERS; LOOSE LEAVES; PRINTED MATTER CHARACTERISED BY IDENTIFICATION OR SECURITY FEATURES; PRINTED MATTER OF SPECIAL FORMAT OR STYLE NOT OTHERWISE PROVIDED FOR; DEVICES FOR USE THEREWITH AND NOT OTHERWISE PROVIDED FOR; MOVABLE-STRIP WRITING OR READING APPARATUS
    • B42D25/00Information-bearing cards or sheet-like structures characterised by identification or security features; Manufacture thereof
    • B42D25/30Identification or security features, e.g. for preventing forgery
    • B42D25/36Identification or security features, e.g. for preventing forgery comprising special materials
    • B42D25/373Metallic materials
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B42BOOKBINDING; ALBUMS; FILES; SPECIAL PRINTED MATTER
    • B42DBOOKS; BOOK COVERS; LOOSE LEAVES; PRINTED MATTER CHARACTERISED BY IDENTIFICATION OR SECURITY FEATURES; PRINTED MATTER OF SPECIAL FORMAT OR STYLE NOT OTHERWISE PROVIDED FOR; DEVICES FOR USE THEREWITH AND NOT OTHERWISE PROVIDED FOR; MOVABLE-STRIP WRITING OR READING APPARATUS
    • B42D25/00Information-bearing cards or sheet-like structures characterised by identification or security features; Manufacture thereof
    • B42D25/40Manufacture
    • B42D25/405Marking
    • B42D25/43Marking by removal of material
    • B42D25/435Marking by removal of material using electromagnetic radiation, e.g. laser

Definitions

  • the present invention relates to a data carrier according to the preamble of claim 1 and claim 1 1 , a security document comprising such a data carrier according to claim 12, as well as to a method of producing a data carrier according to claims 13 and 15, respectively.
  • WO 2012/097463 A1 a multilayer data carrier is known which discloses in one embodiment the provision of a metal layer and an opaque layer. By means of laser ablating the metal layer an ablated image and an ablated text are formed in the data carrier. In another embodiment two metal layers are provided, wherein both metal layers are laser ablated. In doing so two different images with different angles from one another are obtained, whereby a tilt effect between the two images is obtained.
  • a data carrier which comprises at least a first processing layer and a second processing layer which are arranged along an extension direction, and at least a first security element and a second security element being arranged on the first processing layer and/or on the second processing layer.
  • At least the first security element is comprised of at least a first part and a second part, wherein the first part of the first security element is provided on the first processing layer and the second part of the first security element is provided on the second processing layer.
  • the first security element is configured to exhibit a first appearance under a first viewing angle and a second appearance being different from the first appearance under a second viewing angle being different from the first viewing angle.
  • the data carrier can comprise two or more processing layers, wherein said two or more processing layers are arranged along the extension direction.
  • two or more of the security elements can be provided in two or more parts, wherein said two or more parts are distributed over the processing layers.
  • the different aspects and explanations provided for such a data carrier likewise apply to a data carrier comprising more processing layers and more security elements, respectively.
  • a data carrier which comprises at least two security elements, wherein at least one of them is distributed over at least two processing layers. Moreover, at least said distributed security element can change its appearance in dependence of the viewing angle under which the data carrier is observed. In doing so a data carrier is provided which comprises combined security information due to the presence of at least two security elements which furthermore exhibit sophisticated optical effects. As a result, the security provided by the data carrier is increased.
  • the second security element can be provided as a single feature on one of the processing layers only.
  • the provision of the second security element or of any further security elements in parts is however conceivable too, see further below.
  • the first security element and the second security element can at least partially overlap with each other with respect to the extension direction.
  • the first and security elements are at least partially overlapping each other.
  • the second security element is arranged on the first processing layer, it can be arranged such that it at least partially and spatially overlaps with the first part of the first security element provided on the first processing layer.
  • the second security element is arranged on the second processing layer, it can be arranged such that it at least partially and spatially overlaps with the second part of the first security element provided on the second processing layer.
  • the first part of the first security element on the first processing layer and the second part of the first security element on the second processing layer can at least partially overlap with each other when viewed along the extension direction.
  • the first part of the first security element on the first processing layer and the second part of the first security element on the second processing layer are spaced apart from each other when viewed along the extension direction.
  • the first security element can at least partially enclose the second security element when viewed along the extension direction, or the second security element can at least partially enclose the first security element when viewed along the extension direction.
  • the second security element on the first processing layer (second processing layer) such, that it at least partially encloses the first part of the security element provided on the first processing layer (second part of the first security element on the second processing layer).
  • the first part of the first security element on the first processing layer (second part of the first security element on the second processing layer) such, that it at least partially encloses the second security element if said second security element is provided on the first processing layer (second processing layer if said second security element is provided on the second processing layer).
  • a partial enclosure but also an entire enclosure is conceivable.
  • a partial as well as an entire enclosure can be realized by the respective security elements being arranged immediately adjacent to one another on the respective processing layer or by the respective security elements being arranged laterally spaced apart from one another on the respective processing layer.
  • the first security element can be comprised of at least a first part and of a second part, wherein the first part of the second security element can be provided on the first processing layer and the second part of the second security element can be provided on the second processing layer.
  • the first part of the first security element at least partially and spatially overlaps the first part of the second security element arranged on the first processing layer while the second part of the first security element and the second part of the second security element arranged on the second processing layer do not spatially overlap but are arranged at a distance with each other, and vice versa.
  • both the first parts of the first and second security elements arranged on the first processing layer as well as the second parts of the first and second security elements arranged on the second processing layer in each case overlap with each other or are arranged at a distance from one another.
  • the first part of the second security element on the first processing layer and the second part of the second security element on the second processing layer can at least partially overlap with each other when viewed along the extension direction, or the first part of the second security element on the first processing layer and the second part of the second security element on the second processing layer can be spaced apart from each other when viewed along the extension direction.
  • first part of the first security element at least partially encloses the first part of the second security element arranged on the first processing layer and/or that the second part of the first security element at least partially encloses the second part of the second security element arranged on the second processing layer and vice versa.
  • any sort of overlap or enclosure of the parts is conceivable with respect to the extension direction as well as with respect to a direction running perpendicularly to the extension direction, i.e. with respect to a direction running parallel to a plane extending through the processing layers, the latter being considered as a spatial overlap or enclosure.
  • the second security element in particular the at least first and second parts of the second security element, such that it can alter its appearance in dependence of the viewing angle under which the data carrier is observed.
  • the second security element can be configured to exhibit a third appearance under a third viewing angle and a fourth appearance being different from the third appearance under a fourth viewing angle being different from the third viewing angle.
  • first viewing angle”, “second viewing angle” and“third viewing angle”,“fourth viewing angle” do not necessarily mean that these are in each case different viewing angles.
  • first security element changes when the data carrier is observed under at least two differing viewing angles and that the appearance of the second security element changes when the data carrier is observed under at least two differing viewing angles, respectively.
  • the differing viewing angles referred to with respect to the first security element can be the same differing viewing angles referred to with respect to the second security element.
  • the first security element and/or the second security element are capable to alter their appearance between three or more different forms of appearance. Said three or more different forms of appearance can be caused by viewing the data carrier under three or more different viewing angles.
  • the first security element can at least partially complement the second security element when viewed along the extension direction and/or the second security element can at least partially complement the first security element when viewed along the extension direction.
  • Complement in this context means that one of the security elements participates in the creation or generation of the other security element.
  • a complementing security element can be said to fulfil a double function, namely providing a security element on its own as well as participating in the formation of another security element, wherein the security is even further increased.
  • first part of the first security element on the first processing layer and the second part of the first security element on the second processing layer can be configured complementary to one another, the first part of the first security element on the first processing layer preferably being configured as a recess and the second part of the first security element on the second processing layer being preferably configured as a corresponding elevation or vice versa.
  • first part of the second security element on the first processing layer and the second part of the second security element on the second processing layer can be configured complementary to one another, the first part of the second security element on the first processing layer preferably being configured as a recess and the second part of the second security element on the second processing layer being preferably configured as a corresponding elevation or vice versa.
  • the first part of the first security element with a particular recess and to provide the second part of the second security element with an elevation corresponding to said recess, wherein said recess and elevation are arranged on the respective processing layers such that they coincide with respect to the extension direction.
  • the second part of the second security element complements the recess in the first part of the first security element by means of its elevation.
  • the first security element and/or the second security element are preferably provided in the form of an image, an alphanumeric character, a pattern or a fringe, preferably a Moire fringe, the first security element and the second security element are preferably provided in different forms.
  • Security elements in the form of an image can be the portrait of the data carrier holder or the shape of the country of issue of the data carrier, and an alphanumeric character could correspond to the date of issuance or the date of birth of the holder, for example. However, a variety of other images or alphanumeric characters are possible.
  • the first processing layer and/or the second processing layer can be configured to interact with electromagnetic radiation, the first processing layer and/or the second processing layer preferably comprising at least one of: one or more metals, one or more metal-compounds, one or more pigments, and one or more colorants.
  • An interaction of the processing layers with the electromagnetic radiation could be a partial or entire ablation or a partial or entire bleaching of the processing layer at the region of interaction of the processing layer with the electromagnetic radiation.
  • the electromagnetic radiation preferably corresponds to laser radiation.
  • the data carrier can further comprise at least one protection structure which is arranged between the first processing layer and the second processing layer, wherein the protection structure is configured such that, upon irradiation of electromagnetic radiation constituting a first spectrum along the extension direction, the protection structure essentially entirely prevents said electromagnetic radiation from impinging on the second processing layer.
  • the data carrier can be processed by irradiating electromagnetic radiation constituting a first spectrum of particular one or more wavelengths, wherein the protection structure allows an impingement of said radiation only on the first, i.e. upper processing layer but prevents an impingement on the second, i.e. underlying processing layer.
  • the protection structure can thus be seen as a blockage or barrier that eliminates electromagnetic radiation which is used to process the first processing layer and which passes the first processing layer towards the underlying second processing layer.
  • the contrast of information introduced into the data carrier, i.e. the security elements, by means of the electromagnetic irradiation is enhanced and, as a result, a data carrier having an increased level of security is obtained.
  • An essentially entire prevention in the context of the present invention means that typically more than 80%, preferably more than 90% of the irradiated electromagnetic radiation are blocked.
  • the data carrier preferably comprises a cover layer and a base layer, between which the first processing layer and the second processing layer are arranged.
  • the region of the cover layer can be referred to as the front side of the data carrier and the region of the base layer can be referred to as the back side of the data carrier, respectively.
  • the cover layer and/or the base layer are preferably transparent and are preferably made of plastics, particularly preferably made from a polycarbonate, polyvinylchloride, amorphous polyester, co-polyester (A-ET, PET- G), semi-crystalline polyester such as polyethylene terephthalate or boPET.
  • the cover layer and the base layer should be provided in transparent materials.
  • the base layer could be provided as opaque material.
  • Conceivable opaque materials are plastic sheets with filler media as it is known in the state of the art, typically titanium dioxide (T1O2) (standard opaque white PC sheets).
  • T1O2 titanium dioxide
  • the electromagnetic radiation preferably corresponds to monochromatic radiation, particularly preferably to laser radiation, wherein the irradiation of laser radiation on the first processing layer results in an at least partial ablation or bleaching of the first processing layer.
  • the first processing layer is modified, wherein the modified region, potentially together with unmodified regions on the first processing layer and the unprocessed second processing layer, can represent the security elements.
  • the protection structure can be configured such that, upon irradiation of the electromagnetic radiation constituting the first spectrum along a direction running opposite to the extension direction, the protection structure essentially entirely prevents said electromagnetic radiation from impinging on the first processing layer.
  • the protection structure acts as a barrier or blockage for the respectively underlying processing layer with regard to an irradiation of the electromagnetic radiation constituting the first spectrum from both sides of the data carrier, i.e. against irradiation from the front side of the data carrier, wherein the irradiation propagates along the extension direction, as well as against irradiation from the back side of the data carrier, wherein the irradiation propagates along a direction running opposite to the extension direction.
  • the first processing layer is processed from a front side of the data carrier and the second processing layer is processed from a back side of the data carrier, wherein the processing of one of the processing layers does not affect the other processing layer.
  • the protection structure is preferably configured such that, upon irradiation of electromagnetic radiation constituting a second spectrum of particular one or more wavelengths being different from the wavelengths constituting the first spectrum along the extension direction, the protection structure allows said electromagnetic radiation to impinge on the first processing layer and on the second processing layer.
  • the protection structure can be configured such, that upon irradiation of electromagnetic radiation constituting the second spectrum along the direction running opposite to the extension direction, the protection structure allows said electromagnetic radiation to impinge on the second processing layer and on the first processing layer.
  • the protection structure is preferably wavelength- specific.
  • the protection structure can be configured such that it allows the transmission of electromagnetic radiation of one or more particular wavelengths but at the same time prevents the transmission of electromagnetic radiation of other one or more wavelengths.
  • the protection structure can be configured to absorb impinging electromagnetic radiation constituting the first spectrum.
  • Such a protection structure has the function of an optical filter and allows electromagnetic radiation of particular wavelengths to pass and at the same time prevents the propagation of electromagnetic radiation having other particular wavelengths.
  • the protection structure can comprise one or more additives and/or one or more inks that are configured to absorb impinging electromagnetic radiation constituting the first spectrum, the protection structure being preferably configured to absorb in the ultraviolet region and/or in the infrared region.
  • a protection structure which is essentially transparent in visible light.
  • additives and inks can be used and which are well known to the person skilled in the art.
  • An example of an additive which absorbs electromagnetic radiation in the ultraviolet region is based on a 2- hydroxyphenyl-s-triazine derivative such as the commercially available Tinuvin® 1600 from BASF.
  • examples of inks which absorb in the infrared region are the commercially available spectraCARD IRB from Printcolor or MSD4800 or MSC3600 from H. W. Sands.
  • the protection structure is provided by means of additives it is preferred to apply them in the form of a matrix comprising them.
  • the additives can be dispersed into a polymer matrix by using standard extrusion equipment.
  • the protection structure can be configured to reflect impinging electromagnetic radiation constituting the first spectrum, the protection structure preferably being configured to fully reflect or diffusely reflect impinging electromagnetic radiation constituting the first spectrum, or the protection structure can be configured to diffusely transmit impinging electromagnetic radiation constituting the first spectrum.
  • a full reflection occurs when the angle of light incident on the protection structure equals the angle of the light reflected from the protection structure.
  • a diffuse reflection also known as scattered reflection, refers to the scattering of incident light at many angles.
  • the protection structure can be seen as a diffraction grating or an optical grating.
  • a scattered transmission means that the power of the impinging electromagnetic radiation is reduced by the protection structure such, that a processing of the processing layer lying beneath the protection structure by means of the transmitted electromagnetic radiation is prevented.
  • the protection structure can comprise periodical structures that are configured to diffract impinging electromagnetic radiation constituting the first spectrum, or the protection structure can comprise nanoparticles, such that impinging electromagnetic radiation constituting the first spectrum is scattered on a surface of the nanoparticles.
  • a protection structure in the form of nanoparticles can be provided by means of nanoparticles embedded in a matrix, preferably in a plastic matrix. Conceivable nanoparticles are made from silicon dioxide (S1O2) and titanium dioxide (T1O2).
  • the blockage or barrier provided by means of the protection structure can be based on the reflection, the transmission or the absorption of the electromagnetic radiation being irradiated in order to process the processing layers, wherein said reflection, transmission or absorption depends on the particular wavelength(s) of the irradiated electromagnetic radiation and the intrinsic properties of the protection structure.
  • the size and the composition of the nanoparticles can be used to effectuate a diffraction of electromagnetic radiation of a particular wavelength.
  • a reflection, transmission or absorption occurring for electromagnetic radiation of a particular wavelength(s) can be set based on the shape of the periodical structures provided on the protection structure or the chemical composition or the thickness of the protection structure.
  • the protection structure can be provided in the form of one or more layers, wherein said one or more layers extends at least partially between the first and second processing layers along an extension direction.
  • a protection structure in the form of a single layer that fully extends between the first and second processing layers and thereby completely separates the first and second processing layers from one another.
  • the provision of two or more layers constituting the protection structure is likewise conceivable, wherein said two or more layers can be arranged adjacent to one another with respect to the extension direction.
  • the two or more layers differ in their intrinsic properties such that they act as a barrier or blockage for different wavelengths.
  • the protection structure in the form of several thin multilayer structures, wherein the thin multi-layer structures effectuate a thin-film interference of the impinging electromagnetic radiation.
  • the waves composing the electromagnetic radiation are reflected by the upper and lower boundaries of the protection structure and interfere with one another such that they eliminate each other.
  • the data carrier can comprise two or more protection structures, wherein the processing layers and the protection structures are preferably arranged alternating along the extension direction. In this case it is preferred that the individual protection structures differ in their wavelength-selectivity.
  • the data carrier can comprise three processing layers, wherein the first protection structure is arranged between the first and the second processing layer and a second protection structure is arranged between the second and the third processing layer. It is then preferred that the first protection structure is selectively blocking the electromagnetic radiation constituting the first spectrum and that the second protection structure is selectively blocking electromagnetic radiation constituting a second spectrum being different from the first spectrum. In this way the first processing layer can be processed with electromagnetic radiation constituting the first spectrum while the underlying second and third processing layers are protected by the first protection structure and the second processing layer can be processed with electromagnetic radiation constituting the second spectrum while the underlying third processing layer is protected, for example.
  • the data carrier can further comprise at least one filter structure, preferably a printed filter structure and/or one or more lenses, particularly preferably one or more lenticular lenses, wherein said filter structure is configured to alter the appearance of the first security element and/or the second security element, in particular the appearance of the first part and/or of the second part of the first security element depending on a viewing angle.
  • filter structure preferably a printed filter structure and/or one or more lenses, particularly preferably one or more lenticular lenses, wherein said filter structure is configured to alter the appearance of the first security element and/or the second security element, in particular the appearance of the first part and/or of the second part of the first security element depending on a viewing angle.
  • a printed filter structure could be provided in the form of printed segments of a light absorbing colour and/or in the form of a light reflecting colour.
  • the filter structure is configured to alter the appearance of the first part and/or the second part of the second security element, depending on the viewing angle.
  • the filter structure serves the purpose of selectively illuminating the security elements if the data carrier is exposed to light, for example ambient light.
  • the selective illumination is achieved in that the printed segments prevent incoming light from propagating towards the security elements.
  • the security elements are illuminated only at positions where their illumination is not prevented by the printed segments.
  • said lenses result in a particular focussing of incoming light onto particular regions of the security elements. Hence, those parts of the security element where the incoming light has not been focussed to will not be illuminated.
  • This partial or selective illumination of the security element confers the security element a changing appearance, wherein the appearance changes in dependence of the viewing angle.
  • the filter structure should be arranged before the security element and thus before the processing layers with respect to incoming light.
  • the filter structure is preferably arranged on the cover layer and/ or on the base layer.
  • a data carrier which comprises at least one filter structure and at least one first processing layer which are arranged along an extension direction.
  • the first processing layer comprises at least one security element.
  • the first processing layer is configured to interact with electromagnetic radiation under generation of the at least one security element.
  • the first processing layer preferably comprises at least one of one or more metals, one or more metal- compounds, one or more pigments, and one or more colorants.
  • the filter structure and the security element at least partially overlap when viewed along the extension direction, and the filter structure is configured to alter the appearance of the security element depending on a viewing angle.
  • the data carrier comprises at least one processing layer which is configured to interact with electromagnetic radiation, whereupon the at least one security element is generated in the processing layer.
  • the filter structure which preferably corresponds to one or more lenses, particularly preferably one or more lenticular lenses, and/or to one or more printed filter structures, results in a partial and selective illumination of the security element, wherein the appearance of the security element changes in dependence of the viewing angle as described above.
  • first and/or second processing layers preferably comprising one or more metals or metal-compounds
  • metals, metal- compounds or pigments that are ablated or bleached upon irradiation with electromagnetic radiation are conceivable.
  • a security element such as a colored personalization
  • a colored metal, metal-compound pigment should be used.
  • metals can be selected from Al, Cu, Au, Ag, Ti or combinations thereof
  • metal-compounds can be selected from TiN, TiCN, CrN, ZrN, TiZrN, ZrCN, TiC, TiCrN, AITiN, TiAIN, diamond like carbon or combinations thereof.
  • Conceivable pigments or colorants are pigments or colorants that are commonly used in the field of the invention, such as the pigments disclosed in EP0327508, W09635585 or WO0136208.
  • the cover layer and the base layer should be provided in transparent materials such as polycarbonate or polyethylene terephthalate mentioned above.
  • transparent materials such as polycarbonate or polyethylene terephthalate mentioned above.
  • polycarbonate polyethylene terephthalate
  • PET polyethylene terephthalate
  • the base layer could be provided as opaque material.
  • plastic sheets with filler media typically titanium dioxide (T1O2) (standard opaque white PC sheets) are used.
  • One or more filter structures can be printed with standard offset or screen printing inks as they are well known in the field of plastics card printing.
  • printed filter structures are preferably transparent in a wavelength region that corresponds to the wavelength region of the irradiated electromagnetic radiation e.g. the printed filter structures can be transparent in the infrared (IR) wavelength region.
  • IR infrared
  • An IR transparency can be reached by using a mixture of standard primary inks called Cyan, Magenta and Yellow without using carbon black.
  • the interaction of the processing layer with the electromagnetic radiation could be a partial or entire ablation or a partial or entire bleaching of the processing layer at the regions of interaction of the processing layer with the electromagnetic radiation, wherein the electromagnetic radiation preferably corresponds to laser radiation, see above.
  • the data carrier according to the second aspect essentially corresponds to the data carrier according to the first aspect.
  • the main difference lies in the provision of at least two processing layers and security elements in the data carrier according to the first aspect and the provision of at least a filter structure and at least one processing layer and security element in the data carrier according to the second aspect.
  • all features that have been presented in the context of the data carrier according to the first aspect can likewise be present in the data carrier according to the second aspect. For the sake of clarity it is at this point omitted to reproduce the explanations made in the context of the data carrier according to the first aspect. Instead, reference is made to the above.
  • a security document comprising a data carrier as described above is provided, the security document preferably being an identity card, a passport, a credit card, a bank note or the like.
  • the data carrier per se can correspond to a security document. This is the case if the data carrier is provided in the form of an identity card, for example. However, it is likewise conceivable to introduce or incorporate the data carrier into a security document.
  • the data carrier could correspond to a page of the passport, wherein said page is made of plastics, i.e. the cover layer and the base layer, within which the processing layer(s) with its security element(s) and possibly one or more protection structures are arranged.
  • the security document comprises at least one data carrier according to the first aspect and/or at least one data carrier according to the second aspect.
  • a method of producing a data carrier preferably a data carrier according to the first aspect as described above is provided, the method comprising the steps of:
  • At least the first security element is comprised of a first part and of a second part, wherein the first part of the first security element is provided on the first processing layer and the second part of the first security element is provided on the second processing layer.
  • the first security element is configured to exhibit a first appearance under a first viewing angle and a second appearance being different from the first appearance under a second viewing angle being different from the first viewing angle.
  • Electromagnetic radiation can be irradiated along the extension direction and/or along a direction extending opposite to the extension direction in order to generate the first security element and/or the second security element.
  • the first security element and/or the second security element are thereby preferably produced by means of a partial or entire ablation and/or by means of a partial or entire bleaching of the processing layers at the positions of the impinging electromagnetic radiation.
  • Security element(s) on the first processing layer are preferably produced by irradiating electromagnetic radiation along the extension direction, whereas security element(s) on the second processing layer are preferably produced by irradiating electromagnetic radiation along a direction running opposite to the extension direction.
  • a protection structure as described above between the processing layers. That is, a protection structure can be provided which acts as a barrier or blockage for the respectively underlying processing layer with regard to an irradiation of the particular wavelength(s) it is sensitive to from both sides of the data carrier. If three or more processing layers are used it is preferred to use two or more protection structures that are in each case arranged between successive processing layers. These two or more protection structures are then preferably selective for one or more particular wavelength(s) only, wherein said selectivity is preferably different for each protection structure.
  • a method of producing a data carrier preferably a data carrier according to the second aspect described above is provided, the method comprising the steps of:
  • the first processing layer is configured to interact with electromagnetic radiation, whereby the at least one security element is generated.
  • the first processing layer preferably comprises at least one of one or more metals, one or more metal-compounds, one or more pigments, and one or more colorants.
  • the filter structure and the first processing layer at least partially overlap when viewed along the extension direction, and the filter structure is configured to alter the appearance of the security element depending on a viewing angle.
  • All layers of the data carrier such as the processing layers and, if applicable, the filter structure are preferably fused together by means of lamination in a lamination step.
  • said filter structures are preferably applied to the particular layer(s) they are intended for by means of printing them to the layer(s) before the lamination step.
  • said filter structures in the form of lenses are provided, then said filter structures can be provided by means of imprinting them into the layer(s) they are intended for from an engraved metal plate during the lamination process.
  • Fig. 1 a shows a front view of a data carrier comprising two processing layers and a first and a second security element
  • FIG. 1 b shows an exploded view of the data carrier according to figure 1 a;
  • Fig. 2a shows a first view on a data carrier comprising two processing layers and a first and second security element according to another embodiment
  • Fig. 2b shows a second view on the data carrier according to figure 2a;
  • Fig. 3 shows a front view on a data carrier comprising two processing layers and security elements according to another embodiment
  • Fig. 4 shows a front view on a data carrier comprising two processing layers and security elements according to another embodiment
  • Fig. 5 shows a front view on a data carrier comprising four processing layers and security elements according to another embodiment
  • Fig. 6a shows a detailed view of the security element on the first processing layer of the data carrier according to figure 5;
  • Fig. 6b shows a detailed view of security element on the second processing layer of the data carrier according to figure 5;
  • Fig. 6c shows a detailed view of the security element on the third processing layer of the data carrier according to figure 5;
  • Fig. 6d shows a detailed view of the security element on the fourth processing layer of the data carrier according to figure 5;
  • Fig. 7a shows a cross-sectional view of a data carrier comprising two processing layers and a spacing layer in an initial state
  • Fig. 7b shows a cross-sectional view of the data carrier according to figure 7a in a processing state
  • Fig. 7c shows a cross-sectional view of the data carrier according to figure 7a in a final state
  • Fig. 7d shows a cross-sectional view of the data carrier according to figure 7a in a final state, wherein two security elements are schematically indicated;
  • Fig. 8a shows a cross-sectional view of a data carrier comprising two processing layers and a protection structure in an initial state
  • Fig. 8b shows a cross-sectional view of the data carrier according to figure 8a in a processing state
  • Fig. 8c shows a cross-sectional view of the data carrier according to figure 8a in a final state
  • Fig. 8d shows a cross-sectional view of the data carrier according to figure 8a in the final state, wherein two security elements are schematically indicated;
  • Fig. 9 shows a cross-sectional view of a data carrier comprising four processing layers and three spacing layers
  • Fig. 10 shows a cross-sectional view of a data carrier comprising two processing layers, a spacing layer and a filter structure
  • Fig. 1 1 shows a cross-sectional view of a data carrier comprising two processing layers, a spacing layer and a filter structure according to another embodiment
  • Fig. 12 shows a cross-sectional view of a data carrier comprising one processing layer and a filter structure according to another embodiment
  • Fig. 13 shows a cross-sectional view of a data carrier comprising one processing layer and a filter structure according to another embodiment
  • Fig. 14 shows a cross-sectional view of a data carrier comprising one processing layer and a filter structure according to another embodiment
  • Fig. 15 shows a cross-sectional view of a data carrier comprising one processing layer and a filter structure according to another embodiment.
  • FIG. 1 a to 1 1 several embodiments of a data carrier 1 comprising at least two processing layers 4a, 4b and at least two security elements 6a, 6b provided on said processing layers 4a, 4b are disclosed.
  • FIG. 12 to 15 several embodiments of a data carrier 1 comprising one processing layer 4a with one or more security elements 6a provided thereon are disclosed.
  • aspects of said data carriers 1 are discussed in greater detail.
  • different realizations of a data carrier 1 according to the invention are discussed primarily phenomenologically with respect to figures 1 a to 6d. Their structural design and their production method are shown and explained in the context of figures 7a to 1 1 .
  • All data carriers 1 have in common that they comprise at least a first processing layer 4a and a second processing layer 4b which are arranged along an extension direction E1 , wherein at least two security elements 6a, 6b are provided on said processing layers.
  • the first processing layer 4a comprises at least a first part 61 a of a first security element 6a and a first part 61 b of a second security element 6b.
  • the first security element 6a is configured to exhibit a first appearance under a first viewing angle a1 and a second appearance being different from the first appearance under a second viewing angle a2 being different from the first viewing angle.
  • a data carrier 1 comprising a first processing layer 4a and a second processing layer 4b is depicted, wherein said data carrier 1 comprises, inter alia, a first security element 6a in the form of a portrait and a second security element 6b in the form of the alphabetic characters“Data”.
  • both security elements 6a, 6b are split into parts, wherein said parts are distributed over the first and second processing layers 4a, 4b.
  • the first security element 6a in the form of the portrait is split into four parts 61 a-64a, wherein two of said parts 61 a-62a are arranged on the first processing layer 4a and the other two of said parts 63a-64a are arranged on the second processing layer 4b.
  • the two lines L1 , L2 dividing the data carrier 1 into the four parts in figure 1 a are no real lines being physically present on the data carrier 1 but are indicated in said figure as an illustration aid.
  • the lower left side 61 a of the portrait 6a and the upper right side 62a of the portrait 6a are provided on the first processing layer 4a, whereas the upper left side 63a of the portrait 6a and the lower right side 64a of the portrait 6a are provided on the second processing layer 4b.
  • the four parts 61 a-64a comprising these different sides of the portrait 6a are provided on the first and second processing layers 4a, 4b such, that the boundaries of the respective parts rest against each other when viewed from the first processing layer 4a towards the second processing layer 4b along the extension direction E1 .
  • the four parts 61 a-64a are in each case arranged separate from one another but immediately adjacent to one another when viewed along the extension direction E1 .
  • the second security element 6b provided in the form of the alphabetic characters“Data” is split into parts 61 b, 62b and distributed over the first processing layer 4a and the second processing layer 4b. Namely, on the first processing layer 4a the letters“Data” are provided in the form of recesses 61 b and on the second processing layer 4b the letters“Data” are provided as elevations 62b.
  • the letters“Data” in the form of the recesses 61 b on the first processing layer 4a and the letters“Data” in the form of the elevations 62b on the second processing layer 4b are configured complementary to each other.
  • the recesses 61 b on the first processing layer 4a are provided in a region of the first processing layer 4a where also the lower left side 61 a of the portrait 6a is provided, i.e. the recesses 61 b overlap said part 61 a of the portrait 6a.
  • the first security element 6a in the form of the portrait in particular its first part 61 a comprising the lower left side of the portrait 6a
  • first part 61 a of the security element 6a comprising the lower left side of the portrait 6a arranged on the first processing layer 4a and the second part 62b of the second security element 6b comprising the letters“Data” in the form of the elevations provided on the second processing layer 4b overlap with each other with respect to the extension direction E1 .
  • some regions on the first processing layer 4a and on the second processing layer 4b are partially or even completely removed from these layers.
  • the squared region A1 located in the upper left corner of the first processing layer 4a is essentially entirely removed in order to unravel the upper left part 63a of the portrait 6a located underneath in the upper left region B1 of the second processing layer 4b.
  • the squared region B3 located in the upper right corner of the second processing layer 4b is essentially entirely removed in order to unravel the upper right part 62a of the portrait 6a located above in the upper right region A3 of the first processing layer 4a
  • the squared region A4 located in the lower right corner of the first processing layer 4a is essentially entirely removed in order to unravel the lower right part 64a of the portrait 6a located underneath in the lower right region B4 of the second processing layer 4b, respectively.
  • the lower left region A2 on the first processing layer 4a there too the first processing layer 4a is essentially entirely removed with the exception of the area 61 a constituting the lower left side of the portrait 6a.
  • an essentially entirely removed processing layer 4a, 4b corresponds to a layer which is physically removed, e.g. a metal layer that is at least partially or entirely ablated, or a layer that is essentially transparent, e.g. a layer comprising additives or pigments that are partially or entirely bleached.
  • a recess can correspond to a physically ablated area on a processing layer or to a bleached area on a processing layer.
  • an elevation can correspond to an area not being ablated but being surrounded by ablated area or to an unbleached area being surrounded by a bleached area.
  • the data carrier 1 depicted in these figures essentially corresponds to the schematic data carrier 1 depicted in figures 1 a and 1 b.
  • the main difference lies in the provision of a first security element 6a by means of the numeric data“20.03.18”, which extends along an entire width of the second security element 6b in the form of the portrait, and in that the first security element 6a is provided in two parts 61 a, 62a that are distributed over the two processing layers 4a, 4b.
  • the second security element 6b i.e.
  • the portrait is as well split on the two processing layers 4a, 4b by using the form of the numeric data“20.03.18”, but in contrary to figures 1 a and 1 b, the portrait is in this embodiment not quartered to regions.
  • the first security element 6a in the form of the numeric data is again distributed in parts over the first processing layer 4a and the second processing layer 4b, wherein one part is configured as a recess 61 a and the other part is configured as a corresponding elevation 62a.
  • the first security element 6a and the second security element 6b at least partially overlap, i.e. the numeric data 6a is provided in regions where also parts of the portrait 6b are provided.
  • the data carrier 1 is depicted under a first viewing angle cd . Under this first viewing angle cd , both the first security element 6a and the second security element 6b are visible.
  • the data carrier 1 is depicted under a second viewing angle a2 being different from the first viewing angle cd . Under this second viewing angle a2 only the second security element 6b in the form of the portrait is visible, whereas the first security element 6a in the form of the numeric characters is invisible. The appearance of the first security element 6a has thus changed from being visible to being invisible.
  • the second security element 6b it should be noted that the allegedly change of appearance between figure 2a and 2b does not correspond to a change of appearance in the sense of the present invention.
  • the appearance of the portrait does not change in dependence of the viewing angle. Instead, the portrait depicted in figure 2a seems to be dark due to the presence of the background behind the data carrier 1 and the fact that it has not been illuminated at the moment when the photo of said data carrier 1 has been taken.
  • the data carriers 1 depicted in figures 3 and 4 in each case comprise a security element 6b in the form of a portrait as described with reference to figures 2a and 2b.
  • further security elements 6a, 6c-6d are schematically indicated on the data carrier 1 by the expression“Data” surrounded by the arrows within the grey areas.
  • these other security elements 6a, 6c-6d could be provided as images, as alphanumeric characters, as patterns or fringes, preferably as Moire fringes.
  • a Moire fringe could be provided by means of generating a first line grid on the first processing layer 4a which superposes with a second line grid generated on the second processing layer 4b when viewed along the extension direction E1.
  • these other security elements 6a, 6c could be arranged such that they at least partially or completely enclose or complement each other and/or the security element 6b in the form of the portrait.
  • one or more of these other security elements 6d can at least partially or entirely overlap with each other and/or with the security element 6b in the form of the portrait.
  • a data carrier 1 which comprises more than two processing layers 4a, 4b, namely four processing layers 4a-4d in the present case.
  • the first processing layer 4a, the second processing layer 4b, the third processing layer 4c and the fourth processing layer 4d are again arranged along the extension direction E1 , wherein several security elements 6a-6c are provided on these processing layers.
  • the particular security elements on the particular processing layers are depicted individually in figures 6a to 6d. That is to say, each of the processing layers 4a-4d has been individually provided with individual parts of the security elements 6a-6c, here security elements 6a in the form of the numeric character“8” and in the form of images depicting circles 6c and an essentially triangular structure 6b.
  • All processing layers 4a-4c except the processing layer 4d depicted in figure 6d comprise parts 61 a-63a, 61 b-63b of two security elements 6a, 6b, namely of the security element 6a constituting the numeric character“8” and of the security element 6b constituting the essentially triangular image.
  • the different parts 61 a-63a, 61 b- 63b of the different security elements 6a, 6b are arranged spatially apart from one another on the particular processing layers 4a-4c.
  • the geometric extension of the parts 61 a-63a constituting the security element 6a in the form of the numeric character“8” and of the parts constituting 61 b-63b the security element 6b in the form of the essentially triangular structure vary between the different processing layers 4a-4c.
  • a data carrier 1 comprising a cover layer 2 and a base layer 3
  • the processing layers 4a, 4b are arranged between the cover layer 2 and the base layer 3.
  • the cover layer 2 and the base layer 3 are made from plastics, here from polycarbonate (PC) or polyethylene terephthalate (PET). That is, both layers are essentially transparent.
  • PC polycarbonate
  • PET polyethylene terephthalate
  • both layers are essentially transparent.
  • the data carriers 1 depicted in figures 7a to 15 it should be noted that they are depicted in an exploded view for reasons of clarity. That is, the individual layers are depicted separate from one another, although in the actual data carrier they are arranged adjoining and immediately on top of each other.
  • the data carrier 1 is comprised of the cover layer 2, the first processing layer 4a, the second processing layer 4b and the base layer 3 being arranged, in this sequence, along the extension direction E1 .
  • the processing layers 4a, 4b are metallic layers and two opaque areas 6 are provided sideways to the processing layers 4a, 4b.
  • a spacing layer 5a is arranged between the first processing layer 4a and the second processing layer 4b. This spacing layer 5a serves the purpose of an intermediate layer which spatially separates the processing layers 4a, 4b from one another.
  • the information, i.e. security element that is to be generated in the data carrier 1 by means of accordingly processing the processing layers 4a, 4b such spacing between the processing layers is advantageous or even necessary.
  • the spacing layer is preferably made from a transparent material, particularly preferably from polycarbonate or polyethylene terephthalate.
  • FIG 7b the generation of two security elements 6a, 6b on the data carrier 1 is depicted.
  • a processing of the first and second processing layers 4a, 4b is achieved in a first step by irradiating electromagnetic radiation R along the extension direction E1 in order to selectively ablate the first processing layer 4a and by irradiating electromagnetic radiation R along a direction E2 running opposite to the extension direction E1 in order to selectively ablate the second processing layer 4b in a second step.
  • the processing layers 4a, 4b are ablated such, that a first security element 6a comprising a first part 61 a located on the first processing layer 4a and a second part 62a located on the second processing layer 4b is generated, wherein the first part 61 a overlaps with a second security element 6b being exclusively formed on the first processing layer 4b.
  • This situation is schematically illustrated by the rectangles indicated in figure 7d. It should be noted that the rectangles are fictive rectangles that serve the purpose of an illustration aid. In fact, the rectangles are intended to indicate the two security elements 6a, 6b.
  • the second security element 6b could correspond to an image, for example a portrait, on which the first security element 6a in the form of an alphanumeric character is superposed.
  • the second processing layer 4b is preferably entirely removed in those regions that lie beneath the regions of the first processing layer 4a in which only the second security element 6b in the form of the portrait is formed.
  • the data carrier 1 depicted in figures 8a to 8d essentially correspond to the data carrier 1 depicted in figures 7a to 7d, with the exception that two spacing layers 5a, 5b and a protection structure 9a are arranged between the first processing layer 4a and the second processing layer 4b.
  • the protection structure 9a in this example corresponds to an ink that is applied between the two transparent spacing layers 5a, 5b which are in turn arranged between the two processing layers 4a, 4b and which ink is applied along a direction running perpendicularly to the extension direction El and parallel to the plane p extending through the processing layers 4a, 4b.
  • the ink is applied along an entire length of the processing layers 4a, 4b.
  • the processing layers 4a, 4b are completely separated from each other by the spacing layers 5a, 5b and the protection structure 9a.
  • figure 8b the irradiation of electromagnetic radiation R along the extension direction E1 as well as the irradiation of electromagnetic radiation R along the direction E2 running opposite to the extension direction E1 is shown.
  • the electromagnetic radiation R irradiated along the extension direction E1 ablates the first processing layer 4a and the electromagnetic radiation R irradiated along the opposite direction E2 ablates the second processing layer 4b.
  • the protection structure 9a prevents the electromagnetic radiation R from impinging on the second processing layer 4b and in the latter case the protection structure 9a prevents the electromagnetic radiation R from impinging on the first processing layer 4a, respectively.
  • the protection structure 9a acts as a barrier or blockage for the respectively underlying processing layer 4a, 4b with regard to an irradiation from both sides of the data carrier 1 .
  • the blocking of the electromagnetic radiation R is based on absorption of this radiation by the components constituting the protection structure 9a, i.e. the ink.
  • FIG 9 a data carrier 1 comprising four processed processing layers 4a- 4d and three transparent spacing layers 5a-5c arranged there between is depicted. To this end the processing layers 4a-4d and the transparent spacing layers 5a-5c are arranged alternating with respect to the extension direction E1 . A processing of the different processing layers 4a-4d, and hence the generation of different security elements, is done by separately and selectively processing the individual processing layers 4a-4d.
  • a processing of the first and fourth processing layers 4a, 4d can be achieved by irradiating electromagnetic radiation along the extension direction E1 in order to selectively ablate the first processing layer 4a and by irradiating electromagnetic radiation along the opposite direction E2 in order to selectively ablate the fourth processing layer 4d, such that modified regions 41 a, 41 d are created only in the first and fourth processing layers 4a, 4d.
  • a second step radiation R having a wavelength being different from the wavelength of the radiation R irradiated in the first step is irradiated onto the data carrier 1 along the extension direction E1 and along the opposite direction E2This radiation is irradiated at positions where the first and fourth processing layers 4a, 4d were already ablated in the first step.
  • congruent recesses 43a, 43b in the first and second processing layers 4a, 4b and congruent recesses 43c, 43d in the third and fourth processing layers 4c, 4d are generated.
  • processing layers 4a-4d specifically modified and unmodified regions 41 a-41 d, 42a-42d and corresponding at least partially congruent recesses 43a-43d as well as unique recesses 44a-44d are created, which enables the production of a multilayer data carrier comprising complex security elements distributed and/or split over several processing layers at high precision.
  • data carriers 1 comprising two processing layers 4a, 4b and a transparent spacing layer 5a are depicted, wherein said two processing layers 4a, 4b were processed and thus provided with security elements as described above.
  • said data carriers 1 additionally comprise a filter structure 7a, 7b arranged on the cover layer 2, wherein said filter structure 7a, 7b is configured to alter the appearance of security elements provided on the processing layers 4a, 4b depending on a viewing angle.
  • said filter structure corresponds to a printed filter structure 7a provided in the form of printed segments of a light absorbing colour or light reflecting colour.
  • top layer 8 In order to protect the printed filter structure 7a from external influences another transparent layer, referred to as top layer 8, is arranged on top of the cover layer 2, i.e. the printed filter 7a structure is embedded between the top layer 8 and the cover layer 2.
  • said filter structure 7b is provided in the form of lenticular lenses.
  • the filter structure 7a 7b both in the form of one or more lenses as well as in the form of printed segments, serves the purpose of selectively illuminating the security elements if the data carrier 1 is exposed to light, for example ambient light. This partial or selective illumination of the security elements confers the security elements a changing appearance, wherein the appearance changes in dependence of the viewing angle.
  • the data carriers 1 depicted in figures 12 to 15 differ from the previously discussed data carriers 1 in that they comprise only one processing layer 4a.
  • one or more security elements can be generated in the same way as in the case of the above data carriers 1 , namely by selectively irradiating electromagnetic radiation along the extension direction E1 and along the opposite direction E2.
  • these data carriers 1 in each case comprise a filter structure 7a, 7b as just discussed.
  • the data carriers 1 according to figures 12 and 13 comprise a filter structure 7b in the form of lenticular lenses, wherein the lenticular lenses are provided along an entire width of the processing layer 4a (see figure 12) or wherein the lenticular lenses are provided only in some regions (see figure 13).

Abstract

A data carrier (1) comprises at least a first processing layer (4a) and a second processing layer (4b) which are arranged along an extension direction (E1). At least a first security element (6a) and a second security element (6b) are arranged on the first processing layer (4a) and/or on the second processing layer (4b). At least the first security element (6a) is comprised of at least a first part (61a) and a second part (62a), wherein the first part (61a) of the first security element (6a) is provided on the first processing layer (4a) and the second part (62a) of the first security element (6a) is provided on the second processing layer (4b). The first security element (6a) is configured to exhibit a first appearance under a first viewing angle (α1) and a second appearance being different from the first appearance under a second viewing angle (α2) being different from the first viewing angle (α1).

Description

MULTILAYER ABLATION FEATURES
TECHNICAL FIELD
The present invention relates to a data carrier according to the preamble of claim 1 and claim 1 1 , a security document comprising such a data carrier according to claim 12, as well as to a method of producing a data carrier according to claims 13 and 15, respectively.
PRIOR ART
Because of the value and importance associated with data carriers such as identity cards, passports, credit cards or the like, they are often the subject of unauthorized copying, alterations and forgeries. Document falsification and product counterfeiting are significant problems that have been addressed in a variety of ways.
From WO 2012/097463 A1 a multilayer data carrier is known which discloses in one embodiment the provision of a metal layer and an opaque layer. By means of laser ablating the metal layer an ablated image and an ablated text are formed in the data carrier. In another embodiment two metal layers are provided, wherein both metal layers are laser ablated. In doing so two different images with different angles from one another are obtained, whereby a tilt effect between the two images is obtained.
Due to the fact that forgery possibilities and skills of forgers are constantly improving it is the provision of data carriers having an improved security is desired.
SUMMARY OF THE INVENTION
It is therefore an object of the present invention to provide a data carrier which possesses an increased safety.
This object is achieved with a data carrier according to claim 1 . In particular, in a first aspect a data carrier is provided which comprises at least a first processing layer and a second processing layer which are arranged along an extension direction, and at least a first security element and a second security element being arranged on the first processing layer and/or on the second processing layer. At least the first security element is comprised of at least a first part and a second part, wherein the first part of the first security element is provided on the first processing layer and the second part of the first security element is provided on the second processing layer. The first security element is configured to exhibit a first appearance under a first viewing angle and a second appearance being different from the first appearance under a second viewing angle being different from the first viewing angle.
At this point it should be noted that the data carrier can comprise two or more processing layers, wherein said two or more processing layers are arranged along the extension direction. Moreover, it is also conceivable to provide three or more security elements on the processing layers, wherein the provision of two or more security elements on only one of the processing layers or on two or on more of the processing layers is conceivable. In addition, and as will be explained in greater detail further below, two or more of the security elements can be provided in two or more parts, wherein said two or more parts are distributed over the processing layers. For reasons of simplicity, reference is made in the following to a data carrier comprising two processing layers and two security elements. However, it shall be understood that the different aspects and explanations provided for such a data carrier likewise apply to a data carrier comprising more processing layers and more security elements, respectively.
Hence, a data carrier is provided which comprises at least two security elements, wherein at least one of them is distributed over at least two processing layers. Moreover, at least said distributed security element can change its appearance in dependence of the viewing angle under which the data carrier is observed. In doing so a data carrier is provided which comprises combined security information due to the presence of at least two security elements which furthermore exhibit sophisticated optical effects. As a result, the security provided by the data carrier is increased.
As just mentioned, it is conceivable that only one of the security elements is provided in two or more parts, wherein these two or more parts are distributed over the two or more processing layers. The other security element, presently named the second security element, can be provided as a single feature on one of the processing layers only. The provision of the second security element or of any further security elements in parts is however conceivable too, see further below.
The first security element and the second security element can at least partially overlap with each other with respect to the extension direction. In other words, when viewing from the first processing layer towards the second processing layer along the extension direction, it is conceivable that the first and security elements are at least partially overlapping each other.
For example, if the second security element is arranged on the first processing layer, it can be arranged such that it at least partially and spatially overlaps with the first part of the first security element provided on the first processing layer. Likewise, if the second security element is arranged on the second processing layer, it can be arranged such that it at least partially and spatially overlaps with the second part of the first security element provided on the second processing layer.
The first part of the first security element on the first processing layer and the second part of the first security element on the second processing layer can at least partially overlap with each other when viewed along the extension direction. Alternatively, it is also conceivable that the first part of the first security element on the first processing layer and the second part of the first security element on the second processing layer are spaced apart from each other when viewed along the extension direction.
The first security element can at least partially enclose the second security element when viewed along the extension direction, or the second security element can at least partially enclose the first security element when viewed along the extension direction. For example, it is conceivable to arrange the second security element on the first processing layer (second processing layer) such, that it at least partially encloses the first part of the security element provided on the first processing layer (second part of the first security element on the second processing layer). Likewise, it is conceivable to arrange the first part of the first security element on the first processing layer (second part of the first security element on the second processing layer) such, that it at least partially encloses the second security element if said second security element is provided on the first processing layer (second processing layer if said second security element is provided on the second processing layer). To this end only a partial enclosure but also an entire enclosure is conceivable. Moreover, a partial as well as an entire enclosure can be realized by the respective security elements being arranged immediately adjacent to one another on the respective processing layer or by the respective security elements being arranged laterally spaced apart from one another on the respective processing layer.
In addition, and as indicated above, it is conceivable to provide both security elements in parts. That is, not only the first security element but also the second security element can be comprised of at least a first part and of a second part, wherein the first part of the second security element can be provided on the first processing layer and the second part of the second security element can be provided on the second processing layer. In this case it is conceivable that the first part of the first security element at least partially and spatially overlaps the first part of the second security element arranged on the first processing layer while the second part of the first security element and the second part of the second security element arranged on the second processing layer do not spatially overlap but are arranged at a distance with each other, and vice versa. However, it is also conceivable that both the first parts of the first and second security elements arranged on the first processing layer as well as the second parts of the first and second security elements arranged on the second processing layer in each case overlap with each other or are arranged at a distance from one another. Moreover, the first part of the second security element on the first processing layer and the second part of the second security element on the second processing layer can at least partially overlap with each other when viewed along the extension direction, or the first part of the second security element on the first processing layer and the second part of the second security element on the second processing layer can be spaced apart from each other when viewed along the extension direction. Likewise, it is conceivable that the first part of the first security element at least partially encloses the first part of the second security element arranged on the first processing layer and/or that the second part of the first security element at least partially encloses the second part of the second security element arranged on the second processing layer and vice versa. Hence, in short, any sort of overlap or enclosure of the parts is conceivable with respect to the extension direction as well as with respect to a direction running perpendicularly to the extension direction, i.e. with respect to a direction running parallel to a plane extending through the processing layers, the latter being considered as a spatial overlap or enclosure.
It is conceivable to provide the second security element, in particular the at least first and second parts of the second security element, such that it can alter its appearance in dependence of the viewing angle under which the data carrier is observed. Hence, the second security element can be configured to exhibit a third appearance under a third viewing angle and a fourth appearance being different from the third appearance under a fourth viewing angle being different from the third viewing angle. It should be noted that the terms “first viewing angle”, “second viewing angle” and“third viewing angle”,“fourth viewing angle” do not necessarily mean that these are in each case different viewing angles. Instead, these terms are used to indicate that the appearance of the first security element changes when the data carrier is observed under at least two differing viewing angles and that the appearance of the second security element changes when the data carrier is observed under at least two differing viewing angles, respectively. The differing viewing angles referred to with respect to the first security element can be the same differing viewing angles referred to with respect to the second security element. Moreover, it is conceivable that the first security element and/or the second security element are capable to alter their appearance between three or more different forms of appearance. Said three or more different forms of appearance can be caused by viewing the data carrier under three or more different viewing angles. The first security element can at least partially complement the second security element when viewed along the extension direction and/or the second security element can at least partially complement the first security element when viewed along the extension direction.
Complement in this context means that one of the security elements participates in the creation or generation of the other security element. Thus, a complementing security element can be said to fulfil a double function, namely providing a security element on its own as well as participating in the formation of another security element, wherein the security is even further increased.
In particular, the first part of the first security element on the first processing layer and the second part of the first security element on the second processing layer can be configured complementary to one another, the first part of the first security element on the first processing layer preferably being configured as a recess and the second part of the first security element on the second processing layer being preferably configured as a corresponding elevation or vice versa. Likewise, the first part of the second security element on the first processing layer and the second part of the second security element on the second processing layer can be configured complementary to one another, the first part of the second security element on the first processing layer preferably being configured as a recess and the second part of the second security element on the second processing layer being preferably configured as a corresponding elevation or vice versa.
For example, it is conceivable to provide the first part of the first security element with a particular recess and to provide the second part of the second security element with an elevation corresponding to said recess, wherein said recess and elevation are arranged on the respective processing layers such that they coincide with respect to the extension direction. In this case, the second part of the second security element complements the recess in the first part of the first security element by means of its elevation.
The first security element and/or the second security element are preferably provided in the form of an image, an alphanumeric character, a pattern or a fringe, preferably a Moire fringe, the first security element and the second security element are preferably provided in different forms. Security elements in the form of an image can be the portrait of the data carrier holder or the shape of the country of issue of the data carrier, and an alphanumeric character could correspond to the date of issuance or the date of birth of the holder, for example. However, a variety of other images or alphanumeric characters are possible. The first processing layer and/or the second processing layer can be configured to interact with electromagnetic radiation, the first processing layer and/or the second processing layer preferably comprising at least one of: one or more metals, one or more metal-compounds, one or more pigments, and one or more colorants.
An interaction of the processing layers with the electromagnetic radiation could be a partial or entire ablation or a partial or entire bleaching of the processing layer at the region of interaction of the processing layer with the electromagnetic radiation. The electromagnetic radiation preferably corresponds to laser radiation.
The data carrier can further comprise at least one protection structure which is arranged between the first processing layer and the second processing layer, wherein the protection structure is configured such that, upon irradiation of electromagnetic radiation constituting a first spectrum along the extension direction, the protection structure essentially entirely prevents said electromagnetic radiation from impinging on the second processing layer.
That is to say, the data carrier can be processed by irradiating electromagnetic radiation constituting a first spectrum of particular one or more wavelengths, wherein the protection structure allows an impingement of said radiation only on the first, i.e. upper processing layer but prevents an impingement on the second, i.e. underlying processing layer. The protection structure can thus be seen as a blockage or barrier that eliminates electromagnetic radiation which is used to process the first processing layer and which passes the first processing layer towards the underlying second processing layer. In this way, the contrast of information introduced into the data carrier, i.e. the security elements, by means of the electromagnetic irradiation is enhanced and, as a result, a data carrier having an increased level of security is obtained.
An essentially entire prevention in the context of the present invention means that typically more than 80%, preferably more than 90% of the irradiated electromagnetic radiation are blocked.
The data carrier preferably comprises a cover layer and a base layer, between which the first processing layer and the second processing layer are arranged. The region of the cover layer can be referred to as the front side of the data carrier and the region of the base layer can be referred to as the back side of the data carrier, respectively. The cover layer and/or the base layer are preferably transparent and are preferably made of plastics, particularly preferably made from a polycarbonate, polyvinylchloride, amorphous polyester, co-polyester (A-ET, PET- G), semi-crystalline polyester such as polyethylene terephthalate or boPET. In order to allow the irradiated electromagnetic radiation to reach the first and/or second processing layers, the cover layer and the base layer should be provided in transparent materials. However, if an irradiation along the extension direction only is intended, then the base layer could be provided as opaque material. Conceivable opaque materials are plastic sheets with filler media as it is known in the state of the art, typically titanium dioxide (T1O2) (standard opaque white PC sheets). As already mentioned, the electromagnetic radiation preferably corresponds to monochromatic radiation, particularly preferably to laser radiation, wherein the irradiation of laser radiation on the first processing layer results in an at least partial ablation or bleaching of the first processing layer. In this way, the first processing layer is modified, wherein the modified region, potentially together with unmodified regions on the first processing layer and the unprocessed second processing layer, can represent the security elements.
The protection structure can be configured such that, upon irradiation of the electromagnetic radiation constituting the first spectrum along a direction running opposite to the extension direction, the protection structure essentially entirely prevents said electromagnetic radiation from impinging on the first processing layer.
In other words, the protection structure acts as a barrier or blockage for the respectively underlying processing layer with regard to an irradiation of the electromagnetic radiation constituting the first spectrum from both sides of the data carrier, i.e. against irradiation from the front side of the data carrier, wherein the irradiation propagates along the extension direction, as well as against irradiation from the back side of the data carrier, wherein the irradiation propagates along a direction running opposite to the extension direction. In this case the first processing layer is processed from a front side of the data carrier and the second processing layer is processed from a back side of the data carrier, wherein the processing of one of the processing layers does not affect the other processing layer. Hence, a precise production of a security-feature-bearing data carrier with the security elements provided on the at least two processing layers is enabled.
The protection structure is preferably configured such that, upon irradiation of electromagnetic radiation constituting a second spectrum of particular one or more wavelengths being different from the wavelengths constituting the first spectrum along the extension direction, the protection structure allows said electromagnetic radiation to impinge on the first processing layer and on the second processing layer. In addition or as an alternative the protection structure can be configured such, that upon irradiation of electromagnetic radiation constituting the second spectrum along the direction running opposite to the extension direction, the protection structure allows said electromagnetic radiation to impinge on the second processing layer and on the first processing layer. Again in other words, the protection structure is preferably wavelength- specific. That is to say, the protection structure can be configured such that it allows the transmission of electromagnetic radiation of one or more particular wavelengths but at the same time prevents the transmission of electromagnetic radiation of other one or more wavelengths. For example, it is conceivable to provide a protection structure that is a barrier or blockage for electromagnetic radiation having a wavelength of li = 355 nm but which enables the propagation of electromagnetic radiation having a wavelength of K2 = 380 nm. If in a first step radiation li = 355 nm is irradiated from the front side (back side) of the data carrier along the extension direction (direction running opposite to extension direction), said radiation will at least partially ablate only the first processing layer (second processing layer) because a further propagation towards the second processing layer (first processing layer) is prevented by the protection structure. If then in a second step radiation K2 = 380 nm is irradiated from the front side (back side) of the data carrier along the extension direction (direction running opposite to extension direction) at positions where an ablation of the first processing layer (second processing layer) has already occurred during the first step, said radiation will propagate through the protection structure and will at least partially ablate also the second processing layer (first processing layer). In this way a data carrier is generated wherein data is selectively generated and visible in the first processing layer and the second processing.
The protection structure can be configured to absorb impinging electromagnetic radiation constituting the first spectrum. Such a protection structure has the function of an optical filter and allows electromagnetic radiation of particular wavelengths to pass and at the same time prevents the propagation of electromagnetic radiation having other particular wavelengths.
The protection structure can comprise one or more additives and/or one or more inks that are configured to absorb impinging electromagnetic radiation constituting the first spectrum, the protection structure being preferably configured to absorb in the ultraviolet region and/or in the infrared region.
Hence, it is preferred to provide a protection structure which is essentially transparent in visible light. To this end a variety of additives and inks can be used and which are well known to the person skilled in the art. An example of an additive which absorbs electromagnetic radiation in the ultraviolet region is based on a 2- hydroxyphenyl-s-triazine derivative such as the commercially available Tinuvin® 1600 from BASF. Examples of inks which absorb in the infrared region are the commercially available spectraCARD IRB from Printcolor or MSD4800 or MSC3600 from H. W. Sands. If the protection structure is provided by means of additives it is preferred to apply them in the form of a matrix comprising them. For example, the additives can be dispersed into a polymer matrix by using standard extrusion equipment.
The protection structure can be configured to reflect impinging electromagnetic radiation constituting the first spectrum, the protection structure preferably being configured to fully reflect or diffusely reflect impinging electromagnetic radiation constituting the first spectrum, or the protection structure can be configured to diffusely transmit impinging electromagnetic radiation constituting the first spectrum. A full reflection occurs when the angle of light incident on the protection structure equals the angle of the light reflected from the protection structure. A diffuse reflection, also known as scattered reflection, refers to the scattering of incident light at many angles. In this case the protection structure can be seen as a diffraction grating or an optical grating. A scattered transmission means that the power of the impinging electromagnetic radiation is reduced by the protection structure such, that a processing of the processing layer lying beneath the protection structure by means of the transmitted electromagnetic radiation is prevented.
The protection structure can comprise periodical structures that are configured to diffract impinging electromagnetic radiation constituting the first spectrum, or the protection structure can comprise nanoparticles, such that impinging electromagnetic radiation constituting the first spectrum is scattered on a surface of the nanoparticles. A protection structure in the form of nanoparticles can be provided by means of nanoparticles embedded in a matrix, preferably in a plastic matrix. Conceivable nanoparticles are made from silicon dioxide (S1O2) and titanium dioxide (T1O2).
Hence, in view of the above it can be said that the blockage or barrier provided by means of the protection structure can be based on the reflection, the transmission or the absorption of the electromagnetic radiation being irradiated in order to process the processing layers, wherein said reflection, transmission or absorption depends on the particular wavelength(s) of the irradiated electromagnetic radiation and the intrinsic properties of the protection structure. To this end, the size and the composition of the nanoparticles can be used to effectuate a diffraction of electromagnetic radiation of a particular wavelength. Likewise, a reflection, transmission or absorption occurring for electromagnetic radiation of a particular wavelength(s) can be set based on the shape of the periodical structures provided on the protection structure or the chemical composition or the thickness of the protection structure. The protection structure can be provided in the form of one or more layers, wherein said one or more layers extends at least partially between the first and second processing layers along an extension direction.
Hence, it is possible to provide a protection structure in the form of a single layer that fully extends between the first and second processing layers and thereby completely separates the first and second processing layers from one another. However, the provision of two or more layers constituting the protection structure is likewise conceivable, wherein said two or more layers can be arranged adjacent to one another with respect to the extension direction. In this case it is preferred that the two or more layers differ in their intrinsic properties such that they act as a barrier or blockage for different wavelengths. Moreover, it is also conceivable to provide the protection structure in the form of several thin multilayer structures, wherein the thin multi-layer structures effectuate a thin-film interference of the impinging electromagnetic radiation. That is, depending on the wavelength of the irradiated electromagnetic radiation and the thickness and the composition of the thin multilayers of the protection structure, the waves composing the electromagnetic radiation are reflected by the upper and lower boundaries of the protection structure and interfere with one another such that they eliminate each other.
The data carrier can comprise two or more protection structures, wherein the processing layers and the protection structures are preferably arranged alternating along the extension direction. In this case it is preferred that the individual protection structures differ in their wavelength-selectivity. For example, the data carrier can comprise three processing layers, wherein the first protection structure is arranged between the first and the second processing layer and a second protection structure is arranged between the second and the third processing layer. It is then preferred that the first protection structure is selectively blocking the electromagnetic radiation constituting the first spectrum and that the second protection structure is selectively blocking electromagnetic radiation constituting a second spectrum being different from the first spectrum. In this way the first processing layer can be processed with electromagnetic radiation constituting the first spectrum while the underlying second and third processing layers are protected by the first protection structure and the second processing layer can be processed with electromagnetic radiation constituting the second spectrum while the underlying third processing layer is protected, for example.
The data carrier can further comprise at least one filter structure, preferably a printed filter structure and/or one or more lenses, particularly preferably one or more lenticular lenses, wherein said filter structure is configured to alter the appearance of the first security element and/or the second security element, in particular the appearance of the first part and/or of the second part of the first security element depending on a viewing angle.
A printed filter structure could be provided in the form of printed segments of a light absorbing colour and/or in the form of a light reflecting colour. Moreover, in case that the second security element is provided in two parts, it is likewise conceivable that the filter structure is configured to alter the appearance of the first part and/or the second part of the second security element, depending on the viewing angle.
The filter structure, both in the form of one or more lenses as well as in the form of printed segments, serves the purpose of selectively illuminating the security elements if the data carrier is exposed to light, for example ambient light. In the case of the printed filter structure the selective illumination is achieved in that the printed segments prevent incoming light from propagating towards the security elements. As a result, the security elements are illuminated only at positions where their illumination is not prevented by the printed segments. In the case of the one or more lenses said lenses result in a particular focussing of incoming light onto particular regions of the security elements. Hence, those parts of the security element where the incoming light has not been focussed to will not be illuminated. This partial or selective illumination of the security element confers the security element a changing appearance, wherein the appearance changes in dependence of the viewing angle.
In order to make use of the thus described effect the filter structure should be arranged before the security element and thus before the processing layers with respect to incoming light. This means that the filter structure is preferably arranged on the cover layer and/ or on the base layer.
In a second aspect a data carrier is provided which comprises at least one filter structure and at least one first processing layer which are arranged along an extension direction. The first processing layer comprises at least one security element. The first processing layer is configured to interact with electromagnetic radiation under generation of the at least one security element. The first processing layer preferably comprises at least one of one or more metals, one or more metal- compounds, one or more pigments, and one or more colorants. The filter structure and the security element at least partially overlap when viewed along the extension direction, and the filter structure is configured to alter the appearance of the security element depending on a viewing angle.
That is, the data carrier comprises at least one processing layer which is configured to interact with electromagnetic radiation, whereupon the at least one security element is generated in the processing layer. The filter structure, which preferably corresponds to one or more lenses, particularly preferably one or more lenticular lenses, and/or to one or more printed filter structures, results in a partial and selective illumination of the security element, wherein the appearance of the security element changes in dependence of the viewing angle as described above.
With regard to the first and/or second processing layers preferably comprising one or more metals or metal-compounds, it should be noted that metals, metal- compounds or pigments that are ablated or bleached upon irradiation with electromagnetic radiation are conceivable. However, if a security element such as a colored personalization is desired, a colored metal, metal-compound pigment should be used. For example, conceivable metals can be selected from Al, Cu, Au, Ag, Ti or combinations thereof and conceivable metal-compounds can be selected from TiN, TiCN, CrN, ZrN, TiZrN, ZrCN, TiC, TiCrN, AITiN, TiAIN, diamond like carbon or combinations thereof. Conceivable pigments or colorants are pigments or colorants that are commonly used in the field of the invention, such as the pigments disclosed in EP0327508, W09635585 or WO0136208. In order to allow the irradiated electromagnetic radiation irradiated along the first direction or the second direction to reach the first and/or second processing layers, the cover layer and the base layer should be provided in transparent materials such as polycarbonate or polyethylene terephthalate mentioned above. Generally, it can be said that conceivable materials apart from the already mentioned polycarbonate and the PET are amorphous polyester and co-polyester (A-PET, PET-G) and semi-crystalline polyester (boPET). However, if an irradiation along the first direction only is intended, then the base layer could be provided as opaque material. Typically plastic sheets with filler media, typically titanium dioxide (T1O2) (standard opaque white PC sheets) are used.
One or more filter structures can be printed with standard offset or screen printing inks as they are well known in the field of plastics card printing. To avoid disturbing interactions with irradiating electromagnetic radiation, printed filter structures are preferably transparent in a wavelength region that corresponds to the wavelength region of the irradiated electromagnetic radiation e.g. the printed filter structures can be transparent in the infrared (IR) wavelength region. An IR transparency can be reached by using a mixture of standard primary inks called Cyan, Magenta and Yellow without using carbon black.
The interaction of the processing layer with the electromagnetic radiation could be a partial or entire ablation or a partial or entire bleaching of the processing layer at the regions of interaction of the processing layer with the electromagnetic radiation, wherein the electromagnetic radiation preferably corresponds to laser radiation, see above. At this point it should be noted that the data carrier according to the second aspect essentially corresponds to the data carrier according to the first aspect. The main difference lies in the provision of at least two processing layers and security elements in the data carrier according to the first aspect and the provision of at least a filter structure and at least one processing layer and security element in the data carrier according to the second aspect. However, all features that have been presented in the context of the data carrier according to the first aspect can likewise be present in the data carrier according to the second aspect. For the sake of clarity it is at this point omitted to reproduce the explanations made in the context of the data carrier according to the first aspect. Instead, reference is made to the above.
In a further aspect a security document comprising a data carrier as described above is provided, the security document preferably being an identity card, a passport, a credit card, a bank note or the like.
At this point it should be understood that the data carrier per se can correspond to a security document. This is the case if the data carrier is provided in the form of an identity card, for example. However, it is likewise conceivable to introduce or incorporate the data carrier into a security document. In the case of a passport for example the data carrier could correspond to a page of the passport, wherein said page is made of plastics, i.e. the cover layer and the base layer, within which the processing layer(s) with its security element(s) and possibly one or more protection structures are arranged. To this end it is conceivable that the security document comprises at least one data carrier according to the first aspect and/or at least one data carrier according to the second aspect.
In a further aspect a method of producing a data carrier, preferably a data carrier according to the first aspect as described above is provided, the method comprising the steps of:
- Providing at least a first processing layer and a second processing layer along an extension direction, and
- Providing at least a first security element and a second security element on the first processing layer and/or on the second processing layer.
At least the first security element is comprised of a first part and of a second part, wherein the first part of the first security element is provided on the first processing layer and the second part of the first security element is provided on the second processing layer. The first security element is configured to exhibit a first appearance under a first viewing angle and a second appearance being different from the first appearance under a second viewing angle being different from the first viewing angle.
Electromagnetic radiation can be irradiated along the extension direction and/or along a direction extending opposite to the extension direction in order to generate the first security element and/or the second security element. The first security element and/or the second security element are thereby preferably produced by means of a partial or entire ablation and/or by means of a partial or entire bleaching of the processing layers at the positions of the impinging electromagnetic radiation. Security element(s) on the first processing layer are preferably produced by irradiating electromagnetic radiation along the extension direction, whereas security element(s) on the second processing layer are preferably produced by irradiating electromagnetic radiation along a direction running opposite to the extension direction. In other words, it is preferred to irradiate the data carrier from both sides such that the processing layers are processed individually, and wherein the uppermost processing layer is processed in each case. Security elements being provided in the form of one or more parts, which can be distributed over the processing layers, are advantageously produced in this way.
In order to prevent an unintentional ablation of the underlying processing layer it is preferred to provide a protection structure as described above between the processing layers. That is, a protection structure can be provided which acts as a barrier or blockage for the respectively underlying processing layer with regard to an irradiation of the particular wavelength(s) it is sensitive to from both sides of the data carrier. If three or more processing layers are used it is preferred to use two or more protection structures that are in each case arranged between successive processing layers. These two or more protection structures are then preferably selective for one or more particular wavelength(s) only, wherein said selectivity is preferably different for each protection structure.
In a further aspect a method of producing a data carrier, preferably a data carrier according to the second aspect described above is provided, the method comprising the steps of:
- Providing at least a filter structure and a first processing layer along an extension direction,
- Providing at least one security element on the first processing layer.
The first processing layer is configured to interact with electromagnetic radiation, whereby the at least one security element is generated. The first processing layer preferably comprises at least one of one or more metals, one or more metal-compounds, one or more pigments, and one or more colorants. The filter structure and the first processing layer at least partially overlap when viewed along the extension direction, and the filter structure is configured to alter the appearance of the security element depending on a viewing angle. All layers of the data carrier such as the processing layers and, if applicable, the filter structure are preferably fused together by means of lamination in a lamination step. In case that one or more printed filter structures are provided on the data carrier then said filter structures are preferably applied to the particular layer(s) they are intended for by means of printing them to the layer(s) before the lamination step. In case that one or more filter structures in the form of lenses are provided, then said filter structures can be provided by means of imprinting them into the layer(s) they are intended for from an engraved metal plate during the lamination process.
BRIEF DESCRIPTION OF THE DRAWINGS
Preferred embodiments of the invention are described in the following with reference to the drawings, which are for the purpose of illustrating the present preferred embodiments of the invention and not for the purpose of limiting the same. In the drawings,
Fig. 1 a shows a front view of a data carrier comprising two processing layers and a first and a second security element;
Fig. 1 b shows an exploded view of the data carrier according to figure 1 a;
Fig. 2a shows a first view on a data carrier comprising two processing layers and a first and second security element according to another embodiment;
Fig. 2b shows a second view on the data carrier according to figure 2a;
Fig. 3 shows a front view on a data carrier comprising two processing layers and security elements according to another embodiment;
Fig. 4 shows a front view on a data carrier comprising two processing layers and security elements according to another embodiment;
Fig. 5 shows a front view on a data carrier comprising four processing layers and security elements according to another embodiment;
Fig. 6a shows a detailed view of the security element on the first processing layer of the data carrier according to figure 5;
Fig. 6b shows a detailed view of security element on the second processing layer of the data carrier according to figure 5;
Fig. 6c shows a detailed view of the security element on the third processing layer of the data carrier according to figure 5;
Fig. 6d shows a detailed view of the security element on the fourth processing layer of the data carrier according to figure 5;
Fig. 7a shows a cross-sectional view of a data carrier comprising two processing layers and a spacing layer in an initial state; Fig. 7b shows a cross-sectional view of the data carrier according to figure 7a in a processing state;
Fig. 7c shows a cross-sectional view of the data carrier according to figure 7a in a final state;
Fig. 7d shows a cross-sectional view of the data carrier according to figure 7a in a final state, wherein two security elements are schematically indicated;
Fig. 8a shows a cross-sectional view of a data carrier comprising two processing layers and a protection structure in an initial state;
Fig. 8b shows a cross-sectional view of the data carrier according to figure 8a in a processing state;
Fig. 8c shows a cross-sectional view of the data carrier according to figure 8a in a final state;
Fig. 8d shows a cross-sectional view of the data carrier according to figure 8a in the final state, wherein two security elements are schematically indicated;
Fig. 9 shows a cross-sectional view of a data carrier comprising four processing layers and three spacing layers;
Fig. 10 shows a cross-sectional view of a data carrier comprising two processing layers, a spacing layer and a filter structure;
Fig. 1 1 shows a cross-sectional view of a data carrier comprising two processing layers, a spacing layer and a filter structure according to another embodiment;
Fig. 12 shows a cross-sectional view of a data carrier comprising one processing layer and a filter structure according to another embodiment;
Fig. 13 shows a cross-sectional view of a data carrier comprising one processing layer and a filter structure according to another embodiment;
Fig. 14 shows a cross-sectional view of a data carrier comprising one processing layer and a filter structure according to another embodiment;
Fig. 15 shows a cross-sectional view of a data carrier comprising one processing layer and a filter structure according to another embodiment.
DESCRIPTION OF PREFERRED EMBODIMENTS
In figures 1 a to 1 1 several embodiments of a data carrier 1 comprising at least two processing layers 4a, 4b and at least two security elements 6a, 6b provided on said processing layers 4a, 4b are disclosed. With respect to figures 12 to 15 several embodiments of a data carrier 1 comprising one processing layer 4a with one or more security elements 6a provided thereon are disclosed. In the following, aspects of said data carriers 1 are discussed in greater detail. In fact, different realizations of a data carrier 1 according to the invention are discussed primarily phenomenologically with respect to figures 1 a to 6d. Their structural design and their production method are shown and explained in the context of figures 7a to 1 1 . All data carriers 1 have in common that they comprise at least a first processing layer 4a and a second processing layer 4b which are arranged along an extension direction E1 , wherein at least two security elements 6a, 6b are provided on said processing layers. Moreover, the first processing layer 4a comprises at least a first part 61 a of a first security element 6a and a first part 61 b of a second security element 6b. In addition, the first security element 6a is configured to exhibit a first appearance under a first viewing angle a1 and a second appearance being different from the first appearance under a second viewing angle a2 being different from the first viewing angle.
Hence, in figures 1 a and 1 b a data carrier 1 comprising a first processing layer 4a and a second processing layer 4b is depicted, wherein said data carrier 1 comprises, inter alia, a first security element 6a in the form of a portrait and a second security element 6b in the form of the alphabetic characters“Data”. As best seen in figure 1 b, both security elements 6a, 6b are split into parts, wherein said parts are distributed over the first and second processing layers 4a, 4b. That is, the first security element 6a in the form of the portrait is split into four parts 61 a-64a, wherein two of said parts 61 a-62a are arranged on the first processing layer 4a and the other two of said parts 63a-64a are arranged on the second processing layer 4b. The two lines L1 , L2 dividing the data carrier 1 into the four parts in figure 1 a are no real lines being physically present on the data carrier 1 but are indicated in said figure as an illustration aid. To this end, the lower left side 61 a of the portrait 6a and the upper right side 62a of the portrait 6a are provided on the first processing layer 4a, whereas the upper left side 63a of the portrait 6a and the lower right side 64a of the portrait 6a are provided on the second processing layer 4b. The four parts 61 a-64a comprising these different sides of the portrait 6a are provided on the first and second processing layers 4a, 4b such, that the boundaries of the respective parts rest against each other when viewed from the first processing layer 4a towards the second processing layer 4b along the extension direction E1 . In other words, the four parts 61 a-64a are in each case arranged separate from one another but immediately adjacent to one another when viewed along the extension direction E1 . As already mentioned, also the second security element 6b provided in the form of the alphabetic characters“Data” is split into parts 61 b, 62b and distributed over the first processing layer 4a and the second processing layer 4b. Namely, on the first processing layer 4a the letters“Data” are provided in the form of recesses 61 b and on the second processing layer 4b the letters“Data” are provided as elevations 62b. The letters“Data” in the form of the recesses 61 b on the first processing layer 4a and the letters“Data” in the form of the elevations 62b on the second processing layer 4b are configured complementary to each other. Moreover, the recesses 61 b on the first processing layer 4a are provided in a region of the first processing layer 4a where also the lower left side 61 a of the portrait 6a is provided, i.e. the recesses 61 b overlap said part 61 a of the portrait 6a. Thus, the first security element 6a in the form of the portrait, in particular its first part 61 a comprising the lower left side of the portrait 6a, and the second security element 6b in the form of the alphabetic characters, in particular its first part 61 b comprising the letters“Data” provided by means of recesses, overlap with each other. In addition, the first part 61 a of the security element 6a comprising the lower left side of the portrait 6a arranged on the first processing layer 4a and the second part 62b of the second security element 6b comprising the letters“Data” in the form of the elevations provided on the second processing layer 4b overlap with each other with respect to the extension direction E1 .
As will be explained in greater detail further below with reference to figures 7a to 8d, some regions on the first processing layer 4a and on the second processing layer 4b are partially or even completely removed from these layers. Here, if one were to define four squared regions A1 -A4 on the first processing layer 4a and four squared regions B1 -B4 on the second processing layer 4b that are delimited by the (fictitious) lines L1 , L2 in figure 1 a, then the squared region A1 located in the upper left corner of the first processing layer 4a is essentially entirely removed in order to unravel the upper left part 63a of the portrait 6a located underneath in the upper left region B1 of the second processing layer 4b. Likewise, the squared region B3 located in the upper right corner of the second processing layer 4b is essentially entirely removed in order to unravel the upper right part 62a of the portrait 6a located above in the upper right region A3 of the first processing layer 4a, and the squared region A4 located in the lower right corner of the first processing layer 4a is essentially entirely removed in order to unravel the lower right part 64a of the portrait 6a located underneath in the lower right region B4 of the second processing layer 4b, respectively. Regarding the lower left region A2 on the first processing layer 4a, there too the first processing layer 4a is essentially entirely removed with the exception of the area 61 a constituting the lower left side of the portrait 6a. Analogously, the lower left region B2 on the second processing layer 4b is essentially entirely removed with the exception of the area 62b constituting the letters“Data” in the form of the elevations. In this context it should be noted that an essentially entirely removed processing layer 4a, 4b corresponds to a layer which is physically removed, e.g. a metal layer that is at least partially or entirely ablated, or a layer that is essentially transparent, e.g. a layer comprising additives or pigments that are partially or entirely bleached. Hence, a recess can correspond to a physically ablated area on a processing layer or to a bleached area on a processing layer. Likewise, an elevation can correspond to an area not being ablated but being surrounded by ablated area or to an unbleached area being surrounded by a bleached area.
From figures 2a and 2b the aspect regarding the changing appearances of the first security element 6a in dependence on the viewing angles a1 , a2 will become apparent. Firstly, it should be noted that the data carrier 1 depicted in these figures essentially corresponds to the schematic data carrier 1 depicted in figures 1 a and 1 b. The main difference lies in the provision of a first security element 6a by means of the numeric data“20.03.18”, which extends along an entire width of the second security element 6b in the form of the portrait, and in that the first security element 6a is provided in two parts 61 a, 62a that are distributed over the two processing layers 4a, 4b. The second security element 6b, i.e. the portrait, is as well split on the two processing layers 4a, 4b by using the form of the numeric data“20.03.18”, but in contrary to figures 1 a and 1 b, the portrait is in this embodiment not quartered to regions. The first security element 6a in the form of the numeric data is again distributed in parts over the first processing layer 4a and the second processing layer 4b, wherein one part is configured as a recess 61 a and the other part is configured as a corresponding elevation 62a. Moreover, the first security element 6a and the second security element 6b at least partially overlap, i.e. the numeric data 6a is provided in regions where also parts of the portrait 6b are provided.
In figure 2a, the data carrier 1 is depicted under a first viewing angle cd . Under this first viewing angle cd , both the first security element 6a and the second security element 6b are visible. In figure 2b, the data carrier 1 is depicted under a second viewing angle a2 being different from the first viewing angle cd . Under this second viewing angle a2 only the second security element 6b in the form of the portrait is visible, whereas the first security element 6a in the form of the numeric characters is invisible. The appearance of the first security element 6a has thus changed from being visible to being invisible. With regard to the second security element 6b it should be noted that the allegedly change of appearance between figure 2a and 2b does not correspond to a change of appearance in the sense of the present invention. In fact, the appearance of the portrait does not change in dependence of the viewing angle. Instead, the portrait depicted in figure 2a seems to be dark due to the presence of the background behind the data carrier 1 and the fact that it has not been illuminated at the moment when the photo of said data carrier 1 has been taken.
The data carriers 1 depicted in figures 3 and 4 in each case comprise a security element 6b in the form of a portrait as described with reference to figures 2a and 2b. Moreover, conceivable further arrangements of further security elements 6a, 6c-6d are schematically indicated on the data carrier 1 by the expression“Data” surrounded by the arrows within the grey areas. To this end various designs and arrangements of these other security elements 6a, 6c-6d are conceivable. For example, these other security elements could be provided as images, as alphanumeric characters, as patterns or fringes, preferably as Moire fringes. A Moire fringe could be provided by means of generating a first line grid on the first processing layer 4a which superposes with a second line grid generated on the second processing layer 4b when viewed along the extension direction E1. Moreover, one or more of these other security elements 6a, 6c could be arranged such that they at least partially or completely enclose or complement each other and/or the security element 6b in the form of the portrait. In addition or alternatively, one or more of these other security elements 6d can at least partially or entirely overlap with each other and/or with the security element 6b in the form of the portrait. To this end an enclosure or overlap is conceivable with respect to the extension direction E1 and/or with respect to a direction running parallel to a plane p extending through the processing layers 4a, 4b, the latter being considered as a spatial overlap or enclosure of the particular security elements on a particular processing layer.
As initially mentioned, in figure 5 a data carrier 1 is depicted which comprises more than two processing layers 4a, 4b, namely four processing layers 4a-4d in the present case. The first processing layer 4a, the second processing layer 4b, the third processing layer 4c and the fourth processing layer 4d are again arranged along the extension direction E1 , wherein several security elements 6a-6c are provided on these processing layers. The particular security elements on the particular processing layers are depicted individually in figures 6a to 6d. That is to say, each of the processing layers 4a-4d has been individually provided with individual parts of the security elements 6a-6c, here security elements 6a in the form of the numeric character“8” and in the form of images depicting circles 6c and an essentially triangular structure 6b. All processing layers 4a-4c except the processing layer 4d depicted in figure 6d comprise parts 61 a-63a, 61 b-63b of two security elements 6a, 6b, namely of the security element 6a constituting the numeric character“8” and of the security element 6b constituting the essentially triangular image. As becomes evident from figures 6a to 6c, the different parts 61 a-63a, 61 b- 63b of the different security elements 6a, 6b are arranged spatially apart from one another on the particular processing layers 4a-4c. Moreover, the geometric extension of the parts 61 a-63a constituting the security element 6a in the form of the numeric character“8” and of the parts constituting 61 b-63b the security element 6b in the form of the essentially triangular structure vary between the different processing layers 4a-4c. By arranging these parts 61 a-63a, 61 b-63b on the particular processing layer 4a-4c such, that the parts of the respective security element essentially come to lie one below the other when viewed along the extension direction E1 , security elements exhibiting a depth effect are generated.
As mentioned initially, the method of production of data carriers 1 as just described are disclosed with reference to figures 7a to 9. Throughout these figures a data carrier 1 comprising a cover layer 2 and a base layer 3 is disclosed, wherein the processing layers 4a, 4b are arranged between the cover layer 2 and the base layer 3. The cover layer 2 and the base layer 3 are made from plastics, here from polycarbonate (PC) or polyethylene terephthalate (PET). That is, both layers are essentially transparent. Regarding the data carriers 1 depicted in figures 7a to 15 it should be noted that they are depicted in an exploded view for reasons of clarity. That is, the individual layers are depicted separate from one another, although in the actual data carrier they are arranged adjoining and immediately on top of each other.
As becomes evident from figure 7a, the data carrier 1 is comprised of the cover layer 2, the first processing layer 4a, the second processing layer 4b and the base layer 3 being arranged, in this sequence, along the extension direction E1 . The processing layers 4a, 4b are metallic layers and two opaque areas 6 are provided sideways to the processing layers 4a, 4b. A spacing layer 5a is arranged between the first processing layer 4a and the second processing layer 4b. This spacing layer 5a serves the purpose of an intermediate layer which spatially separates the processing layers 4a, 4b from one another. Depending on the information, i.e. security element, that is to be generated in the data carrier 1 by means of accordingly processing the processing layers 4a, 4b such spacing between the processing layers is advantageous or even necessary. The spacing layer is preferably made from a transparent material, particularly preferably from polycarbonate or polyethylene terephthalate. With respect to figure 7b the generation of two security elements 6a, 6b on the data carrier 1 is depicted. In particular, starting from the unprocessed data carrier 1 according to figure 7a, a processing of the first and second processing layers 4a, 4b is achieved in a first step by irradiating electromagnetic radiation R along the extension direction E1 in order to selectively ablate the first processing layer 4a and by irradiating electromagnetic radiation R along a direction E2 running opposite to the extension direction E1 in order to selectively ablate the second processing layer 4b in a second step. It should be noted that this procedure is analogous in case of processing layers that are configured to be bleached upon the interaction with electromagnetic radiation. Explanations provided above as well further below with regard to an ablation of the processing layers thus likewise apply to a bleaching of the processing layers. As follows from figure 7b, the ablation of the processing layers 4a, 4b in the region of incident laser radiation R results in several modified regions 41 a, 41 b corresponding to laser treated areas as well as unmodified regions 42a, 42b corresponding to untreated areas. The modified regions 41 a, 41 b together with the unmodified regions 42a, 42b represent the security elements 6a, 6b. In the depicted situation the processing layers 4a, 4b are ablated such, that a first security element 6a comprising a first part 61 a located on the first processing layer 4a and a second part 62a located on the second processing layer 4b is generated, wherein the first part 61 a overlaps with a second security element 6b being exclusively formed on the first processing layer 4b. This situation is schematically illustrated by the rectangles indicated in figure 7d. It should be noted that the rectangles are fictive rectangles that serve the purpose of an illustration aid. In fact, the rectangles are intended to indicate the two security elements 6a, 6b. The second security element 6b could correspond to an image, for example a portrait, on which the first security element 6a in the form of an alphanumeric character is superposed. In this example the second processing layer 4b is preferably entirely removed in those regions that lie beneath the regions of the first processing layer 4a in which only the second security element 6b in the form of the portrait is formed.
The data carrier 1 depicted in figures 8a to 8d essentially correspond to the data carrier 1 depicted in figures 7a to 7d, with the exception that two spacing layers 5a, 5b and a protection structure 9a are arranged between the first processing layer 4a and the second processing layer 4b. The protection structure 9a in this example corresponds to an ink that is applied between the two transparent spacing layers 5a, 5b which are in turn arranged between the two processing layers 4a, 4b and which ink is applied along a direction running perpendicularly to the extension direction El and parallel to the plane p extending through the processing layers 4a, 4b. Here, the ink is applied along an entire length of the processing layers 4a, 4b. That is, the processing layers 4a, 4b are completely separated from each other by the spacing layers 5a, 5b and the protection structure 9a. In figure 8b the irradiation of electromagnetic radiation R along the extension direction E1 as well as the irradiation of electromagnetic radiation R along the direction E2 running opposite to the extension direction E1 is shown. As indicated in the figure, the electromagnetic radiation R irradiated along the extension direction E1 ablates the first processing layer 4a and the electromagnetic radiation R irradiated along the opposite direction E2 ablates the second processing layer 4b. In the former case the protection structure 9a prevents the electromagnetic radiation R from impinging on the second processing layer 4b and in the latter case the protection structure 9a prevents the electromagnetic radiation R from impinging on the first processing layer 4a, respectively. Hence, the protection structure 9a acts as a barrier or blockage for the respectively underlying processing layer 4a, 4b with regard to an irradiation from both sides of the data carrier 1 . In the present case, the blocking of the electromagnetic radiation R is based on absorption of this radiation by the components constituting the protection structure 9a, i.e. the ink. Due to the fact that the protection structure 9a prevents an unintentional ablation of underlying processing layers 4a, 4b, a precise production of the security-feature-bearing data carrier 1 with several security elements 6a, 6b provided and/or split over several processing layers is enabled, see figures 8c and 8d. Hence, here again modified regions 41 a, 41 b and unmodified regions 42a, 42b are generated upon the interaction with the electromagnetic radiation, which together represent the security elements 6a, 6b. As in the case of the data carrier according to figure 7d fictive rectangles are used in figure 8d for illustrating the two generated security elements 6a, 6b of the data carrier 1 .
In figure 9 a data carrier 1 comprising four processed processing layers 4a- 4d and three transparent spacing layers 5a-5c arranged there between is depicted. To this end the processing layers 4a-4d and the transparent spacing layers 5a-5c are arranged alternating with respect to the extension direction E1 . A processing of the different processing layers 4a-4d, and hence the generation of different security elements, is done by separately and selectively processing the individual processing layers 4a-4d. For example, starting from an unprocessed data carrier 1 , in a first step a processing of the first and fourth processing layers 4a, 4d can be achieved by irradiating electromagnetic radiation along the extension direction E1 in order to selectively ablate the first processing layer 4a and by irradiating electromagnetic radiation along the opposite direction E2 in order to selectively ablate the fourth processing layer 4d, such that modified regions 41 a, 41 d are created only in the first and fourth processing layers 4a, 4d. In a second step, radiation R having a wavelength being different from the wavelength of the radiation R irradiated in the first step is irradiated onto the data carrier 1 along the extension direction E1 and along the opposite direction E2This radiation is irradiated at positions where the first and fourth processing layers 4a, 4d were already ablated in the first step. In this way, congruent recesses 43a, 43b in the first and second processing layers 4a, 4b and congruent recesses 43c, 43d in the third and fourth processing layers 4c, 4d are generated. Hence, by providing several processing layers 4a-4dspecifically modified and unmodified regions 41 a-41 d, 42a-42d and corresponding at least partially congruent recesses 43a-43d as well as unique recesses 44a-44d are created, which enables the production of a multilayer data carrier comprising complex security elements distributed and/or split over several processing layers at high precision.
In figures 10 and 1 1 data carriers 1 comprising two processing layers 4a, 4b and a transparent spacing layer 5a are depicted, wherein said two processing layers 4a, 4b were processed and thus provided with security elements as described above. However, said data carriers 1 additionally comprise a filter structure 7a, 7b arranged on the cover layer 2, wherein said filter structure 7a, 7b is configured to alter the appearance of security elements provided on the processing layers 4a, 4b depending on a viewing angle. In the data carrier 1 according to figure 10 said filter structure corresponds to a printed filter structure 7a provided in the form of printed segments of a light absorbing colour or light reflecting colour. In order to protect the printed filter structure 7a from external influences another transparent layer, referred to as top layer 8, is arranged on top of the cover layer 2, i.e. the printed filter 7a structure is embedded between the top layer 8 and the cover layer 2. In the data carrier 1 according to figure 1 1 said filter structure 7b is provided in the form of lenticular lenses. The filter structure 7a 7b, both in the form of one or more lenses as well as in the form of printed segments, serves the purpose of selectively illuminating the security elements if the data carrier 1 is exposed to light, for example ambient light. This partial or selective illumination of the security elements confers the security elements a changing appearance, wherein the appearance changes in dependence of the viewing angle.
The data carriers 1 depicted in figures 12 to 15 differ from the previously discussed data carriers 1 in that they comprise only one processing layer 4a. However, it should be understood that one or more security elements can be generated in the same way as in the case of the above data carriers 1 , namely by selectively irradiating electromagnetic radiation along the extension direction E1 and along the opposite direction E2. Moreover, these data carriers 1 in each case comprise a filter structure 7a, 7b as just discussed. To this end the data carriers 1 according to figures 12 and 13 comprise a filter structure 7b in the form of lenticular lenses, wherein the lenticular lenses are provided along an entire width of the processing layer 4a (see figure 12) or wherein the lenticular lenses are provided only in some regions (see figure 13). The same holds for the data carriers 1 depicted in figures 14 and 15, wherein there the filter structure 7a is provided in the form of printed segments. LIST OF REFERENCE SIGNS data carrier 9a protection structure cover layer E1 extension direction base layer E2 opposite directiona-4d processing layer p plane
1 a-41 d modified region R electromagnetic2a-42d unmodified region radiation
3a-43d congruent recess a1 , a2 viewing angle4a-44d unique recess L1 , L2 line
a-5c spacing layer A1-A4 region
a-6d security element B1-B4 region
1 a-64d parts
1 b-62b parts
a, 7b filter structure
top layer

Claims

1 . A data carrier (1 ) comprising:
- at least a first processing layer (4a) and a second processing layer (4b) which are arranged along an extension direction (E1 ), and
- at least a first security element (6a) and a second security element (6b) being arranged on the first processing layer (4a) and/or on the second processing layer (4b),
characterized in that at least the first security element (6a) is comprised of at least a first part (61 a) and a second part (62a), wherein the first part (61 a) of the first security element (6a) is provided on the first processing layer (4a) and the second part (62a) of the first security element (6a) is provided on the second processing layer (4b), and
in that the first security element (6a) is configured to exhibit a first appearance under a first viewing angle (a1 ) and a second appearance being different from the first appearance under a second viewing angle (a2) being different from the first viewing angle (a1 ).
2. The data carrier (1 ) according to claim 1 , wherein the first security element (6a) and the second security element (6b) at least partially overlap with each other with respect to the extension direction (E1 ).
3. The data carrier (1 ) according to any one of the preceding claims, wherein the first part (61 a) of the first security element (6a) on the first processing layer (4a) and the second part (62a) of the first security element (6a) on the second processing layer (4b) at least partially overlap with each other when viewed along the extension direction (E1 ), or
wherein the first part (61 a) of the first security element (6a) on the first processing layer (4a) and the second part (62a) of the first security element (6a) on the second processing layer (4b) are spaced apart from each other when viewed along the extension direction (E1 ).
4. The data carrier (1 ) according to any one of the preceding claims, wherein the first security element (6a) at least partially encloses the second security element (6b) when viewed along the extension direction (E1 ), or
wherein the second security element (6b) at least partially encloses the first security element (6a) when viewed along the extension direction (E1 ).
5. The data carrier (1 ) according to any one of the preceding claims, wherein the first security element (6a) at least partially complements the second security element (6b) when viewed along the extension direction (E1 ), and/or
wherein the second security element (6b) at least partially complements the first security element (6a) when viewed along the extension direction (E1 ).
6. The data carrier (1 ) according to any one of the preceding claims, wherein the first part (61 a) of the first security element (6a) on the first processing layer (4a) and the second part (62a) of the first security element (6a) on the second processing layer (4b) are configured complementary to one another, the first part (61 a) of the first security element (6a) on the first processing layer (4a) preferably being configured as a recess and the second part (62a) of the first security element (6a) on the second processing layer (4b) being preferably configured as a corresponding elevation or vice versa.
7. The data carrier (1 ) according to any one of the preceding claims, wherein the first security element (6a) and/or the second security element (6b) is provided in the form of an image, an alphanumeric character, a pattern or a fringe, preferably a Moire fringe, or an optical grating, preferably a diffractive structure, the first security element (6a) and the second security element (6b) are preferably provided in different forms.
8. The data carrier (1 ) according to any one of the preceding claims, wherein the first processing layer (4a) and/or the second processing layer (4b) are configured to interact with electromagnetic radiation (R), the first processing layer (4a) and/or the second processing layer (4b) preferably comprising at least one of: one or more metals, one or more metal-compounds, one or more pigments, and one or more colorants.
9. The data carrier (1 ) according to any one of the preceding claims, further comprising at least one protection structure (9a) which is arranged between the first processing layer (4a) and the second processing layer (4b), wherein the protection structure (9a) is configured such that, upon irradiation of electromagnetic radiation (R) constituting a first spectrum along the extension direction (E1 ), the protection structure (9a) essentially entirely prevents said electromagnetic radiation (R) from impinging on the second processing layer (4b).
10. The data carrier (1 ) according to any one of the preceding claims, further comprising at least one filter structure (7a; 7b), preferably a printed filter structure (7a) and/or one or more lenses (7b), particularly preferably one or more lenticular lenses, wherein said filter structure (7a; 7b) is configured to alter the appearance of the first security element (6a) and/or of the second security element (6b), in particular the appearance of the first part (61 a) and/or of the second part (62a) of the first security element (6a) depending on a viewing angle.
1 1 . A data carrier (1 ) comprising at least one filter structure (7a; 7b) and at least one first processing layer (4a) which are arranged along an extension direction (E1 ), wherein the first processing layer (4a) comprises at least one security element (6a),
characterized in that the first processing layer (4a) is configured to interact with electromagnetic radiation (R) under generation of the at least one security element (6a), the first processing layer (4a) preferably comprising at least one of one or more metals, one or more metal-compounds, one or more pigments, and one or more colorants,
in that the filter structure (7a; 7b) and the security element (6a) at least partially overlap when viewed along the extension direction (E1 ), and
in that the filter structure (7a; 7b) is configured to alter the appearance of the security element (6a) depending on a viewing angle.
12. A security document comprising a data carrier (1 ) according to any one of the preceding claims, the security document preferably being an identity card, a passport, a credit card, a bank note or the like.
13. A method of producing a data carrier, preferably a data carrier (1 ) according to any one of the preceding claims 1 to 10, the method comprising the steps of:
- Providing at least a first processing layer (4a) and a second processing layer (4b) along an extension direction (E1 ), and
- Providing at least a first security element (6a) and a second security element (6b) on the first processing layer (4a) and/or on the second processing layer (4b), wherein at least the first security element (6a) is comprised of a first part (61 a) and of a second part (62a), wherein the first part (61 a) of the first security element (6a) is provided on the first processing layer (4a) and the second part (62a) of the first security element (6a) is provided on the second processing layer (4b), and wherein the first security element (6a) is configured to exhibit a first appearance under a first viewing angle (a1 ) and a second appearance being different from the first appearance under a second viewing angle (a2) being different from the first viewing angle (a1 ).
14. The method according to claim 13, wherein electromagnetic radiation (R) is irradiated along the extension direction (E1 ) and/or along a direction (E2) extending opposite to the extension direction (E1 ) in order to generate the first security element (6a) and/or the second security element (6b).
15. A method of producing a data carrier, preferably a data carrier (1 ) according to claim 1 1 , the method comprising the steps of:
- Providing at least a filter structure (7a; 7b) and a first processing layer (4a) along an extension direction (E1 ),
- Providing at least one security element (6a) on the first processing layer (4a),
wherein the first processing layer (4a) is configured to interact with electromagnetic radiation (R), the first processing layer (4a) preferably comprising at least one of one or more metals, one or more metal-compounds, one or more pigments, and one or more colorants,
wherein the filter structure (7a; 7b) and the first processing layer (4a) at least partially overlap when viewed along the extension direction (E1 ), and
wherein the filter structure (7a; 7b) is configured to alter the appearance of the security element (6a) depending on a viewing angle.
PCT/EP2020/060341 2019-04-19 2020-04-10 Multilayer ablation features WO2020212288A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
EP20716530.9A EP3956149A1 (en) 2019-04-19 2020-04-10 Multilayer ablation features

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
EP19170407.1 2019-04-19
EP19170407.1A EP3674100A1 (en) 2018-12-28 2019-04-19 Multilayer ablation features

Publications (1)

Publication Number Publication Date
WO2020212288A1 true WO2020212288A1 (en) 2020-10-22

Family

ID=70154425

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/EP2020/060341 WO2020212288A1 (en) 2019-04-19 2020-04-10 Multilayer ablation features

Country Status (1)

Country Link
WO (1) WO2020212288A1 (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0327508A2 (en) 1988-02-03 1989-08-09 Ciba-Geigy Ag Process for laser marking of pigmented systems
WO1996035585A1 (en) 1995-05-10 1996-11-14 Dsm N.V. Method for the manufacture of a coloured mark
WO2001036208A2 (en) 1999-11-18 2001-05-25 Orga Kartensysteme Gmbh Method for applying coloured information on an object
WO2007085808A1 (en) * 2006-01-26 2007-08-02 De La Rue International Limited Security document
WO2012097463A1 (en) 2011-01-18 2012-07-26 Trüb AG Method for producing a multilayer data carrier and data carrier produced by said method
EP3321095A1 (en) * 2016-11-10 2018-05-16 Gemalto Sa Method for producing a data carrier and data carrier produced therefrom

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0327508A2 (en) 1988-02-03 1989-08-09 Ciba-Geigy Ag Process for laser marking of pigmented systems
WO1996035585A1 (en) 1995-05-10 1996-11-14 Dsm N.V. Method for the manufacture of a coloured mark
WO2001036208A2 (en) 1999-11-18 2001-05-25 Orga Kartensysteme Gmbh Method for applying coloured information on an object
WO2007085808A1 (en) * 2006-01-26 2007-08-02 De La Rue International Limited Security document
WO2012097463A1 (en) 2011-01-18 2012-07-26 Trüb AG Method for producing a multilayer data carrier and data carrier produced by said method
EP3321095A1 (en) * 2016-11-10 2018-05-16 Gemalto Sa Method for producing a data carrier and data carrier produced therefrom

Similar Documents

Publication Publication Date Title
AU2016222386B2 (en) Method for producing a multilayer data carrier and data carrier produced by said method
US7790361B2 (en) Methods of producing diffractive structures in security documents
EP3697624B1 (en) Security devices, security articles, security documents and methods for their manufacture
US20080042427A1 (en) Security Article with Multicoloured Image
EP3697623B1 (en) Security documents and methods of manufacture thereof
US11453234B2 (en) Security document including an optical security feature
WO2010121293A1 (en) Optically variable device and security document including same
CA2671611C (en) Security element having an optically variable element
RU2586812C2 (en) Protective device with variable optical properties for valuable documents
EP3674100A1 (en) Multilayer ablation features
WO2020212288A1 (en) Multilayer ablation features
EP3956149A1 (en) Multilayer ablation features
US20200331284A1 (en) Color laser marking of security document and a method for producing such security document
EP3674098A1 (en) Ablation blockers
JP7461496B2 (en) Data carriers protected against subsequent laser marking
AU2015251500A1 (en) Volume holograms for security documents
WO2020212289A1 (en) Ablation blockers
EP3956148A1 (en) Ablation blockers
GB2584552A (en) Security devices, security articles, security documents and methods for their manufacture
MXPA06006860A (en) Security article with multicoloured image

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 20716530

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

WWE Wipo information: entry into national phase

Ref document number: 2020716530

Country of ref document: EP