[0001] The present invention relates to systems and methods for authenticating, identifying
or marking objects or individuals using security features that undergo at least in
part dynamic modification process.
[0002] Many of the known security systems make use of static security features for anti-forgery
protection or the prevention of abuse. A way of producing such security features is
to make them appear invisible to the forger. This type of system functions well only
as long as the forger has no knowledge of rendering it visible, copying or stealing
the security element. If, for example, the identity card or an access card is stolen,
the holder thereof, although not authorized, can identify himself and possibly gain
access to restricted areas.
DE 10 2004 045 211 A1 concerns a security document comprising a flexible carrier and a multi-layer flexible
film body which is applied to the flexible carrier and which provides one or more
optical security features. The flexible multi-layer film body has an electrically
controller display element for generating an optical security feature with associated
electrical current source for operation of the display element in combination with
an optically active diffractive structure.
[0003] The security document described in
DE 10 2005 030 626 A1 has an integrated circuit for communication with an external read and/or write device
and at least one display system integrated into the security document. This is designed
to provide a self-personalising document. After the personalisation the display system
contains person-specific and/or document-specific data, in particular the name and/or
biometric data of the document holder or the validity period of the document. A security
document of this type is also rigid with its security features and does not avoid
an unauthorised bearer to gain access to certain areas or copy and use it to mark
a forgery, such as a painting or piece of furniture.
[0004] There is a requirement to provide security for the authentication, identification,
the marking of objects or individuals, for example for gaining physical or digital
access to a device in order to carry out transactions. The mere input of digit numbers,
letters, symbols or other features does not hinder an unauthorized bearer to use the
device for unauthorized transactions. If an unauthorized person knows the code, the
true user can only block the device from performing further actions, but at this time
it can already be too late.
[0005] The use of biometric features constitutes one possible solution, but as a static
factor is still prone to being hijacked or copied and not always very reliable. Such
a system is described in
JP 2010286920 A, where a user inputs several digits of his/her own identification number to a touch
panel of a fingerprint authentication terminal. The user puts a finger on a fingerprint
sensor of the fingerprint authentication terminal. Authentication is performed using
the fingerprint data read by the fingerprint sensor and the personal ID-number. If
there is a certain degree of match between the data and input information, the user
is authenticated.
[0006] There are security systems that make use of the properties of certain materials for
identification purposes.
DE 20 2005 005 130 U1, for instance, describes a textile identification arrangement with security features
for protection against plagiarisms. The arrangement consists of at least one first
and second pigment layer and the polymer supporting layer, whereby the first and second
pigment layers are arranged on the supporting layer. The first pigment layer has at
least one type of interference pigment in the form of a geometric pattern that is
used as a security feature.
[0007] WO 2012/109294 A1 describes a similar approach using a security feature consisting of a product code,
comprising at least one modified character that is different from a corresponding
one of a plurality of unmodified characters of the initial product code. The modified
product code includes a covert feature, which is not generally noticeable as a code
to the casual consumer. Again, this method must be regarded as a static method because
the modified code is printed similar to the way any conventional character is printed,
without any dynamic change. The digitized characters are then stored in a printer
controller. An algorithm can be applied to modify one or more characters of the product
code.
[0008] WO 2011/138515 A1 describes an authentication device comprising at least one security element applied
to a product, capable of changing colour by means of spatially and temporally coherent
laser radiation, which is emitted by the authentication device. The radiation emitted
by the authentication device is located outside the range of perception of the eye.
[0009] US 2012/088079 A1 describes an optically responsive feature for security, authentication and/or identification
purposes. The embodiment makes use of an optical effect-producing medium. The medium
comprises a carrier medium containing pigment particles having at least one optically
responsive pigment or one that is responsive to incident electromagnetic radiation
of at least a selected excitation wave length or wave length band for producing an
optical response in the visible or near-visible spectrum.
US 2009/0074229 A1 describes an apparatus and a method for visually representing measuring values.
All of the known security systems and methods make use of static security features,
such as passwords, ID-numbers and other security features which are updated from time
to time. Even if a code changes constantly, it is static, not dynamic, since the new
code simply replaces the previous one, but remains again static for the duration of
its validity. The authentication or identification system must be able to authenticate
and/or identify an object or user and also knows, which code is currently valid. Therefore,
its algorithm can be hijacked, or the code can be intercepted during its transmission.
It is an object of the present invention to provide an improved system and a method
for authenticating, identifying or marking objects or individuals to achieve a higher
security standard using dynamic modification features.
The solution is provided by a system and a method for authenticating, identifying
or marking objects or individuals according to the present invention.
[0010] The system of the invention as claimed in claim 1 comprises a display or a surface
for displaying a readable information pattern, consisting of at least one string of
digits with numbers, symbols, letters and/or dots. As an example, a string may have
the appearance dA%4Be?P.LK-32i. "Readable information" in this context means any information
that can be captured using physical or optical means such as optical reader units,
cameras or sensors. In a preferred embodiment, the readable information pattern can
be recognized by optical character recognition (OCR). The information pattern can
be one string or a number of strings using numbers, symbols, letters and/or dots.
"Symbols" as used in the context of the present invention comprise additional characters
and special signs in any language, or random signs such as assemblies of dots or a
graphic.
[0011] The system as claimed in claim 1 also comprises a reader comprising optical means
for capturing the readable information pattern displayed in the display or on the
surface. The captured information pattern is stored in a memory unit, which can be
part of the reader. Reader and memory unit can be part of a device, e.g. a mobile
or smart phone or a computer.
[0012] The system further comprises a storage unit for storage of unique information patterns
in a central database. The database can be directly connected to the storage unit,
or it can be part of a remote system. Each object or individual to be authenticated
and/or identified is characterized by a unique information pattern. An assignment
table assigns this unique information pattern to a specific object or individual.
A processing unit is provided with command rules for conducting a change of one or
more digits of the at least one string in response to one or more inherent or external
triggers. Preferably, the command rules are stored together with the unique information
pattern in the central database and/or in the memory unit of a separate device.
[0013] A transmitting unit comprised in the system as claimed in claim 1 transfers the captured
information pattern from the display or surface to the storage unit. The system further
comprises a processing unit that compares the transmitted information pattern with
the unique information pattern stored in the central database. It also comprises a
trigger unit that conducts, in response to the one or more inherent or external triggers,
a modification of one or more digits within the string such that the digit becomes
unreadable, or shall be read as a different symbol by the reader, resulting in a modified
information pattern with changing readable and/or unreadable digits. The processing
unit is further configured to compare the readable and unreadable digits of the modified
information pattern at the respective positions of the unique information pattern
stored in the database. The modification conducted by the trigger unit preferably
comprises a deletion, change or replacement of one or more digits with numbers, symbols,
letters and/or dots.
[0014] In a preferred embodiment, the readable information pattern, in particular the readable
digits (e.g. letters, signs, symbols, numbers, dots) is compared with the database
identity. The combination of readable digits and altered or unreadable digits provide
a pattern that can be compared with the information pattern stored in the database.
Most importantly, the altered or unreadable digits are introduced by means of an inherent
or external trigger.
[0015] Triggers that may be applied in the present invention include, but are not limited
to geo position or routing, temperature, humidity, atmospheric pressure, altitude,
light intensity, colour, sound intensity, time, movement, vibration, stored algorithms,
manual keyboard presses, measurement data provided by sensors, or triggering in accordance
with individual's behaviour. For example, if a device equipped with a display is carried
from one place to another place that has a certain temperature difference, this may
trigger the execution of a command rule, which changes one or more digits at certain
positions within the string from a readable into an unreadable information. For example,
the string ABCDE12345 can be modified to AB*DE1*345, wherein the digits marked with
"*" are rendered unreadable by executing a command rule due to an inherent or external
trigger. It is one advantage of the present system and method of the invention that
the kind of modification is not predictable but is based on certain rules specific
for the object or individual. If there should be modifications in the string that
differ from the ones normally introduced in accordance with the underlying command
rule, that would mean that the object or individual is not validly authenticated or
identified.
[0016] A command rule could also be executed if an individual or an object carried by an
individual does not follow a pre-defined geo-routing, which may trigger one or more
modifications of pre-defined digits within the string. A modification can also be
triggered by a manual keyboard press, for example a key on a smart phone. The triggered
unit can also become active in accordance with individual's behaviour if the individual
follows a certain life scheme. In case there is an abnormality within the individual's
behaviour scheme, this would cause an alert or execute another security event such
as an alarm.
[0017] In one embodiment, the at least one digit in the string is rendered unreadable by
one or more pre-defined cracks introduced by the trigger unit. The one or more cracks
define a pattern which may correlate with a specific command rule for authenticating,
identifying or marking the object or the individual. Not only the pattern of the cracks
can be used as a security feature, but also their position, nature, colour and/or
intensity. The processing unit preferably deletes, replaces or modifies one or more
digits in accordance with the provided command rules by changing the display or surface
background, and/or the intensity, nature, colour or intensity of the displayed numbers,
symbols, letters and/or dots, or the nature, colour and/or intensity of the cracks.
Preferably, the reader comprises an optical character recognition unit to read the
information pattern composed of numbers, symbols or letters. The transmitting unit
may transmit only certain digits to the central database identified by the position
number. It can be sufficient if only certain positions out of the full string are
transferred and compared with the database entry. Certain positions of the string
may also be attributed to certain activities. Each usage may trigger a change (e.
g. a cracking) of some digits in these positions and/or a change of the positions
as such.
[0018] Alternatively, the reader can comprise an image acquisition unit for image comparison
of the digits and/or the cracks. Specific areas of the image can be used for a pre-selection
of the object or individual. A unique string in the information pattern is assigned
to a specific user for basic identification.
[0019] In order to increase security, there are various combinations and rules that may
be applied in order to dynamically modify the string in a defined, but unpredictable
manner. For example, cracks can occur in up to eight (or more) directions and can
be combined with other cracks. Each crack can have its own colour, background colour,
form or intensity. The same also applies to the colour/intensity of the letter/ number/symbol
segment and their respective backgrounds. This results in a plurality of possible
variants per digit, which can be combined or dynamically changed.
[0020] In addition, a certain crack pattern can result in a disappearance of a digit which
adds a further security feature. Furthermore, certain digits can be disregarded from
modification, which means that they can never be changed into a different or unreadable
form. This also increases security. By applying the dynamic modification approach,
digits can crack, change their background colours and/or their intensities. In addition,
digits with cracks can be made reversible by de-cracking and changing or loosing colour.
Furthermore, certain digits can undergo several modifications, whereas other digits
at certain positions can only undergo a certain number of modifications, for example
not more than two modifications or even no modification. Also the mode of modification
can follow a certain rule, for example in a first step cracks are introduced at certain
digit positions, in a second step their colours are changed, in a third step the cracks
develop. A truly authenticated user can be able to change the modified string by pushing
a key or bottom or by touching the screen of his device.
[0021] The present invention also relates to a method for authenticating, identifying or
marking objects or individuals, as claimed in claim 7 the method comprising the steps:
- providing a readable information pattern, consisting of at least one string of digits
numbers, symbols, letters and/or dots,
- providing command rules for conducting a change of one or more digits of the at least
one string in response to one or more inherent or external triggers,
- assigning the information pattern and the command rules to a specific object or individual,
or a group thereof,
- capturing the displayed information pattern by a reader,
- storing the captured information pattern in a memory unit,
- storing a unique information pattern and the command rules in a central database,
- modifying one or more digits within the string in response to one or more inherent
or external triggers, such that the digit becomes unreadable by the reader, or differently
readable, resulting in a modified information pattern consisting of a string with
readable and unreadable digits,
- transmitting at least one part of the modified information pattern to the central
database,
- comparing the at least one part of the modified information pattern with the respective
part of the unique information pattern stored in the central database,
wherein an object or individual is authenticated, authorised or marked, when the readable
and unreadable digits of the transmitted modified information pattern and the information
pattern stored in the database have been changed, replaced or deleted in accordance
with the provided command rules.
[0022] In a preferred embodiment, it may be sufficient that the string is composed of one
or more dots on a surface. The dots may contain pigments that change the colours in
accordance with an inherent or external trigger. The information pattern is made of
the colour displayed by the dots. This unique information pattern is stored in the
central database. If the colours (or their intensities) of the dots change, then this
new information pattern is transferred to the central database and compared. If the
change is in accordance with the provided rules, the user or the object is authenticated
and/or identified. In a subsequent step, the transferred information pattern can then
be stored in the database as a new unique information pattern. If the colours of the
dots change again, an updated information pattern is transferred and again compared
with the stored information pattern within the database. If a colour has not been
changed in accordance with the underlying command rules, access of the user is denied
or an alert will be triggered. For example, the dots may change their colour from
blue to green (e.g. by oxidation) when executing an underlying command rule. If a
formerly green dot should show up in blue colour, an alarm is triggered. Accordingly,
this could indicate the existence of a falsified variant, which had been copied when
the dot was still blue, whereas in the meantime the original would have turned into
green colour. At the same time, this change is non-reversible. Even a perfect copy
would therefore loose its value very quickly. When using a display, the pigment change
of a dot from blue to green can be defined as being irreversible in accordance with
an underlying command rule, which would be similar to the natural oxidation process
described above.
[0023] In another embodiment, the displayed numbers, symbols, letters and/or dots can crack
according to a certain pattern. The image of the pattern can be captured by an image
acquisition unit, or the cracked digits can be rendered unreadable by the utilised
reader. In one embodiment, the one or more digits are rendered unreadable by introducing
or developing one or more cracks in addition to the displayed numbers, symbols, letters
and/or dots. Preferably, the number, nature, colour and/or intensity of the cracks
are triggered by a specific command rule or by an inherent or external trigger. An
inherent trigger can be a chemical or physical reaction that takes place within the
material used for displaying the numbers, symbols, letters and/or dots. An example
is a lacquer that is able to change its colour.
[0024] Preferably, a cracked unreadable digit is either deleted or replaced by one or more
readable digits consisting of numbers, symbols, letters and/or dots, in accordance
with the provided command rules, creating a modified string that is transferred and
compared with the unique information pattern in the central database. The provided
command rules comprise the positions of digit modification, the nature and intensity
of digit modification and the positions with no digit modification. For example, the
digits can be modified in their background colour and intensity, colour and/or intensity
of numbers, symbols, letters and/or dots, and/or colour and/or intensity or type of
the cracks. Therefore, the user has a number of possible combinations wherein the
resulting pattern is based on the underlying command rule. The command rule will tell
which digits within the string (i.e. their positions) are modified in response to
the inherent or external trigger and what restrictions apply, and perhaps which shall
not apply.
[0025] The length of the string can comprise 4 or more digits, preferably more than 100
digits, preferably more than 1000 digits. In order to authenticate and/or identify
an object or individual, it might be necessary to transfer and compare only a portion
of the string with the stored counterpart in the central database. Alternatively,
a pre-selection can be performed by using digit positions which allow a rapid identification
of the object or individual. In a preferred embodiment, the object or individual is
therefore identified in a first step by unique readable digits within the string,
wherein in a further step the object or individual is authenticated by the number,
position, colour, nature and/or intensity of the modified or unreadable digits within
the string.
[0026] The modified information pattern preferably contains a string with readable and/or
unreadable digits, wherein for each identification and/or authentication request,
the string undergoes dynamic changes by modifying one or more of the same or different
readable and/or unreadable digits. At least one part of the original pattern remains
unchanged, whereas another part is changed. Upon transfer of the modified information
pattern captured from the display or surface, the stored information pattern in the
database can be replaced by the modified information pattern. This renders the previous
version of the information pattern invalid for any future authentication or identification.
The updated information pattern can be replaced at a later time point by a further
modified information pattern, which again updates the stored information pattern,
thereby creating a new unique information pattern specific for the object or individual
which cannot be predicted, even if the underlying rules and algorithms are known.
It is therefore impossible to copy or mimic an object using the present system or
method.
[0027] Another embodiment of the method for authenticating, identifying or marking objects
or individuals, is defined in claim 14, wherein the readable information pattern,
consists of security elements such as numbers, symbols, letters, crackles and/or dots,
- and
- the stored information pattern is replaced with the unique information pattern, when
there is a match of the non-modified security elements, wherein a match authenticates,
identifies or marks the true object or individual.
[0028] In a preferred embodiment, the dots provided on the surface comprise a pigment that
changes its colour and/or intensity in response to an inherent or external trigger.
An image acquisition unit such as a camera can detect the colour change, even if not
visible for the human eye. The modified information pattern based on the changed dots
can then be transferred to the central database and compared with the stored unique
information pattern. The information pattern can then be updated as described above.
[0029] The present invention is illustrated in the following examples and the figure.
Example 1
[0030] A device is provided containing a memory unit in which a string consisting of numbers,
letters or symbols is stored together with command rules which allow a triggered modification
of one or more digits within the string. The string may look like 1A.Z56-!i#e.?
[0031] The modification is carried out by a trigger unit that replaces, deletes or introduces
some of the letters, numbers, symbols or dots or their backgrounds. A display makes
the string or a part thereof visible for the user.
[0032] In Fig. 1, one digit out of the string 1A.Z56-!i#e.? consisting of the letter "e"
is shown. If the device (e.g. a smartphone) is used by an authorized user (and/or
depending on the rules by an unauthorized user), this may trigger a modification of
the digit as a response to an underlying command rule. The trigger can be, for example,
a (wrong) input of a pin number or (wrong) GPS position, which does not match with
the GPS position stored in the command rule for this activity. The trigger unit triggers,
as a result of such an external trigger, the formation of a crack which overlaps the
letter "e" (Fig. 1A). This renders the position of the digit "e" within the string
1A.Z56-!i#e.? unreadable to read as 1A.Z56-!i#*.? (marked as "*").
[0033] In the example shown, a half-crack (bold line) can occur at eight possible positions
(dotted lines). Two or more half-cracks can be displayed in combination. Each half-crack
can also be displayed in another colour. In addition, the letter "e" can also be displayed
in a different colour. The same also applies for the letter's background which can
be coloured differently or in a different intensity. This example illustrates that
within one single digit, there is a plurality of variations that can be used as security
features. Most importantly, these security features are dynamic because some information
in the pattern remains unchanged (e.g. the letter "e"), whereas some other information
is changed (e.g. by formation of cracks, colours, intensities). These modifications
of the information pattern result in a new unique information pattern specific for
the object or individual to be authenticated, identified and/or marked. The modified
pattern correlates with the event that triggered the modification and the rules which
apply for it. The pattern is still dynamic, since its exact place of occurrence and
its type is not predictable, because it fully depends on inherent of external triggers
and the underlying command rules..
[0034] In Fig. 1B, a further half-crack is introduced overlapping the letter "e". This creates
a modified unique information pattern which is different from the information pattern
shown in Fig. 1A. By introducing one or more cracks or by changing the colours, the
digit may be rendered unreadable by a reader (e.g. OCR unit or image acquisition unit),
whereas the other digits remain readable. Alternatively, a digit could be replaced
by a different value, which is readable by OCR, wherein the reader is capable of identifying
"cracked letters". Additionally, the digit may be identified in high resolution or
detail by a non-OCR reader, using conventional image information rather than OCR.
[0035] The readable digits are transferred to a central database, in which a previous version
of the unique information pattern is stored. If the modification (e.g. introduction
of a crack) complies with the underlying command rule (or if there is no rule for
this specific change), the object or individual is rightfully authenticated or identified.
If the digit should have been changed differently (e.g. cracks in different positions),
the user is not authenticated or identified, causing an alert or alarm submitted to
an external service. The alarm can also result in blocking the device for further
usage. If the unchanged parts do not correspond with the database entry, the user
is also not authenticated or identified, causing an alert or alarm being submitted
to an external service.
[0036] The security string can comprise from 4 digits to over 1.000.000 digits, whereas
it may be sufficient to transfer only a small portion of the string for a pre-selection.
Therefore, the amount of data to be transferred can be varied, as well as the security
which is scalable, depending on the security request specific for the respective action,
the number of digits within the string and the number of modifications.
[0037] Using OCR technology, only readable digits are transferred and compared with the
stored information pattern in this central database. Because of the dynamic nature
of the inventive security elements, a high security standard is achieved. Furthermore,
using a part of string comparison, fast and easy identification in a pre-selection
step is possible.
[0038] The system and method according to the present invention use dynamic security features
which allow for flexible security applications. The modified and/or non-modified security
elements are OCR- and image-readable. These dynamic security features make it nearly
impossible to fake without risking double or multiple database entries within the
central database. Areas where digits (e.g. letters, numbers, symbols and/or dots)
cannot change form a unique pattern, as well as digits than can change. The security
level can further be increased by applying additional security features such as biometric
features. The code constantly changes, but remains recognizable, especially because
its basic structure does not alter. The dynamic nature of the security string can
protect additional biometric information from being faked, while it can help in selecting
and pre-identifying the user.
[0039] A fast pre-selection can be performed by checking basic elements (e.g. ID-area with
name or ID-number). Double checking of the readable letters and their position in
the resulting data-entries matching the first query is possible if there is a result.
Triple checking is possible that includes digit variants created by the dynamic modification
process. Once identified, data of the respective object or identity can be displayed
to the requesting party.
Example 2
[0040] The image shown in Fig. 1A or Fig. 1B can be used for image acquisition. The information
pattern shown on the display or surface can be photographed by a camera, transferred
and compared with the stored image in the database. This allows an image comparison
of the digits, but also of the cracks. Specific areas of the image can be used for
a fast pre-selection. For example, an individual can be identified by a number of
subsequent digits that occur within the string.
Example 3
[0041] Possible command rules for dynamic changes in letters:
- Letters can never change into other letters, unless these are cracked-derivations,
like aa, a2, a3, a4, ....ax.
- Letter can appear/disappear after a certain level of crack-derivation, e.g. if more
than 3 colours in one letter and more than 2 colours in the background, as well as
more than 4 cracks, etc.
- Letters can crack, change colour and change background colour.
- Letters can de-crack, change colour and background colour back, lose colour.
- Double cracks (e.g. combination of 3 and 9 p.m. cracks) cannot heal anymore, or only
if both segments get the same background/digit/crack-colour.
- 3 colours per segment can be reduced to 2, but not directly removed.
- 2 colours per segment can be reduced to one, but not directly removed.
- More cracks can be added, but only in steps of one.
- Zick-zack cracks and other variants may appear anywhere.
- Zick-zack cracks are neglected by simple OCR readers, but read by more complex ones.
- Environmental factors, like temperature, shock/vibration and/or geo-position (if available)
have an "individual" influence on the cracks, their form and their colours, partly
depending on the "DNA settings" of the algorithm, setting the basic rules for changes.
- A fully authenticated user (e.g. including a secure biometric factor) may change the
changeable areas of this string by simple selection on the screen or by entering their
positions (from/to). The ID area of the string, which may be unknown to the user shall
remain unchangeable. Further cracks can be added by a fully authenticated user by
simply pushing a button "crack" in a software application. This can be useful if the
user feels that his code has been spied, tampered or copied by someone else (e.g.
after paying in a shop).
Example 4
DNA definitions
[0042]
- There are areas defined in which only some or no rules are applicable and "prohibit
changes":
"Between letter 212 and 289 there never occurs any crackling";
"No colour change"
"Crackling can disappear"
"Letter can be replaced".
- Some colours may not appear in some positions, or with some cracks:
- a. Blue: 1, 11, 21, 90"
- b. Red: 2, 12, 22, 270°
- c. Green: 3, 13, 23, 180°
- There may be delays until a colour changes, if a certain environmental factor changes:
- a. "A" in positions xyz changes, if temperature varies > 10 degrees. Delay per change
of 1 A-digit: 100 sec (...x)
- b. "B" in positions xyz changes, if geo-position varies > 10 degrees / 5 degrees.
Delay per change of 1 B-digit: 10 sec (...x).
-
- a. In "A", position xyz, crack disappears, if colour of crack, digit and background
match.
- b. In "B", position xyz, crack disappears, if colour of crack is yellow, digit green
and background white.
1. A system for authenticating, identifying or marking objects or individuals, comprising
- a display or surface for displaying a readable information pattern, consisting of
at least one string of digits with numbers, symbols, letters and/or dots,
- a reader for capturing the displayed information pattern,
- a memory unit for storage of the captured information pattern,
- a storage unit for storage of unique information patterns in a central database,
- a processing unit provided with command rules for conducting a change of one or
more digits of the at least one string in response to one or more inherent or external
triggers,
- an assignment table for assigning the unique information pattern and the command
rules to a specific object or individual,
- a transmitting unit for transmitting the captured information pattern from the display
or surface to the storage unit,
- a processing unit for comparing the transmitted information pattern with the unique
information pattern stored in the central database,
characterised in that the system comprises a trigger unit that conducts, in response to the one or more
inherent or external triggers, a modification of one or more digits within the string
such that the digit becomes unreadable by the reader, resulting in a modified information
pattern with readable and unreadable digits, wherein the processing unit is configured
to compare the readable and unreadable digits of the modified information pattern
at the respective positions of the unique information pattern stored in the database
, wherein an object or individual is authenticated, authorised or marked when the
readable and unreadable digits of the transmitted modified information pattern and
the information pattern stored in the database have been changed, replaced or deleted
in accordance with the provided command rules.
2. The system according to claim 1, wherein the modification conducted by the trigger
unit comprises a deletion, change or replacement of one or more digits with numbers,
symbols, letters and/or dots.
3. The system according to claim 1 or 2, wherein at least one digit in the string comprises
one or more predefined cracks introduced by the trigger unit, wherein the position,
nature, colour and/or intensity of the cracks correlate with a specific command rule
for authenticating, identifying or marking the object or individual.
4. The system according to anyone of claims 1 to 3, wherein the one or more inherent
or external triggers are selected from the group consisting of: geo position or routing,
temperature, humidity, atmospheric pressure, altitude, light intensity, colour, sound
intensity, time, movement, vibration, stored algorithms, manual keyboard presses,
measurement data provided by sensors, or triggering in accordance with individual's
behaviour.
5. The system according to anyone of claims 1 to 4, wherein the reader comprises an optical
character recognition unit and/or an image acquisition unit.
6. The system according to anyone of claims 1 to 5, wherein the processing unit deletes,
replaces or modifies one or more digits in accordance with the provided command rules
by changing the display or surface background colour and/or intensity, the nature,
colour and/or intensity of the displayed numbers, symbols, letters and/or dots, or
the nature, colour and/or intensity of the cracks.
7. A method for authenticating, identifying or marking objects or individuals, the method
comprising the steps:
- providing a readable information pattern, consisting of at least one string of digit
numbers, symbols, letters and/or dots,
- providing command rules for conducting a change of one or more digits of the at
least one string in response to one or more inherent or external triggers,
- assigning the information pattern and the command rules to a specific object or
individual or a group thereof,
- capturing the readable information pattern by a reader,
- storing the captured information pattern in a memory unit,
- storing a unique information pattern and the command rules in a central database,
characterised by the following steps:
- modifying one or more digits within the string in response to the one or more inherent
or external triggers, such that the digit becomes unreadable by the reader, resulting
in a modified information pattern consisting of a string with readable and unreadable
digits,
- transmitting at least one part of the modified information pattern to the central
database,
- comparing the at least one part of the modified information pattern with the respective
part of the unique information pattern stored in the central database, wherein an
object or individual is authenticated, authorised or marked, when the readable and
unreadable digits of the transmitted modified information pattern and the information
pattern stored in the database have been changed, replaced or deleted in accordance
with the provided command rules.
8. The method according to claim 7, wherein the one or more digits are rendered unreadable
by introducing or developing one or more cracks in addition to the displayed numbers,
symbols, letters and/or dots, the number, nature, colour and/or intensity of the cracks
being triggered by a specific command rule or by an inherent or external trigger.
9. The method according to anyone of claims 7 to 8, wherein a cracked unreadable digit
is either deleted or replaced by one or more readable digits consisting of numbers,
symbols, letters and/or dots, in accordance with the provided command rules, creating
a modified string that is transferred and compared with the unique information pattern
in the central database, wherein the provided command rules comprise the positions
of digit modification, the nature and intensity of digit modification, and the positions
with no digit modification.
10. The method according to anyone of claims 7 to 9, wherein the digits are modified in
their background colour and/or intensity, colour and/or intensity of numbers, symbols,
letters and/or dots, and/or colour and/or intensity of the cracks.
11. The method according to anyone of claims 7 to 10, wherein the object or individual
is identified in a first step by unique readable digits within the string, wherein
in a further step the object or individual is authenticated by the number, position,
colour, nature and/or intensity and/or type of the modified unreadable digits within
the string.
12. The method according to anyone of claims 7 to 11, wherein the modified information
pattern contains a string with readable and/or unreadable digits, wherein for each
identification and/or authentication request, the string undergoes dynamic changes
by modifying one or more of the same or different readable and/or unreadable digits,
wherein at least one part of the original pattern remains unchanged.
13. The method according to anyone of claims 7 to 12, wherein the method further comprises
replacing the unique information pattern with the modified information pattern, thereby
creating a new unique information pattern.
14. The method according to claim 7, wherein the readable information pattern is provided
on a display or surface, consisting of security elements such as numbers, symbols,
letters, crackles and/or dots, and the stored information pattern is replaced with
the unique information pattern, when there is a match of the non-modified security
elements.
15. The method according to claim 14, wherein the dots provided on the surface comprise
a pigment that changes its colour and/or intensity in response to an inherent or external
trigger.
1. System zur Authentifizierung, Identifizierung oder Kennzeichnung von Objekten oder
Individuen, umfassend
- ein Display oder eine Oberfläche zum Anzeigen eines lesbaren Informationsmusters,
bestehend aus wenigstens einer Ziffernfolge aus Zahlen, Symbolen, Buchstaben und/oder
Punkten,
- ein Lesegerät zum Erfassen des angezeigten Informationsmusters,
- eine Speichereinheit zum Speichern des erfassten Informationsmusters,
- eine Speichereinheit zum Speichern von einzigartigen Informationsmustern in einer
zentralen Datenbank,
- eine Verarbeitungseinheit, ausgerüstet mit Befehlsregeln zum Durchführen einer Veränderung
von einer oder mehreren Ziffern der wenigstens einen Zeichenfolge als Antwort auf
ein oder mehrere inhärente oder externe Auslösemittel,
- eine Zuordnungstabelle zum Zuordnen des einzigartigen Informationsmusters und der
Befehlsregeln zu einem spezifischen Objekt oder einem Individuum,
- eine Übertragungseinheit zum Übertragen des von dem Display oder der Oberfläche
erfassten Informationsmusters zur Speichereinheit,
- eine Verarbeitungseinheit zum Vergleichen des übertragenen Informationsmusters
mit dem in der zentralen Datenbank gespeicherten einzigartigen Informationsmuster,
dadurch gekennzeichnet, dass das System eine Auslöseeinheit umfasst, die als Antwort auf ein oder mehrere inhärente
oder externe Auslösemittel eine Modifikation von einer oder mehreren Ziffern innerhalb
der Zeichenfolge herbeiführt, so dass die Ziffern durch das Lesegerät unlesbar werden,
was ein modifiziertes Informationsmuster mit lesbaren und unlesbaren Zeichen ergibt,
wobei die Verarbeitungseinheit so konfiguriert ist, dass sie lesbare und unlesbare
Zeichen des modifizierten Informationsmusters an den entsprechenden Positionen mit
denen des einzigartigen Informationsmusters in der Datenbank vergleicht, wobei ein
Objekt oder ein Individuum authentifiziert, autorisiert oder gekennzeichnet ist, wenn
die lesbaren und unlesbaren Zeichen des übertragenden modifizierten Informationsmusters
und des in der Datenbank gespeicherten Informationsmusters gemäß den vorgesehenen
Befehlsregeln geändert, ersetzt oder gelöscht worden sind.
2. System nach Anspruch 1, wobei die durch die Auslöseeinheit herbeigeführte Modifikation
ein Löschen, ein Verändern oder einen Austausch einer oder mehrerer Ziffern aus Zahlen,
Symbolen, Buchstaben und/oder Punkten umfasst.
3. System nach Anspruch 1 oder 2, wobei wenigstens eine Ziffer in der Zeichenfolge einen
oder mehrere durch die Auslöseeinheit eingeführte vordefinierte Risse umfasst, wobei
die Position, die Art, die Farbe und/oder die Intensität der Risse mit einer spezifischen
Befehlsregel zur Authentifizierung, Identifizierung oder Kennzeichnung des Objektes
oder des Individuums korreliert.
4. System nach einem der Ansprüche 1 bis 3, wobei das eine oder die mehreren inhärenten
oder externen Auslösemittel ausgewählt sind aus der Gruppe bestehend aus: einer Geoposition
oder einer Route, einer Temperatur, einer Luftfeuchtigkeit, einem Luftdruck, einer
Höhe, einer Lichtintensität, einer Farbe, einer Lautstärke, einem Zeitpunkt, einer
Bewegung, einer Erschütterung, einem gespeicherten Algorithmus, einem manuellem Tastendruck,
Messdaten, die von Sensoren bereitgestellt werden oder Auslösemittel, die auf einem
individuellen Verhalten basieren.
5. System nach einem der Ansprüche 1 bis 4, wobei das Lesegerät eine optische Zeichenerkennungseinheit
und/oder eine Bilderfassungseinheit umfasst.
6. System nach einem der Ansprüche 1 bis 5, wobei die Verarbeitungseinheit, entsprechend
den bereitgestellten Befehlsregeln, eine oder mehrere Ziffern löscht, austauscht oder
modifiziert, durch eine Änderung des Display oder der Hintergrundfarbe der Oberfläche
und/oder der Intensität, der Art, der Farbe und/oder der Intensität der angezeigten
Zahlen, Symbolen, Buchstaben und/oder Punkte oder der Art, der Farbe und/oder der
Intensität der Risse.
7. Verfahren zur Authentifizierung, Identifizierung oder Kennzeichnung von Objekten oder
Individuen, umfassend die Schritte:
- Bereitstellen eines lesbaren Informationsmusters, bestehend aus wenigstens einer
Ziffernfolge aus Zahlen, Symbolen, Buchstaben und/oder Punkten,
- Bereitstellen von Befehlsregeln zum Herbeiführen einer Veränderung einer oder mehrerer
Ziffern aus der wenigstens einen Zeichenfolge, als Antwort auf ein oder mehrere inhärente
oder externe Auslösemittel,
- Zuordnen des Informationsmusters und der Befehlsregeln zu einem spezifischen Objekt
oder einem Individuum oder einer Gruppe davon,
- Erfassen des lesbaren Informationsmusters durch ein Lesegerät,
- Speichern des erfassten Informationsmusters in einer Speichereinheit,
- Speichern eines einzigartigen Informationsmusters und der Befehlsregeln in einer
zentralen Datenbank,
gekennzeichnet durch die folgenden Schritte:
- Modifizieren einer oder mehrerer Ziffern innerhalb der Zeichenfolge, als Antwort
auf ein oder mehrere inhärente oder externe Auslösemittel derart, dass die Ziffern
für das Lesegerät unlesbar werden, was ein modifiziertes Informationsmuster, bestehend
aus einer Zeichenfolge mit lesbaren und unlesbaren Ziffern, ergibt,
- Übertragen wenigstens eines Teils des modifizierten Informationsmusters an die zentrale
Datenbank,
- Vergleichen des wenigstens einen Teils des modifizierten Informationsmusters mit
dem entsprechenden Teil des einzigartigen Informationsmusters, das in der zentralen
Datenbank gespeichert ist, wobei ein Objekt oder ein Individuum authentifiziert, autorisiert
oder gekennzeichnet wird, wenn die lesbaren und unlesbaren Ziffern des übertragenen
modifizierten Informationsmusters zu dem in der Datenbank gespeicherten Informationsmuster,
entsprechend den Befehlsregeln, geändert, ersetzt oder gelöscht wurden.
8. Verfahren gemäß Anspruch 7, wobei eine oder mehrere Ziffern unlesbar gemacht werden,
indem ein oder mehrere Risse eingeführt oder weiterentwickelt werden, neben den angezeigten
Zahlen, Symbolen, Buchstaben und/oder Punkten, der Anzahl, der Art, der Farbe und/oder
der Intensität der Risse, die durch eine spezifische Befehlsregel oder durch einen
inhärenten oder externen Auslöser ausgelöst werden.
9. Verfahren nach einem der Ansprüche 7 bis 8, wobei eine eingerissene, unlesbare Ziffer
entweder gelöscht oder durch ein oder mehrere lesbare Ziffern, bestehend aus Zahlen,
Symbolen, Buchstaben und/oder Punkten, entsprechend den bereitgestellten Befehlsregeln
ersetzt wird, eine modifizierte Zeichenfolge erstellt wird, die mit dem einzigartigen
Informationsmuster in der zentralen Datenbank übertragen und verglichen wird, wobei
die bereitgestellten Befehlsregeln die Positionen der modifizierten Ziffern, die Art
und die Intensität der modifizierten Ziffern und die Positionen der nichtmodifizierten
Ziffern umfassen.
10. Verfahren nach einem der Ansprüche 7 bis 9, wobei die Ziffern in ihrer Hintergrundfarbe
und/oder ihrer Intensität, ihrer Farbe und/oder der Intensität der Ziffern, Symbole,
Buchstaben und/oder Punkte und/oder in ihrer Farbe und/oder der Intensität der Risse
modifiziert werden.
11. Verfahren nach einem der Ansprüche 7 bis 10, wobei das Objekt oder das Individuum
in einem ersten Schritt durch die einzigartigen lesbaren Ziffern innerhalb der Zeichenfolge
identifiziert wird, wobei in einem weiteren Schritt das Objekt oder das Individuum
durch die Zahl, die Position, die Farbe, die Art und/oder die Intensität und/oder
die Art der Modifikation der unlesbaren Ziffern innerhalb der Zeichenfolge authentifiziert
wird.
12. Verfahren nach einem der Ansprüche 7 bis 11, wobei das modifizierte Informationsmuster
eine Zeichenfolge aus lesbaren und unlesbaren Ziffern umfasst, wobei für jede Identifikation
und/oder Authentifikationsanfrage die Zeichenfolge eine dynamische Veränderung durch
Modifizieren einer oder mehrere derselben oder anderer, lesbarer und/oder unlesbarer
Ziffern durchläuft, wobei wenigstens ein Teil des ursprünglichen Musters unverändert
bleibt.
13. Verfahren nach einem der Ansprüche 7 bis 12, wobei das Verfahren ferner das Ersetzen
des einzigartigen Informationsmusters mit dem modifizierten Informationsmuster umfasst,
wodurch ein neues einzigartiges Informationsmuster geschaffen wird.
14. Verfahren gemäß Anspruch 7, wobei das lesbare Informationsmuster auf einem Display
oder einer Oberfläche bereitgestellt wird, die aus Sicherheitselementen wie Zahlen,
Symbolen, Buchstaben, Rissen und/oder Punkten besteht und das gespeicherte Informationsmuster
mit dem einzigartigen Informationsmuster ersetzt wird, wenn es eine Übereinstimmung
mit den nicht modifizierten Sicherheitselementen gibt.
15. Verfahren gemäß Anspruch 14, wobei die auf der Oberfläche bereitgestellten Punkte
ein Pigment umfassen, das seine Farbe und/oder Intensität als Antwort auf ein inhärentes
oder externes Auslösemittel verändert.
1. Système d'authentification, d'identification ou de marquage d'objets ou d'individus,
comprenant
- un écran ou une surface pour afficher un motif d'information lisible, consistant
en au moins une chaîne de caractères avec des chiffres, des symboles, des lettres
et/ou des points,
- un lecteur pour capturer le motif d'information affiché,
- une unité de mémoire pour le stockage du motif d'information capturé,
- une unité de stockage pour le stockage de motifs d'information uniques dans une
base de données centrale,
- une unité de traitement pourvue de règles de commande pour conduire un changement
d'un ou plusieurs caractères de l'au moins une chaîne en réponse à un ou plusieurs
déclencheurs intrinsèques ou externes,
- une table d'attribution pour attribuer le motif d'information unique et les règles
de commande à un objet ou individu spécifique,
- une unité de transmission pour transmettre le motif d'information capturé de l'écran
ou la surface à l'unité de stockage,
- une unité de traitement pour comparer le motif d'information transmis avec le motif
d'information unique stocké dans la base de données centrale,
caractérisé en ce que le système comprend une unité de déclenchement qui conduit, en réponse au(x) déclencheur(s)
intrinsèque(s) ou externe(s), une modification d'un ou plusieurs caractères à l'intérieur
de la chaîne de telle sorte que le caractère devient illisible par le lecteur, ce
qui se solde par un motif d'information modifié avec des caractères lisibles et illisibles,
l'unité de traitement étant configurée pour comparer les caractères lisibles et illisibles
du motif d'information modifié aux positions respectives du motif d'information unique
stocké dans la base de données, un objet ou individu étant authentifié, autorisé ou
marqué quand les caractères lisibles et illisibles du motif d'information modifié
transmis et du motif d'information stocké dans la base de données ont été changés,
remplacés ou supprimés conformément aux règles de commande fournies.
2. Système selon la revendication 1, dans lequel la modification conduite par l'unité
de déclenchement comprend une suppression, un changement ou un remplacement d'un ou
plusieurs caractères par des chiffres, des symboles, des lettres et/ou des points.
3. Système selon la revendication 1 ou 2, dans lequel au moins un caractère dans la chaîne
comprend une ou plusieurs fissures prédéfinies introduites par l'unité de déclenchement,
la position, la nature, la couleur et/ou l'intensité des fissures étant corrélées
à une règle de commande spécifique pour authentifier, identifier ou marquer l'objet
ou individu.
4. Système selon l'une quelconque des revendications 1 à 3, dans lequel le(s) déclencheur(s)
intrinsèque(s) ou externe(s) est/sont choisis dans le groupe constitué par : une position
géographique ou un itinéraire, la température, l'humidité, la pression atmosphérique,
l'altitude, l'intensité lumineuse, la couleur, l'intensité sonore, le temps, le mouvement,
les vibrations, les algorithmes stockés, les saisies manuelles sur le clavier, les
données de mesure fournies par des capteurs, ou un déclenchement en fonction du comportement
d'un individu.
5. Système selon l'une quelconque des revendications 1 à 4, dans lequel le lecteur comprend
une unité de reconnaissance optique de caractères et/ou une unité d'acquisition d'image.
6. Système selon l'une quelconque des revendications 1 à 5, dans lequel l'unité de traitement
supprime, remplace ou modifie un ou plusieurs caractères conformément aux règles de
commande fournies en changeant la couleur de fond et/ou l'intensité de l'écran ou
de la surface, la nature, la couleur et/ou l'intensité des chiffres, symboles, lettres
et/ou points affichés, ou la nature, la couleur et/ou l'intensité des fissures.
7. Procédé d'authentification, d'identification ou de marquage d'objets ou d'individus,
le procédé comprenant les étapes consistant à :
- se procurer un motif d'information lisible, consistant en au moins une chaîne de
caractères, chiffres, symboles, lettres et/ou points,
- se procurer des règles de commande pour conduire un changement d'un ou plusieurs
caractères de l'au moins une chaîne en réponse à un ou plusieurs déclencheurs intrinsèques
ou externes,
- attribuer le motif d'information et les règles de commande à un objet ou individu
spécifique ou un groupe de ceux-ci,
- capturer le motif d'information lisible avec un lecteur,
- stocker le motif d'information capturé dans une unité de mémoire,
- stocker un motif d'information unique et les règles de commande dans une base de
données centrale,
caractérisé par les étapes suivantes :
- modifier un ou plusieurs caractères à l'intérieur de la chaîne en réponse au(x)
déclencheur(s) intrinsèque(s) ou externe(s), de telle sorte que le caractère devienne
illisible par le lecteur, ce qui se solde par un motif d'information modifié consistant
en une chaîne avec des caractères lisibles et illisibles,
- transmettre au moins une partie du motif d'information modifié à la base de données
centrale,
- comparer l'au moins une partie du motif d'information modifié avec la partie respective
du motif d'information unique stocké dans la base de données centrale, un objet ou
individu étant authentifié, autorisé ou marqué quand les caractères lisibles et illisibles
du motif d'information modifié transmis et du motif d'information stocké dans la base
de données ont été changés, remplacés ou supprimés conformément aux règles de commande
fournies.
8. Procédé selon la revendication 7, dans lequel le ou les caractères sont rendus illisibles
en introduisant ou en développant une ou plusieurs fissures en plus des chiffres,
symboles, lettres et/ou points affichés, le nombre, la nature, la couleur et/ou l'intensité
des fissures étant déclenchés par une règle de commande spécifique ou par un déclencheur
intrinsèque ou externe.
9. Procédé selon l'une quelconque des revendications 7 à 8, dans lequel un caractère
fissuré illisible est supprimé ou remplacé par un ou plusieurs caractères lisibles
consistant en des chiffres, des symboles, des lettres et/ou des points, conformément
aux règles de commande fournies, ce qui crée une chaîne modifiée qui est transférée
et comparée avec le motif d'information unique dans la base de données centrale, les
règles de commande fournies comprenant les positions de modification de caractère,
la nature et l'intensité des modifications de caractère, et les positions sans aucune
modification de caractère.
10. Procédé selon l'une quelconque des revendications 7 à 9, dans lequel les caractères
sont modifiés dans leur couleur de fond et/ou leur intensité, la couleur et/ou l'intensité
de chiffres, symboles, lettres et/ou points, et/ou la couleur et/ou l'intensité des
fissures.
11. Procédé selon l'une quelconque des revendications 7 à 10, dans lequel l'objet ou individu
est identifié dans une première étape par des caractères lisibles uniques à l'intérieur
de la chaîne, l'objet ou individu étant authentifié dans une étape supplémentaire
par le nombre, la position, la couleur, la nature et/ou l'intensité et/ou le type
des caractères modifiés illisibles à l'intérieur de la chaîne.
12. Procédé selon l'une quelconque des revendications 7 à 11, dans lequel le motif d'information
modifié contient une chaîne avec des caractères lisibles et/ou illisibles, dans lequel
pour chaque requête d'identification et/ou d'authentification, la chaîne subit des
changements dynamiques par modification d'un ou plusieurs des caractères lisibles
et/ou illisibles identiques ou différents, dans lequel au moins une partie du motif
initial reste inchangée.
13. Procédé selon l'une quelconque des revendications 7 à 12, le procédé comprenant en
outre le remplacement du motif d'information unique par le motif d'information modifié,
ce qui crée ainsi un nouveau motif d'information unique.
14. Procédé selon la revendication 7, dans lequel le motif d'information lisible est disposé
sur un écran ou une surface, composé d'éléments de sécurité tels que des chiffres,
des symboles, des lettres, des craquelures et/ou des points, et le motif d'information
stocké est remplacé par le motif d'information unique quand il y a une correspondance
des éléments de sécurité non modifiés.
15. Procédé selon la revendication 14, dans lequel les points disposés sur la surface
comprennent un pigment qui change sa couleur et/ou son intensité en réponse à un déclencheur
intrinsèque ou externe.