(19)
(11) EP 2 824 641 B1

(12) EUROPEAN PATENT SPECIFICATION

(45) Mention of the grant of the patent:
30.11.2016 Bulletin 2016/48

(21) Application number: 13003436.6

(22) Date of filing: 08.07.2013
(51) International Patent Classification (IPC): 
G07D 7/00(2016.01)

(54)

Systems and methods for authenticating, identifying or marking objects or individuals using dynamic security features

Systeme und Verfahren zur Authentifizierung, Identifizierung oder Markierung von Gegenständen oder Personen mit dynamischen Sicherheitsmerkmalen

Systèmes et procédés permettant l'authentification, l'identification ou le marquage d'objets ou d'individus au moyen de caractéristiques de sécurité dynamiques


(84) Designated Contracting States:
AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR

(43) Date of publication of application:
14.01.2015 Bulletin 2015/03

(73) Proprietor: Kisters, Friedrich
8280 Kreuzlingen (CH)

(72) Inventor:
  • Kisters, Friedrich
    8280 Kreuzlingen (CH)

(74) Representative: Patentanwälte Dr. Keller, Schwertfeger 
Westring 17
76829 Landau
76829 Landau (DE)


(56) References cited: : 
WO-A1-2011/138515
WO-A1-2012/109294
   
       
    Note: Within nine months from the publication of the mention of the grant of the European patent, any person may give notice to the European Patent Office of opposition to the European patent granted. Notice of opposition shall be filed in a written reasoned statement. It shall not be deemed to have been filed until the opposition fee has been paid. (Art. 99(1) European Patent Convention).


    Description


    [0001] The present invention relates to systems and methods for authenticating, identifying or marking objects or individuals using security features that undergo at least in part dynamic modification process.

    [0002] Many of the known security systems make use of static security features for anti-forgery protection or the prevention of abuse. A way of producing such security features is to make them appear invisible to the forger. This type of system functions well only as long as the forger has no knowledge of rendering it visible, copying or stealing the security element. If, for example, the identity card or an access card is stolen, the holder thereof, although not authorized, can identify himself and possibly gain access to restricted areas.
    DE 10 2004 045 211 A1 concerns a security document comprising a flexible carrier and a multi-layer flexible film body which is applied to the flexible carrier and which provides one or more optical security features. The flexible multi-layer film body has an electrically controller display element for generating an optical security feature with associated electrical current source for operation of the display element in combination with an optically active diffractive structure.

    [0003] The security document described in DE 10 2005 030 626 A1 has an integrated circuit for communication with an external read and/or write device and at least one display system integrated into the security document. This is designed to provide a self-personalising document. After the personalisation the display system contains person-specific and/or document-specific data, in particular the name and/or biometric data of the document holder or the validity period of the document. A security document of this type is also rigid with its security features and does not avoid an unauthorised bearer to gain access to certain areas or copy and use it to mark a forgery, such as a painting or piece of furniture.

    [0004] There is a requirement to provide security for the authentication, identification, the marking of objects or individuals, for example for gaining physical or digital access to a device in order to carry out transactions. The mere input of digit numbers, letters, symbols or other features does not hinder an unauthorized bearer to use the device for unauthorized transactions. If an unauthorized person knows the code, the true user can only block the device from performing further actions, but at this time it can already be too late.

    [0005] The use of biometric features constitutes one possible solution, but as a static factor is still prone to being hijacked or copied and not always very reliable. Such a system is described in JP 2010286920 A, where a user inputs several digits of his/her own identification number to a touch panel of a fingerprint authentication terminal. The user puts a finger on a fingerprint sensor of the fingerprint authentication terminal. Authentication is performed using the fingerprint data read by the fingerprint sensor and the personal ID-number. If there is a certain degree of match between the data and input information, the user is authenticated.

    [0006] There are security systems that make use of the properties of certain materials for identification purposes. DE 20 2005 005 130 U1, for instance, describes a textile identification arrangement with security features for protection against plagiarisms. The arrangement consists of at least one first and second pigment layer and the polymer supporting layer, whereby the first and second pigment layers are arranged on the supporting layer. The first pigment layer has at least one type of interference pigment in the form of a geometric pattern that is used as a security feature.

    [0007] WO 2012/109294 A1 describes a similar approach using a security feature consisting of a product code, comprising at least one modified character that is different from a corresponding one of a plurality of unmodified characters of the initial product code. The modified product code includes a covert feature, which is not generally noticeable as a code to the casual consumer. Again, this method must be regarded as a static method because the modified code is printed similar to the way any conventional character is printed, without any dynamic change. The digitized characters are then stored in a printer controller. An algorithm can be applied to modify one or more characters of the product code.

    [0008] WO 2011/138515 A1 describes an authentication device comprising at least one security element applied to a product, capable of changing colour by means of spatially and temporally coherent laser radiation, which is emitted by the authentication device. The radiation emitted by the authentication device is located outside the range of perception of the eye.

    [0009] US 2012/088079 A1 describes an optically responsive feature for security, authentication and/or identification purposes. The embodiment makes use of an optical effect-producing medium. The medium comprises a carrier medium containing pigment particles having at least one optically responsive pigment or one that is responsive to incident electromagnetic radiation of at least a selected excitation wave length or wave length band for producing an optical response in the visible or near-visible spectrum. US 2009/0074229 A1 describes an apparatus and a method for visually representing measuring values.
    All of the known security systems and methods make use of static security features, such as passwords, ID-numbers and other security features which are updated from time to time. Even if a code changes constantly, it is static, not dynamic, since the new code simply replaces the previous one, but remains again static for the duration of its validity. The authentication or identification system must be able to authenticate and/or identify an object or user and also knows, which code is currently valid. Therefore, its algorithm can be hijacked, or the code can be intercepted during its transmission.
    It is an object of the present invention to provide an improved system and a method for authenticating, identifying or marking objects or individuals to achieve a higher security standard using dynamic modification features.
    The solution is provided by a system and a method for authenticating, identifying or marking objects or individuals according to the present invention.

    [0010] The system of the invention as claimed in claim 1 comprises a display or a surface for displaying a readable information pattern, consisting of at least one string of digits with numbers, symbols, letters and/or dots. As an example, a string may have the appearance dA%4Be?P.LK-32i. "Readable information" in this context means any information that can be captured using physical or optical means such as optical reader units, cameras or sensors. In a preferred embodiment, the readable information pattern can be recognized by optical character recognition (OCR). The information pattern can be one string or a number of strings using numbers, symbols, letters and/or dots. "Symbols" as used in the context of the present invention comprise additional characters and special signs in any language, or random signs such as assemblies of dots or a graphic.

    [0011] The system as claimed in claim 1 also comprises a reader comprising optical means for capturing the readable information pattern displayed in the display or on the surface. The captured information pattern is stored in a memory unit, which can be part of the reader. Reader and memory unit can be part of a device, e.g. a mobile or smart phone or a computer.

    [0012] The system further comprises a storage unit for storage of unique information patterns in a central database. The database can be directly connected to the storage unit, or it can be part of a remote system. Each object or individual to be authenticated and/or identified is characterized by a unique information pattern. An assignment table assigns this unique information pattern to a specific object or individual. A processing unit is provided with command rules for conducting a change of one or more digits of the at least one string in response to one or more inherent or external triggers. Preferably, the command rules are stored together with the unique information pattern in the central database and/or in the memory unit of a separate device.

    [0013] A transmitting unit comprised in the system as claimed in claim 1 transfers the captured information pattern from the display or surface to the storage unit. The system further comprises a processing unit that compares the transmitted information pattern with the unique information pattern stored in the central database. It also comprises a trigger unit that conducts, in response to the one or more inherent or external triggers, a modification of one or more digits within the string such that the digit becomes unreadable, or shall be read as a different symbol by the reader, resulting in a modified information pattern with changing readable and/or unreadable digits. The processing unit is further configured to compare the readable and unreadable digits of the modified information pattern at the respective positions of the unique information pattern stored in the database. The modification conducted by the trigger unit preferably comprises a deletion, change or replacement of one or more digits with numbers, symbols, letters and/or dots.

    [0014] In a preferred embodiment, the readable information pattern, in particular the readable digits (e.g. letters, signs, symbols, numbers, dots) is compared with the database identity. The combination of readable digits and altered or unreadable digits provide a pattern that can be compared with the information pattern stored in the database. Most importantly, the altered or unreadable digits are introduced by means of an inherent or external trigger.

    [0015] Triggers that may be applied in the present invention include, but are not limited to geo position or routing, temperature, humidity, atmospheric pressure, altitude, light intensity, colour, sound intensity, time, movement, vibration, stored algorithms, manual keyboard presses, measurement data provided by sensors, or triggering in accordance with individual's behaviour. For example, if a device equipped with a display is carried from one place to another place that has a certain temperature difference, this may trigger the execution of a command rule, which changes one or more digits at certain positions within the string from a readable into an unreadable information. For example, the string ABCDE12345 can be modified to AB*DE1*345, wherein the digits marked with "*" are rendered unreadable by executing a command rule due to an inherent or external trigger. It is one advantage of the present system and method of the invention that the kind of modification is not predictable but is based on certain rules specific for the object or individual. If there should be modifications in the string that differ from the ones normally introduced in accordance with the underlying command rule, that would mean that the object or individual is not validly authenticated or identified.

    [0016] A command rule could also be executed if an individual or an object carried by an individual does not follow a pre-defined geo-routing, which may trigger one or more modifications of pre-defined digits within the string. A modification can also be triggered by a manual keyboard press, for example a key on a smart phone. The triggered unit can also become active in accordance with individual's behaviour if the individual follows a certain life scheme. In case there is an abnormality within the individual's behaviour scheme, this would cause an alert or execute another security event such as an alarm.

    [0017] In one embodiment, the at least one digit in the string is rendered unreadable by one or more pre-defined cracks introduced by the trigger unit. The one or more cracks define a pattern which may correlate with a specific command rule for authenticating, identifying or marking the object or the individual. Not only the pattern of the cracks can be used as a security feature, but also their position, nature, colour and/or intensity. The processing unit preferably deletes, replaces or modifies one or more digits in accordance with the provided command rules by changing the display or surface background, and/or the intensity, nature, colour or intensity of the displayed numbers, symbols, letters and/or dots, or the nature, colour and/or intensity of the cracks. Preferably, the reader comprises an optical character recognition unit to read the information pattern composed of numbers, symbols or letters. The transmitting unit may transmit only certain digits to the central database identified by the position number. It can be sufficient if only certain positions out of the full string are transferred and compared with the database entry. Certain positions of the string may also be attributed to certain activities. Each usage may trigger a change (e. g. a cracking) of some digits in these positions and/or a change of the positions as such.

    [0018] Alternatively, the reader can comprise an image acquisition unit for image comparison of the digits and/or the cracks. Specific areas of the image can be used for a pre-selection of the object or individual. A unique string in the information pattern is assigned to a specific user for basic identification.

    [0019] In order to increase security, there are various combinations and rules that may be applied in order to dynamically modify the string in a defined, but unpredictable manner. For example, cracks can occur in up to eight (or more) directions and can be combined with other cracks. Each crack can have its own colour, background colour, form or intensity. The same also applies to the colour/intensity of the letter/ number/symbol segment and their respective backgrounds. This results in a plurality of possible variants per digit, which can be combined or dynamically changed.

    [0020] In addition, a certain crack pattern can result in a disappearance of a digit which adds a further security feature. Furthermore, certain digits can be disregarded from modification, which means that they can never be changed into a different or unreadable form. This also increases security. By applying the dynamic modification approach, digits can crack, change their background colours and/or their intensities. In addition, digits with cracks can be made reversible by de-cracking and changing or loosing colour. Furthermore, certain digits can undergo several modifications, whereas other digits at certain positions can only undergo a certain number of modifications, for example not more than two modifications or even no modification. Also the mode of modification can follow a certain rule, for example in a first step cracks are introduced at certain digit positions, in a second step their colours are changed, in a third step the cracks develop. A truly authenticated user can be able to change the modified string by pushing a key or bottom or by touching the screen of his device.

    [0021] The present invention also relates to a method for authenticating, identifying or marking objects or individuals, as claimed in claim 7 the method comprising the steps:
    • providing a readable information pattern, consisting of at least one string of digits numbers, symbols, letters and/or dots,
    • providing command rules for conducting a change of one or more digits of the at least one string in response to one or more inherent or external triggers,
    • assigning the information pattern and the command rules to a specific object or individual, or a group thereof,
    • capturing the displayed information pattern by a reader,
    • storing the captured information pattern in a memory unit,
    • storing a unique information pattern and the command rules in a central database,
    • modifying one or more digits within the string in response to one or more inherent or external triggers, such that the digit becomes unreadable by the reader, or differently readable, resulting in a modified information pattern consisting of a string with readable and unreadable digits,
    • transmitting at least one part of the modified information pattern to the central database,
    • comparing the at least one part of the modified information pattern with the respective part of the unique information pattern stored in the central database,
    wherein an object or individual is authenticated, authorised or marked, when the readable and unreadable digits of the transmitted modified information pattern and the information pattern stored in the database have been changed, replaced or deleted in accordance with the provided command rules.

    [0022] In a preferred embodiment, it may be sufficient that the string is composed of one or more dots on a surface. The dots may contain pigments that change the colours in accordance with an inherent or external trigger. The information pattern is made of the colour displayed by the dots. This unique information pattern is stored in the central database. If the colours (or their intensities) of the dots change, then this new information pattern is transferred to the central database and compared. If the change is in accordance with the provided rules, the user or the object is authenticated and/or identified. In a subsequent step, the transferred information pattern can then be stored in the database as a new unique information pattern. If the colours of the dots change again, an updated information pattern is transferred and again compared with the stored information pattern within the database. If a colour has not been changed in accordance with the underlying command rules, access of the user is denied or an alert will be triggered. For example, the dots may change their colour from blue to green (e.g. by oxidation) when executing an underlying command rule. If a formerly green dot should show up in blue colour, an alarm is triggered. Accordingly, this could indicate the existence of a falsified variant, which had been copied when the dot was still blue, whereas in the meantime the original would have turned into green colour. At the same time, this change is non-reversible. Even a perfect copy would therefore loose its value very quickly. When using a display, the pigment change of a dot from blue to green can be defined as being irreversible in accordance with an underlying command rule, which would be similar to the natural oxidation process described above.

    [0023] In another embodiment, the displayed numbers, symbols, letters and/or dots can crack according to a certain pattern. The image of the pattern can be captured by an image acquisition unit, or the cracked digits can be rendered unreadable by the utilised reader. In one embodiment, the one or more digits are rendered unreadable by introducing or developing one or more cracks in addition to the displayed numbers, symbols, letters and/or dots. Preferably, the number, nature, colour and/or intensity of the cracks are triggered by a specific command rule or by an inherent or external trigger. An inherent trigger can be a chemical or physical reaction that takes place within the material used for displaying the numbers, symbols, letters and/or dots. An example is a lacquer that is able to change its colour.

    [0024] Preferably, a cracked unreadable digit is either deleted or replaced by one or more readable digits consisting of numbers, symbols, letters and/or dots, in accordance with the provided command rules, creating a modified string that is transferred and compared with the unique information pattern in the central database. The provided command rules comprise the positions of digit modification, the nature and intensity of digit modification and the positions with no digit modification. For example, the digits can be modified in their background colour and intensity, colour and/or intensity of numbers, symbols, letters and/or dots, and/or colour and/or intensity or type of the cracks. Therefore, the user has a number of possible combinations wherein the resulting pattern is based on the underlying command rule. The command rule will tell which digits within the string (i.e. their positions) are modified in response to the inherent or external trigger and what restrictions apply, and perhaps which shall not apply.

    [0025] The length of the string can comprise 4 or more digits, preferably more than 100 digits, preferably more than 1000 digits. In order to authenticate and/or identify an object or individual, it might be necessary to transfer and compare only a portion of the string with the stored counterpart in the central database. Alternatively, a pre-selection can be performed by using digit positions which allow a rapid identification of the object or individual. In a preferred embodiment, the object or individual is therefore identified in a first step by unique readable digits within the string, wherein in a further step the object or individual is authenticated by the number, position, colour, nature and/or intensity of the modified or unreadable digits within the string.

    [0026] The modified information pattern preferably contains a string with readable and/or unreadable digits, wherein for each identification and/or authentication request, the string undergoes dynamic changes by modifying one or more of the same or different readable and/or unreadable digits. At least one part of the original pattern remains unchanged, whereas another part is changed. Upon transfer of the modified information pattern captured from the display or surface, the stored information pattern in the database can be replaced by the modified information pattern. This renders the previous version of the information pattern invalid for any future authentication or identification. The updated information pattern can be replaced at a later time point by a further modified information pattern, which again updates the stored information pattern, thereby creating a new unique information pattern specific for the object or individual which cannot be predicted, even if the underlying rules and algorithms are known. It is therefore impossible to copy or mimic an object using the present system or method.

    [0027] Another embodiment of the method for authenticating, identifying or marking objects or individuals, is defined in claim 14, wherein the readable information pattern, consists of security elements such as numbers, symbols, letters, crackles and/or dots,
    • and
    • the stored information pattern is replaced with the unique information pattern, when there is a match of the non-modified security elements, wherein a match authenticates, identifies or marks the true object or individual.


    [0028] In a preferred embodiment, the dots provided on the surface comprise a pigment that changes its colour and/or intensity in response to an inherent or external trigger. An image acquisition unit such as a camera can detect the colour change, even if not visible for the human eye. The modified information pattern based on the changed dots can then be transferred to the central database and compared with the stored unique information pattern. The information pattern can then be updated as described above.

    [0029] The present invention is illustrated in the following examples and the figure.

    Example 1



    [0030] A device is provided containing a memory unit in which a string consisting of numbers, letters or symbols is stored together with command rules which allow a triggered modification of one or more digits within the string. The string may look like 1A.Z56-!i#e.?

    [0031] The modification is carried out by a trigger unit that replaces, deletes or introduces some of the letters, numbers, symbols or dots or their backgrounds. A display makes the string or a part thereof visible for the user.

    [0032] In Fig. 1, one digit out of the string 1A.Z56-!i#e.? consisting of the letter "e" is shown. If the device (e.g. a smartphone) is used by an authorized user (and/or depending on the rules by an unauthorized user), this may trigger a modification of the digit as a response to an underlying command rule. The trigger can be, for example, a (wrong) input of a pin number or (wrong) GPS position, which does not match with the GPS position stored in the command rule for this activity. The trigger unit triggers, as a result of such an external trigger, the formation of a crack which overlaps the letter "e" (Fig. 1A). This renders the position of the digit "e" within the string 1A.Z56-!i#e.? unreadable to read as 1A.Z56-!i#*.? (marked as "*").

    [0033] In the example shown, a half-crack (bold line) can occur at eight possible positions (dotted lines). Two or more half-cracks can be displayed in combination. Each half-crack can also be displayed in another colour. In addition, the letter "e" can also be displayed in a different colour. The same also applies for the letter's background which can be coloured differently or in a different intensity. This example illustrates that within one single digit, there is a plurality of variations that can be used as security features. Most importantly, these security features are dynamic because some information in the pattern remains unchanged (e.g. the letter "e"), whereas some other information is changed (e.g. by formation of cracks, colours, intensities). These modifications of the information pattern result in a new unique information pattern specific for the object or individual to be authenticated, identified and/or marked. The modified pattern correlates with the event that triggered the modification and the rules which apply for it. The pattern is still dynamic, since its exact place of occurrence and its type is not predictable, because it fully depends on inherent of external triggers and the underlying command rules..

    [0034] In Fig. 1B, a further half-crack is introduced overlapping the letter "e". This creates a modified unique information pattern which is different from the information pattern shown in Fig. 1A. By introducing one or more cracks or by changing the colours, the digit may be rendered unreadable by a reader (e.g. OCR unit or image acquisition unit), whereas the other digits remain readable. Alternatively, a digit could be replaced by a different value, which is readable by OCR, wherein the reader is capable of identifying "cracked letters". Additionally, the digit may be identified in high resolution or detail by a non-OCR reader, using conventional image information rather than OCR.

    [0035] The readable digits are transferred to a central database, in which a previous version of the unique information pattern is stored. If the modification (e.g. introduction of a crack) complies with the underlying command rule (or if there is no rule for this specific change), the object or individual is rightfully authenticated or identified. If the digit should have been changed differently (e.g. cracks in different positions), the user is not authenticated or identified, causing an alert or alarm submitted to an external service. The alarm can also result in blocking the device for further usage. If the unchanged parts do not correspond with the database entry, the user is also not authenticated or identified, causing an alert or alarm being submitted to an external service.

    [0036] The security string can comprise from 4 digits to over 1.000.000 digits, whereas it may be sufficient to transfer only a small portion of the string for a pre-selection. Therefore, the amount of data to be transferred can be varied, as well as the security which is scalable, depending on the security request specific for the respective action, the number of digits within the string and the number of modifications.

    [0037] Using OCR technology, only readable digits are transferred and compared with the stored information pattern in this central database. Because of the dynamic nature of the inventive security elements, a high security standard is achieved. Furthermore, using a part of string comparison, fast and easy identification in a pre-selection step is possible.

    [0038] The system and method according to the present invention use dynamic security features which allow for flexible security applications. The modified and/or non-modified security elements are OCR- and image-readable. These dynamic security features make it nearly impossible to fake without risking double or multiple database entries within the central database. Areas where digits (e.g. letters, numbers, symbols and/or dots) cannot change form a unique pattern, as well as digits than can change. The security level can further be increased by applying additional security features such as biometric features. The code constantly changes, but remains recognizable, especially because its basic structure does not alter. The dynamic nature of the security string can protect additional biometric information from being faked, while it can help in selecting and pre-identifying the user.

    [0039] A fast pre-selection can be performed by checking basic elements (e.g. ID-area with name or ID-number). Double checking of the readable letters and their position in the resulting data-entries matching the first query is possible if there is a result. Triple checking is possible that includes digit variants created by the dynamic modification process. Once identified, data of the respective object or identity can be displayed to the requesting party.

    Example 2



    [0040] The image shown in Fig. 1A or Fig. 1B can be used for image acquisition. The information pattern shown on the display or surface can be photographed by a camera, transferred and compared with the stored image in the database. This allows an image comparison of the digits, but also of the cracks. Specific areas of the image can be used for a fast pre-selection. For example, an individual can be identified by a number of subsequent digits that occur within the string.

    Example 3



    [0041] Possible command rules for dynamic changes in letters:
    • Letters can never change into other letters, unless these are cracked-derivations, like aa, a2, a3, a4, ....ax.
    • Letter can appear/disappear after a certain level of crack-derivation, e.g. if more than 3 colours in one letter and more than 2 colours in the background, as well as more than 4 cracks, etc.
    • Letters can crack, change colour and change background colour.
    • Letters can de-crack, change colour and background colour back, lose colour.
    • Double cracks (e.g. combination of 3 and 9 p.m. cracks) cannot heal anymore, or only if both segments get the same background/digit/crack-colour.
    • 3 colours per segment can be reduced to 2, but not directly removed.
    • 2 colours per segment can be reduced to one, but not directly removed.
    • More cracks can be added, but only in steps of one.
    • Zick-zack cracks and other variants may appear anywhere.
    • Zick-zack cracks are neglected by simple OCR readers, but read by more complex ones.
    • Environmental factors, like temperature, shock/vibration and/or geo-position (if available) have an "individual" influence on the cracks, their form and their colours, partly depending on the "DNA settings" of the algorithm, setting the basic rules for changes.
    • A fully authenticated user (e.g. including a secure biometric factor) may change the changeable areas of this string by simple selection on the screen or by entering their positions (from/to). The ID area of the string, which may be unknown to the user shall remain unchangeable. Further cracks can be added by a fully authenticated user by simply pushing a button "crack" in a software application. This can be useful if the user feels that his code has been spied, tampered or copied by someone else (e.g. after paying in a shop).

    Example 4


    DNA definitions



    [0042] 
    • There are areas defined in which only some or no rules are applicable and "prohibit changes":

      "Between letter 212 and 289 there never occurs any crackling";

      "No colour change"

      "Crackling can disappear"

      "Letter can be replaced".

    • Some colours may not appear in some positions, or with some cracks:
      1. a. Blue: 1, 11, 21, 90"
      2. b. Red: 2, 12, 22, 270°
      3. c. Green: 3, 13, 23, 180°
    • There may be delays until a colour changes, if a certain environmental factor changes:
      1. a. "A" in positions xyz changes, if temperature varies > 10 degrees. Delay per change of 1 A-digit: 100 sec (...x)
      2. b. "B" in positions xyz changes, if geo-position varies > 10 degrees / 5 degrees. Delay per change of 1 B-digit: 10 sec (...x).
      1. a. In "A", position xyz, crack disappears, if colour of crack, digit and background match.
      2. b. In "B", position xyz, crack disappears, if colour of crack is yellow, digit green and background white.



    Claims

    1. A system for authenticating, identifying or marking objects or individuals, comprising

    - a display or surface for displaying a readable information pattern, consisting of at least one string of digits with numbers, symbols, letters and/or dots,

    - a reader for capturing the displayed information pattern,

    - a memory unit for storage of the captured information pattern,

    - a storage unit for storage of unique information patterns in a central database,

    - a processing unit provided with command rules for conducting a change of one or more digits of the at least one string in response to one or more inherent or external triggers,

    - an assignment table for assigning the unique information pattern and the command rules to a specific object or individual,

    - a transmitting unit for transmitting the captured information pattern from the display or surface to the storage unit,

    - a processing unit for comparing the transmitted information pattern with the unique information pattern stored in the central database,

    characterised in that the system comprises a trigger unit that conducts, in response to the one or more inherent or external triggers, a modification of one or more digits within the string such that the digit becomes unreadable by the reader, resulting in a modified information pattern with readable and unreadable digits, wherein the processing unit is configured to compare the readable and unreadable digits of the modified information pattern at the respective positions of the unique information pattern stored in the database , wherein an object or individual is authenticated, authorised or marked when the readable and unreadable digits of the transmitted modified information pattern and the information pattern stored in the database have been changed, replaced or deleted in accordance with the provided command rules.
     
    2. The system according to claim 1, wherein the modification conducted by the trigger unit comprises a deletion, change or replacement of one or more digits with numbers, symbols, letters and/or dots.
     
    3. The system according to claim 1 or 2, wherein at least one digit in the string comprises one or more predefined cracks introduced by the trigger unit, wherein the position, nature, colour and/or intensity of the cracks correlate with a specific command rule for authenticating, identifying or marking the object or individual.
     
    4. The system according to anyone of claims 1 to 3, wherein the one or more inherent or external triggers are selected from the group consisting of: geo position or routing, temperature, humidity, atmospheric pressure, altitude, light intensity, colour, sound intensity, time, movement, vibration, stored algorithms, manual keyboard presses, measurement data provided by sensors, or triggering in accordance with individual's behaviour.
     
    5. The system according to anyone of claims 1 to 4, wherein the reader comprises an optical character recognition unit and/or an image acquisition unit.
     
    6. The system according to anyone of claims 1 to 5, wherein the processing unit deletes, replaces or modifies one or more digits in accordance with the provided command rules by changing the display or surface background colour and/or intensity, the nature, colour and/or intensity of the displayed numbers, symbols, letters and/or dots, or the nature, colour and/or intensity of the cracks.
     
    7. A method for authenticating, identifying or marking objects or individuals, the method comprising the steps:

    - providing a readable information pattern, consisting of at least one string of digit numbers, symbols, letters and/or dots,

    - providing command rules for conducting a change of one or more digits of the at least one string in response to one or more inherent or external triggers,

    - assigning the information pattern and the command rules to a specific object or individual or a group thereof,

    - capturing the readable information pattern by a reader,

    - storing the captured information pattern in a memory unit,

    - storing a unique information pattern and the command rules in a central database,

    characterised by the following steps:

    - modifying one or more digits within the string in response to the one or more inherent or external triggers, such that the digit becomes unreadable by the reader, resulting in a modified information pattern consisting of a string with readable and unreadable digits,

    - transmitting at least one part of the modified information pattern to the central database,

    - comparing the at least one part of the modified information pattern with the respective part of the unique information pattern stored in the central database, wherein an object or individual is authenticated, authorised or marked, when the readable and unreadable digits of the transmitted modified information pattern and the information pattern stored in the database have been changed, replaced or deleted in accordance with the provided command rules.


     
    8. The method according to claim 7, wherein the one or more digits are rendered unreadable by introducing or developing one or more cracks in addition to the displayed numbers, symbols, letters and/or dots, the number, nature, colour and/or intensity of the cracks being triggered by a specific command rule or by an inherent or external trigger.
     
    9. The method according to anyone of claims 7 to 8, wherein a cracked unreadable digit is either deleted or replaced by one or more readable digits consisting of numbers, symbols, letters and/or dots, in accordance with the provided command rules, creating a modified string that is transferred and compared with the unique information pattern in the central database, wherein the provided command rules comprise the positions of digit modification, the nature and intensity of digit modification, and the positions with no digit modification.
     
    10. The method according to anyone of claims 7 to 9, wherein the digits are modified in their background colour and/or intensity, colour and/or intensity of numbers, symbols, letters and/or dots, and/or colour and/or intensity of the cracks.
     
    11. The method according to anyone of claims 7 to 10, wherein the object or individual is identified in a first step by unique readable digits within the string, wherein in a further step the object or individual is authenticated by the number, position, colour, nature and/or intensity and/or type of the modified unreadable digits within the string.
     
    12. The method according to anyone of claims 7 to 11, wherein the modified information pattern contains a string with readable and/or unreadable digits, wherein for each identification and/or authentication request, the string undergoes dynamic changes by modifying one or more of the same or different readable and/or unreadable digits, wherein at least one part of the original pattern remains unchanged.
     
    13. The method according to anyone of claims 7 to 12, wherein the method further comprises replacing the unique information pattern with the modified information pattern, thereby creating a new unique information pattern.
     
    14. The method according to claim 7, wherein the readable information pattern is provided on a display or surface, consisting of security elements such as numbers, symbols, letters, crackles and/or dots, and the stored information pattern is replaced with the unique information pattern, when there is a match of the non-modified security elements.
     
    15. The method according to claim 14, wherein the dots provided on the surface comprise a pigment that changes its colour and/or intensity in response to an inherent or external trigger.
     


    Ansprüche

    1. System zur Authentifizierung, Identifizierung oder Kennzeichnung von Objekten oder Individuen, umfassend

    - ein Display oder eine Oberfläche zum Anzeigen eines lesbaren Informationsmusters, bestehend aus wenigstens einer Ziffernfolge aus Zahlen, Symbolen, Buchstaben und/oder Punkten,

    - ein Lesegerät zum Erfassen des angezeigten Informationsmusters,

    - eine Speichereinheit zum Speichern des erfassten Informationsmusters,

    - eine Speichereinheit zum Speichern von einzigartigen Informationsmustern in einer zentralen Datenbank,

    - eine Verarbeitungseinheit, ausgerüstet mit Befehlsregeln zum Durchführen einer Veränderung von einer oder mehreren Ziffern der wenigstens einen Zeichenfolge als Antwort auf ein oder mehrere inhärente oder externe Auslösemittel,

    - eine Zuordnungstabelle zum Zuordnen des einzigartigen Informationsmusters und der Befehlsregeln zu einem spezifischen Objekt oder einem Individuum,

    - eine Übertragungseinheit zum Übertragen des von dem Display oder der Oberfläche erfassten Informationsmusters zur Speichereinheit,

    - eine Verarbeitungseinheit zum Vergleichen des übertragenen Informationsmusters

    mit dem in der zentralen Datenbank gespeicherten einzigartigen Informationsmuster,
    dadurch gekennzeichnet, dass das System eine Auslöseeinheit umfasst, die als Antwort auf ein oder mehrere inhärente oder externe Auslösemittel eine Modifikation von einer oder mehreren Ziffern innerhalb der Zeichenfolge herbeiführt, so dass die Ziffern durch das Lesegerät unlesbar werden, was ein modifiziertes Informationsmuster mit lesbaren und unlesbaren Zeichen ergibt, wobei die Verarbeitungseinheit so konfiguriert ist, dass sie lesbare und unlesbare Zeichen des modifizierten Informationsmusters an den entsprechenden Positionen mit denen des einzigartigen Informationsmusters in der Datenbank vergleicht, wobei ein Objekt oder ein Individuum authentifiziert, autorisiert oder gekennzeichnet ist, wenn die lesbaren und unlesbaren Zeichen des übertragenden modifizierten Informationsmusters und des in der Datenbank gespeicherten Informationsmusters gemäß den vorgesehenen Befehlsregeln geändert, ersetzt oder gelöscht worden sind.
     
    2. System nach Anspruch 1, wobei die durch die Auslöseeinheit herbeigeführte Modifikation ein Löschen, ein Verändern oder einen Austausch einer oder mehrerer Ziffern aus Zahlen, Symbolen, Buchstaben und/oder Punkten umfasst.
     
    3. System nach Anspruch 1 oder 2, wobei wenigstens eine Ziffer in der Zeichenfolge einen oder mehrere durch die Auslöseeinheit eingeführte vordefinierte Risse umfasst, wobei die Position, die Art, die Farbe und/oder die Intensität der Risse mit einer spezifischen Befehlsregel zur Authentifizierung, Identifizierung oder Kennzeichnung des Objektes oder des Individuums korreliert.
     
    4. System nach einem der Ansprüche 1 bis 3, wobei das eine oder die mehreren inhärenten oder externen Auslösemittel ausgewählt sind aus der Gruppe bestehend aus: einer Geoposition oder einer Route, einer Temperatur, einer Luftfeuchtigkeit, einem Luftdruck, einer Höhe, einer Lichtintensität, einer Farbe, einer Lautstärke, einem Zeitpunkt, einer Bewegung, einer Erschütterung, einem gespeicherten Algorithmus, einem manuellem Tastendruck, Messdaten, die von Sensoren bereitgestellt werden oder Auslösemittel, die auf einem individuellen Verhalten basieren.
     
    5. System nach einem der Ansprüche 1 bis 4, wobei das Lesegerät eine optische Zeichenerkennungseinheit und/oder eine Bilderfassungseinheit umfasst.
     
    6. System nach einem der Ansprüche 1 bis 5, wobei die Verarbeitungseinheit, entsprechend den bereitgestellten Befehlsregeln, eine oder mehrere Ziffern löscht, austauscht oder modifiziert, durch eine Änderung des Display oder der Hintergrundfarbe der Oberfläche und/oder der Intensität, der Art, der Farbe und/oder der Intensität der angezeigten Zahlen, Symbolen, Buchstaben und/oder Punkte oder der Art, der Farbe und/oder der Intensität der Risse.
     
    7. Verfahren zur Authentifizierung, Identifizierung oder Kennzeichnung von Objekten oder Individuen, umfassend die Schritte:

    - Bereitstellen eines lesbaren Informationsmusters, bestehend aus wenigstens einer Ziffernfolge aus Zahlen, Symbolen, Buchstaben und/oder Punkten,

    - Bereitstellen von Befehlsregeln zum Herbeiführen einer Veränderung einer oder mehrerer Ziffern aus der wenigstens einen Zeichenfolge, als Antwort auf ein oder mehrere inhärente oder externe Auslösemittel,

    - Zuordnen des Informationsmusters und der Befehlsregeln zu einem spezifischen Objekt oder einem Individuum oder einer Gruppe davon,

    - Erfassen des lesbaren Informationsmusters durch ein Lesegerät,

    - Speichern des erfassten Informationsmusters in einer Speichereinheit,

    - Speichern eines einzigartigen Informationsmusters und der Befehlsregeln in einer zentralen Datenbank,

    gekennzeichnet durch die folgenden Schritte:

    - Modifizieren einer oder mehrerer Ziffern innerhalb der Zeichenfolge, als Antwort auf ein oder mehrere inhärente oder externe Auslösemittel derart, dass die Ziffern für das Lesegerät unlesbar werden, was ein modifiziertes Informationsmuster, bestehend aus einer Zeichenfolge mit lesbaren und unlesbaren Ziffern, ergibt,

    - Übertragen wenigstens eines Teils des modifizierten Informationsmusters an die zentrale Datenbank,

    - Vergleichen des wenigstens einen Teils des modifizierten Informationsmusters mit dem entsprechenden Teil des einzigartigen Informationsmusters, das in der zentralen Datenbank gespeichert ist, wobei ein Objekt oder ein Individuum authentifiziert, autorisiert oder gekennzeichnet wird, wenn die lesbaren und unlesbaren Ziffern des übertragenen modifizierten Informationsmusters zu dem in der Datenbank gespeicherten Informationsmuster, entsprechend den Befehlsregeln, geändert, ersetzt oder gelöscht wurden.


     
    8. Verfahren gemäß Anspruch 7, wobei eine oder mehrere Ziffern unlesbar gemacht werden, indem ein oder mehrere Risse eingeführt oder weiterentwickelt werden, neben den angezeigten Zahlen, Symbolen, Buchstaben und/oder Punkten, der Anzahl, der Art, der Farbe und/oder der Intensität der Risse, die durch eine spezifische Befehlsregel oder durch einen inhärenten oder externen Auslöser ausgelöst werden.
     
    9. Verfahren nach einem der Ansprüche 7 bis 8, wobei eine eingerissene, unlesbare Ziffer entweder gelöscht oder durch ein oder mehrere lesbare Ziffern, bestehend aus Zahlen, Symbolen, Buchstaben und/oder Punkten, entsprechend den bereitgestellten Befehlsregeln ersetzt wird, eine modifizierte Zeichenfolge erstellt wird, die mit dem einzigartigen Informationsmuster in der zentralen Datenbank übertragen und verglichen wird, wobei die bereitgestellten Befehlsregeln die Positionen der modifizierten Ziffern, die Art und die Intensität der modifizierten Ziffern und die Positionen der nichtmodifizierten Ziffern umfassen.
     
    10. Verfahren nach einem der Ansprüche 7 bis 9, wobei die Ziffern in ihrer Hintergrundfarbe und/oder ihrer Intensität, ihrer Farbe und/oder der Intensität der Ziffern, Symbole, Buchstaben und/oder Punkte und/oder in ihrer Farbe und/oder der Intensität der Risse modifiziert werden.
     
    11. Verfahren nach einem der Ansprüche 7 bis 10, wobei das Objekt oder das Individuum in einem ersten Schritt durch die einzigartigen lesbaren Ziffern innerhalb der Zeichenfolge identifiziert wird, wobei in einem weiteren Schritt das Objekt oder das Individuum durch die Zahl, die Position, die Farbe, die Art und/oder die Intensität und/oder die Art der Modifikation der unlesbaren Ziffern innerhalb der Zeichenfolge authentifiziert wird.
     
    12. Verfahren nach einem der Ansprüche 7 bis 11, wobei das modifizierte Informationsmuster eine Zeichenfolge aus lesbaren und unlesbaren Ziffern umfasst, wobei für jede Identifikation und/oder Authentifikationsanfrage die Zeichenfolge eine dynamische Veränderung durch Modifizieren einer oder mehrere derselben oder anderer, lesbarer und/oder unlesbarer Ziffern durchläuft, wobei wenigstens ein Teil des ursprünglichen Musters unverändert bleibt.
     
    13. Verfahren nach einem der Ansprüche 7 bis 12, wobei das Verfahren ferner das Ersetzen des einzigartigen Informationsmusters mit dem modifizierten Informationsmuster umfasst, wodurch ein neues einzigartiges Informationsmuster geschaffen wird.
     
    14. Verfahren gemäß Anspruch 7, wobei das lesbare Informationsmuster auf einem Display oder einer Oberfläche bereitgestellt wird, die aus Sicherheitselementen wie Zahlen, Symbolen, Buchstaben, Rissen und/oder Punkten besteht und das gespeicherte Informationsmuster mit dem einzigartigen Informationsmuster ersetzt wird, wenn es eine Übereinstimmung mit den nicht modifizierten Sicherheitselementen gibt.
     
    15. Verfahren gemäß Anspruch 14, wobei die auf der Oberfläche bereitgestellten Punkte ein Pigment umfassen, das seine Farbe und/oder Intensität als Antwort auf ein inhärentes oder externes Auslösemittel verändert.
     


    Revendications

    1. Système d'authentification, d'identification ou de marquage d'objets ou d'individus, comprenant

    - un écran ou une surface pour afficher un motif d'information lisible, consistant en au moins une chaîne de caractères avec des chiffres, des symboles, des lettres et/ou des points,

    - un lecteur pour capturer le motif d'information affiché,

    - une unité de mémoire pour le stockage du motif d'information capturé,

    - une unité de stockage pour le stockage de motifs d'information uniques dans une base de données centrale,

    - une unité de traitement pourvue de règles de commande pour conduire un changement d'un ou plusieurs caractères de l'au moins une chaîne en réponse à un ou plusieurs déclencheurs intrinsèques ou externes,

    - une table d'attribution pour attribuer le motif d'information unique et les règles de commande à un objet ou individu spécifique,

    - une unité de transmission pour transmettre le motif d'information capturé de l'écran ou la surface à l'unité de stockage,

    - une unité de traitement pour comparer le motif d'information transmis avec le motif d'information unique stocké dans la base de données centrale,

    caractérisé en ce que le système comprend une unité de déclenchement qui conduit, en réponse au(x) déclencheur(s) intrinsèque(s) ou externe(s), une modification d'un ou plusieurs caractères à l'intérieur de la chaîne de telle sorte que le caractère devient illisible par le lecteur, ce qui se solde par un motif d'information modifié avec des caractères lisibles et illisibles, l'unité de traitement étant configurée pour comparer les caractères lisibles et illisibles du motif d'information modifié aux positions respectives du motif d'information unique stocké dans la base de données, un objet ou individu étant authentifié, autorisé ou marqué quand les caractères lisibles et illisibles du motif d'information modifié transmis et du motif d'information stocké dans la base de données ont été changés, remplacés ou supprimés conformément aux règles de commande fournies.
     
    2. Système selon la revendication 1, dans lequel la modification conduite par l'unité de déclenchement comprend une suppression, un changement ou un remplacement d'un ou plusieurs caractères par des chiffres, des symboles, des lettres et/ou des points.
     
    3. Système selon la revendication 1 ou 2, dans lequel au moins un caractère dans la chaîne comprend une ou plusieurs fissures prédéfinies introduites par l'unité de déclenchement, la position, la nature, la couleur et/ou l'intensité des fissures étant corrélées à une règle de commande spécifique pour authentifier, identifier ou marquer l'objet ou individu.
     
    4. Système selon l'une quelconque des revendications 1 à 3, dans lequel le(s) déclencheur(s) intrinsèque(s) ou externe(s) est/sont choisis dans le groupe constitué par : une position géographique ou un itinéraire, la température, l'humidité, la pression atmosphérique, l'altitude, l'intensité lumineuse, la couleur, l'intensité sonore, le temps, le mouvement, les vibrations, les algorithmes stockés, les saisies manuelles sur le clavier, les données de mesure fournies par des capteurs, ou un déclenchement en fonction du comportement d'un individu.
     
    5. Système selon l'une quelconque des revendications 1 à 4, dans lequel le lecteur comprend une unité de reconnaissance optique de caractères et/ou une unité d'acquisition d'image.
     
    6. Système selon l'une quelconque des revendications 1 à 5, dans lequel l'unité de traitement supprime, remplace ou modifie un ou plusieurs caractères conformément aux règles de commande fournies en changeant la couleur de fond et/ou l'intensité de l'écran ou de la surface, la nature, la couleur et/ou l'intensité des chiffres, symboles, lettres et/ou points affichés, ou la nature, la couleur et/ou l'intensité des fissures.
     
    7. Procédé d'authentification, d'identification ou de marquage d'objets ou d'individus, le procédé comprenant les étapes consistant à :

    - se procurer un motif d'information lisible, consistant en au moins une chaîne de caractères, chiffres, symboles, lettres et/ou points,

    - se procurer des règles de commande pour conduire un changement d'un ou plusieurs caractères de l'au moins une chaîne en réponse à un ou plusieurs déclencheurs intrinsèques ou externes,

    - attribuer le motif d'information et les règles de commande à un objet ou individu spécifique ou un groupe de ceux-ci,

    - capturer le motif d'information lisible avec un lecteur,

    - stocker le motif d'information capturé dans une unité de mémoire,

    - stocker un motif d'information unique et les règles de commande dans une base de données centrale,

    caractérisé par les étapes suivantes :

    - modifier un ou plusieurs caractères à l'intérieur de la chaîne en réponse au(x) déclencheur(s) intrinsèque(s) ou externe(s), de telle sorte que le caractère devienne illisible par le lecteur, ce qui se solde par un motif d'information modifié consistant en une chaîne avec des caractères lisibles et illisibles,

    - transmettre au moins une partie du motif d'information modifié à la base de données centrale,

    - comparer l'au moins une partie du motif d'information modifié avec la partie respective du motif d'information unique stocké dans la base de données centrale, un objet ou individu étant authentifié, autorisé ou marqué quand les caractères lisibles et illisibles du motif d'information modifié transmis et du motif d'information stocké dans la base de données ont été changés, remplacés ou supprimés conformément aux règles de commande fournies.


     
    8. Procédé selon la revendication 7, dans lequel le ou les caractères sont rendus illisibles en introduisant ou en développant une ou plusieurs fissures en plus des chiffres, symboles, lettres et/ou points affichés, le nombre, la nature, la couleur et/ou l'intensité des fissures étant déclenchés par une règle de commande spécifique ou par un déclencheur intrinsèque ou externe.
     
    9. Procédé selon l'une quelconque des revendications 7 à 8, dans lequel un caractère fissuré illisible est supprimé ou remplacé par un ou plusieurs caractères lisibles consistant en des chiffres, des symboles, des lettres et/ou des points, conformément aux règles de commande fournies, ce qui crée une chaîne modifiée qui est transférée et comparée avec le motif d'information unique dans la base de données centrale, les règles de commande fournies comprenant les positions de modification de caractère, la nature et l'intensité des modifications de caractère, et les positions sans aucune modification de caractère.
     
    10. Procédé selon l'une quelconque des revendications 7 à 9, dans lequel les caractères sont modifiés dans leur couleur de fond et/ou leur intensité, la couleur et/ou l'intensité de chiffres, symboles, lettres et/ou points, et/ou la couleur et/ou l'intensité des fissures.
     
    11. Procédé selon l'une quelconque des revendications 7 à 10, dans lequel l'objet ou individu est identifié dans une première étape par des caractères lisibles uniques à l'intérieur de la chaîne, l'objet ou individu étant authentifié dans une étape supplémentaire par le nombre, la position, la couleur, la nature et/ou l'intensité et/ou le type des caractères modifiés illisibles à l'intérieur de la chaîne.
     
    12. Procédé selon l'une quelconque des revendications 7 à 11, dans lequel le motif d'information modifié contient une chaîne avec des caractères lisibles et/ou illisibles, dans lequel pour chaque requête d'identification et/ou d'authentification, la chaîne subit des changements dynamiques par modification d'un ou plusieurs des caractères lisibles et/ou illisibles identiques ou différents, dans lequel au moins une partie du motif initial reste inchangée.
     
    13. Procédé selon l'une quelconque des revendications 7 à 12, le procédé comprenant en outre le remplacement du motif d'information unique par le motif d'information modifié, ce qui crée ainsi un nouveau motif d'information unique.
     
    14. Procédé selon la revendication 7, dans lequel le motif d'information lisible est disposé sur un écran ou une surface, composé d'éléments de sécurité tels que des chiffres, des symboles, des lettres, des craquelures et/ou des points, et le motif d'information stocké est remplacé par le motif d'information unique quand il y a une correspondance des éléments de sécurité non modifiés.
     
    15. Procédé selon la revendication 14, dans lequel les points disposés sur la surface comprennent un pigment qui change sa couleur et/ou son intensité en réponse à un déclencheur intrinsèque ou externe.
     




    Drawing








    Cited references

    REFERENCES CITED IN THE DESCRIPTION



    This list of references cited by the applicant is for the reader's convenience only. It does not form part of the European patent document. Even though great care has been taken in compiling the references, errors or omissions cannot be excluded and the EPO disclaims all liability in this regard.

    Patent documents cited in the description