(19)
(11) EP 2 824 641 A1

(12) EUROPEAN PATENT APPLICATION

(43) Date of publication:
14.01.2015 Bulletin 2015/03

(21) Application number: 13003436.6

(22) Date of filing: 08.07.2013
(51) International Patent Classification (IPC): 
G07D 7/00(2006.01)
(84) Designated Contracting States:
AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR
Designated Extension States:
BA ME

(71) Applicant: Kisters, Friedrich
8280 Kreuzlingen (CH)

(72) Inventor:
  • Kisters, Friedrich
    8280 Kreuzlingen (CH)

(74) Representative: Patentanwälte Dr. Keller, Schwertfeger 
Westring 17
76829 Landau
76829 Landau (DE)

   


(54) Systems and methods for authenticating, identifying or marking objects or individuals using dynamic security features


(57) The present invention relates to a system and method for authenticating, identifying or marking objects or individuals, by providing security features on a display or surface for displaying a readable information pattern, consisting of at least one string of digits with numbers, symbols, letters and/or dots. The system and method triggers dynamic modifications of one or more digits within the string, which renders a readable digit into an unreadable digit.
An object or individual is authenticated, authorised or marked when the readable and unreadable digits of the modified information pattern and the information pattern stored in a database have been changed, replaced or deleted in accordance with object-specific underlying command rules.




Description


[0001] The present invention relates to systems and methods for authenticating, identifying or marking objects or individuals using security features that undergo at least in part dynamic modification process.

[0002] Many of the known security systems make use of static security features for anti-forgery protection or the prevention of abuse. A way of producing such security features is to make them appear invisible to the forger. This type of system functions well only as long as the forger has no knowledge of rendering it visible, copying or stealing the security element. If, for example, the identity card or an access card is stolen, the holder thereof, although not authorized, can identify himself and possibly gain access to restricted areas. DE 10 2004 045 211 A1 concerns a security document comprising a flexible carrier and a multi-layer flexible film body which is applied to the flexible carrier and which provides one or more optical security features. The flexible multi-layer film body has an electrically controller display element for generating an optical security feature with associated electrical current source for operation of the display element in combination with an optically active diffractive structure.

[0003] The security document described in DE 10 2005 030 626 A1 has an integrated circuit for communication with an external read and/or write device and at least one display system integrated into the security document. This is designed to provide a self-personalising document. After the personalisation the display system contains person-specific and/or document-specific data, in particular the name and/or biometric data of the document holder or the validity period of the document. A security document of this type is also rigid with its security features and does not avoid an unauthorised bearer to gain access to certain areas or copy and use it to mark a forgery, such as a painting or piece of furniture.

[0004] There is a requirement to provide security for the authentication, identification, the marking of objects or individuals, for example for gaining physical or digital access to a device in order to carry out transactions. The mere input of digit numbers, letters, symbols or other features does not hinder an unauthorized bearer to use the device for unauthorized transactions. If an unauthorized person knows the code, the true user can only block the device from performing further actions, but at this time it can already be too late.

[0005] The use of biometric features constitutes one possible solution, but as a static factor is still prone to being hijacked or copied and not always very reliable. Such a system is described in JP 2010286920 A, where a user inputs several digits of his/her own identification number to a touch panel of a fingerprint authentication terminal. The user puts a finger on a fingerprint sensor of the fingerprint authentication terminal. Authentication is performed using the fingerprint data read by the fingerprint sensor and the personal ID-number. If there is a certain degree of match between the data and input information, the user is authenticated.

[0006] There are security systems that make use of the properties of certain materials for identification purposes. DE 20 2005 005 130 U1, for instance, describes a textile identification arrangement with security features for protection against plagiarisms. The arrangement consists of at least one first and second pigment layer and the polymer supporting layer, whereby the first and second pigment layers are arranged on the supporting layer. The first pigment layer has at least one type of interference pigment in the form of a geometric pattern that is used as a security feature.

[0007] An optically responsive feature for security, authentication and/or identification purposes is described in US 2012/088079 A1, which makes use of an optical-effect-producing medium. The medium comprises a carrier medium containing pigment particles having at least one optically responsive pigment or one that is responsive to incident electro-magnetic radiation of at least a selected excitation wave length or wave length band for producing an optical response in the visible or near-visible spectrum. US 2009/0074229 A1 describes an apparatus and a method for visually representing measuring values.

[0008] All of the known security systems and methods make use of static security features, such as passwords, ID-numbers and other security features which are updated from time to time. Even if a code changes constantly, it is static, not dynamic, since the new code simply replaces the previous one, but remains again static for the duration of its validity. The authentication or identification system must be able to authenticate and/or identify an object or user and also knows, which code is currently valid. Therefore, its algorithm can be hijacked, or the code can be intercepted during its transmission.

[0009] It is an object of the present invention to provide an improved system and a method for authenticating, identifying or marking objects or individuals to achieve a higher security standard using dynamic modification features.

[0010] The solution is provided by a system and a method for authenticating, identifying or marking objects or individuals according to the present invention.

[0011] The system of the invention comprises a display or a surface for displaying a readable information pattern, consisting of at least one string of digits with numbers, symbols, letters and/or dots. As an example, a string may have the appearance dA%4Be?P.LK-32i. "Readable information" in this context means any information that can be captured using physical or optical means such as optical reader units, cameras or sensors. In a preferred embodiment, the readable information pattern can be recognized by optical character recognition (OCR). The information pattern can be one string or a number of strings using numbers, symbols, letters and/or dots. "Symbols" as used in the context of the present invention comprise additional characters and special signs in any language, or random signs such as assemblies of dots or a graphic.

[0012] A reader comprises optical means for capturing the readable information pattern displayed in the display or on the surface. The captured information pattern is stored in a memory unit, which can be part of the reader. Reader and memory unit can be part of a device, e.g. a mobile or smart phone or a computer.

[0013] The system further comprises a storage unit for storage of unique information patterns in a central database. The database can be directly connected to the storage unit, or it can be part of a remote system. Each object or individual to be authenticated and/or identified is characterized by a unique information pattern. An assignment table assigns this unique information pattern to a specific object or individual. A processing unit is provided with command rules for conducting a change of one or more digits of the at least one string in response to one or more inherent or external triggers. Preferably, the command rules are stored together with the unique information pattern in the central database and/or in the memory unit of a separate device.

[0014] A transmitting unit transfers the captured information pattern from the display or surface to the storage unit. A processing unit compares the transmitted information pattern with the unique information pattern stored in the central database. A trigger unit conducts, in response to the one or more inherent or external triggers, a modification of one or more digits within the string such that the digit becomes unreadable, or shall be read as a different symbol by the reader, resulting in a modified information pattern with changing readable and/or unreadable digits. The processing unit is further configured to compare the readable and unreadable digits of the modified information pattern at the respective positions of the unique information pattern stored in the database. The modification conducted by the trigger unit preferably comprises a deletion, change or replacement of one or more digits with numbers, symbols, letters and/or dots.

[0015] In a preferred embodiment, the readable information pattern, in particular the readable digits (e.g. letters, signs, symbols, numbers, dots) is compared with the database identity. The combination of readable digits and altered or unreadable digits provide a pattern that can be compared with the information pattern stored in the database. Most importantly, the altered or unreadable digits are introduced by means of an inherent or external trigger.

[0016] Triggers that may be applied in the present invention include, but are not limited to geo position or routing, temperature, humidity, atmospheric pressure, altitude, light intensity, colour, sound intensity, time, movement, vibration, stored algorithms, manual keyboard presses, measurement data provided by sensors, or triggering in accordance with individual's behaviour. For example, if a device equipped with a display is carried from one place to another place that has a certain temperature difference, this may trigger the execution of a command rule, which changes one or more digits at certain positions within the string from a readable into an unreadable information. For example, the string ABCDE12345 can be modified to AB*DE1*345, wherein the digits marked with "*" are rendered unreadable by executing a command rule due to an inherent or external trigger. It is one advantage of the present system and method of the invention, that the kind of modification is not predictable but is based on certain rules specific for the object or individual. If there should be modifications in the string that differ from the ones normally introduced in accordance with the underlying command rule, that would mean that the object or individual is not validly authenticated or identified.

[0017] A command rule could also be executed if an individual or an object carried by an individual does not follow a pre-defined geo-routing, which may trigger one or more modifications of pre-defined digits within the string. A modification can also be triggered by a manual keyboard press, for example a key on a smart phone. The triggered unit can also become active in accordance with individual's behaviour if the individual follows a certain life scheme. In case there is an abnormality within the individual's behaviour scheme, this would cause an alert or execute an other security event such as an alarm.

[0018] In one embodiment, the at least one digit in the string is rendered unreadable by one or more pre-defined cracks introduced by the trigger unit. The one or more cracks define a pattern which may correlate with a specific command rule for authenticating, identifying or marking the object or the individual. Not only the pattern of the cracks can be used as a security feature, but also their position, nature, colour and/or intensity. The processing unit preferably deletes, replaces or modifies one or more digits in accordance with the provided command rules by changing the display or surface background, and/or the intensity, nature, colour or intensity of the displayed numbers, symbols, letters and/or dots, or the nature, colour and/or intensity of the cracks. Preferably, the reader comprises an optical character recognition unit to read the information pattern composed of numbers, symbols or letters. The transmitting unit may transmit only certain digits to the central database identified by the position number. It can be sufficient if only certain positions out of the full string are transferred and compared with the database entry. Certain positions of the string may also be attributed to certain activities. Each usage may trigger a change (e. g. a cracking) of some digits in these positions and/or a change of the positions as such.

[0019] Alternatively, the reader can comprise an image acquisition unit for image comparison of the digits and/or the cracks. Specific areas of the image can be used for a pre-selection of the object or individual. A unique string in the information pattern is assigned to a specific user for basic identification.

[0020] In order to increase security, there are various combinations and rules that may be applied in order to dynamically modify the string in an defined, but unpredictable manner. For example, cracks can occur in up to eight (or more) directions and can be combined with other cracks. Each crack can have its own colour, background colour, form or intensity. The same also applies to the colour/intensity of the letter/ number/symbol segment and their respective backgrounds. This results in a plurality of possible variants per digit, which can be combined or dynamically changed.

[0021] In addition, a certain crack pattern can result in a disappearance of a digit which adds a further security feature. Furthermore, certain digits can be disregarded from modification, which means that they can never be changed into a different or unreadable form. This also increases security. By applying the dynamic modification approach, digits can crack, change their background colours and/or their intensities. In addition, digits with cracks can be made reversible by decracking and changing or loosing colour. Furthermore, certain digits can undergo several modifications, whereas other digits at certain positions can only undergo a certain number of modifications, for example not more than two modifications or even no modification. Also the mode of modification can follow a certain rule, for example in a first step cracks are introduced at certain digit positions, in a second step their colours are changed, in a third step the cracks develop. A truly authenticated user can be able to change the modified string by pushing a key or bottom or by touching the screen of his device.

[0022] The present invention also relates to a method for authenticating, identifying or marking objects or individuals, the method comprising the steps:
  • providing a readable information pattern, consisting of at least one string of digits numbers, symbols, letters and/or dots,
  • providing command rules for conducting a change of one or more digits of the at least one string in response to one or more inherent or external triggers,
  • assigning the information pattern and the command rules to a specific object or individual, or a group thereof,
  • capturing the displayed information pattern by a reader,
  • storing the captured information pattern in a memory unit,
  • storing a unique information pattern and the command rules in a central database,
  • modifying one or more digits within the string in response to one or more inherent or external triggers, such that the digit becomes unreadable by the reader, or differently readable, resulting in a modified information pattern consisting of a string with readable and unreadable digits,
  • transmitting at least one part of the modified information pattern to the central database,
  • comparing the at least one part of the modified information pattern with the respective part of the unique information pattern stored in the central database, wherein an object or individual is authenticated, authorised or marked, when the readable and unreadable digits of the transmitted modified information pattern and the information pattern stored in the database have been changed, replaced or deleted in accordance with the provided command rules.


[0023] In a preferred embodiment, it may be sufficient that the string is composed of one or more dots on a surface. The dots may contain pigments that change the colours in accordance with an inherent or external trigger. The information pattern is made of the colour displayed by the dots. This unique information pattern is stored in the central database. If the colours (or their intensities) of the dots change, then this new information pattern is transferred to the central database and compared. If the change is in accordance with the provided rules, the user or the object is authenticated and/or identified. In a subsequent step, the transferred information pattern can then be stored in the database as a new unique information pattern. If the colours of the dots change again, an updated information pattern is transferred and again compared with the stored information pattern within the database. If a colour has not been changed in accordance with the underlying command rules, access of the user is denied or an alert will be triggered. For example, the dots may change their colour from blue to green (e.g. by oxidation) when executing an underlying command rule. If a formerly green dot should show up in blue colour, an alarm is triggered. Accordingly, this could indicate the existence of a falsified variant, which had been copied when the dot was still blue, whereas in the meantime the original would have turned into green colour. At the same time, this change is non-reversible. Even a perfect copy would therefore loose its value very quickly. When using a display, the pigment change of a dot from blue to green can be defined as being irreversible in accordance with an underlying commandrule, which would be similar to the natural oxidation process described above.

[0024] In another embodiment, the displayed numbers, symbols, letters and/or dots can crack according to a certain pattern. The image of the pattern can be captured by an image acquisition unit, or the cracked digits can be rendered unreadable by the utilised reader. In one embodiment, the one or more digits are rendered unreadable by introducing or developing one or more cracks in addition to the displayed numbers, symbols, letters and/or dots. Preferably, the number, nature, colour and/or intensity of the cracks are triggered by a specific command rule or by an inherent or external trigger. An inherent trigger can be a chemical or physical reaction that takes place within the material used for displaying the numbers, symbols, letters and/or dots. An example is a lacquer that is able to change its colour.

[0025] Preferably, a cracked unreadable digit is either deleted or replaced by one or more readable digits consisting of numbers, symbols, letters and/or dots, in accordance with the provided command rules, creating a modified string that is transferred and compared with the unique information pattern in the central database. The provided command rules comprise the positions of digit modification, the nature and intensity of digit modification and the positions with no digit modification. For example, the digits can be modified in their background colour and intensity, colour and/or intensity of numbers, symbols, letters and/or dots, and/or colour and/or intensity or type of the cracks. Therefore, the user has a number of possible combinations wherein the resulting pattern is based on the underlying command rule. The command rule will tell which digits within the string (i.e. their positions) are modified in response to the inherent or external trigger and what restrictions apply, and perhaps which shall not apply.

[0026] The length of the string can comprise 4 or more digits, preferably more than 100 digits, preferably more than 1000 digits. In order to authenticate and/or identify an object or individual, it might be necessary to transfer and compare only a portion of the string with the stored counterpart in the central database. Alternatively, a pre-selection can be performed by using digit positions which allow a rapid identification of the object or individual. In a preferred embodiment, the object or individual is therefore identified in a first step by unique readable digits within the string, wherein in a further step the object or individual is authenticated by the number, position, colour, nature and/or intensity of the modified or unreadable digits within the string.

[0027] The modified information pattern preferably contains a string with readable and/or unreadable digits, wherein for each identification and/or authentication request, the string undergoes dynamic changes by modifying one or more of the same or different readable and/or unreadable digits. At least one part of the original pattern remains unchanged, whereas another part is changed. Upon transfer of the modified information pattern captured from the display or surface, the stored information pattern in the database can be replaced by the modified information pattern. This renders the previous version of the information pattern invalid for any future authentication or identification. The updated information pattern can be replaced at a later time point by a further modified information pattern, which again updates the stored information pattern, thereby creating a new unique information pattern specific for the object or individual which cannot be predicted, even if the underlying rules and algorithms are known. It is therefore impossible to copy or mimic an object using the present system or method.

[0028] The present invention also relates to a method for authenticating, identifying or marking objects or individuals, the method comprising the steps:
  • providing on a display or surface a readable information pattern, consisting of security elements such as numbers, symbols, letters, crackles and/or dots,
  • storing of the information pattern in a storage,
  • modifying at least some numbers, symbols, letters and/or dots in response to an inherent or external trigger, resulting in a modified unique information pattern,
  • transmitting and comparing the modified unique information pattern with the stored information pattern,
  • replacing the stored information pattern with the unique information pattern, when there is a match of the non-modified security elements, wherein a match authenticates, identifies or marks the true object or individual.


[0029] Preferable the rules or restrictions that concern the modified security elements and their places are tracked.

[0030] In a preferred embodiment, the dots provided on the surface comprise a pigment that changes its colour and/or intensity in response to an inherent or external trigger. An image acquisition unit such as a camera can detect the colour change, even if not visible for the human eye. The modified information pattern based on the changed dots can then be transferred to the central database and compared with the stored unique information pattern. The information pattern can then be updated as described above.

[0031] In a preferred embodiment, the display or surface comprises security elements made of material that forms, numbers, symbols, letters, crackles and/or dots. These security elements or their backgrounds can undergo a dynamic modification process in response to an inherent or external trigger, in which at least some numbers, symbols, letters and/or dots are changed, resulting in a modified unique information pattern. Preferably the modification process concerns the property of the material used to display the numbers, symbols, letters, crackles and/or dots.

[0032] The present invention is illustrated in the following examples and the figure.

Example 1



[0033] A device is provided containing a memory unit in which a string consisting of numbers, letters or symbols is stored together with command rules which allow a triggered modification of one or more digits within the string. The string may look like 1A.Z56-!i#e.? The modification is carried out by a trigger unit that replaces, deletes or introduces some of the letters, numbers, symbols or dots or their backgrounds. A display makes the string or a part thereof visible for the user.

[0034] In Fig. 1, one digit out of the string 1A.Z56-!i#e.? consisting of the letter "e" is shown. If the device (e.g. a smartphone) is used by an authorized user (and/or depending on the rules by an unauthorized user), this may trigger a modification of the digit as a response to an underlying command rule. The trigger can be, for example, a (wrong) input of a pin number or (wrong) GPS position, which does not match with the GPS position stored in the command rule for this activity. The trigger unit triggers, as a result of such an external trigger, the formation of a crack which overlaps the letter "e" (Fig. 1A). This renders the position of the digit "e" within the string 1A.Z56-!i#e.? unreadable to read as 1A.Z56-!i#*.? (marked as "*").

[0035] In the example shown, a half-crack (bold line) can occur at eight possible positions (dotted lines). Two or more half-cracks can be displayed in combination. Each half-crack can also be displayed in another colour. In addition, the letter "e" can also be displayed in a different colour. The same also applies for the letter's background which can be coloured differently or in a different intensity. This example illustrates that within one single digit, there is a plurality of variations that can be used as security features. Most importantly, these security features are dynamic because some information in the pattern remains unchanged (e.g. the letter "e"), whereas some other information is changed (e.g. by formation of cracks, colours, intensities). These modifications of the information pattern result in a new unique information pattern, specific for the object or individual to be authenticated, identified and/or marked. The modified pattern correlates with the event that triggered the modification and the rules which apply for it. The pattern is still dynamic, since its exact place of occurrence and its type is not predictable, because it fully depends on inherent of external triggers and the underlying command rules..

[0036] In Fig. 1B, a further half-crack is introduced overlapping the letter "e". This creates a modified unique information pattern which is different from the information pattern shown in Fig. 1A. By introducing one or more cracks or by changing the colours, the digit may be rendered unreadable by a reader (e.g. OCR unit or image acquisition unit), whereas the other digits remain readable. Alternatively, a digit could be replaced by a different value, which is readable by OCR, wherein the reader is capable of identifying "cracked letters". Additionally, the digit may be identified in high resolution or detail by a non-OCR reader, using conventional image information rather than OCR.

[0037] The readable digits are transferred to a central database, in which a previous version of the unique information pattern is stored. If the modification (e.g. introduction of a crack) complies with the underlying command rule (or if there is no rule for this specific change), the object or individual is rightfully authenticated or identified. If the digit should have been changed differently (e.g. cracks in different positions), the user is not authenticated or identified, causing an alert or alarm submitted to an external service. The alarm can also result in blocking the device for further usage. If the unchanged parts do not correspond with the database entry, the user is also not authenticated or identified, causing an alert or alarm being submitted to an external service.

[0038] The security string can comprise from 4 digits to over 1.000.000 digits, whereas it may be sufficient to transfer only a small portion of the string for a pre-selection. Therefore, the amount of data to be transferred can be varied, as well as the security which is scalable, depending on the security request specific for the respective action, the number of digits within the string and the number of modifications.

[0039] Using OCR technology, only readable digits are transferred and compared with the stored information pattern in this central database. Because of the dynamic nature of the inventive security elements, a high security standard is achieved. Furthermore, using a part of string comparison, fast and easy identification in a pre-selection step is possible.

[0040] The system and method according to the present invention use dynamic security features which allow for flexible security applications. The modified and/or non-modified security elements are OCR- and image-readable. These dynamic security features make it nearly impossible to fake without risking double or multiple database entries within the central database. Areas where digits (e.g. letters, numbers, symbols and/or dots) cannot change form a unique pattern, as well as digits than can change. The security level can further be increased by applying additional security features such as biometric features. The code constantly changes, but remains recognizable, especially because its basic structure does not alter. The dynamic nature of the security string can protect additional biometric information from being faked, while it can help in selecting and pre-identifying the user.

[0041] A fast pre-selection can be performed by checking basic elements (e.g. ID-area with name or ID-number). Double checking of the readable letters and their position in the resulting data-entries matching the first query is possible if there is a result. Triple checking is possible that includes digit variants created by the dynamic modification process. Once identified, data of the respective object or identity can be displayed to the requesting party.Example 2

[0042] The image shown in Fig. 1A or Fig. 1B can be used for image acquisition. The information pattern shown on the display or surface can be photographed by a camera, transferred and compared with the stored image in the database. This allows an image comparison of the digits, but also of the cracks. Specific areas of the image can be used for a fast pre-selection. For example, an individual can be identified by a number of subsequent digits that occur within the string.

Example 3



[0043] Possible command rules for dynamic changes in letters:
  • Letters can never change into other letters, unless these are cracked-derivations, like aa, a2, a3, a4, ....ax.
  • Letter can appear/disappear after a certain level of crack-derivation, e.g. if more than 3 colours in one letter and more than 2 colours in the background, as well as more than 4 cracks, etc.
  • Letters can crack, change colour and change background colour.
  • Letters can de-crack, change colour and background colour back, lose colour.
  • Double cracks (e.g. combination of 3 and 9 p.m. cracks) cannot heal anymore, or only if both segments get the same background/digit/crack-colour.
  • 3 colours per segment can be reduced to 2, but not directly removed.
  • 2 colours per segment can be reduced to one, but not directly removed.
  • More cracks can be added, but only in steps of one.
  • Zick-zack cracks and other variants may appear anywhere.
  • Zick-zack cracks are neglected by simple OCR readers, but read by more complex ones.
  • Environmental factors, like temperature, shock/vibration and/or geo-position (if available) have an "individual" influence on the cracks, their form and their colours, partly depending on the "DNA settings" of the algorithm, setting the basic rules for changes.
  • A fully authenticated user (e.g. including a secure biometric factor) may change the changeable areas of this string by simple selection on the screen or by entering their positions (from/to). The ID area of the string, which may be unknown to the user shall remain unchangeable. Further cracks can be added by a fully authenticated user by simply pushing a button "crack" in a software application. This can be useful if the user feels that his code has been spied, tampered or copied by someone else (e.g. after paying in a shop).

Example 4


DNA definitions



[0044] 
  • There are areas defined in which only some or no rules are applicable and "prohibit changes":

    "Between letter 212 and 289 there never occurs any crackling";

    "No colour change"

    "Crackling can disappear"

    "Letter can be replaced".

  • Some colours may not appear in some positions, or with some cracks:
    1. a. Blue: 1, 11, 21, 90"
    2. b. Red: 2, 12, 22, 270°
    3. c. Green: 3, 13, 23, 180°
  • There may be delays until a colour changes, if a certain environmental factor changes:

    a. "A" in positions xyz changes, if temperature varies > 10 degrees. Delay per change of 1 A-digit: 100 sec (...x)

    b. "B" in positions xyz changes, if geo-position varies > 10 degrees / 5 degrees. Delay per change of 1 B-digit: 10 sec (...x).

  • a. In "A", position xyz, crack disappears, if colour of crack, digit and background match.
    b. In "B", position xyz, crack disappears, if colour of crack is yellow, digit green and background white.



Claims

1. A system for authenticating, identifying or marking objects or individuals, comprising

- a display or surface for displaying a readable information pattern, consisting of at least one string of digits with numbers, symbols, letters and/or dots,

- a reader for capturing the displayed information pattern,

- a memory unit for storage of the captured information pattern,

- a storage unit for storage of unique information patterns in a central database,

- a processing unit provided with command rules for conducting a change of one or more digits of the at least one string in response to one or more inherent or external triggers,

- an assignment table for assigning the unique information pattern and the command rules to a specific object or individual,

- a transmitting unit for transmitting the captured information pattern from the display or surface to the storage unit,

- a processing unit for comparing the transmitted information pattern with the unique information pattern stored in the central database,

characterised in that the system comprises a trigger unit that conducts, in response to the one or more inherent or external triggers, a modification of one or more digits within the string such that the digit becomes unreadable by the reader, resulting in a modified information pattern with readable and unreadable digits, wherein the processing unit is configured to compare the readable and unreadable digits of the modified information pattern at the respective positions of the unique information pattern stored in the database.
 
2. The system according to claim 1, wherein the modification conducted by the trigger unit comprises a deletion, change or replacement of one or more digits with numbers, symbols, letters and/or dots.
 
3. The system according to claim 1 or 2, wherein at least one digit in the string comprises one or more predefined cracks introduced by the trigger unit, wherein the position, nature, colour and/or intensity of the cracks correlate with a specific command rule for authenticating, identifying or marking the object or individual.
 
4. The system according to anyone of claims 1 to 3, wherein the one or more inherent or external triggers are selected from the group consisting of: geo position or routing, temperature, humidity, atmospheric pressure, altitude, light intensity, colour, sound intensity, time, movement, vibration, stored algorithms, manual keyboard presses, measurement data provided by sensors, or triggering in accordance with individual's behaviour.
 
5. The system according to any one of claims 1 to 4, wherein the reader comprises an optical character recognition unit and/or an image acquisition unit.
 
6. The system according to anyone of claims 1 to 5, wherein the processing unit deletes, replaces or modifies one or more digits in accordance with the provided command rules by changing the display or surface background colour and/or intensity, the nature, colour and/or intensity of the displayed numbers, symbols, letters and/or dots, or the nature, colour and/or intensity of the cracks.
 
7. A method for authenticating, identifying or marking objects or individuals, the method comprising the steps:

- providing a readable information pattern, consisting of at least one string of digit numbers, symbols, letters and/or dots,

- providing command rules for conducting a change of one or more digits of the at least one string in response to one or more inherent or external triggers,

- assigning the information pattern and the command rules to a specific object or individual or a group thereof,

- capturing the displayed information pattern by a reader,

- storing the captured information pattern in a memory unit,

- storing a unique information pattern and the command rules in a central database,

- modifying one or more digits within the string in response to the one or more inherent or external triggers, such that the digit becomes unreadable by the reader, resulting in a modified information pattern consisting of a string with readable and unreadable digits,

- transmitting at least one part of the modified information pattern to the central database,

- comparing the at least one part of the modified information pattern with the respective part of the unique information pattern stored in the central database, wherein an object or individual is authenticated, authorised or marked when the readable and unreadable digits of the transmitted modified information pattern and the information pattern stored in the database have been changed, replaced or deleted in accordance with the provided command rules.


 
8. The method according to claim 7, wherein the one or more digits are rendered unreadable by introducing or developing one or more cracks in addition to the displayed numbers, symbols, letters and/or dots, the number, nature, colour and/or intensity of the cracks being triggered by a specific command rule or by an inherent or external trigger.
 
9. The method according to anyone of claims 7 to 8, wherein a cracked unreadable digit is either deleted or replaced by one or more readable digits consisting of numbers, symbols, letters and/or dots, in accordance with the provided command rules, creating a modified string that is transferred and compared with the unique information pattern in the central database, wherein the provided command rules comprise the positions of digit modification, the nature and intensity of digit modification, and the positions with no digit modification.
 
10. The method according to anyone of claims 7 to 9, wherein the digits are modified in their background colour and/or intensity, colour and/or intensity of numbers, symbols, letters and/or dots, and/or colour and/or intensity of the cracks.
 
11. The method according to anyone of claims 7 to 10, wherein the object or individual is identified in a first step by unique readable digits within the string, wherein in a further step the object or individual is authenticated by the number, position, colour, nature and/or intensity and/or type of the modified unreadable digits within the string.
 
12. The method according to anyone of claims 7 to 11, wherein the modified information pattern contains a string with readable and/or unreadable digits, wherein for each identification and/or authentication request, the string undergoes dynamic changes by modifying one or more of the same or different readable and/or unreadable digits, wherein at least one part of the original pattern remains unchanged.
 
13. The method according to anyone of claims 7 to 12, wherein the method further comprises replacing the unique information pattern with the modified information pattern, thereby creating a new unique information pattern.
 
14. A method for authenticating, identifying or marking objects or individuals, the method comprising the steps:

- providing on a display or surface a readable information pattern, consisting of security elements such as numbers, symbols, letters, crackles and/or dots,

- storing of the information pattern in a storage,

- modifying at least some numbers, symbols, letters and/or dots in response to an inherent or external trigger, resulting in a modified unique information pattern,

- transmitting and comparing the modified unique information pattern with the stored information pattern,

- replacing the stored information pattern with the unique information pattern, when there is a match of the non-modified security elements, wherein a match authenticates, identifies or marks the true object or individual.


 
15. The method according to claim 14, wherein the dots provided on the surface comprise a pigment that changes its colour and/or intensity in response to an inherent or external trigger.
 
16. A security element for carrying out the method according to claim 14, comprising a display or surface for displaying a readable information pattern, consisting of security elements made of material that forms numbers, symbols, letters, crackles and/or dots, or their backgrounds that undergo a dynamic modification process of the material in response to an inherent or external trigger, in which at least some numbers, symbols, letters and/or dots are changed, resulting in a modified unique information pattern.
 




Drawing







Search report









Search report




Cited references

REFERENCES CITED IN THE DESCRIPTION



This list of references cited by the applicant is for the reader's convenience only. It does not form part of the European patent document. Even though great care has been taken in compiling the references, errors or omissions cannot be excluded and the EPO disclaims all liability in this regard.

Patent documents cited in the description