[0001] The present invention relates to systems and methods for authenticating, identifying
or marking objects or individuals using security features that undergo at least in
part dynamic modification process.
[0002] Many of the known security systems make use of static security features for anti-forgery
protection or the prevention of abuse. A way of producing such security features is
to make them appear invisible to the forger. This type of system functions well only
as long as the forger has no knowledge of rendering it visible, copying or stealing
the security element. If, for example, the identity card or an access card is stolen,
the holder thereof, although not authorized, can identify himself and possibly gain
access to restricted areas.
DE 10 2004 045 211 A1 concerns a security document comprising a flexible carrier and a multi-layer flexible
film body which is applied to the flexible carrier and which provides one or more
optical security features. The flexible multi-layer film body has an electrically
controller display element for generating an optical security feature with associated
electrical current source for operation of the display element in combination with
an optically active diffractive structure.
[0003] The security document described in
DE 10 2005 030 626 A1 has an integrated circuit for communication with an external read and/or write device
and at least one display system integrated into the security document. This is designed
to provide a self-personalising document. After the personalisation the display system
contains person-specific and/or document-specific data, in particular the name and/or
biometric data of the document holder or the validity period of the document. A security
document of this type is also rigid with its security features and does not avoid
an unauthorised bearer to gain access to certain areas or copy and use it to mark
a forgery, such as a painting or piece of furniture.
[0004] There is a requirement to provide security for the authentication, identification,
the marking of objects or individuals, for example for gaining physical or digital
access to a device in order to carry out transactions. The mere input of digit numbers,
letters, symbols or other features does not hinder an unauthorized bearer to use the
device for unauthorized transactions. If an unauthorized person knows the code, the
true user can only block the device from performing further actions, but at this time
it can already be too late.
[0005] The use of biometric features constitutes one possible solution, but as a static
factor is still prone to being hijacked or copied and not always very reliable. Such
a system is described in
JP 2010286920 A, where a user inputs several digits of his/her own identification number to a touch
panel of a fingerprint authentication terminal. The user puts a finger on a fingerprint
sensor of the fingerprint authentication terminal. Authentication is performed using
the fingerprint data read by the fingerprint sensor and the personal ID-number. If
there is a certain degree of match between the data and input information, the user
is authenticated.
[0006] There are security systems that make use of the properties of certain materials for
identification purposes.
DE 20 2005 005 130 U1, for instance, describes a textile identification arrangement with security features
for protection against plagiarisms. The arrangement consists of at least one first
and second pigment layer and the polymer supporting layer, whereby the first and second
pigment layers are arranged on the supporting layer. The first pigment layer has at
least one type of interference pigment in the form of a geometric pattern that is
used as a security feature.
[0007] An optically responsive feature for security, authentication and/or identification
purposes is described in
US 2012/088079 A1, which makes use of an optical-effect-producing medium. The medium comprises a carrier
medium containing pigment particles having at least one optically responsive pigment
or one that is responsive to incident electro-magnetic radiation of at least a selected
excitation wave length or wave length band for producing an optical response in the
visible or near-visible spectrum.
US 2009/0074229 A1 describes an apparatus and a method for visually representing measuring values.
[0008] All of the known security systems and methods make use of static security features,
such as passwords, ID-numbers and other security features which are updated from time
to time. Even if a code changes constantly, it is static, not dynamic, since the new
code simply replaces the previous one, but remains again static for the duration of
its validity. The authentication or identification system must be able to authenticate
and/or identify an object or user and also knows, which code is currently valid. Therefore,
its algorithm can be hijacked, or the code can be intercepted during its transmission.
[0009] It is an object of the present invention to provide an improved system and a method
for authenticating, identifying or marking objects or individuals to achieve a higher
security standard using dynamic modification features.
[0010] The solution is provided by a system and a method for authenticating, identifying
or marking objects or individuals according to the present invention.
[0011] The system of the invention comprises a display or a surface for displaying a readable
information pattern, consisting of at least one string of digits with numbers, symbols,
letters and/or dots. As an example, a string may have the appearance dA%4Be?P.LK-32i.
"Readable information" in this context means any information that can be captured
using physical or optical means such as optical reader units, cameras or sensors.
In a preferred embodiment, the readable information pattern can be recognized by optical
character recognition (OCR). The information pattern can be one string or a number
of strings using numbers, symbols, letters and/or dots. "Symbols" as used in the context
of the present invention comprise additional characters and special signs in any language,
or random signs such as assemblies of dots or a graphic.
[0012] A reader comprises optical means for capturing the readable information pattern displayed
in the display or on the surface. The captured information pattern is stored in a
memory unit, which can be part of the reader. Reader and memory unit can be part of
a device, e.g. a mobile or smart phone or a computer.
[0013] The system further comprises a storage unit for storage of unique information patterns
in a central database. The database can be directly connected to the storage unit,
or it can be part of a remote system. Each object or individual to be authenticated
and/or identified is characterized by a unique information pattern. An assignment
table assigns this unique information pattern to a specific object or individual.
A processing unit is provided with command rules for conducting a change of one or
more digits of the at least one string in response to one or more inherent or external
triggers. Preferably, the command rules are stored together with the unique information
pattern in the central database and/or in the memory unit of a separate device.
[0014] A transmitting unit transfers the captured information pattern from the display or
surface to the storage unit. A processing unit compares the transmitted information
pattern with the unique information pattern stored in the central database. A trigger
unit conducts, in response to the one or more inherent or external triggers, a modification
of one or more digits within the string such that the digit becomes unreadable, or
shall be read as a different symbol by the reader, resulting in a modified information
pattern with changing readable and/or unreadable digits. The processing unit is further
configured to compare the readable and unreadable digits of the modified information
pattern at the respective positions of the unique information pattern stored in the
database. The modification conducted by the trigger unit preferably comprises a deletion,
change or replacement of one or more digits with numbers, symbols, letters and/or
dots.
[0015] In a preferred embodiment, the readable information pattern, in particular the readable
digits (e.g. letters, signs, symbols, numbers, dots) is compared with the database
identity. The combination of readable digits and altered or unreadable digits provide
a pattern that can be compared with the information pattern stored in the database.
Most importantly, the altered or unreadable digits are introduced by means of an inherent
or external trigger.
[0016] Triggers that may be applied in the present invention include, but are not limited
to geo position or routing, temperature, humidity, atmospheric pressure, altitude,
light intensity, colour, sound intensity, time, movement, vibration, stored algorithms,
manual keyboard presses, measurement data provided by sensors, or triggering in accordance
with individual's behaviour. For example, if a device equipped with a display is carried
from one place to another place that has a certain temperature difference, this may
trigger the execution of a command rule, which changes one or more digits at certain
positions within the string from a readable into an unreadable information. For example,
the string ABCDE12345 can be modified to AB*DE1*345, wherein the digits marked with
"*" are rendered unreadable by executing a command rule due to an inherent or external
trigger. It is one advantage of the present system and method of the invention, that
the kind of modification is not predictable but is based on certain rules specific
for the object or individual. If there should be modifications in the string that
differ from the ones normally introduced in accordance with the underlying command
rule, that would mean that the object or individual is not validly authenticated or
identified.
[0017] A command rule could also be executed if an individual or an object carried by an
individual does not follow a pre-defined geo-routing, which may trigger one or more
modifications of pre-defined digits within the string. A modification can also be
triggered by a manual keyboard press, for example a key on a smart phone. The triggered
unit can also become active in accordance with individual's behaviour if the individual
follows a certain life scheme. In case there is an abnormality within the individual's
behaviour scheme, this would cause an alert or execute an other security event such
as an alarm.
[0018] In one embodiment, the at least one digit in the string is rendered unreadable by
one or more pre-defined cracks introduced by the trigger unit. The one or more cracks
define a pattern which may correlate with a specific command rule for authenticating,
identifying or marking the object or the individual. Not only the pattern of the cracks
can be used as a security feature, but also their position, nature, colour and/or
intensity. The processing unit preferably deletes, replaces or modifies one or more
digits in accordance with the provided command rules by changing the display or surface
background, and/or the intensity, nature, colour or intensity of the displayed numbers,
symbols, letters and/or dots, or the nature, colour and/or intensity of the cracks.
Preferably, the reader comprises an optical character recognition unit to read the
information pattern composed of numbers, symbols or letters. The transmitting unit
may transmit only certain digits to the central database identified by the position
number. It can be sufficient if only certain positions out of the full string are
transferred and compared with the database entry. Certain positions of the string
may also be attributed to certain activities. Each usage may trigger a change (e.
g. a cracking) of some digits in these positions and/or a change of the positions
as such.
[0019] Alternatively, the reader can comprise an image acquisition unit for image comparison
of the digits and/or the cracks. Specific areas of the image can be used for a pre-selection
of the object or individual. A unique string in the information pattern is assigned
to a specific user for basic identification.
[0020] In order to increase security, there are various combinations and rules that may
be applied in order to dynamically modify the string in an defined, but unpredictable
manner. For example, cracks can occur in up to eight (or more) directions and can
be combined with other cracks. Each crack can have its own colour, background colour,
form or intensity. The same also applies to the colour/intensity of the letter/ number/symbol
segment and their respective backgrounds. This results in a plurality of possible
variants per digit, which can be combined or dynamically changed.
[0021] In addition, a certain crack pattern can result in a disappearance of a digit which
adds a further security feature. Furthermore, certain digits can be disregarded from
modification, which means that they can never be changed into a different or unreadable
form. This also increases security. By applying the dynamic modification approach,
digits can crack, change their background colours and/or their intensities. In addition,
digits with cracks can be made reversible by decracking and changing or loosing colour.
Furthermore, certain digits can undergo several modifications, whereas other digits
at certain positions can only undergo a certain number of modifications, for example
not more than two modifications or even no modification. Also the mode of modification
can follow a certain rule, for example in a first step cracks are introduced at certain
digit positions, in a second step their colours are changed, in a third step the cracks
develop. A truly authenticated user can be able to change the modified string by pushing
a key or bottom or by touching the screen of his device.
[0022] The present invention also relates to a method for authenticating, identifying or
marking objects or individuals, the method comprising the steps:
- providing a readable information pattern, consisting of at least one string of digits
numbers, symbols, letters and/or dots,
- providing command rules for conducting a change of one or more digits of the at least
one string in response to one or more inherent or external triggers,
- assigning the information pattern and the command rules to a specific object or individual,
or a group thereof,
- capturing the displayed information pattern by a reader,
- storing the captured information pattern in a memory unit,
- storing a unique information pattern and the command rules in a central database,
- modifying one or more digits within the string in response to one or more inherent
or external triggers, such that the digit becomes unreadable by the reader, or differently
readable, resulting in a modified information pattern consisting of a string with
readable and unreadable digits,
- transmitting at least one part of the modified information pattern to the central
database,
- comparing the at least one part of the modified information pattern with the respective
part of the unique information pattern stored in the central database, wherein an
object or individual is authenticated, authorised or marked, when the readable and
unreadable digits of the transmitted modified information pattern and the information
pattern stored in the database have been changed, replaced or deleted in accordance
with the provided command rules.
[0023] In a preferred embodiment, it may be sufficient that the string is composed of one
or more dots on a surface. The dots may contain pigments that change the colours in
accordance with an inherent or external trigger. The information pattern is made of
the colour displayed by the dots. This unique information pattern is stored in the
central database. If the colours (or their intensities) of the dots change, then this
new information pattern is transferred to the central database and compared. If the
change is in accordance with the provided rules, the user or the object is authenticated
and/or identified. In a subsequent step, the transferred information pattern can then
be stored in the database as a new unique information pattern. If the colours of the
dots change again, an updated information pattern is transferred and again compared
with the stored information pattern within the database. If a colour has not been
changed in accordance with the underlying command rules, access of the user is denied
or an alert will be triggered. For example, the dots may change their colour from
blue to green (e.g. by oxidation) when executing an underlying command rule. If a
formerly green dot should show up in blue colour, an alarm is triggered. Accordingly,
this could indicate the existence of a falsified variant, which had been copied when
the dot was still blue, whereas in the meantime the original would have turned into
green colour. At the same time, this change is non-reversible. Even a perfect copy
would therefore loose its value very quickly. When using a display, the pigment change
of a dot from blue to green can be defined as being irreversible in accordance with
an underlying commandrule, which would be similar to the natural oxidation process
described above.
[0024] In another embodiment, the displayed numbers, symbols, letters and/or dots can crack
according to a certain pattern. The image of the pattern can be captured by an image
acquisition unit, or the cracked digits can be rendered unreadable by the utilised
reader. In one embodiment, the one or more digits are rendered unreadable by introducing
or developing one or more cracks in addition to the displayed numbers, symbols, letters
and/or dots. Preferably, the number, nature, colour and/or intensity of the cracks
are triggered by a specific command rule or by an inherent or external trigger. An
inherent trigger can be a chemical or physical reaction that takes place within the
material used for displaying the numbers, symbols, letters and/or dots. An example
is a lacquer that is able to change its colour.
[0025] Preferably, a cracked unreadable digit is either deleted or replaced by one or more
readable digits consisting of numbers, symbols, letters and/or dots, in accordance
with the provided command rules, creating a modified string that is transferred and
compared with the unique information pattern in the central database. The provided
command rules comprise the positions of digit modification, the nature and intensity
of digit modification and the positions with no digit modification. For example, the
digits can be modified in their background colour and intensity, colour and/or intensity
of numbers, symbols, letters and/or dots, and/or colour and/or intensity or type of
the cracks. Therefore, the user has a number of possible combinations wherein the
resulting pattern is based on the underlying command rule. The command rule will tell
which digits within the string (i.e. their positions) are modified in response to
the inherent or external trigger and what restrictions apply, and perhaps which shall
not apply.
[0026] The length of the string can comprise 4 or more digits, preferably more than 100
digits, preferably more than 1000 digits. In order to authenticate and/or identify
an object or individual, it might be necessary to transfer and compare only a portion
of the string with the stored counterpart in the central database. Alternatively,
a pre-selection can be performed by using digit positions which allow a rapid identification
of the object or individual. In a preferred embodiment, the object or individual is
therefore identified in a first step by unique readable digits within the string,
wherein in a further step the object or individual is authenticated by the number,
position, colour, nature and/or intensity of the modified or unreadable digits within
the string.
[0027] The modified information pattern preferably contains a string with readable and/or
unreadable digits, wherein for each identification and/or authentication request,
the string undergoes dynamic changes by modifying one or more of the same or different
readable and/or unreadable digits. At least one part of the original pattern remains
unchanged, whereas another part is changed. Upon transfer of the modified information
pattern captured from the display or surface, the stored information pattern in the
database can be replaced by the modified information pattern. This renders the previous
version of the information pattern invalid for any future authentication or identification.
The updated information pattern can be replaced at a later time point by a further
modified information pattern, which again updates the stored information pattern,
thereby creating a new unique information pattern specific for the object or individual
which cannot be predicted, even if the underlying rules and algorithms are known.
It is therefore impossible to copy or mimic an object using the present system or
method.
[0028] The present invention also relates to a method for authenticating, identifying or
marking objects or individuals, the method comprising the steps:
- providing on a display or surface a readable information pattern, consisting of security
elements such as numbers, symbols, letters, crackles and/or dots,
- storing of the information pattern in a storage,
- modifying at least some numbers, symbols, letters and/or dots in response to an inherent
or external trigger, resulting in a modified unique information pattern,
- transmitting and comparing the modified unique information pattern with the stored
information pattern,
- replacing the stored information pattern with the unique information pattern, when
there is a match of the non-modified security elements, wherein a match authenticates,
identifies or marks the true object or individual.
[0029] Preferable the rules or restrictions that concern the modified security elements
and their places are tracked.
[0030] In a preferred embodiment, the dots provided on the surface comprise a pigment that
changes its colour and/or intensity in response to an inherent or external trigger.
An image acquisition unit such as a camera can detect the colour change, even if not
visible for the human eye. The modified information pattern based on the changed dots
can then be transferred to the central database and compared with the stored unique
information pattern. The information pattern can then be updated as described above.
[0031] In a preferred embodiment, the display or surface comprises security elements made
of material that forms, numbers, symbols, letters, crackles and/or dots. These security
elements or their backgrounds can undergo a dynamic modification process in response
to an inherent or external trigger, in which at least some numbers, symbols, letters
and/or dots are changed, resulting in a modified unique information pattern. Preferably
the modification process concerns the property of the material used to display the
numbers, symbols, letters, crackles and/or dots.
[0032] The present invention is illustrated in the following examples and the figure.
Example 1
[0033] A device is provided containing a memory unit in which a string consisting of numbers,
letters or symbols is stored together with command rules which allow a triggered modification
of one or more digits within the string. The string may look like 1A.Z56-!i#e.? The
modification is carried out by a trigger unit that replaces, deletes or introduces
some of the letters, numbers, symbols or dots or their backgrounds. A display makes
the string or a part thereof visible for the user.
[0034] In Fig. 1, one digit out of the string 1A.Z56-!i#e.? consisting of the letter "e"
is shown. If the device (e.g. a smartphone) is used by an authorized user (and/or
depending on the rules by an unauthorized user), this may trigger a modification of
the digit as a response to an underlying command rule. The trigger can be, for example,
a (wrong) input of a pin number or (wrong) GPS position, which does not match with
the GPS position stored in the command rule for this activity. The trigger unit triggers,
as a result of such an external trigger, the formation of a crack which overlaps the
letter "e" (Fig. 1A). This renders the position of the digit "e" within the string
1A.Z56-!i#e.? unreadable to read as 1A.Z56-!i#*.? (marked as "*").
[0035] In the example shown, a half-crack (bold line) can occur at eight possible positions
(dotted lines). Two or more half-cracks can be displayed in combination. Each half-crack
can also be displayed in another colour. In addition, the letter "e" can also be displayed
in a different colour. The same also applies for the letter's background which can
be coloured differently or in a different intensity. This example illustrates that
within one single digit, there is a plurality of variations that can be used as security
features. Most importantly, these security features are dynamic because some information
in the pattern remains unchanged (e.g. the letter "e"), whereas some other information
is changed (e.g. by formation of cracks, colours, intensities). These modifications
of the information pattern result in a new unique information pattern, specific for
the object or individual to be authenticated, identified and/or marked. The modified
pattern correlates with the event that triggered the modification and the rules which
apply for it. The pattern is still dynamic, since its exact place of occurrence and
its type is not predictable, because it fully depends on inherent of external triggers
and the underlying command rules..
[0036] In Fig. 1B, a further half-crack is introduced overlapping the letter "e". This creates
a modified unique information pattern which is different from the information pattern
shown in Fig. 1A. By introducing one or more cracks or by changing the colours, the
digit may be rendered unreadable by a reader (e.g. OCR unit or image acquisition unit),
whereas the other digits remain readable. Alternatively, a digit could be replaced
by a different value, which is readable by OCR, wherein the reader is capable of identifying
"cracked letters". Additionally, the digit may be identified in high resolution or
detail by a non-OCR reader, using conventional image information rather than OCR.
[0037] The readable digits are transferred to a central database, in which a previous version
of the unique information pattern is stored. If the modification (e.g. introduction
of a crack) complies with the underlying command rule (or if there is no rule for
this specific change), the object or individual is rightfully authenticated or identified.
If the digit should have been changed differently (e.g. cracks in different positions),
the user is not authenticated or identified, causing an alert or alarm submitted to
an external service. The alarm can also result in blocking the device for further
usage. If the unchanged parts do not correspond with the database entry, the user
is also not authenticated or identified, causing an alert or alarm being submitted
to an external service.
[0038] The security string can comprise from 4 digits to over 1.000.000 digits, whereas
it may be sufficient to transfer only a small portion of the string for a pre-selection.
Therefore, the amount of data to be transferred can be varied, as well as the security
which is scalable, depending on the security request specific for the respective action,
the number of digits within the string and the number of modifications.
[0039] Using OCR technology, only readable digits are transferred and compared with the
stored information pattern in this central database. Because of the dynamic nature
of the inventive security elements, a high security standard is achieved. Furthermore,
using a part of string comparison, fast and easy identification in a pre-selection
step is possible.
[0040] The system and method according to the present invention use dynamic security features
which allow for flexible security applications. The modified and/or non-modified security
elements are OCR- and image-readable. These dynamic security features make it nearly
impossible to fake without risking double or multiple database entries within the
central database. Areas where digits (e.g. letters, numbers, symbols and/or dots)
cannot change form a unique pattern, as well as digits than can change. The security
level can further be increased by applying additional security features such as biometric
features. The code constantly changes, but remains recognizable, especially because
its basic structure does not alter. The dynamic nature of the security string can
protect additional biometric information from being faked, while it can help in selecting
and pre-identifying the user.
[0041] A fast pre-selection can be performed by checking basic elements (e.g. ID-area with
name or ID-number). Double checking of the readable letters and their position in
the resulting data-entries matching the first query is possible if there is a result.
Triple checking is possible that includes digit variants created by the dynamic modification
process. Once identified, data of the respective object or identity can be displayed
to the requesting party.
Example 2
[0042] The image shown in Fig. 1A or Fig. 1B can be used for image acquisition. The information
pattern shown on the display or surface can be photographed by a camera, transferred
and compared with the stored image in the database. This allows an image comparison
of the digits, but also of the cracks. Specific areas of the image can be used for
a fast pre-selection. For example, an individual can be identified by a number of
subsequent digits that occur within the string.
Example 3
[0043] Possible command rules for dynamic changes in letters:
- Letters can never change into other letters, unless these are cracked-derivations,
like aa, a2, a3, a4, ....ax.
- Letter can appear/disappear after a certain level of crack-derivation, e.g. if more
than 3 colours in one letter and more than 2 colours in the background, as well as
more than 4 cracks, etc.
- Letters can crack, change colour and change background colour.
- Letters can de-crack, change colour and background colour back, lose colour.
- Double cracks (e.g. combination of 3 and 9 p.m. cracks) cannot heal anymore, or only
if both segments get the same background/digit/crack-colour.
- 3 colours per segment can be reduced to 2, but not directly removed.
- 2 colours per segment can be reduced to one, but not directly removed.
- More cracks can be added, but only in steps of one.
- Zick-zack cracks and other variants may appear anywhere.
- Zick-zack cracks are neglected by simple OCR readers, but read by more complex ones.
- Environmental factors, like temperature, shock/vibration and/or geo-position (if available)
have an "individual" influence on the cracks, their form and their colours, partly
depending on the "DNA settings" of the algorithm, setting the basic rules for changes.
- A fully authenticated user (e.g. including a secure biometric factor) may change the
changeable areas of this string by simple selection on the screen or by entering their
positions (from/to). The ID area of the string, which may be unknown to the user shall
remain unchangeable. Further cracks can be added by a fully authenticated user by
simply pushing a button "crack" in a software application. This can be useful if the
user feels that his code has been spied, tampered or copied by someone else (e.g.
after paying in a shop).
Example 4
DNA definitions
[0044]
- There are areas defined in which only some or no rules are applicable and "prohibit
changes":
"Between letter 212 and 289 there never occurs any crackling";
"No colour change"
"Crackling can disappear"
"Letter can be replaced".
- Some colours may not appear in some positions, or with some cracks:
- a. Blue: 1, 11, 21, 90"
- b. Red: 2, 12, 22, 270°
- c. Green: 3, 13, 23, 180°
- There may be delays until a colour changes, if a certain environmental factor changes:
a. "A" in positions xyz changes, if temperature varies > 10 degrees. Delay per change
of 1 A-digit: 100 sec (...x)
b. "B" in positions xyz changes, if geo-position varies > 10 degrees / 5 degrees.
Delay per change of 1 B-digit: 10 sec (...x).
- a. In "A", position xyz, crack disappears, if colour of crack, digit and background
match.
b. In "B", position xyz, crack disappears, if colour of crack is yellow, digit green
and background white.
1. A system for authenticating, identifying or marking objects or individuals, comprising
- a display or surface for displaying a readable information pattern, consisting of
at least one string of digits with numbers, symbols, letters and/or dots,
- a reader for capturing the displayed information pattern,
- a memory unit for storage of the captured information pattern,
- a storage unit for storage of unique information patterns in a central database,
- a processing unit provided with command rules for conducting a change of one or
more digits of the at least one string in response to one or more inherent or external
triggers,
- an assignment table for assigning the unique information pattern and the command
rules to a specific object or individual,
- a transmitting unit for transmitting the captured information pattern from the display
or surface to the storage unit,
- a processing unit for comparing the transmitted information pattern with the unique
information pattern stored in the central database,
characterised in that the system comprises a trigger unit that conducts, in response to the one or more
inherent or external triggers, a modification of one or more digits within the string
such that the digit becomes unreadable by the reader, resulting in a modified information
pattern with readable and unreadable digits, wherein the processing unit is configured
to compare the readable and unreadable digits of the modified information pattern
at the respective positions of the unique information pattern stored in the database.
2. The system according to claim 1, wherein the modification conducted by the trigger
unit comprises a deletion, change or replacement of one or more digits with numbers,
symbols, letters and/or dots.
3. The system according to claim 1 or 2, wherein at least one digit in the string comprises
one or more predefined cracks introduced by the trigger unit, wherein the position,
nature, colour and/or intensity of the cracks correlate with a specific command rule
for authenticating, identifying or marking the object or individual.
4. The system according to anyone of claims 1 to 3, wherein the one or more inherent
or external triggers are selected from the group consisting of: geo position or routing,
temperature, humidity, atmospheric pressure, altitude, light intensity, colour, sound
intensity, time, movement, vibration, stored algorithms, manual keyboard presses,
measurement data provided by sensors, or triggering in accordance with individual's
behaviour.
5. The system according to any one of claims 1 to 4, wherein the reader comprises an
optical character recognition unit and/or an image acquisition unit.
6. The system according to anyone of claims 1 to 5, wherein the processing unit deletes,
replaces or modifies one or more digits in accordance with the provided command rules
by changing the display or surface background colour and/or intensity, the nature,
colour and/or intensity of the displayed numbers, symbols, letters and/or dots, or
the nature, colour and/or intensity of the cracks.
7. A method for authenticating, identifying or marking objects or individuals, the method
comprising the steps:
- providing a readable information pattern, consisting of at least one string of digit
numbers, symbols, letters and/or dots,
- providing command rules for conducting a change of one or more digits of the at
least one string in response to one or more inherent or external triggers,
- assigning the information pattern and the command rules to a specific object or
individual or a group thereof,
- capturing the displayed information pattern by a reader,
- storing the captured information pattern in a memory unit,
- storing a unique information pattern and the command rules in a central database,
- modifying one or more digits within the string in response to the one or more inherent
or external triggers, such that the digit becomes unreadable by the reader, resulting
in a modified information pattern consisting of a string with readable and unreadable
digits,
- transmitting at least one part of the modified information pattern to the central
database,
- comparing the at least one part of the modified information pattern with the respective
part of the unique information pattern stored in the central database, wherein an
object or individual is authenticated, authorised or marked when the readable and
unreadable digits of the transmitted modified information pattern and the information
pattern stored in the database have been changed, replaced or deleted in accordance
with the provided command rules.
8. The method according to claim 7, wherein the one or more digits are rendered unreadable
by introducing or developing one or more cracks in addition to the displayed numbers,
symbols, letters and/or dots, the number, nature, colour and/or intensity of the cracks
being triggered by a specific command rule or by an inherent or external trigger.
9. The method according to anyone of claims 7 to 8, wherein a cracked unreadable digit
is either deleted or replaced by one or more readable digits consisting of numbers,
symbols, letters and/or dots, in accordance with the provided command rules, creating
a modified string that is transferred and compared with the unique information pattern
in the central database, wherein the provided command rules comprise the positions
of digit modification, the nature and intensity of digit modification, and the positions
with no digit modification.
10. The method according to anyone of claims 7 to 9, wherein the digits are modified in
their background colour and/or intensity, colour and/or intensity of numbers, symbols,
letters and/or dots, and/or colour and/or intensity of the cracks.
11. The method according to anyone of claims 7 to 10, wherein the object or individual
is identified in a first step by unique readable digits within the string, wherein
in a further step the object or individual is authenticated by the number, position,
colour, nature and/or intensity and/or type of the modified unreadable digits within
the string.
12. The method according to anyone of claims 7 to 11, wherein the modified information
pattern contains a string with readable and/or unreadable digits, wherein for each
identification and/or authentication request, the string undergoes dynamic changes
by modifying one or more of the same or different readable and/or unreadable digits,
wherein at least one part of the original pattern remains unchanged.
13. The method according to anyone of claims 7 to 12, wherein the method further comprises
replacing the unique information pattern with the modified information pattern, thereby
creating a new unique information pattern.
14. A method for authenticating, identifying or marking objects or individuals, the method
comprising the steps:
- providing on a display or surface a readable information pattern, consisting of
security elements such as numbers, symbols, letters, crackles and/or dots,
- storing of the information pattern in a storage,
- modifying at least some numbers, symbols, letters and/or dots in response to an
inherent or external trigger, resulting in a modified unique information pattern,
- transmitting and comparing the modified unique information pattern with the stored
information pattern,
- replacing the stored information pattern with the unique information pattern, when
there is a match of the non-modified security elements, wherein a match authenticates,
identifies or marks the true object or individual.
15. The method according to claim 14, wherein the dots provided on the surface comprise
a pigment that changes its colour and/or intensity in response to an inherent or external
trigger.
16. A security element for carrying out the method according to claim 14, comprising a
display or surface for displaying a readable information pattern, consisting of security
elements made of material that forms numbers, symbols, letters, crackles and/or dots,
or their backgrounds that undergo a dynamic modification process of the material in
response to an inherent or external trigger, in which at least some numbers, symbols,
letters and/or dots are changed, resulting in a modified unique information pattern.