EP2374091A2 - Encrypted marking and method for securing and certifying the authenticity of a product - Google Patents

Encrypted marking and method for securing and certifying the authenticity of a product

Info

Publication number
EP2374091A2
EP2374091A2 EP09762149A EP09762149A EP2374091A2 EP 2374091 A2 EP2374091 A2 EP 2374091A2 EP 09762149 A EP09762149 A EP 09762149A EP 09762149 A EP09762149 A EP 09762149A EP 2374091 A2 EP2374091 A2 EP 2374091A2
Authority
EP
European Patent Office
Prior art keywords
marking
encrypted
elements
dots
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Ceased
Application number
EP09762149A
Other languages
German (de)
French (fr)
Inventor
Zhivko Georgiev Zhelev
Georgi Zhivkov Zhelev
Arkadiush Zhelev
Edvin Zhelev
Vitan Kanev Grancharov
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
GRANCHAROV, VITAN KANEV
ZHELEV, EDVIN
ZHELEV, GEORGI ZHIVKOV
ZHELEV, ZHIVKO GEORGIEV
Keit Ltd
Original Assignee
Keit Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Family has litigation
Priority to DE09762149.4T priority Critical patent/DE09762149T1/en
First worldwide family litigation filed litigation Critical https://patents.darts-ip.com/?family=41217692&utm_source=google_patent&utm_medium=platform_link&utm_campaign=public_patent_search&patent=EP2374091(A2) "Global patent litigation dataset” by Darts-ip is licensed under a Creative Commons Attribution 4.0 International License.
Application filed by Keit Ltd filed Critical Keit Ltd
Publication of EP2374091A2 publication Critical patent/EP2374091A2/en
Ceased legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/08Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V30/00Character recognition; Recognising digital ink; Document-oriented image-based pattern recognition
    • G06V30/10Character recognition
    • G06V30/22Character recognition characterised by the type of writing
    • G06V30/224Character recognition characterised by the type of writing of printed characters having additional code marks or containing code marks
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07DHANDLING OF COINS OR VALUABLE PAPERS, e.g. TESTING, SORTING BY DENOMINATIONS, COUNTING, DISPENSING, CHANGING OR DEPOSITING
    • G07D7/00Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency
    • G07D7/004Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency using digital security elements, e.g. information coded on a magnetic thread or strip
    • G07D7/0047Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency using digital security elements, e.g. information coded on a magnetic thread or strip using checkcodes, e.g. coded numbers derived from serial number and denomination
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/08Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
    • G07F7/0806Details of the card
    • G07F7/0813Specific details related to card security
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/08Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
    • G07F7/12Card verification

Definitions

  • This invention refers to encrypted marking and a method for protection, verification, and certification of products' authenticity by means of unique encrypted marking based on extensive encrypted information embedded [located] in each very small element (dot) of the marking, which is protected and which may be recovered [reconstituted] in case of wear, contamination, or deletion.
  • WO 0129790 shows a one-level or multilevel encrypted marking for securing and controlling a product's authenticity, which offers the opportunity of integrating one or several encrypted, invisible, and personalized numbers in the same marking, which is to be placed on the secured product. This is done by means of rearranging signs of the visible number of the marking, increasing or reducing the size of the letters and elements of the marking, or their rotation. Such marking offers a very good protection against forgery due to the uniquely encrypted personalized numbers on each securitized product provided by separate and independent sources.
  • BG 61241 Bl describes a method for writing and reading such multimedia and multilevel markings (codes), which are generated by parallel and independently operating systems.
  • WO 0239397 contains a description of a device for embedding such multimedia and multilevel encrypted markings.
  • all they have considerable disadvantages, namely that such markings contain information limited to some personalized numbers. This is due to the way of reading the information, i.e. there is a change of certain elements, whose dimensions are relatively big in comparison to the dimensions of the marking or its parts.
  • Such elements are signs (letters or digits) or other parts of the marking, which are limited in terms of quantity and features.
  • the aim of this invention is to solve the above-mentioned problems and to overcome the previously mentioned disadvantages by means of encrypted marking and a method for securing and certifying the authenticity of a product through a multilevel encrypted marking with one-level and multilevel generated, independent, encrypted information, unique for each marking and which is secured by recording and reading the code of the material, obtained from different sources by means of a controllable marking element. Without altering the initial appearance and form of the marking, it is possible to record a very large quantity of encrypted information, written in each small element (dot) of the marking by means of stochastic modulation and alteration of these very small elements (dots) of the marking.
  • the marking by using very small elements (dots) of the marking one can obtain a big multitude, i.e. bigger resolution and density of elements, which on their part may be modulated and altered in a large variety of forms, spatial orientation, and location.
  • the large multitude of very small elements (dots) multiplied by the big variety of modulations result in the opportunity of integrating a large volume of information.
  • the very marking preserves its integrity in terms of initial appearance and form. The alteration of these very small elements, which do not constitute a significant part of the whole marking, does not result in a change in the form and image of the marking.
  • the number of elements, the quantity and variety of impacts on them lead not only to the possibility of integrating more information, but also to more options available to the user such as a bigger choice of elements and impacts on them, with the objective of achieving uniqueness for each of the users and each of their products with the immediate result of more security and reliability against any attempted forgery.
  • the marking itself can be applied by means of a laser marking system, an electronic beam, a controllable nano-brush - matrix, an inkjet element, a mechanical marking head, or any other technology of marking and printing.
  • the print, modulation, form, and location of certain encrypted elements (dots) of the marking are stored in a database.
  • These small elements (dots) are selected in such a way as to ensure the availability of a few such elements (dots) from various and specific fields of the very marking and/or bigger elements of the marking such as its parts, signs, letters, and digits, which need to be defined.
  • a protective ultraviolet varnish is applied on the area around the marking. As the varnish dries, it forms a protective layer on, in, and around the elements of the marking.
  • the marking is put on an inlay, which is to be integrated into the product, the marking is placed in such a way as to be positioned between the inlay and the secured product. Such a location prevents it from aging and wearing out.
  • the encrypted marking is made by means of a laser beam, which penetrates through the layer.
  • Figure 1 shows a unique multilevel encrypted marking with encryption in very small elements of the marking
  • Figure 2 shows a unique multilevel encrypted marking with encryption in very small elements of the marking applied on metal by means of laser engraving
  • Figure 3 shows a unique multilevel encrypted marking with encryption in very small elements (dots) of the marking by means of micro-perforation of paper where (1) is the regular marking; (2) is a multilevel encrypted marking; (3) is a unique multilevel encrypted marking with encryption in very small elements of the marking; (4) is a group of encrypted small elements (dots); (5) is a magnified image of a group of encrypted small elements (dots);
  • Figure 4 shows the resistance and recovery of a unique multilevel encrypted marking with encryption in very small elements (dots) of the marking in case of contamination, wear and tear, and obliteration;
  • Figure 5 shows the application of a unique multilevel encrypted marking with encryption in very small elements (dots) of the marking for securing products which are subject to production, control, and verification by several independent authorities;
  • Figure 6 shows the implementation of a unique multilevel encrypted marking with encryption in very small elements (dots) of the marking at a nano-level;
  • Figure 7 shows a product secured by means of integration of its information into a unique multilevel encrypted marking with encryption in very small elements (dots) of the marking.
  • Figure 8 shows secured personal ID documents with a unique multilevel encrypted marking secured by a material code; the marking contains also the biometric data of the holder of the ID document;
  • Figure 9 shows secured personal ID documents with an integrated contact chip
  • Figure 10 shows secured passport with an integrated contactless chip
  • Figure 11 shows a marking of a motor vehicle against theft
  • Figure 12 shows a unique multilevel encrypted marking secured with a code of the material
  • Figure 1 is an illustration of a unique marking with encrypted information, which is integrated into very small elements (dots).
  • (1) shows multilevel encrypted marking which is a laser micro-perforation of holes in paper. An eight-digit number is integrated by means of shuffling eight holes along the 'X' & 'Y' axes;
  • (2) shows a multilevel encrypted marking with another five eight-digit numbers integrated in the same way. It becomes evident from (1) and (2) that the amount of integrated information is extremely limited. Even a small increase in the volume of information leads to a drastic change in the form and appearance of the marking. With the second example, it is even impossible to visually recognize the last digit '3'.
  • the marking (3) is the same visible marking '153' with integrated encrypted information in very small elements (dots) of the marking.
  • the marking preserves its form and appearance and it is easily recognizable and machine-readable even though the volume of integrated information is several times higher than the information in (1) and (2).
  • the magnified image (5) of the fragment (4) of the marking (3) shows a number of small elements (dots) (6) having various alterations (modulations) obtained by means of different geometric forms of each very small element (dot). In this case, twenty-seven different geometric forms are used. Even in this simplified example, fragment (4) with its eleven elements results in I I 27 combinations. In theory and practice, the number of possible geometric forms and combinations is unlimited.
  • Figure 2 shows another example of marking made by means of laser engraving on metal.
  • (1) shows a laser engraved serial number without integrated encrypted information
  • (2) is a multilevel encrypted marking with one personalized twelve-digit number derived by means of displacing the signs (letters and digits) of the serial number horizontally along the 'X' & 'Y' axes
  • (3) represents a multilevel encrypted marking with three personalized twelve-digit numbers integrated by means of displacement of signs, rotation of signs, and increase/decrease of signs.
  • (2) and (3) clearly show the limited volume of the integrated encrypted information. Its triple increase in (3) compared to (2) results in a drastic change of the appearance of the marking, impeded recognition, machine reading, and OCR (optical character recognition) unlike marking (4).
  • Marking (4) is a marking of the same serial number with encryption in very small elements (dots) of the marking.
  • the appearance of marking (4) resembles the one of (1).
  • the magnified fragment (5) of marking (4) shows on the magnified image (6) the encrypted very small elements (dots) (7) of marking (4) made by means of engraving much smaller figures with different shapes on the signs of the marking. It makes it possible to integrate several dozens of different personalized numbers by using the encryption table (8) in fragment (5) alone, where a particular twelve-digit number corresponds to each element (dot).
  • Figure 4 is an illustration of the resistance of a marking with encryption in very small elements (dots) to contamination, wear, tear, and obliteration.
  • Certain very small elements (dots) (2) of each sign of the marking (1) are modulated in a certain way for that particular sign.
  • these elements (dots) have the shape of the digit one for digit ' 1 ', for the digit '5' they have the shape of a pentagon, for digit '3' they have another specific shape.
  • the elements (dots) (2) of each particular sign are selected in such a way as to be located on different places in the relevant sign of the marking (1).
  • Modulations on these very small elements are unique for each very small element (dot) of the marking (1). Their type, modulation, and location are stored in a database tagged by indices, i.e. both by the visible number of the marking (in this case ' 153') and by individual signs.
  • the digit ' 1 ' is represented by a modulation whose element (dot) has the shape of the digit one; digit '5' has a shape of a pentagon, etc.
  • Marking (1) acquires the appearance (3) as a result of contamination or wear and tear. The marking is destroyed and its type cannot be determined. A further detailed study of the marking (3) reveals the type and location of its encrypted very small elements (dots) (2). A check in the database makes it possible to restore the marking, the element which is to represent the digit '1 ', then the pentagon restores the digit '5', and so one until the marking ' 153' is completely restored.
  • Figure 5 shows another example of the possibility offered by this invention for protecting a product (2), which is subject to protection, verification, and certification by several independent authorities (1).
  • Product (2) bears a marking (3) with encryption in very small elements (dots).
  • Each of the authorities Oi , O 2 ... O N determines the modulations of certain elements (dots) (4), (5) ... (6) independently from each other.
  • the location, type of modulation, the image, and the structure of the product around the relevant elements (dots) of each of the authorities Oi , O 2 ... O N is stored in the relevant database DBi, DB 2 ...
  • DB N The database of a particular authority stores information only related to the elements (dots) of the marking determined by this authority (3), respectively (4) for Oi , (5) for O 2 and (6) for O N -
  • each authority has its own unique and independent personalization, unknown to the other authorities, by which the authenticity of a product can be verified and certified.
  • Oi the elements of the authorities
  • O 2 the unique personalization of the affected authority has been compromised
  • such an event cannot affect the security features of the marking as a whole (3), because the unique personalization provided by the rest of the authorities, shall remain valid, thus the validation of the authenticity of the product shall not be affected.
  • the secured product can be a EURO banknote with a certain nominal value and the relevant authorities can be the European Central Bank and the central banks of the Members States, which issue and use this currency.
  • Figure 6 illustrates the implementation of this invention at a nano-level. i.e. where the dimensions of the information encrypted in very small elements (dots) of the unique multilevel encrypted marking (1) are of the nano-level, and where certain very small elements (dots) of the marking (2) are images (3), formed at a nano-level of elements with dimensions less than 1 ⁇ m and where these images serve to encrypt the information and to secure the marking.
  • certain elements (dots) or certain locations are formed as a marking at a nano-level (3) of the same marking carrying the same information stored in them (4).
  • the encryption at a nano-level is carried out by a controllable nano-brush-matrix. Such encryption can be read by means of AFM (Atomic Force Microscopy).
  • This unique encrypted marking (1) may be applied as a thin layer, on or under security elements such as kinegrams, holograms, etc., where it is placed in the inner side of such security elements.
  • security elements such as kinegrams, holograms, etc.
  • the unique encrypted marking will be between the product and the security element and in such way it will be protected from aging and wearing out while at the same time it can be verified and certified.
  • Figure 12 illustrates another embodiment of the invention where the code of a material can secure the encrypted marking in very small elements (dots) of being exactly copied - cloning.
  • the structure of product's material is scanned in and around certain elements (dots) or a group of elements (dots) (2) of the marking. These elements (dots) are located at different places of the marking.
  • the scanned structures which are unique identifiers of the protected product, are stored in a database and serve for the unquestionable identification of the authenticity of a marking. In case the marking gets contaminated, worn out or partly destroyed, some elements are saved (3), thus permitting the express and unquestionable identification and verification the whole marking after comparing of that preserved element of the marking to the one which that has been stored in the database.
  • Each product bears specific information relevant only for this particular product.
  • Such information can be a serial number, a product number, a brand and model, a document number, as well as identificators with information about the product's designated purpose of use such as nominal value of payment documents, etc.
  • this information is placed on the products to be protected in a way, which makes it easy to find it, read it, and identify it because it is important for the product, subject to protection, or for its functions.
  • the payment title (1) on Figure 7 contains a nominal value (2) and a serial number (3), which are visible to every user; such information is different for each particular title of this kind.
  • the same title is also protected by a unique multilevel encrypted marking (4) and it is also secured by the code of the material.
  • the nominal value and the serial number of the payment title are integrated into the unique multilevel encrypted marking by means of alteration of certain elements.
  • the nominal value is integrated into the unique multilevel encrypted marking through the very small elements (dots) of group (5) while the serial number of the payment title is encrypted through the very small elements (dots) of group (6).
  • the unique marking is applied as perforation on the document.
  • the next example illustrates the security protection of personal ID documents by means of a unique multilevel encrypted marking protected by the code of the material where the personal biometric data of the document's holder are integrated in such a marking.
  • the personal document (1) on Figure 8 is an ID card made of plastic material such as Teslin, PVC, PET, Polycarbonate, or any other material used in the plastic card industry.
  • a unique multilevel encrypted marking (2) is placed on it.
  • the passport (3) is treated in the same way.
  • the encrypted marking (2) may take the form of a logo or another sign (4) of the authority issuing the relevant ID document or it may be the marked image of the document's holder (5).
  • Images (6) and (7) of (4) and (5) show the implementation of biometric information by means of modulation of the elements of a marking, (8) and (9) respectively.
  • the distribution by areas of the marking and/or the sequence of these elements determines the type of recorded biometric data.
  • Biometric data include features of the document's holder such as eyes colour, hair colour, nose shape, lips shape, ears shape, identifying marks, height, weight, etc., as well as fingerprints and other prints which are integrated into the encrypted marking by means of modulation of elements as described above.
  • the elements of group (10) refer to the eye colour
  • those of group (11) refer to the shape of the nose
  • the ones of group (12) refer to the hair colour, etc.
  • the very encrypted marking can be placed on personal ID documents by different printing techniques, laser engraving as with (1), laser or other types of perforation as with (3).
  • Electronic documents such as ePassports, eID cards, etc. are the most recent trends in the field of personal ID documents. Such documents bear an electronic device, which is integrated into them and which contains data of both their holder and the document itself. These data are readable, checkable and serve for verification of the authenticity of the document.
  • the most commonly used contactless and contact integrated circuits in personal ID documents are RFID chips. They can store very important personal information of the holder of an ID document such as fingerprints, a digital photograph, etc.; such data are used for holder's authentication and are subject to very successful forgery, manipulation, and falsification.
  • the data in question can be secured in the following way:
  • the personal ID card (1) on Figure 9 has an integrated contact chip (2).
  • the hash value of information stored on the contact chip is calculated under the mathematical hash function.
  • a distinctive feature of the hash function is that a change of even one bit of input information results in a different calculated value.
  • the calculated hash function is then integrated into the encrypted marking (3) via alteration of some elements of the marking.
  • the encrypted marking (3) may comprise either the contact surface of the chip, or both the chip and the card.
  • the marking is placed by means of laser micro-engraving.
  • Passport (1) on Figure 10 has a contactless chip (2) integrated into its cover and a unique identificationor (4).
  • the unique multilevel encrypted marking (3) is applied by means of printing. It bears the unique identificator of the chip, which is used later for verification of the authenticity of the chip and the of data stored on it.
  • Passport (1) has a chip (2) with an identificator (4).
  • the hash value of data stored in that chip is calculated and integrated into the unique multilevel encrypted marking (5), which is in the form of a perforation of an image on the document.
  • the verification process includes thereafter reading of an encrypted marking and the data integrated into it.
  • the hash value of data stored on the chip is calculated and the value of the marking is then compared to the calculated hash value. If both values match, the data from the chip are authentic. If they do not match, that is a sure sign that the data have been manipulated and altered.
  • the same principle refers to any product containing a RFID tag, a NFC (Near Field Communication) device, or another type of chip, processor, memory, or electronic device, which carry data about the product, its purpose of use and mode of operation, as well as any other important information concerning the product.
  • a bankcard with an integrated chip which is marked with a unique multilevel encrypted marking with an integrated unique chip identificationor.
  • the card can only be used after the chip has been validated through the marking of the bankcard. This is to prevent forging it and especially making a duplicate of it known as cloning and using for unauthorized money drawing.
  • Another field of implementation of this invention is the protection of motor vehicles against theft. Every vehicle has a chassis number, which serves as vehicle's identification. When a motor vehicle is stolen, this number is usually changed, manipulated, and forged. The motor vehicle is repainted and then easily reregistered and sold. This is why it became necessary to place a marking on many additional interior and exterior parts. Often such marking contain another number, the vehicle's registration number, chassis' number, or part of it. Such markings are not secured and can easily be replaced, falsified, and forged which makes them useless.
  • the problem can be solved in the following way: a number of interior and exterior parts of a motor vehicle (1) on Figure 11 are marked with a unique multilevel encrypted marking (2) and secured with a code of the material.
  • the marking contains integrated information about the vehicle and/or its owner, and/or the name of the authorized company, which marked it.
  • the marking is placed by means of mechanical, laser, chemical abrasive, sandblast, or another type of marking. Such an encrypted marking cannot be forged, imitated, and manipulated. A motor vehicle marked in such way can be easily traced and identified if stolen.

Abstract

This invention refers to encrypted marking and a method for protection, verification, and certification of products' authenticity by means of unique encrypted marking containing very large amount of encrypted information embedded in each very small element (dot) of the marking, which is protected and which may be recovered [reconstituted] in case of wear, contamination, or deletion. The encrypted marking is obtained by means of staochastic modularion and alteration of the elements of the marking

Description

ENCRYPTED MARKING AND METHOD FOR SECURING AND CERTIFYING THE AUTHENTICITY OF A PRODUCT
FIELD OF THE TECHNOLOGY
This invention refers to encrypted marking and a method for protection, verification, and certification of products' authenticity by means of unique encrypted marking based on extensive encrypted information embedded [located] in each very small element (dot) of the marking, which is protected and which may be recovered [reconstituted] in case of wear, contamination, or deletion.
I STATE-OF-THE-PRIOR-ART
There exist a number of methods and means of protecting/securing different types of products against forgery, such as for example, holograms, kinegrams, watermarks, micro-perforated signs, digital watermarking, special inks, etc. These methods as a whole offer the same means of protecting each type of product; however, they do not offer unique personalization of every single product, which belongs to a certain type of products. For example, each unit of packing of a certain medicine such as an ampoule, a blister pack, etc., to have its own unique hologram or each banknote of certain nominal value to bear its own watermark or hologram strip. The same refers to the vast variety of products, regardless of their type, whether they are goods, personal documents, or banknotes. The current security used is the same for large number of elements, which are to be protected and it does not contain any additional, visible or invisible information, to protect every single unit, thus making these items extremely vulnerable to imitation, forgery, and copying.
The patent document BG65111(WO03030098) gives a description of a method for securing by means of writing and reading a code of the material, which represents the unique structure of a product's material around a sign embedded on the product. That method offers an extremely high level of resistance against copying and falsifying. Its weakness, however, is the fact that it does not offer the opportunity of integrating hidden personalized information about the item to be securitized.
Another patent document, WO 0129790 (BG 63520 Bl) shows a one-level or multilevel encrypted marking for securing and controlling a product's authenticity, which offers the opportunity of integrating one or several encrypted, invisible, and personalized numbers in the same marking, which is to be placed on the secured product. This is done by means of rearranging signs of the visible number of the marking, increasing or reducing the size of the letters and elements of the marking, or their rotation. Such marking offers a very good protection against forgery due to the uniquely encrypted personalized numbers on each securitized product provided by separate and independent sources.
The Bulgarian patent document BG 61241 Bl describes a method for writing and reading such multimedia and multilevel markings (codes), which are generated by parallel and independently operating systems. WO 0239397 (BG 63518 Bl) contains a description of a device for embedding such multimedia and multilevel encrypted markings. However, all they have considerable disadvantages, namely that such markings contain information limited to some personalized numbers. This is due to the way of reading the information, i.e. there is a change of certain elements, whose dimensions are relatively big in comparison to the dimensions of the marking or its parts. Such elements are signs (letters or digits) or other parts of the marking, which are limited in terms of quantity and features. This leads to limitation of the volume of hidden information integrated in the marking, which results in limited information available, i.e. the integrity of information cannot be restored in case some of its parts are missing. In other words, in case of damage of the marking, in case a marked product is smudged, worn out, or damaged, or in case a part or all of the encrypted personalized information is lost, the marking cannot be authenticated.
Moreover, if there is an attempt to insert more hidden personalized information into a certain marking, the appearance of the marking becomes extremely altered compared to its initial appearance due to displacement, rotation, and increase of its elements and signs, which is an obstacle to its correct reading. For example, if a marking is a succession of letters and digits, its automatic machine reading known also as OCR (OCR - Optical Character Recognition) shall become difficult or impossible.
TECHNICAL CHARACTERISTICS OF THE INVENTION
The aim of this invention is to solve the above-mentioned problems and to overcome the previously mentioned disadvantages by means of encrypted marking and a method for securing and certifying the authenticity of a product through a multilevel encrypted marking with one-level and multilevel generated, independent, encrypted information, unique for each marking and which is secured by recording and reading the code of the material, obtained from different sources by means of a controllable marking element. Without altering the initial appearance and form of the marking, it is possible to record a very large quantity of encrypted information, written in each small element (dot) of the marking by means of stochastic modulation and alteration of these very small elements (dots) of the marking. Thus, by using very small elements (dots) of the marking one can obtain a big multitude, i.e. bigger resolution and density of elements, which on their part may be modulated and altered in a large variety of forms, spatial orientation, and location. The large multitude of very small elements (dots) multiplied by the big variety of modulations result in the opportunity of integrating a large volume of information. Moreover, the very marking preserves its integrity in terms of initial appearance and form. The alteration of these very small elements, which do not constitute a significant part of the whole marking, does not result in a change in the form and image of the marking.
On the other hand, the number of elements, the quantity and variety of impacts on them lead not only to the possibility of integrating more information, but also to more options available to the user such as a bigger choice of elements and impacts on them, with the objective of achieving uniqueness for each of the users and each of their products with the immediate result of more security and reliability against any attempted forgery.
The marking itself, depending of its dimension and the dimensions of the very small elements (dots), can be applied by means of a laser marking system, an electronic beam, a controllable nano-brush - matrix, an inkjet element, a mechanical marking head, or any other technology of marking and printing.
The possibility of integrating a larger volume of information makes permits to double the information and its excess in order to be able to restore it later in case of missing parts of information or in case of incorrect interpretation of the encrypted elements (dots). On the other hand, to enable restoring the information of the marking, which is damaged, worn out, or aged, the print, modulation, form, and location of certain encrypted elements (dots) of the marking are stored in a database. These small elements (dots) are selected in such a way as to ensure the availability of a few such elements (dots) from various and specific fields of the very marking and/or bigger elements of the marking such as its parts, signs, letters, and digits, which need to be defined. In the course of using a certain product, its marking can be damaged, destroyed, worn out, or contaminated to such an extent as to make it impossible to recognize it even by its parts, appearance, and form. However, the elements stored in a database can be used for restoring the marking thus permitting the verification of the origin and authenticity of the product in question.
In order to prevent the elements of a marking and the structure of a product's material from aging, being contaminating, and wearing out, a protective ultraviolet varnish is applied on the area around the marking. As the varnish dries, it forms a protective layer on, in, and around the elements of the marking. In cases where the marking is put on an inlay, which is to be integrated into the product, the marking is placed in such a way as to be positioned between the inlay and the secured product. Such a location prevents it from aging and wearing out. In cases where the surface is protected by a transparent layer, the encrypted marking is made by means of a laser beam, which penetrates through the layer.
EXPLANATIONS OF THE ENCLOSED FIGURES
Figure 1 shows a unique multilevel encrypted marking with encryption in very small elements of the marking;
Figure 2 shows a unique multilevel encrypted marking with encryption in very small elements of the marking applied on metal by means of laser engraving;
Figure 3 shows a unique multilevel encrypted marking with encryption in very small elements (dots) of the marking by means of micro-perforation of paper where (1) is the regular marking; (2) is a multilevel encrypted marking; (3) is a unique multilevel encrypted marking with encryption in very small elements of the marking; (4) is a group of encrypted small elements (dots); (5) is a magnified image of a group of encrypted small elements (dots);
Figure 4 shows the resistance and recovery of a unique multilevel encrypted marking with encryption in very small elements (dots) of the marking in case of contamination, wear and tear, and obliteration;
Figure 5 shows the application of a unique multilevel encrypted marking with encryption in very small elements (dots) of the marking for securing products which are subject to production, control, and verification by several independent authorities;
Figure 6 shows the implementation of a unique multilevel encrypted marking with encryption in very small elements (dots) of the marking at a nano-level;
Figure 7 shows a product secured by means of integration of its information into a unique multilevel encrypted marking with encryption in very small elements (dots) of the marking.
Figure 8 shows secured personal ID documents with a unique multilevel encrypted marking secured by a material code; the marking contains also the biometric data of the holder of the ID document;
Figure 9 shows secured personal ID documents with an integrated contact chip;
Figure 10 shows secured passport with an integrated contactless chip;
Figure 11 shows a marking of a motor vehicle against theft;
Figure 12 shows a unique multilevel encrypted marking secured with a code of the material EXAMPLES ILLUSTRATING THE EMBODIMENT OF THE INVENTION
Figure 1 is an illustration of a unique marking with encrypted information, which is integrated into very small elements (dots). (1) shows multilevel encrypted marking which is a laser micro-perforation of holes in paper. An eight-digit number is integrated by means of shuffling eight holes along the 'X' & 'Y' axes; (2) shows a multilevel encrypted marking with another five eight-digit numbers integrated in the same way. It becomes evident from (1) and (2) that the amount of integrated information is extremely limited. Even a small increase in the volume of information leads to a drastic change in the form and appearance of the marking. With the second example, it is even impossible to visually recognize the last digit '3'. The marking (3) is the same visible marking '153' with integrated encrypted information in very small elements (dots) of the marking. The marking preserves its form and appearance and it is easily recognizable and machine-readable even though the volume of integrated information is several times higher than the information in (1) and (2). The magnified image (5) of the fragment (4) of the marking (3) shows a number of small elements (dots) (6) having various alterations (modulations) obtained by means of different geometric forms of each very small element (dot). In this case, twenty-seven different geometric forms are used. Even in this simplified example, fragment (4) with its eleven elements results in I I27 combinations. In theory and practice, the number of possible geometric forms and combinations is unlimited. Depending on the number of element 'E' and the number of modulations 'M' the number of variations without repetition can be calculated under the formula 'E !/(E-M)!' while the number of combinations without repetition can be calculated under the formula 'E !/(M!* (E- M)!)'.
Figure 2 shows another example of marking made by means of laser engraving on metal. (1) shows a laser engraved serial number without integrated encrypted information, while (2) is a multilevel encrypted marking with one personalized twelve-digit number derived by means of displacing the signs (letters and digits) of the serial number horizontally along the 'X' & 'Y' axes and (3) represents a multilevel encrypted marking with three personalized twelve-digit numbers integrated by means of displacement of signs, rotation of signs, and increase/decrease of signs. (2) and (3) clearly show the limited volume of the integrated encrypted information. Its triple increase in (3) compared to (2) results in a drastic change of the appearance of the marking, impeded recognition, machine reading, and OCR (optical character recognition) unlike marking (4). Marking (4) is a marking of the same serial number with encryption in very small elements (dots) of the marking. The appearance of marking (4) resembles the one of (1). The magnified fragment (5) of marking (4) (in this case this is a part of the last digit) shows on the magnified image (6) the encrypted very small elements (dots) (7) of marking (4) made by means of engraving much smaller figures with different shapes on the signs of the marking. It makes it possible to integrate several dozens of different personalized numbers by using the encryption table (8) in fragment (5) alone, where a particular twelve-digit number corresponds to each element (dot).
Figure 4 is an illustration of the resistance of a marking with encryption in very small elements (dots) to contamination, wear, tear, and obliteration. Certain very small elements (dots) (2) of each sign of the marking (1) are modulated in a certain way for that particular sign. In this example, these elements (dots) have the shape of the digit one for digit ' 1 ', for the digit '5' they have the shape of a pentagon, for digit '3' they have another specific shape. The elements (dots) (2) of each particular sign are selected in such a way as to be located on different places in the relevant sign of the marking (1). Modulations on these very small elements (dots) are unique for each very small element (dot) of the marking (1). Their type, modulation, and location are stored in a database tagged by indices, i.e. both by the visible number of the marking (in this case ' 153') and by individual signs. Thus, the digit ' 1 ' is represented by a modulation whose element (dot) has the shape of the digit one; digit '5' has a shape of a pentagon, etc.
Marking (1) acquires the appearance (3) as a result of contamination or wear and tear. The marking is destroyed and its type cannot be determined. A further detailed study of the marking (3) reveals the type and location of its encrypted very small elements (dots) (2). A check in the database makes it possible to restore the marking, the element which is to represent the digit '1 ', then the pentagon restores the digit '5', and so one until the marking ' 153' is completely restored.
Figure 5 shows another example of the possibility offered by this invention for protecting a product (2), which is subject to protection, verification, and certification by several independent authorities (1). Product (2) bears a marking (3) with encryption in very small elements (dots). Each of the authorities Oi , O2 ... ON determines the modulations of certain elements (dots) (4), (5) ... (6) independently from each other. The location, type of modulation, the image, and the structure of the product around the relevant elements (dots) of each of the authorities Oi , O2 ... ON is stored in the relevant database DBi, DB2 ... DBN • The database of a particular authority stores information only related to the elements (dots) of the marking determined by this authority (3), respectively (4) for Oi , (5) for O2 and (6) for ON- Thus, each authority has its own unique and independent personalization, unknown to the other authorities, by which the authenticity of a product can be verified and certified. In case of break into the security of any of the authorities Oi , O2 ... ON, and the unique personalization of the affected authority has been compromised, such an event cannot affect the security features of the marking as a whole (3), because the unique personalization provided by the rest of the authorities, shall remain valid, thus the validation of the authenticity of the product shall not be affected.
For example, the secured product can be a EURO banknote with a certain nominal value and the relevant authorities can be the European Central Bank and the central banks of the Members States, which issue and use this currency.
Figure 6 illustrates the implementation of this invention at a nano-level. i.e. where the dimensions of the information encrypted in very small elements (dots) of the unique multilevel encrypted marking (1) are of the nano-level, and where certain very small elements (dots) of the marking (2) are images (3), formed at a nano-level of elements with dimensions less than 1 μm and where these images serve to encrypt the information and to secure the marking. In this particular example, certain elements (dots) or certain locations are formed as a marking at a nano-level (3) of the same marking carrying the same information stored in them (4).
This is a way to increase the density and to miniaturize the process of information integration, which results in increased security and reliability. The encryption at a nano-level is carried out by a controllable nano-brush-matrix. Such encryption can be read by means of AFM (Atomic Force Microscopy).
This unique encrypted marking (1) may be applied as a thin layer, on or under security elements such as kinegrams, holograms, etc., where it is placed in the inner side of such security elements. When a security element is applied (5) on the product (6), the unique encrypted marking will be between the product and the security element and in such way it will be protected from aging and wearing out while at the same time it can be verified and certified.
Figure 12 illustrates another embodiment of the invention where the code of a material can secure the encrypted marking in very small elements (dots) of being exactly copied - cloning. When the encrypted marking (1) is being placed on the product, the structure of product's material is scanned in and around certain elements (dots) or a group of elements (dots) (2) of the marking. These elements (dots) are located at different places of the marking. The scanned structures, which are unique identifiers of the protected product, are stored in a database and serve for the unquestionable identification of the authenticity of a marking. In case the marking gets contaminated, worn out or partly destroyed, some elements are saved (3), thus permitting the express and unquestionable identification and verification the whole marking after comparing of that preserved element of the marking to the one which that has been stored in the database.
Each product bears specific information relevant only for this particular product. Such information can be a serial number, a product number, a brand and model, a document number, as well as identificators with information about the product's designated purpose of use such as nominal value of payment documents, etc. In most cases, this information is placed on the products to be protected in a way, which makes it easy to find it, read it, and identify it because it is important for the product, subject to protection, or for its functions. The payment title (1) on Figure 7 contains a nominal value (2) and a serial number (3), which are visible to every user; such information is different for each particular title of this kind. The same title is also protected by a unique multilevel encrypted marking (4) and it is also secured by the code of the material. The nominal value and the serial number of the payment title are integrated into the unique multilevel encrypted marking by means of alteration of certain elements. In this particular case, the nominal value is integrated into the unique multilevel encrypted marking through the very small elements (dots) of group (5) while the serial number of the payment title is encrypted through the very small elements (dots) of group (6). The unique marking is applied as perforation on the document.
The next example illustrates the security protection of personal ID documents by means of a unique multilevel encrypted marking protected by the code of the material where the personal biometric data of the document's holder are integrated in such a marking. The personal document (1) on Figure 8 is an ID card made of plastic material such as Teslin, PVC, PET, Polycarbonate, or any other material used in the plastic card industry. After or during the ID card's personalization process, i.e. attaching holder's photograph, his/her personal data, etc., a unique multilevel encrypted marking (2) is placed on it. The passport (3) is treated in the same way. The encrypted marking (2) may take the form of a logo or another sign (4) of the authority issuing the relevant ID document or it may be the marked image of the document's holder (5). Images (6) and (7) of (4) and (5) show the implementation of biometric information by means of modulation of the elements of a marking, (8) and (9) respectively. The distribution by areas of the marking and/or the sequence of these elements determines the type of recorded biometric data. Biometric data include features of the document's holder such as eyes colour, hair colour, nose shape, lips shape, ears shape, identifying marks, height, weight, etc., as well as fingerprints and other prints which are integrated into the encrypted marking by means of modulation of elements as described above. In this case, the elements of group (10) refer to the eye colour, those of group (11) refer to the shape of the nose, the ones of group (12) refer to the hair colour, etc. This is a secure and reliable way of integrating encrypted biometric data, which are secured and protected against forgery and manipulation and which are resistant to electromagnetic radiation.
The very encrypted marking can be placed on personal ID documents by different printing techniques, laser engraving as with (1), laser or other types of perforation as with (3).
Electronic documents such as ePassports, eID cards, etc. are the most recent trends in the field of personal ID documents. Such documents bear an electronic device, which is integrated into them and which contains data of both their holder and the document itself. These data are readable, checkable and serve for verification of the authenticity of the document. At present, the most commonly used contactless and contact integrated circuits in personal ID documents are RFID chips. They can store very important personal information of the holder of an ID document such as fingerprints, a digital photograph, etc.; such data are used for holder's authentication and are subject to very successful forgery, manipulation, and falsification. The data in question can be secured in the following way: The personal ID card (1) on Figure 9 has an integrated contact chip (2). The hash value of information stored on the contact chip is calculated under the mathematical hash function. A distinctive feature of the hash function is that a change of even one bit of input information results in a different calculated value. The calculated hash function is then integrated into the encrypted marking (3) via alteration of some elements of the marking. The encrypted marking (3) may comprise either the contact surface of the chip, or both the chip and the card. The marking is placed by means of laser micro-engraving.
If a contactless chip is used, security is ensured as follows: Passport (1) on Figure 10 has a contactless chip (2) integrated into its cover and a unique identificator (4). The unique multilevel encrypted marking (3) is applied by means of printing. It bears the unique identificator of the chip, which is used later for verification of the authenticity of the chip and the of data stored on it. Another option offers the following: Passport (1) has a chip (2) with an identificator (4). The hash value of data stored in that chip is calculated and integrated into the unique multilevel encrypted marking (5), which is in the form of a perforation of an image on the document.
The verification process includes thereafter reading of an encrypted marking and the data integrated into it. The hash value of data stored on the chip is calculated and the value of the marking is then compared to the calculated hash value. If both values match, the data from the chip are authentic. If they do not match, that is a sure sign that the data have been manipulated and altered.
The same principle refers to any product containing a RFID tag, a NFC (Near Field Communication) device, or another type of chip, processor, memory, or electronic device, which carry data about the product, its purpose of use and mode of operation, as well as any other important information concerning the product. For example, a bankcard with an integrated chip, which is marked with a unique multilevel encrypted marking with an integrated unique chip identificator. The card can only be used after the chip has been validated through the marking of the bankcard. This is to prevent forging it and especially making a duplicate of it known as cloning and using for unauthorized money drawing.
Another field of implementation of this invention is the protection of motor vehicles against theft. Every vehicle has a chassis number, which serves as vehicle's identification. When a motor vehicle is stolen, this number is usually changed, manipulated, and forged. The motor vehicle is repainted and then easily reregistered and sold. This is why it became necessary to place a marking on many additional interior and exterior parts. Often such marking contain another number, the vehicle's registration number, chassis' number, or part of it. Such markings are not secured and can easily be replaced, falsified, and forged which makes them useless. The problem can be solved in the following way: a number of interior and exterior parts of a motor vehicle (1) on Figure 11 are marked with a unique multilevel encrypted marking (2) and secured with a code of the material. It contains integrated information about the vehicle and/or its owner, and/or the name of the authorized company, which marked it. The marking is placed by means of mechanical, laser, chemical abrasive, sandblast, or another type of marking. Such an encrypted marking cannot be forged, imitated, and manipulated. A motor vehicle marked in such way can be easily traced and identified if stolen.

Claims

PATENT CLAIMS
1. Encrypted marking for securing and certifying the authenticity of products with integrated one-level and multi-level generated independent encrypted information, characterized in that in certain or in all elements (dots) of the marking, the information is encrypted by means of stochastic modulation and alteration of the elements of the marking.
2. Encrypted marking according to claim 1, characterized in that the marking includes also a protection which is a code of the material of the product's in and around the elements (dots) of the marking.
3. Encrypted marking according to claims 1 and 2, characterized in that the encrypted elements (dots) of the marking have dimensions within the range of micrometers and/or nanometers.
4. Encrypted marking according to claims from 1 to 3, characterized in that the encrypted marking contains embedded information about the product to be protected, its features and/or its designated purpose of use and application.
5. Security protection of personal ID documents implemented by means of encrypted marking according to claims from 1 to 3, where the marking may be perforation, engraving, printing, or another image application on the document, characterized in that the marking contains integrated encrypted biometric data of the holder of the secured document.
6. Security protection of products with integrated contactless or contact chip, RFID, NFC (Near Field Communication) or another type of chip, processor, memory, or electronic device implemented by an encrypted marking according to claims from 1 to 3, characterized in that the encrypted marking contains an integrated unique identificator of the chip and/or data stored on it.
7. Security protection of motor vehicles against theft by means of an encrypted marking according to claims from 1 to 3, characterized in that the marking contains integrated information concerning the vehicle and/or its owner, and/or the name of the authorized company, which marked it.
8. A method for securing and certifying the authenticity of products implemented by applying encrypted marking with one-level and multi-level generated independent encrypted information by means of a controllable marking element, characterized in that the marking is encrypted by means of stochastic modulation and alteration of the elements (dots) of the marking.
9. A method according to claim 8, characterized in that the marking element is a laser marking system, an electronic beam, an ion beam, a printing element, inkjet element, nano-brush - matrix, or a mechanical marking head.
10. A method according to claims 8 and 9, characterized in that the marking is made by means of the elements (dots) of the marking, the dimensions of which are within the range of micrometers and/or nanometers.
11. A method according to claims from 8 to 10, characterized in that during the process of applying an encrypted marking, the modulation, form, and location of certain elements (dots) or groups of elements (dots) of the marking and the structure of product's material in and around them are scanned and stored in a database, which is used later for restoring part of the marking or the whole marking and for identification of its authenticity even if it gets smeared, obliterated, or contaminated.
12. A method according to one of the preceding claims from 8 to 12, characterized in that an ultraviolet varnish is applied on the marking, on its elements (dots), and around them, whereupon the varnish cures, it forms a protective layer on, in, and around the elements of the marking.
EP09762149A 2008-06-12 2009-06-10 Encrypted marking and method for securing and certifying the authenticity of a product Ceased EP2374091A2 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
DE09762149.4T DE09762149T1 (en) 2008-06-12 ENCRYPTED MARKING AND METHOD FOR ASSURING AND CERTIFYING THE AUTHENTICITY OF A PRODUCT

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
BG10110162A BG66377B1 (en) 2008-06-12 2008-06-12 Encoded marking and a method for protection and certification the authenticity of products
PCT/IB2009/052476 WO2009150622A2 (en) 2008-06-12 2009-06-10 Encrypted marking and method for securing and certifying the authenticity of a product

Publications (1)

Publication Number Publication Date
EP2374091A2 true EP2374091A2 (en) 2011-10-12

Family

ID=41217692

Family Applications (1)

Application Number Title Priority Date Filing Date
EP09762149A Ceased EP2374091A2 (en) 2008-06-12 2009-06-10 Encrypted marking and method for securing and certifying the authenticity of a product

Country Status (5)

Country Link
EP (1) EP2374091A2 (en)
BG (1) BG66377B1 (en)
DE (1) DE09762149T1 (en)
ES (1) ES2728513T1 (en)
WO (1) WO2009150622A2 (en)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103415857A (en) * 2011-02-08 2013-11-27 录象射流技术公司 Method of printing a product code
ES2727101T3 (en) 2013-04-11 2019-10-14 European Central Bank Security feature and object with security feature
DE15816640T1 (en) * 2014-10-23 2019-11-28 Keit Ltd. Method of protecting bound documents against forgery by means of perforation
CN105150711A (en) * 2015-08-25 2015-12-16 郑国义 Random colorful three-dimensional entity false proof mark and manufacturing device and method
JPWO2022044876A1 (en) * 2020-08-24 2022-03-03

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE3628353A1 (en) * 1986-08-21 1988-02-25 Guenther Louda Method for the inconspicuous marking of documents and method of testing such documents
EP0469868A2 (en) * 1990-07-31 1992-02-05 Xerox Corporation Binary image processing for decoding self-clocking glyph shape codes
WO1999056241A1 (en) * 1998-04-23 1999-11-04 The Royal College Of Art Method and apparatus for producing a signal from an image
JP2002200872A (en) * 2000-12-28 2002-07-16 Printing Bureau Ministry Of Finance Japan Authenticity discriminating former with fine perfortion and authenticity discriminating device
FR2843072A1 (en) * 2002-08-02 2004-02-06 Banque De France Document secured with micro-perforations, uses micro-perforations of various shapes and orientations to form encoded marking of bank note
DE202005011521U1 (en) * 2005-07-19 2005-10-06 Bundesdruckerei Gmbh Security system for book type document especially a passport has security markings applied to each page

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
FR2565383B1 (en) * 1984-05-29 1986-08-14 Imaje Sa METHOD FOR IDENTIFYING A PRODUCT FOR PREVENTING FRAUD AND DEVICE CARRYING OUT THIS METHOD
EP1402485A1 (en) * 2000-11-07 2004-03-31 Zhivko Georgiev Zhelev A device for recording multi-dimensional coded markings upon products for protection and verification purposes
US20040061326A1 (en) * 2001-02-09 2004-04-01 David Hilton Document printed with graphical symbols which encode information
GB2397681B (en) * 2001-10-01 2005-12-07 Fryco Ltd Optical encoding
BG65111B1 (en) * 2001-10-04 2007-02-28 "Кеит" Оод Method and device for code recording and reading of material on products for the protection and control of their originality

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE3628353A1 (en) * 1986-08-21 1988-02-25 Guenther Louda Method for the inconspicuous marking of documents and method of testing such documents
EP0469868A2 (en) * 1990-07-31 1992-02-05 Xerox Corporation Binary image processing for decoding self-clocking glyph shape codes
WO1999056241A1 (en) * 1998-04-23 1999-11-04 The Royal College Of Art Method and apparatus for producing a signal from an image
JP2002200872A (en) * 2000-12-28 2002-07-16 Printing Bureau Ministry Of Finance Japan Authenticity discriminating former with fine perfortion and authenticity discriminating device
FR2843072A1 (en) * 2002-08-02 2004-02-06 Banque De France Document secured with micro-perforations, uses micro-perforations of various shapes and orientations to form encoded marking of bank note
DE202005011521U1 (en) * 2005-07-19 2005-10-06 Bundesdruckerei Gmbh Security system for book type document especially a passport has security markings applied to each page

Also Published As

Publication number Publication date
ES2728513T1 (en) 2019-10-25
DE09762149T1 (en) 2019-12-05
WO2009150622A3 (en) 2010-02-04
BG110162A (en) 2009-12-31
BG66377B1 (en) 2013-10-31
WO2009150622A2 (en) 2009-12-17

Similar Documents

Publication Publication Date Title
CA2242671C (en) Method of preventing counterfeiting of articles of manufacture
EP2345008B1 (en) Method of manufacturing security document and method for authenticating the document
CN107486627B (en) Method of forming identification mark and identification mark formed by the method
EP2533982B1 (en) Security element for document of value
US20050010776A1 (en) Optically variable devices with encrypted embedded data for authentication of identification documents
JP5274020B2 (en) Authentic card
US20050087604A1 (en) Licensing and identification devices having coded marks and methods of making and authenticating such licensing and identification devices
JP2014205349A (en) Secure discernment document
CN101053003A (en) Method and device for checking non-invasive system and/or destroying object integrity or its container
EP1646972B1 (en) Chip card including tamper-proof security features
US20030108373A1 (en) Printer driver log security verification for identification cards
US20030179902A1 (en) Authentication and anti-counterfeit tracking system
WO2009150622A2 (en) Encrypted marking and method for securing and certifying the authenticity of a product
AU682778B2 (en) Authentication technique
CN101395619A (en) Card capable of authentication
EP2790133B1 (en) Security feature and object with security feature
JP2005346447A (en) Forgery-preventive card with two-dimensional code, and information presentation collation system and information presentation collation method using the forgery-preventive card
JP4395588B2 (en) Manufacture, issuance, examination method and booklet of IC booklet
US7617986B2 (en) Laminate security feature
CA2739508A1 (en) Method of manufacturing security document and method for authenticating the document
WO2010089673A2 (en) A data authentication technology
CN117916080A (en) Transfer foil, transfer article, display body, verification method and verification device for authenticity of display body, and individual authentication method
JP3172046U (en) Laminate security function
Lichtenstein The role of optics in secure credentials
UA73244C2 (en) Method for protecting documents presented on paper data carriers (method "atlas-krystal")

Legal Events

Date Code Title Description
PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text: ORIGINAL CODE: 0009012

17P Request for examination filed

Effective date: 20110414

AK Designated contracting states

Kind code of ref document: A2

Designated state(s): AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO SE SI SK TR

RIC1 Information provided on ipc code assigned before grant

Ipc: G07D 7/00 20060101ALI20110923BHEP

Ipc: G06K 9/18 20060101AFI20110923BHEP

Ipc: G07F 7/08 20060101ALI20110923BHEP

DAX Request for extension of the european patent (deleted)
DAX Request for extension of the european patent (deleted)
17Q First examination report despatched

Effective date: 20120820

18D Application deemed to be withdrawn

Effective date: 20130103

D18D Application deemed to be withdrawn (deleted)
APBK Appeal reference recorded

Free format text: ORIGINAL CODE: EPIDOSNREFNE

APAF Appeal reference modified

Free format text: ORIGINAL CODE: EPIDOSCREFNE

APBV Interlocutory revision of appeal recorded

Free format text: ORIGINAL CODE: EPIDOSNIRAPE

APBD Information on interlocutory revision deleted

Free format text: ORIGINAL CODE: EPIDOSDIRAPE

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: EXAMINATION IS IN PROGRESS

APBK Appeal reference recorded

Free format text: ORIGINAL CODE: EPIDOSNREFNE

APBN Date of receipt of notice of appeal recorded

Free format text: ORIGINAL CODE: EPIDOSNNOA2E

APBR Date of receipt of statement of grounds of appeal recorded

Free format text: ORIGINAL CODE: EPIDOSNNOA3E

APAF Appeal reference modified

Free format text: ORIGINAL CODE: EPIDOSCREFNE

REG Reference to a national code

Ref country code: ES

Ref legal event code: BA2A

Ref document number: 2728513

Country of ref document: ES

Kind code of ref document: T1

Effective date: 20191025

REG Reference to a national code

Ref country code: DE

Ref legal event code: R210

REG Reference to a national code

Ref country code: AT

Ref legal event code: EECC

Ref document number: AT T

Effective date: 20191215

APAV Appeal reference deleted

Free format text: ORIGINAL CODE: EPIDOSDREFNE

RAP1 Party data changed (applicant data changed or rights of an application transferred)

Owner name: GRANCHAROV, VITAN KANEV

Owner name: ZHELEV, EDVIN

Owner name: ZHELEV, GEORGI ZHIVKOV

Owner name: ZHELEV, ZHIVKO GEORGIEV

Owner name: KEIT LTD.

REG Reference to a national code

Ref country code: DE

Ref legal event code: R082

Representative=s name: BOEHMERT & BOEHMERT ANWALTSPARTNERSCHAFT MBB -, DE

Ref country code: DE

Ref legal event code: R082

Representative=s name: WUESTHOFF & WUESTHOFF, PATENTANWAELTE PARTG MB, DE

REG Reference to a national code

Ref country code: DE

Ref legal event code: R082

Representative=s name: WUESTHOFF & WUESTHOFF, PATENTANWAELTE PARTG MB, DE

REG Reference to a national code

Ref country code: DE

Ref legal event code: R003

APBT Appeal procedure closed

Free format text: ORIGINAL CODE: EPIDOSNNOA9E

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: THE APPLICATION HAS BEEN REFUSED

18R Application refused

Effective date: 20220715