EP2824641B1 - Systems and methods for authenticating, identifying or marking objects or individuals using dynamic security features - Google Patents

Systems and methods for authenticating, identifying or marking objects or individuals using dynamic security features Download PDF

Info

Publication number
EP2824641B1
EP2824641B1 EP13003436.6A EP13003436A EP2824641B1 EP 2824641 B1 EP2824641 B1 EP 2824641B1 EP 13003436 A EP13003436 A EP 13003436A EP 2824641 B1 EP2824641 B1 EP 2824641B1
Authority
EP
European Patent Office
Prior art keywords
information pattern
digits
string
readable
colour
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
EP13003436.6A
Other languages
German (de)
French (fr)
Other versions
EP2824641A1 (en
Inventor
Friedrich Kisters
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to EP13003436.6A priority Critical patent/EP2824641B1/en
Publication of EP2824641A1 publication Critical patent/EP2824641A1/en
Application granted granted Critical
Publication of EP2824641B1 publication Critical patent/EP2824641B1/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07DHANDLING OF COINS OR VALUABLE PAPERS, e.g. TESTING, SORTING BY DENOMINATIONS, COUNTING, DISPENSING, CHANGING OR DEPOSITING
    • G07D7/00Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency
    • G07D7/005Testing security markings invisible to the naked eye, e.g. verifying thickened lines or unobtrusive markings or alterations
    • G07D7/0054Testing security markings invisible to the naked eye, e.g. verifying thickened lines or unobtrusive markings or alterations involving markings the properties of which are altered from original properties
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07DHANDLING OF COINS OR VALUABLE PAPERS, e.g. TESTING, SORTING BY DENOMINATIONS, COUNTING, DISPENSING, CHANGING OR DEPOSITING
    • G07D7/00Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency
    • G07D7/004Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency using digital security elements, e.g. information coded on a magnetic thread or strip
    • G07D7/0047Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency using digital security elements, e.g. information coded on a magnetic thread or strip using checkcodes, e.g. coded numbers derived from serial number and denomination

Definitions

  • the present invention relates to systems and methods for authenticating, identifying or marking objects or individuals using security features that undergo at least in part dynamic modification process.
  • DE 10 2004 045 211 A1 concerns a security document comprising a flexible carrier and a multi-layer flexible film body which is applied to the flexible carrier and which provides one or more optical security features.
  • the flexible multi-layer film body has an electrically controller display element for generating an optical security feature with associated electrical current source for operation of the display element in combination with an optically active diffractive structure.
  • the security document described in DE 10 2005 030 626 A1 has an integrated circuit for communication with an external read and/or write device and at least one display system integrated into the security document. This is designed to provide a self-personalising document. After the personalisation the display system contains person-specific and/or document-specific data, in particular the name and/or biometric data of the document holder or the validity period of the document.
  • a security document of this type is also rigid with its security features and does not avoid an unauthorised bearer to gain access to certain areas or copy and use it to mark a forgery, such as a painting or piece of furniture.
  • JP 2010286920 A a user inputs several digits of his/her own identification number to a touch panel of a fingerprint authentication terminal.
  • the user puts a finger on a fingerprint sensor of the fingerprint authentication terminal.
  • Authentication is performed using the fingerprint data read by the fingerprint sensor and the personal ID-number. If there is a certain degree of match between the data and input information, the user is authenticated.
  • DE 20 2005 005 130 U1 describes a textile identification arrangement with security features for protection against plagiarisms.
  • the arrangement consists of at least one first and second pigment layer and the polymer supporting layer, whereby the first and second pigment layers are arranged on the supporting layer.
  • the first pigment layer has at least one type of interference pigment in the form of a geometric pattern that is used as a security feature.
  • WO 2012/109294 A1 describes a similar approach using a security feature consisting of a product code, comprising at least one modified character that is different from a corresponding one of a plurality of unmodified characters of the initial product code.
  • the modified product code includes a covert feature, which is not generally noticeable as a code to the casual consumer. Again, this method must be regarded as a static method because the modified code is printed similar to the way any conventional character is printed, without any dynamic change.
  • the digitized characters are then stored in a printer controller.
  • An algorithm can be applied to modify one or more characters of the product code.
  • WO 2011/138515 A1 describes an authentication device comprising at least one security element applied to a product, capable of changing colour by means of spatially and temporally coherent laser radiation, which is emitted by the authentication device.
  • the radiation emitted by the authentication device is located outside the range of perception of the eye.
  • US 2012/088079 A1 describes an optically responsive feature for security, authentication and/or identification purposes.
  • the embodiment makes use of an optical effect-producing medium.
  • the medium comprises a carrier medium containing pigment particles having at least one optically responsive pigment or one that is responsive to incident electromagnetic radiation of at least a selected excitation wave length or wave length band for producing an optical response in the visible or near-visible spectrum.
  • US 2009/0074229 A1 describes an apparatus and a method for visually representing measuring values. All of the known security systems and methods make use of static security features, such as passwords, ID-numbers and other security features which are updated from time to time. Even if a code changes constantly, it is static, not dynamic, since the new code simply replaces the previous one, but remains again static for the duration of its validity.
  • the authentication or identification system must be able to authenticate and/or identify an object or user and also knows, which code is currently valid. Therefore, its algorithm can be hijacked, or the code can be intercepted during its transmission. It is an object of the present invention to provide an improved system and a method for authenticating, identifying or marking objects or individuals to achieve a higher security standard using dynamic modification features. The solution is provided by a system and a method for authenticating, identifying or marking objects or individuals according to the present invention.
  • the system of the invention as claimed in claim 1 comprises a display or a surface for displaying a readable information pattern, consisting of at least one string of digits with numbers, symbols, letters and/or dots.
  • a string may have the appearance dA%4Be?P.LK-32i.
  • Readable information in this context means any information that can be captured using physical or optical means such as optical reader units, cameras or sensors.
  • the readable information pattern can be recognized by optical character recognition (OCR).
  • OCR optical character recognition
  • the information pattern can be one string or a number of strings using numbers, symbols, letters and/or dots.
  • "Symbols" as used in the context of the present invention comprise additional characters and special signs in any language, or random signs such as assemblies of dots or a graphic.
  • the system as claimed in claim 1 also comprises a reader comprising optical means for capturing the readable information pattern displayed in the display or on the surface.
  • the captured information pattern is stored in a memory unit, which can be part of the reader.
  • Reader and memory unit can be part of a device, e.g. a mobile or smart phone or a computer.
  • the system further comprises a storage unit for storage of unique information patterns in a central database.
  • the database can be directly connected to the storage unit, or it can be part of a remote system.
  • Each object or individual to be authenticated and/or identified is characterized by a unique information pattern.
  • An assignment table assigns this unique information pattern to a specific object or individual.
  • a processing unit is provided with command rules for conducting a change of one or more digits of the at least one string in response to one or more inherent or external triggers.
  • the command rules are stored together with the unique information pattern in the central database and/or in the memory unit of a separate device.
  • a transmitting unit comprised in the system as claimed in claim 1 transfers the captured information pattern from the display or surface to the storage unit.
  • the system further comprises a processing unit that compares the transmitted information pattern with the unique information pattern stored in the central database. It also comprises a trigger unit that conducts, in response to the one or more inherent or external triggers, a modification of one or more digits within the string such that the digit becomes unreadable, or shall be read as a different symbol by the reader, resulting in a modified information pattern with changing readable and/or unreadable digits.
  • the processing unit is further configured to compare the readable and unreadable digits of the modified information pattern at the respective positions of the unique information pattern stored in the database.
  • the modification conducted by the trigger unit preferably comprises a deletion, change or replacement of one or more digits with numbers, symbols, letters and/or dots.
  • the readable information pattern in particular the readable digits (e.g. letters, signs, symbols, numbers, dots) is compared with the database identity.
  • the combination of readable digits and altered or unreadable digits provide a pattern that can be compared with the information pattern stored in the database.
  • the altered or unreadable digits are introduced by means of an inherent or external trigger.
  • Triggers that may be applied in the present invention include, but are not limited to geo position or routing, temperature, humidity, atmospheric pressure, altitude, light intensity, colour, sound intensity, time, movement, vibration, stored algorithms, manual keyboard presses, measurement data provided by sensors, or triggering in accordance with individual's behaviour. For example, if a device equipped with a display is carried from one place to another place that has a certain temperature difference, this may trigger the execution of a command rule, which changes one or more digits at certain positions within the string from a readable into an unreadable information. For example, the string ABCDE12345 can be modified to AB*DE1*345, wherein the digits marked with "*" are rendered unreadable by executing a command rule due to an inherent or external trigger.
  • a command rule could also be executed if an individual or an object carried by an individual does not follow a pre-defined geo-routing, which may trigger one or more modifications of pre-defined digits within the string.
  • a modification can also be triggered by a manual keyboard press, for example a key on a smart phone.
  • the triggered unit can also become active in accordance with individual's behaviour if the individual follows a certain life scheme. In case there is an abnormality within the individual's behaviour scheme, this would cause an alert or execute another security event such as an alarm.
  • the at least one digit in the string is rendered unreadable by one or more pre-defined cracks introduced by the trigger unit.
  • the one or more cracks define a pattern which may correlate with a specific command rule for authenticating, identifying or marking the object or the individual. Not only the pattern of the cracks can be used as a security feature, but also their position, nature, colour and/or intensity.
  • the processing unit preferably deletes, replaces or modifies one or more digits in accordance with the provided command rules by changing the display or surface background, and/or the intensity, nature, colour or intensity of the displayed numbers, symbols, letters and/or dots, or the nature, colour and/or intensity of the cracks.
  • the reader comprises an optical character recognition unit to read the information pattern composed of numbers, symbols or letters.
  • the transmitting unit may transmit only certain digits to the central database identified by the position number. It can be sufficient if only certain positions out of the full string are transferred and compared with the database entry. Certain positions of the string may also be attributed to certain activities. Each usage may trigger a change (e. g. a cracking) of some digits in these positions and/or a change of the positions as such.
  • the reader can comprise an image acquisition unit for image comparison of the digits and/or the cracks. Specific areas of the image can be used for a pre-selection of the object or individual. A unique string in the information pattern is assigned to a specific user for basic identification.
  • cracks can occur in up to eight (or more) directions and can be combined with other cracks.
  • Each crack can have its own colour, background colour, form or intensity. The same also applies to the colour/intensity of the letter/ number/symbol segment and their respective backgrounds. This results in a plurality of possible variants per digit, which can be combined or dynamically changed.
  • a certain crack pattern can result in a disappearance of a digit which adds a further security feature.
  • certain digits can be disregarded from modification, which means that they can never be changed into a different or unreadable form. This also increases security.
  • digits can crack, change their background colours and/or their intensities.
  • digits with cracks can be made reversible by de-cracking and changing or loosing colour.
  • certain digits can undergo several modifications, whereas other digits at certain positions can only undergo a certain number of modifications, for example not more than two modifications or even no modification.
  • the mode of modification can follow a certain rule, for example in a first step cracks are introduced at certain digit positions, in a second step their colours are changed, in a third step the cracks develop.
  • a truly authenticated user can be able to change the modified string by pushing a key or bottom or by touching the screen of his device.
  • the present invention also relates to a method for authenticating, identifying or marking objects or individuals, as claimed in claim 7 the method comprising the steps:
  • the string is composed of one or more dots on a surface.
  • the dots may contain pigments that change the colours in accordance with an inherent or external trigger.
  • the information pattern is made of the colour displayed by the dots. This unique information pattern is stored in the central database. If the colours (or their intensities) of the dots change, then this new information pattern is transferred to the central database and compared. If the change is in accordance with the provided rules, the user or the object is authenticated and/or identified. In a subsequent step, the transferred information pattern can then be stored in the database as a new unique information pattern. If the colours of the dots change again, an updated information pattern is transferred and again compared with the stored information pattern within the database.
  • the dots may change their colour from blue to green (e.g. by oxidation) when executing an underlying command rule. If a formerly green dot should show up in blue colour, an alarm is triggered. Accordingly, this could indicate the existence of a falsified variant, which had been copied when the dot was still blue, whereas in the meantime the original would have turned into green colour. At the same time, this change is non-reversible. Even a perfect copy would therefore loose its value very quickly.
  • the pigment change of a dot from blue to green can be defined as being irreversible in accordance with an underlying command rule, which would be similar to the natural oxidation process described above.
  • the displayed numbers, symbols, letters and/or dots can crack according to a certain pattern.
  • the image of the pattern can be captured by an image acquisition unit, or the cracked digits can be rendered unreadable by the utilised reader.
  • the one or more digits are rendered unreadable by introducing or developing one or more cracks in addition to the displayed numbers, symbols, letters and/or dots.
  • the number, nature, colour and/or intensity of the cracks are triggered by a specific command rule or by an inherent or external trigger.
  • An inherent trigger can be a chemical or physical reaction that takes place within the material used for displaying the numbers, symbols, letters and/or dots.
  • An example is a lacquer that is able to change its colour.
  • a cracked unreadable digit is either deleted or replaced by one or more readable digits consisting of numbers, symbols, letters and/or dots, in accordance with the provided command rules, creating a modified string that is transferred and compared with the unique information pattern in the central database.
  • the provided command rules comprise the positions of digit modification, the nature and intensity of digit modification and the positions with no digit modification.
  • the digits can be modified in their background colour and intensity, colour and/or intensity of numbers, symbols, letters and/or dots, and/or colour and/or intensity or type of the cracks. Therefore, the user has a number of possible combinations wherein the resulting pattern is based on the underlying command rule.
  • the command rule will tell which digits within the string (i.e. their positions) are modified in response to the inherent or external trigger and what restrictions apply, and perhaps which shall not apply.
  • the length of the string can comprise 4 or more digits, preferably more than 100 digits, preferably more than 1000 digits.
  • a pre-selection can be performed by using digit positions which allow a rapid identification of the object or individual.
  • the object or individual is therefore identified in a first step by unique readable digits within the string, wherein in a further step the object or individual is authenticated by the number, position, colour, nature and/or intensity of the modified or unreadable digits within the string.
  • the modified information pattern preferably contains a string with readable and/or unreadable digits, wherein for each identification and/or authentication request, the string undergoes dynamic changes by modifying one or more of the same or different readable and/or unreadable digits. At least one part of the original pattern remains unchanged, whereas another part is changed.
  • the stored information pattern in the database can be replaced by the modified information pattern. This renders the previous version of the information pattern invalid for any future authentication or identification.
  • the updated information pattern can be replaced at a later time point by a further modified information pattern, which again updates the stored information pattern, thereby creating a new unique information pattern specific for the object or individual which cannot be predicted, even if the underlying rules and algorithms are known. It is therefore impossible to copy or mimic an object using the present system or method.
  • the readable information pattern consists of security elements such as numbers, symbols, letters, crackles and/or dots,
  • the dots provided on the surface comprise a pigment that changes its colour and/or intensity in response to an inherent or external trigger.
  • An image acquisition unit such as a camera can detect the colour change, even if not visible for the human eye.
  • the modified information pattern based on the changed dots can then be transferred to the central database and compared with the stored unique information pattern. The information pattern can then be updated as described above.
  • a device containing a memory unit in which a string consisting of numbers, letters or symbols is stored together with command rules which allow a triggered modification of one or more digits within the string.
  • the string may look like 1A.Z56-!i#e.?
  • the modification is carried out by a trigger unit that replaces, deletes or introduces some of the letters, numbers, symbols or dots or their backgrounds.
  • a display makes the string or a part thereof visible for the user.
  • Fig. 1 one digit out of the string 1A.Z56-!i#e.? consisting of the letter "e” is shown.
  • the device e.g. a smartphone
  • the trigger can be, for example, a (wrong) input of a pin number or (wrong) GPS position, which does not match with the GPS position stored in the command rule for this activity.
  • the trigger unit triggers, as a result of such an external trigger, the formation of a crack which overlaps the letter "e” ( Fig. 1A ). This renders the position of the digit "e” within the string 1A.Z56-!i#e.? unreadable to read as 1A.Z56-!i#*.? (marked as "*").
  • a half-crack (bold line) can occur at eight possible positions (dotted lines). Two or more half-cracks can be displayed in combination. Each half-crack can also be displayed in another colour. In addition, the letter "e” can also be displayed in a different colour. The same also applies for the letter's background which can be coloured differently or in a different intensity.
  • This example illustrates that within one single digit, there is a plurality of variations that can be used as security features. Most importantly, these security features are dynamic because some information in the pattern remains unchanged (e.g. the letter "e"), whereas some other information is changed (e.g. by formation of cracks, colours, intensities).
  • a further half-crack is introduced overlapping the letter "e".
  • the digit may be rendered unreadable by a reader (e.g. OCR unit or image acquisition unit), whereas the other digits remain readable.
  • a digit could be replaced by a different value, which is readable by OCR, wherein the reader is capable of identifying "cracked letters”.
  • the digit may be identified in high resolution or detail by a non-OCR reader, using conventional image information rather than OCR.
  • the readable digits are transferred to a central database, in which a previous version of the unique information pattern is stored. If the modification (e.g. introduction of a crack) complies with the underlying command rule (or if there is no rule for this specific change), the object or individual is rightfully authenticated or identified. If the digit should have been changed differently (e.g. cracks in different positions), the user is not authenticated or identified, causing an alert or alarm submitted to an external service. The alarm can also result in blocking the device for further usage. If the unchanged parts do not correspond with the database entry, the user is also not authenticated or identified, causing an alert or alarm being submitted to an external service.
  • the security string can comprise from 4 digits to over 1.000.000 digits, whereas it may be sufficient to transfer only a small portion of the string for a pre-selection. Therefore, the amount of data to be transferred can be varied, as well as the security which is scalable, depending on the security request specific for the respective action, the number of digits within the string and the number of modifications.
  • the system and method according to the present invention use dynamic security features which allow for flexible security applications.
  • the modified and/or non-modified security elements are OCR- and image-readable. These dynamic security features make it nearly impossible to fake without risking double or multiple database entries within the central database. Areas where digits (e.g. letters, numbers, symbols and/or dots) cannot change form a unique pattern, as well as digits than can change.
  • the security level can further be increased by applying additional security features such as biometric features.
  • the code constantly changes, but remains recognizable, especially because its basic structure does not alter.
  • the dynamic nature of the security string can protect additional biometric information from being faked, while it can help in selecting and pre-identifying the user.
  • a fast pre-selection can be performed by checking basic elements (e.g. ID-area with name or ID-number). Double checking of the readable letters and their position in the resulting data-entries matching the first query is possible if there is a result. Triple checking is possible that includes digit variants created by the dynamic modification process. Once identified, data of the respective object or identity can be displayed to the requesting party.
  • basic elements e.g. ID-area with name or ID-number
  • the image shown in Fig. 1A or Fig. 1B can be used for image acquisition.
  • the information pattern shown on the display or surface can be photographed by a camera, transferred and compared with the stored image in the database. This allows an image comparison of the digits, but also of the cracks. Specific areas of the image can be used for a fast pre-selection. For example, an individual can be identified by a number of subsequent digits that occur within the string.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Credit Cards Or The Like (AREA)

Description

  • The present invention relates to systems and methods for authenticating, identifying or marking objects or individuals using security features that undergo at least in part dynamic modification process.
  • Many of the known security systems make use of static security features for anti-forgery protection or the prevention of abuse. A way of producing such security features is to make them appear invisible to the forger. This type of system functions well only as long as the forger has no knowledge of rendering it visible, copying or stealing the security element. If, for example, the identity card or an access card is stolen, the holder thereof, although not authorized, can identify himself and possibly gain access to restricted areas.
    DE 10 2004 045 211 A1 concerns a security document comprising a flexible carrier and a multi-layer flexible film body which is applied to the flexible carrier and which provides one or more optical security features. The flexible multi-layer film body has an electrically controller display element for generating an optical security feature with associated electrical current source for operation of the display element in combination with an optically active diffractive structure.
  • The security document described in DE 10 2005 030 626 A1 has an integrated circuit for communication with an external read and/or write device and at least one display system integrated into the security document. This is designed to provide a self-personalising document. After the personalisation the display system contains person-specific and/or document-specific data, in particular the name and/or biometric data of the document holder or the validity period of the document. A security document of this type is also rigid with its security features and does not avoid an unauthorised bearer to gain access to certain areas or copy and use it to mark a forgery, such as a painting or piece of furniture.
  • There is a requirement to provide security for the authentication, identification, the marking of objects or individuals, for example for gaining physical or digital access to a device in order to carry out transactions. The mere input of digit numbers, letters, symbols or other features does not hinder an unauthorized bearer to use the device for unauthorized transactions. If an unauthorized person knows the code, the true user can only block the device from performing further actions, but at this time it can already be too late.
  • The use of biometric features constitutes one possible solution, but as a static factor is still prone to being hijacked or copied and not always very reliable. Such a system is described in JP 2010286920 A , where a user inputs several digits of his/her own identification number to a touch panel of a fingerprint authentication terminal. The user puts a finger on a fingerprint sensor of the fingerprint authentication terminal. Authentication is performed using the fingerprint data read by the fingerprint sensor and the personal ID-number. If there is a certain degree of match between the data and input information, the user is authenticated.
  • There are security systems that make use of the properties of certain materials for identification purposes. DE 20 2005 005 130 U1 , for instance, describes a textile identification arrangement with security features for protection against plagiarisms. The arrangement consists of at least one first and second pigment layer and the polymer supporting layer, whereby the first and second pigment layers are arranged on the supporting layer. The first pigment layer has at least one type of interference pigment in the form of a geometric pattern that is used as a security feature.
  • WO 2012/109294 A1 describes a similar approach using a security feature consisting of a product code, comprising at least one modified character that is different from a corresponding one of a plurality of unmodified characters of the initial product code. The modified product code includes a covert feature, which is not generally noticeable as a code to the casual consumer. Again, this method must be regarded as a static method because the modified code is printed similar to the way any conventional character is printed, without any dynamic change. The digitized characters are then stored in a printer controller. An algorithm can be applied to modify one or more characters of the product code.
  • WO 2011/138515 A1 describes an authentication device comprising at least one security element applied to a product, capable of changing colour by means of spatially and temporally coherent laser radiation, which is emitted by the authentication device. The radiation emitted by the authentication device is located outside the range of perception of the eye.
  • US 2012/088079 A1 describes an optically responsive feature for security, authentication and/or identification purposes. The embodiment makes use of an optical effect-producing medium. The medium comprises a carrier medium containing pigment particles having at least one optically responsive pigment or one that is responsive to incident electromagnetic radiation of at least a selected excitation wave length or wave length band for producing an optical response in the visible or near-visible spectrum. US 2009/0074229 A1 describes an apparatus and a method for visually representing measuring values.
    All of the known security systems and methods make use of static security features, such as passwords, ID-numbers and other security features which are updated from time to time. Even if a code changes constantly, it is static, not dynamic, since the new code simply replaces the previous one, but remains again static for the duration of its validity. The authentication or identification system must be able to authenticate and/or identify an object or user and also knows, which code is currently valid. Therefore, its algorithm can be hijacked, or the code can be intercepted during its transmission.
    It is an object of the present invention to provide an improved system and a method for authenticating, identifying or marking objects or individuals to achieve a higher security standard using dynamic modification features.
    The solution is provided by a system and a method for authenticating, identifying or marking objects or individuals according to the present invention.
  • The system of the invention as claimed in claim 1 comprises a display or a surface for displaying a readable information pattern, consisting of at least one string of digits with numbers, symbols, letters and/or dots. As an example, a string may have the appearance dA%4Be?P.LK-32i. "Readable information" in this context means any information that can be captured using physical or optical means such as optical reader units, cameras or sensors. In a preferred embodiment, the readable information pattern can be recognized by optical character recognition (OCR). The information pattern can be one string or a number of strings using numbers, symbols, letters and/or dots. "Symbols" as used in the context of the present invention comprise additional characters and special signs in any language, or random signs such as assemblies of dots or a graphic.
  • The system as claimed in claim 1 also comprises a reader comprising optical means for capturing the readable information pattern displayed in the display or on the surface. The captured information pattern is stored in a memory unit, which can be part of the reader. Reader and memory unit can be part of a device, e.g. a mobile or smart phone or a computer.
  • The system further comprises a storage unit for storage of unique information patterns in a central database. The database can be directly connected to the storage unit, or it can be part of a remote system. Each object or individual to be authenticated and/or identified is characterized by a unique information pattern. An assignment table assigns this unique information pattern to a specific object or individual. A processing unit is provided with command rules for conducting a change of one or more digits of the at least one string in response to one or more inherent or external triggers. Preferably, the command rules are stored together with the unique information pattern in the central database and/or in the memory unit of a separate device.
  • A transmitting unit comprised in the system as claimed in claim 1 transfers the captured information pattern from the display or surface to the storage unit. The system further comprises a processing unit that compares the transmitted information pattern with the unique information pattern stored in the central database. It also comprises a trigger unit that conducts, in response to the one or more inherent or external triggers, a modification of one or more digits within the string such that the digit becomes unreadable, or shall be read as a different symbol by the reader, resulting in a modified information pattern with changing readable and/or unreadable digits. The processing unit is further configured to compare the readable and unreadable digits of the modified information pattern at the respective positions of the unique information pattern stored in the database. The modification conducted by the trigger unit preferably comprises a deletion, change or replacement of one or more digits with numbers, symbols, letters and/or dots.
  • In a preferred embodiment, the readable information pattern, in particular the readable digits (e.g. letters, signs, symbols, numbers, dots) is compared with the database identity. The combination of readable digits and altered or unreadable digits provide a pattern that can be compared with the information pattern stored in the database. Most importantly, the altered or unreadable digits are introduced by means of an inherent or external trigger.
  • Triggers that may be applied in the present invention include, but are not limited to geo position or routing, temperature, humidity, atmospheric pressure, altitude, light intensity, colour, sound intensity, time, movement, vibration, stored algorithms, manual keyboard presses, measurement data provided by sensors, or triggering in accordance with individual's behaviour. For example, if a device equipped with a display is carried from one place to another place that has a certain temperature difference, this may trigger the execution of a command rule, which changes one or more digits at certain positions within the string from a readable into an unreadable information. For example, the string ABCDE12345 can be modified to AB*DE1*345, wherein the digits marked with "*" are rendered unreadable by executing a command rule due to an inherent or external trigger. It is one advantage of the present system and method of the invention that the kind of modification is not predictable but is based on certain rules specific for the object or individual. If there should be modifications in the string that differ from the ones normally introduced in accordance with the underlying command rule, that would mean that the object or individual is not validly authenticated or identified.
  • A command rule could also be executed if an individual or an object carried by an individual does not follow a pre-defined geo-routing, which may trigger one or more modifications of pre-defined digits within the string. A modification can also be triggered by a manual keyboard press, for example a key on a smart phone. The triggered unit can also become active in accordance with individual's behaviour if the individual follows a certain life scheme. In case there is an abnormality within the individual's behaviour scheme, this would cause an alert or execute another security event such as an alarm.
  • In one embodiment, the at least one digit in the string is rendered unreadable by one or more pre-defined cracks introduced by the trigger unit. The one or more cracks define a pattern which may correlate with a specific command rule for authenticating, identifying or marking the object or the individual. Not only the pattern of the cracks can be used as a security feature, but also their position, nature, colour and/or intensity. The processing unit preferably deletes, replaces or modifies one or more digits in accordance with the provided command rules by changing the display or surface background, and/or the intensity, nature, colour or intensity of the displayed numbers, symbols, letters and/or dots, or the nature, colour and/or intensity of the cracks. Preferably, the reader comprises an optical character recognition unit to read the information pattern composed of numbers, symbols or letters. The transmitting unit may transmit only certain digits to the central database identified by the position number. It can be sufficient if only certain positions out of the full string are transferred and compared with the database entry. Certain positions of the string may also be attributed to certain activities. Each usage may trigger a change (e. g. a cracking) of some digits in these positions and/or a change of the positions as such.
  • Alternatively, the reader can comprise an image acquisition unit for image comparison of the digits and/or the cracks. Specific areas of the image can be used for a pre-selection of the object or individual. A unique string in the information pattern is assigned to a specific user for basic identification.
  • In order to increase security, there are various combinations and rules that may be applied in order to dynamically modify the string in a defined, but unpredictable manner. For example, cracks can occur in up to eight (or more) directions and can be combined with other cracks. Each crack can have its own colour, background colour, form or intensity. The same also applies to the colour/intensity of the letter/ number/symbol segment and their respective backgrounds. This results in a plurality of possible variants per digit, which can be combined or dynamically changed.
  • In addition, a certain crack pattern can result in a disappearance of a digit which adds a further security feature. Furthermore, certain digits can be disregarded from modification, which means that they can never be changed into a different or unreadable form. This also increases security. By applying the dynamic modification approach, digits can crack, change their background colours and/or their intensities. In addition, digits with cracks can be made reversible by de-cracking and changing or loosing colour. Furthermore, certain digits can undergo several modifications, whereas other digits at certain positions can only undergo a certain number of modifications, for example not more than two modifications or even no modification. Also the mode of modification can follow a certain rule, for example in a first step cracks are introduced at certain digit positions, in a second step their colours are changed, in a third step the cracks develop. A truly authenticated user can be able to change the modified string by pushing a key or bottom or by touching the screen of his device.
  • The present invention also relates to a method for authenticating, identifying or marking objects or individuals, as claimed in claim 7 the method comprising the steps:
    • providing a readable information pattern, consisting of at least one string of digits numbers, symbols, letters and/or dots,
    • providing command rules for conducting a change of one or more digits of the at least one string in response to one or more inherent or external triggers,
    • assigning the information pattern and the command rules to a specific object or individual, or a group thereof,
    • capturing the displayed information pattern by a reader,
    • storing the captured information pattern in a memory unit,
    • storing a unique information pattern and the command rules in a central database,
    • modifying one or more digits within the string in response to one or more inherent or external triggers, such that the digit becomes unreadable by the reader, or differently readable, resulting in a modified information pattern consisting of a string with readable and unreadable digits,
    • transmitting at least one part of the modified information pattern to the central database,
    • comparing the at least one part of the modified information pattern with the respective part of the unique information pattern stored in the central database,
    wherein an object or individual is authenticated, authorised or marked, when the readable and unreadable digits of the transmitted modified information pattern and the information pattern stored in the database have been changed, replaced or deleted in accordance with the provided command rules.
  • In a preferred embodiment, it may be sufficient that the string is composed of one or more dots on a surface. The dots may contain pigments that change the colours in accordance with an inherent or external trigger. The information pattern is made of the colour displayed by the dots. This unique information pattern is stored in the central database. If the colours (or their intensities) of the dots change, then this new information pattern is transferred to the central database and compared. If the change is in accordance with the provided rules, the user or the object is authenticated and/or identified. In a subsequent step, the transferred information pattern can then be stored in the database as a new unique information pattern. If the colours of the dots change again, an updated information pattern is transferred and again compared with the stored information pattern within the database. If a colour has not been changed in accordance with the underlying command rules, access of the user is denied or an alert will be triggered. For example, the dots may change their colour from blue to green (e.g. by oxidation) when executing an underlying command rule. If a formerly green dot should show up in blue colour, an alarm is triggered. Accordingly, this could indicate the existence of a falsified variant, which had been copied when the dot was still blue, whereas in the meantime the original would have turned into green colour. At the same time, this change is non-reversible. Even a perfect copy would therefore loose its value very quickly. When using a display, the pigment change of a dot from blue to green can be defined as being irreversible in accordance with an underlying command rule, which would be similar to the natural oxidation process described above.
  • In another embodiment, the displayed numbers, symbols, letters and/or dots can crack according to a certain pattern. The image of the pattern can be captured by an image acquisition unit, or the cracked digits can be rendered unreadable by the utilised reader. In one embodiment, the one or more digits are rendered unreadable by introducing or developing one or more cracks in addition to the displayed numbers, symbols, letters and/or dots. Preferably, the number, nature, colour and/or intensity of the cracks are triggered by a specific command rule or by an inherent or external trigger. An inherent trigger can be a chemical or physical reaction that takes place within the material used for displaying the numbers, symbols, letters and/or dots. An example is a lacquer that is able to change its colour.
  • Preferably, a cracked unreadable digit is either deleted or replaced by one or more readable digits consisting of numbers, symbols, letters and/or dots, in accordance with the provided command rules, creating a modified string that is transferred and compared with the unique information pattern in the central database. The provided command rules comprise the positions of digit modification, the nature and intensity of digit modification and the positions with no digit modification. For example, the digits can be modified in their background colour and intensity, colour and/or intensity of numbers, symbols, letters and/or dots, and/or colour and/or intensity or type of the cracks. Therefore, the user has a number of possible combinations wherein the resulting pattern is based on the underlying command rule. The command rule will tell which digits within the string (i.e. their positions) are modified in response to the inherent or external trigger and what restrictions apply, and perhaps which shall not apply.
  • The length of the string can comprise 4 or more digits, preferably more than 100 digits, preferably more than 1000 digits. In order to authenticate and/or identify an object or individual, it might be necessary to transfer and compare only a portion of the string with the stored counterpart in the central database. Alternatively, a pre-selection can be performed by using digit positions which allow a rapid identification of the object or individual. In a preferred embodiment, the object or individual is therefore identified in a first step by unique readable digits within the string, wherein in a further step the object or individual is authenticated by the number, position, colour, nature and/or intensity of the modified or unreadable digits within the string.
  • The modified information pattern preferably contains a string with readable and/or unreadable digits, wherein for each identification and/or authentication request, the string undergoes dynamic changes by modifying one or more of the same or different readable and/or unreadable digits. At least one part of the original pattern remains unchanged, whereas another part is changed. Upon transfer of the modified information pattern captured from the display or surface, the stored information pattern in the database can be replaced by the modified information pattern. This renders the previous version of the information pattern invalid for any future authentication or identification. The updated information pattern can be replaced at a later time point by a further modified information pattern, which again updates the stored information pattern, thereby creating a new unique information pattern specific for the object or individual which cannot be predicted, even if the underlying rules and algorithms are known. It is therefore impossible to copy or mimic an object using the present system or method.
  • Another embodiment of the method for authenticating, identifying or marking objects or individuals, is defined in claim 14, wherein the readable information pattern, consists of security elements such as numbers, symbols, letters, crackles and/or dots,
    • and
    • the stored information pattern is replaced with the unique information pattern, when there is a match of the non-modified security elements, wherein a match authenticates, identifies or marks the true object or individual.
  • In a preferred embodiment, the dots provided on the surface comprise a pigment that changes its colour and/or intensity in response to an inherent or external trigger. An image acquisition unit such as a camera can detect the colour change, even if not visible for the human eye. The modified information pattern based on the changed dots can then be transferred to the central database and compared with the stored unique information pattern. The information pattern can then be updated as described above.
  • The present invention is illustrated in the following examples and the figure.
  • Example 1
  • A device is provided containing a memory unit in which a string consisting of numbers, letters or symbols is stored together with command rules which allow a triggered modification of one or more digits within the string. The string may look like 1A.Z56-!i#e.?
  • The modification is carried out by a trigger unit that replaces, deletes or introduces some of the letters, numbers, symbols or dots or their backgrounds. A display makes the string or a part thereof visible for the user.
  • In Fig. 1, one digit out of the string 1A.Z56-!i#e.? consisting of the letter "e" is shown. If the device (e.g. a smartphone) is used by an authorized user (and/or depending on the rules by an unauthorized user), this may trigger a modification of the digit as a response to an underlying command rule. The trigger can be, for example, a (wrong) input of a pin number or (wrong) GPS position, which does not match with the GPS position stored in the command rule for this activity. The trigger unit triggers, as a result of such an external trigger, the formation of a crack which overlaps the letter "e" (Fig. 1A). This renders the position of the digit "e" within the string 1A.Z56-!i#e.? unreadable to read as 1A.Z56-!i#*.? (marked as "*").
  • In the example shown, a half-crack (bold line) can occur at eight possible positions (dotted lines). Two or more half-cracks can be displayed in combination. Each half-crack can also be displayed in another colour. In addition, the letter "e" can also be displayed in a different colour. The same also applies for the letter's background which can be coloured differently or in a different intensity. This example illustrates that within one single digit, there is a plurality of variations that can be used as security features. Most importantly, these security features are dynamic because some information in the pattern remains unchanged (e.g. the letter "e"), whereas some other information is changed (e.g. by formation of cracks, colours, intensities). These modifications of the information pattern result in a new unique information pattern specific for the object or individual to be authenticated, identified and/or marked. The modified pattern correlates with the event that triggered the modification and the rules which apply for it. The pattern is still dynamic, since its exact place of occurrence and its type is not predictable, because it fully depends on inherent of external triggers and the underlying command rules..
  • In Fig. 1B, a further half-crack is introduced overlapping the letter "e". This creates a modified unique information pattern which is different from the information pattern shown in Fig. 1A. By introducing one or more cracks or by changing the colours, the digit may be rendered unreadable by a reader (e.g. OCR unit or image acquisition unit), whereas the other digits remain readable. Alternatively, a digit could be replaced by a different value, which is readable by OCR, wherein the reader is capable of identifying "cracked letters". Additionally, the digit may be identified in high resolution or detail by a non-OCR reader, using conventional image information rather than OCR.
  • The readable digits are transferred to a central database, in which a previous version of the unique information pattern is stored. If the modification (e.g. introduction of a crack) complies with the underlying command rule (or if there is no rule for this specific change), the object or individual is rightfully authenticated or identified. If the digit should have been changed differently (e.g. cracks in different positions), the user is not authenticated or identified, causing an alert or alarm submitted to an external service. The alarm can also result in blocking the device for further usage. If the unchanged parts do not correspond with the database entry, the user is also not authenticated or identified, causing an alert or alarm being submitted to an external service.
  • The security string can comprise from 4 digits to over 1.000.000 digits, whereas it may be sufficient to transfer only a small portion of the string for a pre-selection. Therefore, the amount of data to be transferred can be varied, as well as the security which is scalable, depending on the security request specific for the respective action, the number of digits within the string and the number of modifications.
  • Using OCR technology, only readable digits are transferred and compared with the stored information pattern in this central database. Because of the dynamic nature of the inventive security elements, a high security standard is achieved. Furthermore, using a part of string comparison, fast and easy identification in a pre-selection step is possible.
  • The system and method according to the present invention use dynamic security features which allow for flexible security applications. The modified and/or non-modified security elements are OCR- and image-readable. These dynamic security features make it nearly impossible to fake without risking double or multiple database entries within the central database. Areas where digits (e.g. letters, numbers, symbols and/or dots) cannot change form a unique pattern, as well as digits than can change. The security level can further be increased by applying additional security features such as biometric features. The code constantly changes, but remains recognizable, especially because its basic structure does not alter. The dynamic nature of the security string can protect additional biometric information from being faked, while it can help in selecting and pre-identifying the user.
  • A fast pre-selection can be performed by checking basic elements (e.g. ID-area with name or ID-number). Double checking of the readable letters and their position in the resulting data-entries matching the first query is possible if there is a result. Triple checking is possible that includes digit variants created by the dynamic modification process. Once identified, data of the respective object or identity can be displayed to the requesting party.
  • Example 2
  • The image shown in Fig. 1A or Fig. 1B can be used for image acquisition. The information pattern shown on the display or surface can be photographed by a camera, transferred and compared with the stored image in the database. This allows an image comparison of the digits, but also of the cracks. Specific areas of the image can be used for a fast pre-selection. For example, an individual can be identified by a number of subsequent digits that occur within the string.
  • Example 3
  • Possible command rules for dynamic changes in letters:
    • Letters can never change into other letters, unless these are cracked-derivations, like aa, a2, a3, a4, ....ax.
    • Letter can appear/disappear after a certain level of crack-derivation, e.g. if more than 3 colours in one letter and more than 2 colours in the background, as well as more than 4 cracks, etc.
    • Letters can crack, change colour and change background colour.
    • Letters can de-crack, change colour and background colour back, lose colour.
    • Double cracks (e.g. combination of 3 and 9 p.m. cracks) cannot heal anymore, or only if both segments get the same background/digit/crack-colour.
    • 3 colours per segment can be reduced to 2, but not directly removed.
    • 2 colours per segment can be reduced to one, but not directly removed.
    • More cracks can be added, but only in steps of one.
    • Zick-zack cracks and other variants may appear anywhere.
    • Zick-zack cracks are neglected by simple OCR readers, but read by more complex ones.
    • Environmental factors, like temperature, shock/vibration and/or geo-position (if available) have an "individual" influence on the cracks, their form and their colours, partly depending on the "DNA settings" of the algorithm, setting the basic rules for changes.
    • A fully authenticated user (e.g. including a secure biometric factor) may change the changeable areas of this string by simple selection on the screen or by entering their positions (from/to). The ID area of the string, which may be unknown to the user shall remain unchangeable. Further cracks can be added by a fully authenticated user by simply pushing a button "crack" in a software application. This can be useful if the user feels that his code has been spied, tampered or copied by someone else (e.g. after paying in a shop).
    Example 4 DNA definitions
    • There are areas defined in which only some or no rules are applicable and "prohibit changes":
      • "Between letter 212 and 289 there never occurs any crackling";
      • "No colour change"
      • "Crackling can disappear"
      • "Letter can be replaced".
    • Some colours may not appear in some positions, or with some cracks:
      1. a. Blue: 1, 11, 21, 90"
      2. b. Red: 2, 12, 22, 270°
      3. c. Green: 3, 13, 23, 180°
    • There may be delays until a colour changes, if a certain environmental factor changes:
      1. a. "A" in positions xyz changes, if temperature varies > 10 degrees. Delay per change of 1 A-digit: 100 sec (...x)
      2. b. "B" in positions xyz changes, if geo-position varies > 10 degrees / 5 degrees. Delay per change of 1 B-digit: 10 sec (...x).
      1. a. In "A", position xyz, crack disappears, if colour of crack, digit and background match.
      2. b. In "B", position xyz, crack disappears, if colour of crack is yellow, digit green and background white.

Claims (15)

  1. A system for authenticating, identifying or marking objects or individuals, comprising
    - a display or surface for displaying a readable information pattern, consisting of at least one string of digits with numbers, symbols, letters and/or dots,
    - a reader for capturing the displayed information pattern,
    - a memory unit for storage of the captured information pattern,
    - a storage unit for storage of unique information patterns in a central database,
    - a processing unit provided with command rules for conducting a change of one or more digits of the at least one string in response to one or more inherent or external triggers,
    - an assignment table for assigning the unique information pattern and the command rules to a specific object or individual,
    - a transmitting unit for transmitting the captured information pattern from the display or surface to the storage unit,
    - a processing unit for comparing the transmitted information pattern with the unique information pattern stored in the central database,
    characterised in that the system comprises a trigger unit that conducts, in response to the one or more inherent or external triggers, a modification of one or more digits within the string such that the digit becomes unreadable by the reader, resulting in a modified information pattern with readable and unreadable digits, wherein the processing unit is configured to compare the readable and unreadable digits of the modified information pattern at the respective positions of the unique information pattern stored in the database , wherein an object or individual is authenticated, authorised or marked when the readable and unreadable digits of the transmitted modified information pattern and the information pattern stored in the database have been changed, replaced or deleted in accordance with the provided command rules.
  2. The system according to claim 1, wherein the modification conducted by the trigger unit comprises a deletion, change or replacement of one or more digits with numbers, symbols, letters and/or dots.
  3. The system according to claim 1 or 2, wherein at least one digit in the string comprises one or more predefined cracks introduced by the trigger unit, wherein the position, nature, colour and/or intensity of the cracks correlate with a specific command rule for authenticating, identifying or marking the object or individual.
  4. The system according to anyone of claims 1 to 3, wherein the one or more inherent or external triggers are selected from the group consisting of: geo position or routing, temperature, humidity, atmospheric pressure, altitude, light intensity, colour, sound intensity, time, movement, vibration, stored algorithms, manual keyboard presses, measurement data provided by sensors, or triggering in accordance with individual's behaviour.
  5. The system according to anyone of claims 1 to 4, wherein the reader comprises an optical character recognition unit and/or an image acquisition unit.
  6. The system according to anyone of claims 1 to 5, wherein the processing unit deletes, replaces or modifies one or more digits in accordance with the provided command rules by changing the display or surface background colour and/or intensity, the nature, colour and/or intensity of the displayed numbers, symbols, letters and/or dots, or the nature, colour and/or intensity of the cracks.
  7. A method for authenticating, identifying or marking objects or individuals, the method comprising the steps:
    - providing a readable information pattern, consisting of at least one string of digit numbers, symbols, letters and/or dots,
    - providing command rules for conducting a change of one or more digits of the at least one string in response to one or more inherent or external triggers,
    - assigning the information pattern and the command rules to a specific object or individual or a group thereof,
    - capturing the readable information pattern by a reader,
    - storing the captured information pattern in a memory unit,
    - storing a unique information pattern and the command rules in a central database,
    characterised by the following steps:
    - modifying one or more digits within the string in response to the one or more inherent or external triggers, such that the digit becomes unreadable by the reader, resulting in a modified information pattern consisting of a string with readable and unreadable digits,
    - transmitting at least one part of the modified information pattern to the central database,
    - comparing the at least one part of the modified information pattern with the respective part of the unique information pattern stored in the central database, wherein an object or individual is authenticated, authorised or marked, when the readable and unreadable digits of the transmitted modified information pattern and the information pattern stored in the database have been changed, replaced or deleted in accordance with the provided command rules.
  8. The method according to claim 7, wherein the one or more digits are rendered unreadable by introducing or developing one or more cracks in addition to the displayed numbers, symbols, letters and/or dots, the number, nature, colour and/or intensity of the cracks being triggered by a specific command rule or by an inherent or external trigger.
  9. The method according to anyone of claims 7 to 8, wherein a cracked unreadable digit is either deleted or replaced by one or more readable digits consisting of numbers, symbols, letters and/or dots, in accordance with the provided command rules, creating a modified string that is transferred and compared with the unique information pattern in the central database, wherein the provided command rules comprise the positions of digit modification, the nature and intensity of digit modification, and the positions with no digit modification.
  10. The method according to anyone of claims 7 to 9, wherein the digits are modified in their background colour and/or intensity, colour and/or intensity of numbers, symbols, letters and/or dots, and/or colour and/or intensity of the cracks.
  11. The method according to anyone of claims 7 to 10, wherein the object or individual is identified in a first step by unique readable digits within the string, wherein in a further step the object or individual is authenticated by the number, position, colour, nature and/or intensity and/or type of the modified unreadable digits within the string.
  12. The method according to anyone of claims 7 to 11, wherein the modified information pattern contains a string with readable and/or unreadable digits, wherein for each identification and/or authentication request, the string undergoes dynamic changes by modifying one or more of the same or different readable and/or unreadable digits, wherein at least one part of the original pattern remains unchanged.
  13. The method according to anyone of claims 7 to 12, wherein the method further comprises replacing the unique information pattern with the modified information pattern, thereby creating a new unique information pattern.
  14. The method according to claim 7, wherein the readable information pattern is provided on a display or surface, consisting of security elements such as numbers, symbols, letters, crackles and/or dots, and the stored information pattern is replaced with the unique information pattern, when there is a match of the non-modified security elements.
  15. The method according to claim 14, wherein the dots provided on the surface comprise a pigment that changes its colour and/or intensity in response to an inherent or external trigger.
EP13003436.6A 2013-07-08 2013-07-08 Systems and methods for authenticating, identifying or marking objects or individuals using dynamic security features Active EP2824641B1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
EP13003436.6A EP2824641B1 (en) 2013-07-08 2013-07-08 Systems and methods for authenticating, identifying or marking objects or individuals using dynamic security features

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
EP13003436.6A EP2824641B1 (en) 2013-07-08 2013-07-08 Systems and methods for authenticating, identifying or marking objects or individuals using dynamic security features

Publications (2)

Publication Number Publication Date
EP2824641A1 EP2824641A1 (en) 2015-01-14
EP2824641B1 true EP2824641B1 (en) 2016-11-30

Family

ID=48771256

Family Applications (1)

Application Number Title Priority Date Filing Date
EP13003436.6A Active EP2824641B1 (en) 2013-07-08 2013-07-08 Systems and methods for authenticating, identifying or marking objects or individuals using dynamic security features

Country Status (1)

Country Link
EP (1) EP2824641B1 (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP3185221B1 (en) 2015-12-23 2023-06-07 Friedrich Kisters Authentication apparatus and method for optical or acoustic character recognition

Family Cites Families (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE102004045211B4 (en) 2004-09-17 2015-07-09 Ovd Kinegram Ag Security document with electrically controlled display element
DE102004049998A1 (en) 2004-10-14 2006-04-20 Giesecke & Devrient Gmbh Device and method for the visual display of measured values
DE202005005130U1 (en) 2005-03-31 2005-06-02 BIESS Textil-Applikationen GmbH Textile identification arrangement or label for original identification against plagiarism has first pigment layer with at least one type of interference pigment in form of geometric pattern that is used as security characteristic
DE102005030626A1 (en) 2005-06-30 2007-01-04 Bundesdruckerei Gmbh Security document with integrated circuit and display system
JP2010286920A (en) 2009-06-09 2010-12-24 Mitsubishi Electric Corp Biometric authentication apparatus and biometric authentication system
FR2959843B1 (en) * 2010-05-05 2013-01-25 Honnorat Rech S & Services DISCRETE AUTHENTICATION DEVICE.
WO2011154922A2 (en) 2010-06-10 2011-12-15 Downing Elizabeth A Optical-effect-producing medium, use thereof and object having an optically responsive feature produced using said optical-effect-producing medium
US8982424B2 (en) * 2011-02-08 2015-03-17 Videojet Technologies Inc. Method of printing a product code with a modified character

Also Published As

Publication number Publication date
EP2824641A1 (en) 2015-01-14

Similar Documents

Publication Publication Date Title
US10262191B2 (en) System and method for manufacturing and inspecting identification documents
AU2016100419A4 (en) Instrument and document authentication system
US9286461B2 (en) Multiface document
US20210206193A1 (en) Embedded variable line patterns
US8342414B2 (en) Multiface document
AU2016269267B2 (en) Encoding methods and systems
US11037213B2 (en) Embedding security information in an image
EP2062228A1 (en) Visual code transaction verification
EP2824641B1 (en) Systems and methods for authenticating, identifying or marking objects or individuals using dynamic security features
US9033245B2 (en) Device and method for obfuscating visual information
EP3378670A1 (en) Securing credentials with optical security features formed by quasi-random optical characteristics of credential substrates
Wilkins Can biometrics secure manufacturing?
US8931079B2 (en) Security element having an electronic display device for displaying security-relevant information or patterns
Hussain et al. BSC: A Novel Scheme for Providing Security using Biometric Smart Card
JP5618437B1 (en) Personal authentication method
AU2013204335B2 (en) Multiface document
Giri et al. Theoretical analysis of user authentication systems
Jacobs et al. Biometrics and Smart Cards in Identity Management
Lewis Ever had your fingerprints taken? Meeting the challenges of 21st Century access control
Wilson Biometrics: Here’s looking at you…
Mercer et al. Data Object Extensions for Access Control Credentials
US20180293371A1 (en) Method and device for authenticating an object or a person using a security element with a modular structure
KR20220157349A (en) Method of electronic documents authentication and storage
CN114730336A (en) Improved system and method for secure data entry and authentication
CN106452734A (en) Trusted tag generation method based on secure element and trusted tag generation system thereof

Legal Events

Date Code Title Description
17P Request for examination filed

Effective date: 20130708

AK Designated contracting states

Kind code of ref document: A1

Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR

AX Request for extension of the european patent

Extension state: BA ME

PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text: ORIGINAL CODE: 0009012

R17P Request for examination filed (corrected)

Effective date: 20150624

RBV Designated contracting states (corrected)

Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR

17Q First examination report despatched

Effective date: 20160301

GRAP Despatch of communication of intention to grant a patent

Free format text: ORIGINAL CODE: EPIDOSNIGR1

INTG Intention to grant announced

Effective date: 20160620

GRAS Grant fee paid

Free format text: ORIGINAL CODE: EPIDOSNIGR3

GRAA (expected) grant

Free format text: ORIGINAL CODE: 0009210

AK Designated contracting states

Kind code of ref document: B1

Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR

REG Reference to a national code

Ref country code: CH

Ref legal event code: EP

Ref country code: GB

Ref legal event code: FG4D

REG Reference to a national code

Ref country code: AT

Ref legal event code: REF

Ref document number: 850430

Country of ref document: AT

Kind code of ref document: T

Effective date: 20161215

REG Reference to a national code

Ref country code: IE

Ref legal event code: FG4D

REG Reference to a national code

Ref country code: DE

Ref legal event code: R096

Ref document number: 602013014590

Country of ref document: DE

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: LV

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20161130

REG Reference to a national code

Ref country code: CH

Ref legal event code: NV

Representative=s name: PATENTANWAELTE SCHAAD, BALASS, MENZL AND PARTN, CH

REG Reference to a national code

Ref country code: LT

Ref legal event code: MG4D

REG Reference to a national code

Ref country code: NL

Ref legal event code: MP

Effective date: 20161130

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: LT

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20161130

Ref country code: NO

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20170228

Ref country code: SE

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20161130

Ref country code: GR

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20170301

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: RS

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20161130

Ref country code: HR

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20161130

Ref country code: ES

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20161130

Ref country code: PL

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20161130

Ref country code: FI

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20161130

Ref country code: PT

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20170330

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: NL

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20161130

REG Reference to a national code

Ref country code: FR

Ref legal event code: PLFP

Year of fee payment: 5

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: RO

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20161130

Ref country code: SK

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20161130

Ref country code: EE

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20161130

Ref country code: DK

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20161130

Ref country code: CZ

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20161130

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: IT

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20161130

Ref country code: SM

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20161130

Ref country code: BG

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20170228

REG Reference to a national code

Ref country code: DE

Ref legal event code: R097

Ref document number: 602013014590

Country of ref document: DE

PLBE No opposition filed within time limit

Free format text: ORIGINAL CODE: 0009261

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: NO OPPOSITION FILED WITHIN TIME LIMIT

26N No opposition filed

Effective date: 20170831

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: SI

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20161130

REG Reference to a national code

Ref country code: IE

Ref legal event code: MM4A

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: IE

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20170708

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: LU

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20170708

REG Reference to a national code

Ref country code: FR

Ref legal event code: PLFP

Year of fee payment: 6

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: MT

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20170708

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: MC

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20161130

Ref country code: HU

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT; INVALID AB INITIO

Effective date: 20130708

REG Reference to a national code

Ref country code: AT

Ref legal event code: UEP

Ref document number: 850430

Country of ref document: AT

Kind code of ref document: T

Effective date: 20161130

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: CY

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20161130

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: MK

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20161130

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: TR

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20161130

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: AL

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20161130

Ref country code: IS

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20170330

PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code: CH

Payment date: 20230801

Year of fee payment: 11

Ref country code: AT

Payment date: 20230718

Year of fee payment: 11

PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code: DE

Payment date: 20240614

Year of fee payment: 12

PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code: GB

Payment date: 20240723

Year of fee payment: 12

PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code: BE

Payment date: 20240722

Year of fee payment: 12

PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code: FR

Payment date: 20240724

Year of fee payment: 12