EP3269557B1 - Assembly and method for identifying and verifying an object - Google Patents

Assembly and method for identifying and verifying an object Download PDF

Info

Publication number
EP3269557B1
EP3269557B1 EP16179118.1A EP16179118A EP3269557B1 EP 3269557 B1 EP3269557 B1 EP 3269557B1 EP 16179118 A EP16179118 A EP 16179118A EP 3269557 B1 EP3269557 B1 EP 3269557B1
Authority
EP
European Patent Office
Prior art keywords
security element
security
arrangement according
medium
code
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
EP16179118.1A
Other languages
German (de)
French (fr)
Other versions
EP3269557A1 (en
Inventor
Sieglinde Reithmeier
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Niedermeier Klaus
Original Assignee
Niedermeier Klaus
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Niedermeier Klaus filed Critical Niedermeier Klaus
Priority to EP16179118.1A priority Critical patent/EP3269557B1/en
Publication of EP3269557A1 publication Critical patent/EP3269557A1/en
Application granted granted Critical
Publication of EP3269557B1 publication Critical patent/EP3269557B1/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • BPERFORMING OPERATIONS; TRANSPORTING
    • B42BOOKBINDING; ALBUMS; FILES; SPECIAL PRINTED MATTER
    • B42DBOOKS; BOOK COVERS; LOOSE LEAVES; PRINTED MATTER CHARACTERISED BY IDENTIFICATION OR SECURITY FEATURES; PRINTED MATTER OF SPECIAL FORMAT OR STYLE NOT OTHERWISE PROVIDED FOR; DEVICES FOR USE THEREWITH AND NOT OTHERWISE PROVIDED FOR; MOVABLE-STRIP WRITING OR READING APPARATUS
    • B42D25/00Information-bearing cards or sheet-like structures characterised by identification or security features; Manufacture thereof
    • B42D25/30Identification or security features, e.g. for preventing forgery
    • B42D25/305Associated digital information
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B42BOOKBINDING; ALBUMS; FILES; SPECIAL PRINTED MATTER
    • B42DBOOKS; BOOK COVERS; LOOSE LEAVES; PRINTED MATTER CHARACTERISED BY IDENTIFICATION OR SECURITY FEATURES; PRINTED MATTER OF SPECIAL FORMAT OR STYLE NOT OTHERWISE PROVIDED FOR; DEVICES FOR USE THEREWITH AND NOT OTHERWISE PROVIDED FOR; MOVABLE-STRIP WRITING OR READING APPARATUS
    • B42D25/00Information-bearing cards or sheet-like structures characterised by identification or security features; Manufacture thereof
    • B42D25/30Identification or security features, e.g. for preventing forgery
    • B42D25/36Identification or security features, e.g. for preventing forgery comprising special materials

Definitions

  • the present invention relates to an arrangement and method for identifying and verifying an object or a living being.
  • the arrangement comprises a first security element and a second security element, which are arranged directly on the object.
  • AU 488 652 B2 discloses an arrangement according to the preamble of claim 1.
  • the present invention is based on the object to propose an arrangement and a method of the type described above, which allows a forgery-proof identification and verification of an object or a living thing.
  • a first security element with at least one the object or the living being clearly identifiable security code or the like and at least one tamper-indicating second security element Subject or the living being assigned.
  • the second security element has at least one medium or the like for displaying the manipulation or for unambiguous verification and is at least partially integrated into the security code of the first security element.
  • the manipulation may be indicated by a change in the medium, for example by a color change or the like. Alternatively or additionally, a manipulation by an external excitation of the medium can be displayed.
  • a clear identification can be realized by reading out the at least one security code integrated into the second security element, while via the second security element a verification or authentication is achieved by manipulating, if necessary, at the first security element and / or is displayed on the security code and / or on the second security element by the second security element.
  • the second security element is fixedly connected to the object or the living being by means of a self-contained connection or the like, ie undetachably connected.
  • a self-contained connection or the like ie undetachably connected.
  • the arrangement can not be solved and exchanged unnoticed by the object but also not by the security code of the first security element.
  • this may be a completely enclosing connection, but also a partially enclosing connection or a penetrating connection.
  • the second security element is provided for attaching a support member or the like to the article or to the living being.
  • a support member a trailer or the like of any material, such as amber, plastic, metal, glass or the like is provided.
  • the first security element with the security code and at least partially applied the second security element for example by coating or the like.
  • the use of a carrier element or a trailer is useful for objects to which the first security element with the security code and the second security element can not be applied directly.
  • the use of a trailer is also particularly advantageous in living beings, documents or the like.
  • the second security element is embodied as a body having at least one receiving space or the like, in which the at least one manipulation-indicating medium is contained.
  • the body can be designed as a hollow fiber, hollow fiber or the like to form a self-contained compound, for. B. in the form of a closed loop, a hose, a torus or the like to allow the object or the living thing in the simplest way.
  • the quasi a z. B. realize closed connection with the object or the living being.
  • the fibers occur individually or in collections which can be braided, bundled and / or of a hollow structure which, together, or in each case form a receiving space for the medium.
  • the fibers may form at least one channel, lumen or the like.
  • natural fibers such.
  • B. biogenic fibers may be provided, which are made for example of animal and / or vegetable materials.
  • artificially produced fibers of inorganic and / or mineral materials may be used, such.
  • glass fibers mineral fibers or ceramic fibers.
  • fibers made of plastics such.
  • the body can be made up of tubes or tubes with one or more channels (lumens) of the above mentioned. Materials or a mixture of these in different proportions.
  • the filled body or fibers may have the property of reflecting or diffracting light in a proportionate or mixed manner in the (electromagnetic) spectrum from ultraviolet (UV) to visible (VIS) to infrared (IR), to diffract, fluoresce, phosphoresce and absorb alone or in different proportions such that the response pattern is generated under certain energetic conditions.
  • UV ultraviolet
  • VIS visible
  • IR infrared
  • a manipulation on the first security element or on the security code but also on the second security element can be determined by the second security element in that the medium outputs, for example, by excitation a predetermined response pattern, so that thus a check of the first security element with the security code and the second Security elements for integrity.
  • This excitation can be done, for example, energetically.
  • an optical electrical, thermal or similar excitation can be used as an exciting energy pulse, which causes a corresponding response pattern in the medium. Since the response pattern is generated in sections in the security code of the first security element or runs, it is thus determined in the simplest manner, whether a manipulation of the security code of the first security element and thus the object or living things has been made. Since the first security element is connected to the security code via the second security element with the object or the living being, a clear forgery-proof identification and verification is given.
  • the medium of the second security element emerging, for example, from the receiving space destroys the security code of the first security element at least in sections.
  • a first security element z As a first security element z.
  • a hologram a picture film or the like may be provided, which includes all security codes.
  • the security code it is possible for the security code to be embodied as hidden or visible nano-code sticks or elements or the like whose arbitrary or chaotic arrangement is unique and thus permits unambiguous identification. It is also possible that a micro-font and / or a hidden or visible barcode, for example as a dot or bar code, is provided as the security code.
  • the article may be any kind of high quality objects and materials.
  • valuables such as certificates, certificates, expertise for valuable goods can be protected against counterfeiting with the arrangement according to the invention.
  • the described tag or the like can be used as a carrier element which is connected to the object or to the document via a closed connection.
  • a loop-like closed connection for example, as a hollow fiber or the like executed second security element is used to realize a tamper-proof arrangement.
  • the second security element z. B be executed in the form of an earring or a piercing.
  • the object underlying the invention is also achieved by a method for identifying and verifying an object or a living being.
  • a security code of a first security element the arrangement is detected on or on the object on or on the living being and also energetically excited a second security element of the arrangement and generates a predetermined response pattern.
  • the generated response pattern and the recorded security code are compared with data stored in a database for identification and verification.
  • a database for identification and verification.
  • an Internet connection via a mobile telephone or the like can be used to query the database.
  • an optical pulse such as a flash of a mobile phone
  • a camera can be used on the mobile phone, wherein a corresponding application can be used on the mobile phone to automate the query.
  • the proposed method can be used in the above-described arrangement.
  • FIGS. 1 to 5 different views of an inventive arrangement for identifying and verifying various objects 5, 5 A, 5 B, 5 C are exemplified.
  • FIG. 1 a schematic detail view of the proposed arrangement is shown, which represents the exact structure.
  • the arrangement comprises at least a first security element 1 with at least one security code 3 and at least one manipulation of the security code 3 indicating second security element 2, which are an object 5, 5 A, 5 B, 5 C or a living being assigned.
  • the second security element 2 has at least one medium 4 for displaying the manipulation. Furthermore, the second security element 2 is at least partially integrated in the security code 3 of the first security element 1.
  • the second security element 2 is designed as a body having a receiving space 7, the receiving space 7 having at least one solid, liquid or gaseous medium 4 indicating the manipulation.
  • the medium 4 is designed such that an incoming energetic pulse triggers a corresponding response pattern. For example, as an energetic pulse an incident light pulse can be applied to the medium, which generates a predetermined reflection pattern 4 as a response pattern. Further, a color change of the medium 4 may indicate a manipulation without energetic impulse when the body is damaged or destroyed.
  • the body of the second security element 2 is exemplified as a hollow fiber 9 or hollow hose, wherein a plurality of hollow fibers 9 may be provided for receiving the medium 4.
  • the second security element 2 or the hollow fiber 9 is so partially integrated with the security code 3 in the first security element 1, so that a manipulation of the first security element 1 or on the security code 3 and thereby also on the securing object or living being is immediately recognizable because in a manipulation, the second security element 2 or the tube or the information fiber and thereby also the response pattern z.
  • B. as a nano-information object the receiving space 7 is severed or destroyed and consequently the solid, liquid or gaseous medium exits and thus the response pattern 4 and also the security code 3 are interrupted. Therefore, the verification code or security code 3 can not be detected and thus the object can not be confirmed by a database and not be released.
  • Figure 1A shows a cross-sectional view through the body as a hollow fiber 9, in which the receiving space 7 is provided in the interior of the hollow fiber 9.
  • FIG. 1B a further embodiment is shown in which the second security element 2 as a body has a plurality of fibers 10 which together form the receiving space 7 for the medium 4.
  • the receiving space 7 is thus realized by bundling or linking the fibers 10.
  • a stimulating energy pulse e.g. Light
  • electromagnetic waves or photons on a momentum transfer system device
  • the security code 3 for example via the camera of the mobile phone as an inertial device.
  • the mobile phone as a transmission medium can be made an identification query in a corresponding database. If the authentication confirmation is negative, a corresponding message is displayed for the user so that the counterfeit item can be recognized.
  • the first security element 1 is embodied as a hologram, the security code 3 being read out as a hidden or visible microfilter and / or nanocodes and / or as a hidden or visible barcode, such as a dot or bar code, only in signal communication with the security element 2 as original can be.
  • the tubular or tubular hollow fiber is designed as a second security element 2 quasi in the form of a closed loop, so that a self-contained connection with the first security element 1 provided object 5, 5 A, 5 B, 5 C is realized.
  • the hollow fiber 7 of the second security element is attached to a part such as the strap or zipper 8 of the bag, on which a support element for the first security element 1 with the security code 3 and at least partially provided for the second security element 2.
  • a trailer 6 is provided, which serves to receive the first security element 1 with the security code 3 and at least partially the second security element 2 by these are applied to the trailer 6 by gluing, coating or the like.
  • the trailer 6 is firmly connected via the second security element 2 or via the hollow fiber as a self-contained connection with the article 5 or with the bag. By using the trailer 6, it is not necessary to apply the first security element 1 with the security code 3 and the second security element 2 on the surface of the bag.
  • FIG. 3 a further possible embodiment is shown, in which a coin, for example made of precious metal or the like, is provided on which the first security element 1 is applied, wherein the hollow fiber surrounds the coin as a second security element 2 and sections thereof via the security code 3 of the first security element 1 runs.
  • a coin for example made of precious metal or the like
  • FIG. 4 shows the inventive arrangement on a certificate or official document as the subject 5B, wherein a penetrating sleeve is provided on the document through which the hollow fiber extends as a second security element 2 to which the trailer 6 is attached, on which also the first security element 1 with the Security code 3 is applied.
  • FIG. 5 a bottle that may contain wine or spirits as item 5C.
  • the safety fiber is attached as a second security element 2 and extends in sections on the attached to the surface of the bottle first security element 1.
  • the variant can be used with the trailer 6.
  • the arrangement according to the invention realizes a secure, closed connection via the second security element 2 with the respective article 5, 5 A, 5 B, 5 C and, in addition, secures the first security element 1 with the security code 3, for example formed as a hologram, and forms a unit with the first security element 2 quasi.

Description

Die vorliegende Erfindung betrifft eine Anordnung und Verfahren zum Identifizieren und Verifizieren eines Gegenstandes oder eines Lebewesens.The present invention relates to an arrangement and method for identifying and verifying an object or a living being.

Es ist bekannt, dass sich Produkt- und Markenpiraterie oder die bewusste Herstellung eines Objektes oder einer Information zur Täuschung Dritter immer mehr ausweitet. Hierbei werden Produkte, wie zum Beispiel Wertgegenstände, Luxusgüter, Verpackungsinhalte, Labels, Elemente zum Identifizieren von Lebewesen oder auch spezielle Designs gefälscht. Die gefälschten Gegenstände oder angefertigten Dubletten bzw. Nachbildungen bzw. Imitationen sind mittlerweile ohne kosten- und zeitaufwendige Untersuchungen nicht zu erkennen. Es kann auch vorkommen, dass zu einer Fälschung kein Original zu Vergleichszwecken vorhanden ist.It is known that product and brand piracy or the deliberate production of an object or information to deceive third parties is becoming more and more widespread. Here, products such as valuables, luxury goods, packaging contents, labels, elements for identifying living things or even special designs are forged. The counterfeit items or duplicates or reproductions or imitations that have been made can now not be recognized without costly and time-consuming examinations. It can also happen that there is no original for a forgery for comparison purposes.

Demzufolge versuchen Hersteller von Originalgegenständen bestimmte charakteristische Markenzeichen und/oder Zertifizierungsmerkmale an diesen zu platzieren, die es erlauben die originalen Gegenstände zu identifizieren und von den gefälschten Gegenständen zu unterscheiden. Jedoch sind diese Merkmale ohne weiteres fälschbar, so dass auch mit dieser Maßnahme keine eindeutige Identifizierung oder Verifizierung des Gegenstandes möglich ist.As a result, original article manufacturers attempt to place certain distinctive trademarks and / or certification features on them which allow the original items to be identified and distinguished from the counterfeit items. However, these features are easily faked, so that even with this measure no clear identification or verification of the object is possible.

Aus der Druckschrift WO 2005/080088 ist eine Anordnung und ein Verfahren zum Identifizieren eines Gegenstandes bekannt. Die Anordnung umfasst ein erstes Sicherheitselement und ein zweites Sicherheitselement, die direkt auf dem Gegenstand angeordnet sind.From the publication WO 2005/080088 For example, an arrangement and method for identifying an item is known. The arrangement comprises a first security element and a second security element, which are arranged directly on the object.

AU 488 652 B2 offenbart eine Anordnung nach dem Oberbegriff des Anspruchs 1. AU 488 652 B2 discloses an arrangement according to the preamble of claim 1.

Der vorliegenden Erfindung liegt die Aufgabe zu Grunde, eine Anordnung und ein Verfahren der eingangs beschriebenen Gattung vorzuschlagen, die eine fälschungssichere Identifizierung und Verifizierung eines Gegenstandes oder eines Lebewesens ermöglicht.The present invention is based on the object to propose an arrangement and a method of the type described above, which allows a forgery-proof identification and verification of an object or a living thing.

Diese Aufgabe wird erfindungsgemäß durch die Merkmale des Patentanspruches 1 bzw. 13 gelöst, wobei sich vorteilhafte Ausgestaltungen aus den Unteransprüchen und der Beschreibung sowie den Zeichnungen ergeben.This object is achieved by the features of claim 1 and 13, wherein advantageous embodiments of the dependent claims and the description and the drawings.

Somit wird eine Anordnung zum Identifizieren und Verifizieren eines beliebigen Gegenstandes oder eines Lebewesens bzw. eines aeroben Wesens oder dergleichen vorgeschlagen, wobei ein erstes Sicherheitselement mit zumindest einem den Gegenstand oder das Lebewesen eindeutig zu identifizierenden Sicherheitscode oder dergleichen und zumindest ein eine Manipulation anzeigendes zweites Sicherheitselement dem Gegenstand oder dem Lebewesen zugeordnet sind. Das zweite Sicherheitselement weist zum Anzeigen der Manipulation bzw. zum eindeutigen Verifizieren zumindest ein Medium oder dergleichen auf und ist dazu in den Sicherheitscode des ersten Sicherheitselementes zumindest abschnittsweise integriert. Die Manipulation kann durch eine Veränderung an dem Medium angezeigt werden, beispielsweise durch eine Farbveränderung oder dergleichen. Alternativ oder auch zusätzlich kann eine Manipulation durch eine externe Anregung des Mediums angezeigt werden.Thus, an arrangement for identifying and verifying any object or a living or an aerobic being or the like is proposed, wherein a first security element with at least one the object or the living being clearly identifiable security code or the like and at least one tamper-indicating second security element Subject or the living being assigned. The second security element has at least one medium or the like for displaying the manipulation or for unambiguous verification and is at least partially integrated into the security code of the first security element. The manipulation may be indicated by a change in the medium, for example by a color change or the like. Alternatively or additionally, a manipulation by an external excitation of the medium can be displayed.

Demzufolge kann mithilfe des ersten Sicherheitselementes eine eindeutige Identifizierung durch das Auslesen des zumindest einen in das zweite Sicherheitselement integrierten Sicherheitscodes realisiert werden, während über das zweite Sicherheitselement eine Verifizierung bzw. Authentifizierung dadurch erreicht wird, dass eine gegebenenfalls vorgenommene Manipulation an dem ersten Sicherheitselement und/oder an dem Sicherheitscode und/oder an dem zweiten Sicherheitselement durch das zweite Sicherheitselement angezeigt wird.Consequently, by means of the first security element, a clear identification can be realized by reading out the at least one security code integrated into the second security element, while via the second security element a verification or authentication is achieved by manipulating, if necessary, at the first security element and / or is displayed on the security code and / or on the second security element by the second security element.

Das zweite Sicherheitselement ist mit dem Gegenstand oder dem Lebewesen mittels einer in sich geschlossenen Verbindung oder dergleichen fest, d. h. unlösbar verbunden. Somit kann die Anordnung nicht unbemerkt von dem Gegenstand aber auch nicht von dem Sicherheitscode des ersten Sicherheitselements gelöst und ausgetauscht werden. In Abhängigkeit der Art des Gegenstandes kann dies eine vollständig umschließende Verbindung, aber auch eine nur teilweise umschließende Verbindung oder eine durchdringende Verbindung sein.The second security element is fixedly connected to the object or the living being by means of a self-contained connection or the like, ie undetachably connected. Thus, the arrangement can not be solved and exchanged unnoticed by the object but also not by the security code of the first security element. Depending on the nature of the article, this may be a completely enclosing connection, but also a partially enclosing connection or a penetrating connection.

Das zweite Sicherheitselement ist zum Befestigen eines Trägerelements oder dergleichen an dem Gegenstand bzw. an dem Lebewesen vorgesehen. Als Trägerelement ist ein Anhänger oder dergleichen aus beliebigem Material, wie zum Beispiel aus Bernstein, Kunststoff, Metall, Glas oder dergleichen vorgesehen. Auf dem Anhänger sind das erste Sicherheitselement mit dem Sicherheitscode und zumindest abschnittsweise das zweite Sicherheitselement beispielsweise durch Beschichtung oder dergleichen aufgebracht. Die Verwendung eines Trägerelements bzw. eines Anhängers bietet sich bei Gegenständen an, auf die das erste Sicherheitselement mit dem Sicherheitscode und das zweite Sicherheitselement nicht direkt aufgebracht werden können. Darüber hinaus ist die Verwendung eines Anhängers auch bei Lebewesen, Dokumenten oder dergleichen besonders vorteilhaft.The second security element is provided for attaching a support member or the like to the article or to the living being. As a support member, a trailer or the like of any material, such as amber, plastic, metal, glass or the like is provided. On the trailer, the first security element with the security code and at least partially applied the second security element, for example by coating or the like. The use of a carrier element or a trailer is useful for objects to which the first security element with the security code and the second security element can not be applied directly. In addition, the use of a trailer is also particularly advantageous in living beings, documents or the like.

Im Rahmen einer Weiterbildung der Erfindung kann zum Erfassen einer Manipulation vorgesehen sein, dass das zweite Sicherheitselement als ein zumindest einen Aufnahmeraum oder dergleichen aufweisender Körper ausgeführt ist, in dem das zumindest eine die Manipulation anzeigende Medium enthalten ist. Vorzugsweise kann der Körper als Hohlfaser, Hohlfaden oder dergleichen ausgeführt sein, um eine in sich geschlossene Verbindung, z. B. in Form einer geschlossenen Schlaufe, eines Schlauches, eines Torus oder dergleichen, mit dem Gegenstand oder dem Lebewesen auf einfachste Weise zu ermöglichen. Es sind jedoch auch andere einen Aufnahmeraum aufweisende Formgebungen denkbar, die quasi eine z. B. geschlossene Verbindung mit dem Gegenstand oder dem Lebewesen realisieren.Within the scope of a development of the invention, to detect a manipulation, it may be provided that the second security element is embodied as a body having at least one receiving space or the like, in which the at least one manipulation-indicating medium is contained. Preferably, the body can be designed as a hollow fiber, hollow fiber or the like to form a self-contained compound, for. B. in the form of a closed loop, a hose, a torus or the like to allow the object or the living thing in the simplest way. However, there are also other receiving space having a formations conceivable, the quasi a z. B. realize closed connection with the object or the living being.

Bei dem faserförmigen Körper als zweites Sicherheitselement kann vorgesehen sein, dass die Fasern einzeln oder in Ansammlungen vorkommen, welche geflochten, gebündelt und/oder von einem hohlen Aufbau sein können, die quasi zusammen oder auch jeweils einen Aufnahmeraum für das Medium bilden. Die Fasern können zumindest einen Kanal, Lumen oder dergleichen bilden. Als Materialien können Naturfasern, wie z. B. biogene Fasern vorgesehen sein, die beispielsweise aus tierischen und/oder pflanzlichen Materialien hergestellt werden. Es können jedoch auch künstlich hergestellte Fasern aus anorganischen und/oder mineralischen Werkstoffen verwendet werden, wie z. B. Glasfasern, Mineralfasern oder keramische Fasern. Denkbar sind auch Fasern aus Kunststoffen, wie z. B. duroplastische und/oder thermoplastische Kunststoffe und Silikone, gefüllt oder ungefüllt (Reinstoff), transparent, opak oder gefärbt.In the case of the fibrous body as the second security element, it can be provided that the fibers occur individually or in collections which can be braided, bundled and / or of a hollow structure which, together, or in each case form a receiving space for the medium. The fibers may form at least one channel, lumen or the like. As materials natural fibers such. B. biogenic fibers may be provided, which are made for example of animal and / or vegetable materials. However, artificially produced fibers of inorganic and / or mineral materials may be used, such. As glass fibers, mineral fibers or ceramic fibers. Are also conceivable fibers made of plastics, such. B. thermosetting and / or Thermoplastic plastics and silicones, filled or unfilled (pure substance), transparent, opaque or colored.

Demzufolge kann der Körper aus Schläuchen oder Röhren mit einem oder mehreren Kanälen (Lumen) aus den o.g. Materialien oder einer Mischung dieser in verschiedenen Anteilen bestehen.As a result, the body can be made up of tubes or tubes with one or more channels (lumens) of the above mentioned. Materials or a mixture of these in different proportions.

Der befüllte Körper bzw. die befüllten Fasern können die Eigenschaft besitzen Licht anteilig oder gemischt im (elektromagnetischen) Spektrum von Ultraviolett (UV) über VIS (sichtbares Licht) bis hin zu Infrarotem Licht (IR) zu reflektieren, zu beugen, fluoreszieren, phosphoreszieren und absorbieren alleine oder in verschiedenen Anteilen derart, dass unter bestimmten energetischen Bedingungen das Antwortmuster erzeugt wird.The filled body or fibers may have the property of reflecting or diffracting light in a proportionate or mixed manner in the (electromagnetic) spectrum from ultraviolet (UV) to visible (VIS) to infrared (IR), to diffract, fluoresce, phosphoresce and absorb alone or in different proportions such that the response pattern is generated under certain energetic conditions.

Eine Manipulation an dem ersten Sicherheitselement bzw. an dem Sicherheitscode aber auch an dem zweiten Sicherheitselement kann durch das zweite Sicherheitselement dadurch festgestellt werden, dass das Medium beispielsweise durch Anregung ein vorbestimmtes Antwortmuster ausgibt, sodass damit eine Überprüfung des ersten Sicherheitselements mit dem Sicherheitscode und des zweiten Sicherheitselements auf Unversehrtheit ermöglicht wird. Diese Anregung kann beispielsweise energetisch erfolgen. Hierzu kann beispielsweise eine optische elektrische, thermische oder dergleichen Anregung als anregender Energieimpuls verwendet werden, der ein entsprechendes Antwortmuster bei dem Medium bewirkt. Da das Antwortmuster abschnittsweise auch im Bereich des Sicherheitscodes des ersten Sicherheitselements erzeugt wird bzw. verläuft, wird somit auf einfachste Weise festgestellt, ob eine Manipulation an dem Sicherheitscode des ersten Sicherheitselements und damit an dem Gegenstand bzw. Lebewesen vorgenommen worden ist. Da das erste Sicherheitselement mit dem Sicherheitscode über das zweite Sicherheitselement mit dem Gegenstand bzw. dem Lebewesen verbunden ist, ist eine eindeutige fälschungssichere Identifizierung und Verifizierung gegeben.A manipulation on the first security element or on the security code but also on the second security element can be determined by the second security element in that the medium outputs, for example, by excitation a predetermined response pattern, so that thus a check of the first security element with the security code and the second Security elements for integrity. This excitation can be done, for example, energetically. For this purpose, for example, an optical electrical, thermal or similar excitation can be used as an exciting energy pulse, which causes a corresponding response pattern in the medium. Since the response pattern is generated in sections in the security code of the first security element or runs, it is thus determined in the simplest manner, whether a manipulation of the security code of the first security element and thus the object or living things has been made. Since the first security element is connected to the security code via the second security element with the object or the living being, a clear forgery-proof identification and verification is given.

Besonders vorteilhaft ist es, wenn bei einer Manipulation das zum Beispiel aus dem Aufnahmeraum austretende Medium des zweiten Sicherheitselements den Sicherheitscode des ersten Sicherheitselements zumindest abschnittsweise zerstört.It is particularly advantageous if, during a manipulation, the medium of the second security element emerging, for example, from the receiving space destroys the security code of the first security element at least in sections.

Als erstes Sicherheitselement kann z. B. ein Hologramm, eine Bildfolie oder dergleichen vorgesehen sein, welche alle Sicherheitscodes umfasst. Hierbei ist es möglich, dass der Sicherheitscode als versteckte oder sichtbare Nanocodestäbchen bzw. -elemente oder dergleichen ausgeführt ist, deren willkürliche bzw. chaotische Anordnung einmalig ist und somit eine eindeutige Identifizierung ermöglicht. Es ist auch möglich, dass als Sicherheitscode eine Mikroschrift und/oder ein versteckter oder sichtbarer Barcode, zum Beispiel als Punkt- oder Strichcode vorgesehen ist.As a first security element z. As a hologram, a picture film or the like may be provided, which includes all security codes. In this case, it is possible for the security code to be embodied as hidden or visible nano-code sticks or elements or the like whose arbitrary or chaotic arrangement is unique and thus permits unambiguous identification. It is also possible that a micro-font and / or a hidden or visible barcode, for example as a dot or bar code, is provided as the security code.

Als Gegenstand kann jede Art von hochwertigen Gegenständen und Materialien vorgesehen sein. Beispielsweise können Wertgegenstände, wie Zertifikate, Urkunden, Expertisen für wertvolle Güter mit der erfindungsgemäßen Anordnung fälschungssicher geschützt werden. Wenn das erste Sicherheitselement und das zweite Sicherheitselement beispielsweise bei Zertifikaten oder Urkunden nicht direkt auf diese aufgebracht werden sollen, kann beispielsweise der beschriebene Anhänger oder dergleichen als Trägerelement verwendet werden, der über eine geschlossene Verbindung mit dem Gegenstand bzw. mit der Urkunde verbunden ist. Als schlaufenartig geschlossene Verbindung wird das beispielsweise als Hohlfaser oder dergleichen ausgeführte zweite Sicherheitselement verwendet, um eine fälschungssichere Anordnung zu realisieren.The article may be any kind of high quality objects and materials. For example, valuables such as certificates, certificates, expertise for valuable goods can be protected against counterfeiting with the arrangement according to the invention. For example, if the first security element and the second security element are not to be applied directly to certificates or certificates, the described tag or the like can be used as a carrier element which is connected to the object or to the document via a closed connection. As a loop-like closed connection, for example, as a hollow fiber or the like executed second security element is used to realize a tamper-proof arrangement.

Zudem können als Gegenstände auch Antiquitäten, Kunstgegenstände, Fahrzeuge, Porzellan, Elektrogeräte, Computer, Elektronik, Schmuck, Münzen, Spirituosen, Weinflaschen, Luxustaschen, Lederwaren, alle Arten von Verpackungsmaterialien aber auch Bekleidungsstücke sowie organische Materialien und Gegenstände oder dergleichen mit der vorgeschlagenen Anordnung versehen werden. Als Lebewesen können beispielsweise menschliche oder tierische Patienten mit der Anordnung zur eindeutigen Identifizierung und Verifizieren versehen werden. Als Verbindung kann das zweite Sicherheitselement z. B. in Form eines Ohrringes oder eines Piercings ausgeführt sein.In addition, as items and antiques, works of art, vehicles, porcelain, electrical appliances, computers, electronics, jewelry, coins, spirits, wine bottles, luxury bags, leather goods, all kinds of packaging materials but also clothing and organic materials and objects or the like provided with the proposed arrangement become. As living beings, for example, human or animal patients can be provided with the arrangement for unambiguous identification and verification. As a connection, the second security element z. B. be executed in the form of an earring or a piercing.

Die der Erfindung zugrunde liegende Aufgabe wird auch durch ein Verfahren zum Identifizieren und Verifizieren eines Gegenstandes oder eines Lebewesens gelöst. Bei dem vorgeschlagenen Verfahren wird ein Sicherheitscode eines ersten Sicherheitselements der Anordnung auf bzw. an dem Gegenstand auf bzw. an dem Lebewesen erfasst und zudem ein zweites Sicherheitselement der Anordnung energetisch angeregt und ein vorbestimmtes Antwortmuster erzeugt. Das erzeugte Antwortmuster und der erfasste Sicherheitscode werden mit in einer Datenbank hinterlegten Daten zur Identifizierung und Verifizierung abgeglichen. Beispielsweise kann zum Abfragen der Datenbank eine Internetverbindung über ein Mobiltelefon oder dergleichen genutzt werden. Zum Erzeugen des Antwortmusters kann ein optischer Impuls, wie zum Beispiel ein Blitz eines Mobiltelefons, und zum Erfassen des Antwortmusters und des Sicherheitscodes kann eine Kamera an dem Mobiltelefon eingesetzt werden, wobei zur Automatisierung der Abfrage eine entsprechende Applikation auf dem Mobiltelefon verwendet werden kann. Vorzugsweise kann das vorgeschlagene Verfahren bei der vorbeschriebenen Anordnung eingesetzt werden.The object underlying the invention is also achieved by a method for identifying and verifying an object or a living being. In the proposed method, a security code of a first security element the arrangement is detected on or on the object on or on the living being and also energetically excited a second security element of the arrangement and generates a predetermined response pattern. The generated response pattern and the recorded security code are compared with data stored in a database for identification and verification. For example, an Internet connection via a mobile telephone or the like can be used to query the database. To generate the response pattern, an optical pulse, such as a flash of a mobile phone, and for detecting the response pattern and the security code, a camera can be used on the mobile phone, wherein a corresponding application can be used on the mobile phone to automate the query. Preferably, the proposed method can be used in the above-described arrangement.

Die vorliegende Erfindung wird anhand der Zeichnungen weiter erläutert. Es zeigen:

  • Figur 1 eine schematische Detailansicht einer erfindungsgemäßen Anordnung zum Verbinden mit einem nicht weiter dargestellten Gegenstand oder Lebewesen;
  • Figur 1A einen Querschnitt durch einen Körper als Hohlfaser der Anordnung gemäß Figur 1;
  • Figur 1B einen Querschnitt durch eine alternative Ausführung des Körpers durch mehrere Fasern;
  • Figur 2 eine schematische Ansicht der Anordnung mit einem Anhänger als Trägerelement an einer Tasche als Gegenstand;
  • Figur 3 eine schematische Ansicht der Anordnung an einer Münze als Gegenstand;
  • Figur 4 eine schematische Ansicht der Anordnung mit dem Anhänger als Trägerelement an einer Urkunde oder einem Zertifikat als Gegenstand; und
  • Figur 5 eine schematische Ansicht der Anordnung an einer Flasche als Gegenstand.
The present invention will be further explained with reference to the drawings. Show it:
  • FIG. 1 a schematic detail view of an arrangement according to the invention for connecting to an object or living beings not shown;
  • Figure 1A a cross section through a body as a hollow fiber of the arrangement according to FIG. 1 ;
  • FIG. 1B a cross-section through an alternative embodiment of the body by a plurality of fibers;
  • FIG. 2 a schematic view of the arrangement with a trailer as a support element on a bag as an object;
  • FIG. 3 a schematic view of the arrangement of a coin as an object;
  • FIG. 4 a schematic view of the arrangement with the trailer as a support element on a certificate or certificate as an object; and
  • FIG. 5 a schematic view of the arrangement of a bottle as an object.

In den Figuren 1 bis 5 sind verschiedene Ansichten einer erfindungsgemäßen Anordnung zum Identifizieren und Verifizieren anhand verschiedener Gegenstände 5, 5 A, 5 B, 5 C beispielhaft dargestellt.In the FIGS. 1 to 5 different views of an inventive arrangement for identifying and verifying various objects 5, 5 A, 5 B, 5 C are exemplified.

In Figur 1 ist eine schematische Detailansicht der vorgeschlagenen Anordnung gezeigt, die den genauen Aufbau darstellt. Die Anordnung umfasst zumindest ein erstes Sicherheitselement 1 mit zumindest einem Sicherheitscode 3 und zumindest ein eine Manipulation an dem Sicherheitscode 3 anzeigendes zweites Sicherheitselement 2, welche einen Gegenstand 5, 5 A, 5 B, 5 C oder einem Lebewesen zuordenbar sind. Das zweite Sicherheitselement 2 weist zumindest ein Medium 4 zum Anzeigen der Manipulation auf. Ferner ist das zweite Sicherheitselement 2 in den Sicherheitscode 3 des ersten Sicherheitselementes 1 zumindest abschnittsweise integriert.In FIG. 1 a schematic detail view of the proposed arrangement is shown, which represents the exact structure. The arrangement comprises at least a first security element 1 with at least one security code 3 and at least one manipulation of the security code 3 indicating second security element 2, which are an object 5, 5 A, 5 B, 5 C or a living being assigned. The second security element 2 has at least one medium 4 for displaying the manipulation. Furthermore, the second security element 2 is at least partially integrated in the security code 3 of the first security element 1.

Wie insbesondere aus Figur 1 ersichtlich ist, ist das zweite Sicherheitselement 2 als ein einen Aufnahmeraum 7 aufweisender Körper ausgeführt, wobei der Aufnahmeraum 7 zumindest ein die Manipulation anzeigendes festes, flüssiges oder gasförmiges Medium 4 aufweist. Das Medium 4 ist derart ausgeführt, dass ein eingehender energetischer Impuls ein entsprechendes Antwortmuster auslöst. Beispielsweise kann als energetischer Impuls ein einfallender Lichtimpuls auf das Medium eingesetzt werden, welcher als Antwortmuster ein vorbestimmtes Reflexionsmuster 4 erzeugt. Ferner kann eine Farbveränderung des Mediums 4 eine Manipulation ohne energetischen Impuls anzeigen, wenn der Körper beschädigt oder zerstört wird.As in particular from FIG. 1 it can be seen, the second security element 2 is designed as a body having a receiving space 7, the receiving space 7 having at least one solid, liquid or gaseous medium 4 indicating the manipulation. The medium 4 is designed such that an incoming energetic pulse triggers a corresponding response pattern. For example, as an energetic pulse an incident light pulse can be applied to the medium, which generates a predetermined reflection pattern 4 as a response pattern. Further, a color change of the medium 4 may indicate a manipulation without energetic impulse when the body is damaged or destroyed.

In Figur 1 ist der Körper des zweiten Sicherheitselements 2 beispielhaft als Hohlfaser 9 bzw. Hohlschlauch ausgeführt, wobei auch mehrere Hohlfasern 9 zum Aufnehmen des Mediums 4 vorgesehen sein können. Das zweite Sicherheitselement 2 bzw. die Hohlfaser 9 ist derart abschnittsweise mit dem Sicherheitscode 3 in das erste Sicherheitselement 1 integriert, so dass eine Manipulation an dem ersten Sicherheitselement 1 bzw. an dem Sicherheitscode 3 und dadurch auch an dem zu sichernden Gegenstand bzw. Lebewesen sofort erkennbar ist, da bei einer Manipulation das zweite Sicherheitselement 2 bzw. der Schlauch bzw. die Informationsfaser und dadurch auch das Antwortmuster z. B. als Nano-Informationsobjekt den Aufnahmeraum 7 durchtrennt bzw. zerstört wird und demzufolge das feste, flüssige oder gasförmige Medium austritt und somit das Antwortmuster 4 und zudem der Sicherheitscode 3 unterbrochen werden. Daher kann der Verifizierungscode bzw. Sicherheitscode 3 nicht erfasst werden und der Gegenstand somit von einer Datenbank nicht bestätigt und nicht freigegeben werden.In FIG. 1 the body of the second security element 2 is exemplified as a hollow fiber 9 or hollow hose, wherein a plurality of hollow fibers 9 may be provided for receiving the medium 4. The second security element 2 or the hollow fiber 9 is so partially integrated with the security code 3 in the first security element 1, so that a manipulation of the first security element 1 or on the security code 3 and thereby also on the securing object or living being is immediately recognizable because in a manipulation, the second security element 2 or the tube or the information fiber and thereby also the response pattern z. B. as a nano-information object the receiving space 7 is severed or destroyed and consequently the solid, liquid or gaseous medium exits and thus the response pattern 4 and also the security code 3 are interrupted. Therefore, the verification code or security code 3 can not be detected and thus the object can not be confirmed by a database and not be released.

Figur 1A zeigt eine quergeschnittene Ansicht durch den Körper als Hohlfaser 9, bei dem der Aufnahmeraum 7 im Inneren der Hohlfaser 9 vorgesehen ist. Figure 1A shows a cross-sectional view through the body as a hollow fiber 9, in which the receiving space 7 is provided in the interior of the hollow fiber 9.

In Figur 1B ist eine weitere Ausführung gezeigt, bei der das zweite Sicherheitselement 2 als Körper mehrere Fasern 10 aufweist, die gemeinsam den Aufnahmeraum 7 für das Medium 4 bilden. Der Aufnahmeraum 7 wird somit durch Bündelung oder Verknüpfung der Fasern 10 realisiert.In FIG. 1B a further embodiment is shown in which the second security element 2 as a body has a plurality of fibers 10 which together form the receiving space 7 for the medium 4. The receiving space 7 is thus realized by bundling or linking the fibers 10.

Beispielsweise kann das Erzeugen des holistischen Reflexionsflusses oder - musters als Antwortmuster über ein Inertialsystem mit einem Blitz oder eine Lampe durch einen anregenden Energieimpuls z.B. Licht, elektromagnetische Wellen oder Photonen an einem Impulsübertragungssystemgerät, wie z.B. einem Mobiltelefon, Scanner oder dergleichen Lesegerät erfolgen und anschließend können das Reflexionsmuster mit dem Sicherheitscode 3 zum Beispiel über die Kamera des Mobiltelefons als Inertialgerät erfasst werden. Über die Internetverbindung zum Beispiel des Mobiltelefons als Übertragungsmedium kann eine Identifizierungsabfrage in einer entsprechenden Datenbank erfolgen. Bei negativer Authentifizierungsrückbestätigung wird eine entsprechende Meldung für den Nutzer angezeigt, so dass der gefälschte Gegenstand erkannt werden kann.For example, generating the holistic reflection flux or pattern as a response pattern via an inertial system with a flash or a lamp through a stimulating energy pulse, e.g. Light, electromagnetic waves or photons on a momentum transfer system device, such as e.g. a mobile phone, scanner or similar reading device and then the reflection pattern can be detected with the security code 3, for example via the camera of the mobile phone as an inertial device. About the Internet connection, for example, the mobile phone as a transmission medium can be made an identification query in a corresponding database. If the authentication confirmation is negative, a corresponding message is displayed for the user so that the counterfeit item can be recognized.

Neben der erfindungsgemäßen Anordnung wird auch das vorbeschriebene Verfahren zum Identifizieren und Verifizieren jedes materiellen Gegenstandes 5, 5 A, 5 B, 5 C, wie z.B. eines organischen Elements oder eines Lebewesens unabhängig von der vorgeschlagenen Anordnung beansprucht.In addition to the arrangement according to the invention, the method described above for identifying and verifying any material object 5, 5 A, 5 B, 5 C, such as an organic element or a living being is claimed regardless of the proposed arrangement.

Das erste Sicherheitselement 1 ist als Hologramm ausgeführt, wobei der Sicherheitscode 3 als versteckte oder sichtbare Mikroschrift und/oder Nanocodes und/oder als versteckter oder sichtbarer Barcode, wie zum Beispiel einem Punkt- oder Strichcode, nur in Signalverbindung mit dem Sicherheitselement 2 als Original ausgelesen werden kann.The first security element 1 is embodied as a hologram, the security code 3 being read out as a hidden or visible microfilter and / or nanocodes and / or as a hidden or visible barcode, such as a dot or bar code, only in signal communication with the security element 2 as original can be.

Wie insbesondere aus den Figuren 2 bis 5 ersichtlich ist, ist die rohr- oder schlauchförmige Hohlfaser als zweites Sicherheitselement 2 quasi in Form einer geschlossenen Schlaufe ausgeführt, so dass eine in sich geschlossene Verbindung mit dem dem ersten Sicherheitselement 1 versehenen Gegenstand 5, 5 A, 5 B, 5 C realisiert wird.As in particular from the FIGS. 2 to 5 it can be seen, the tubular or tubular hollow fiber is designed as a second security element 2 quasi in the form of a closed loop, so that a self-contained connection with the first security element 1 provided object 5, 5 A, 5 B, 5 C is realized.

In Figur 2 ist die erfindungsgemäße Anordnung an einem als Tasche ausgeführten Gegenstand 5 befestigt. Hierzu ist die Hohlfaser 7 des zweiten Sicherheitselements an einem Teil wie z.B. dem Trageriemen oder Reißverschluss 8 der Tasche befestigt, an dem ein Trägerelement für das erste Sicherheitselement 1 mit dem Sicherheitscode 3 und zumindest abschnittsweise für das zweite Sicherheitselement 2 vorgesehen ist. Als Trägerelement ist ein Anhänger 6 vorgesehen, welcher dazu dient das erste Sicherheitselement 1 mit dem Sicherheitscode 3 und zumindest abschnittsweise das zweite Sicherheitselement 2 aufzunehmen, indem diese auf den Anhänger 6 durch Aufkleben, Beschichten oder dergleichen aufgebracht sind. Der Anhänger 6 ist über das zweite Sicherheitselement 2 bzw. über die Hohlfaser als in sich geschlossene Verbindung mit dem Gegenstand 5 bzw. mit der Tasche fest verbunden. Durch die Verwendung des Anhängers 6 ist es nicht erforderlich das erste Sicherheitselement 1 mit dem Sicherheitscode 3 und das zweite Sicherheitselement 2 auf die Oberfläche der Tasche aufzubringen.In FIG. 2 If the arrangement according to the invention is attached to an object 5 designed as a pocket. For this purpose, the hollow fiber 7 of the second security element is attached to a part such as the strap or zipper 8 of the bag, on which a support element for the first security element 1 with the security code 3 and at least partially provided for the second security element 2. As a support member, a trailer 6 is provided, which serves to receive the first security element 1 with the security code 3 and at least partially the second security element 2 by these are applied to the trailer 6 by gluing, coating or the like. The trailer 6 is firmly connected via the second security element 2 or via the hollow fiber as a self-contained connection with the article 5 or with the bag. By using the trailer 6, it is not necessary to apply the first security element 1 with the security code 3 and the second security element 2 on the surface of the bag.

In Figur 3 ist eine weitere mögliche Ausführung dargestellt, bei der als Gegenstand 5A eine Münze, zum Beispiel aus Edelmetall oder dergleichen, vorgesehen ist, auf der das erste Sicherheitselement 1 aufgebracht ist, wobei die Hohlfaser als zweites Sicherheitselement 2 die Münze umgibt und abschnittsweise über den Sicherheitscode 3 des ersten Sicherheitselements 1 verläuft.In FIG. 3 a further possible embodiment is shown, in which a coin, for example made of precious metal or the like, is provided on which the first security element 1 is applied, wherein the hollow fiber surrounds the coin as a second security element 2 and sections thereof via the security code 3 of the first security element 1 runs.

Figur 4 zeigt die erfindungsgemäße Anordnung an einem Zertifikat oder offiziellem Dokument als Gegenstand 5B, wobei eine Durchdringungshülse an dem Schriftstück vorgesehen ist, durch die die Hohlfaser als zweites Sicherheitselement 2 verläuft, an dem der Anhänger 6 befestigt ist, auf dem auch das erste Sicherheitselement 1 mit dem Sicherheitscode 3 aufgebracht ist. FIG. 4 shows the inventive arrangement on a certificate or official document as the subject 5B, wherein a penetrating sleeve is provided on the document through which the hollow fiber extends as a second security element 2 to which the trailer 6 is attached, on which also the first security element 1 with the Security code 3 is applied.

Schließlich zeigt Figur 5 eine Flasche, in der Wein oder Spirituosen enthalten sein kann, als Gegenstand 5C. Auf der Oberfläche der Flasche ist die Sicherheitsfaser als zweites Sicherheitselement 2 befestigt und verläuft abschnittsweise über das auf der Oberfläche der Flasche befestigte erste Sicherheitselement 1. Wahlweise kann auch die Variante mit dem Anhänger 6 verwendet werden.Finally shows FIG. 5 a bottle that may contain wine or spirits as item 5C. On the surface of the bottle, the safety fiber is attached as a second security element 2 and extends in sections on the attached to the surface of the bottle first security element 1. Alternatively, the variant can be used with the trailer 6.

Zusammenfassend kann festgestellt werden, dass die erfindungsgemäße Anordnung eine sichere geschlossene Verbindung über das zweite Sicherheitselement 2 mit dem jeweiligen Gegenstand 5, 5 A, 5 B, 5 C realisiert und zudem das zum Beispiel als Hologramm ausgebildete erste Sicherheitselement 1 mit dem Sicherheitscode 3 sichert und mit dem ersten Sicherheitselement 2 quasi eine Einheit bildet.In summary, it can be stated that the arrangement according to the invention realizes a secure, closed connection via the second security element 2 with the respective article 5, 5 A, 5 B, 5 C and, in addition, secures the first security element 1 with the security code 3, for example formed as a hologram, and forms a unit with the first security element 2 quasi.

BezuqszeichenREFERENCE CHARACTERS

11
erstes Sicherheitselementfirst security element
22
zweites Sicherheitselementsecond security element
33
Sicherheitscodesecurity code
44
Mediummedium
5,5A,5B,5C5.5A, 5B, 5C
Gegenstandobject
66
Anhänger als TrägerelementPendant as a carrier element
77
Aufnahmeraumaccommodation space
88th
Trageriemenstrap
99
Hohlfaserhollow fiber
1010
Faserfiber

Claims (13)

  1. An arrangement for identifying and verifying an article (5, 5A, 5B, 5C) or a living organism, wherein at least one first security element (1) with at least one security code (3) and at least one manipulation-indicating second security element (2) are associated with the article (5, 5A, 5B, 5C) or the living organism, wherein the second security element (2) for indicating the manipulation has at least one medium (4) and wherein a carrier element (6) is provided on which the first security element (1) with the security code (3) and the second security element (2) at least in sections are attached and that the carrier element (6) is firmly connected via the second security element (2) to the article (5, 5A, 5B, 5C) or to the living organism as a self-contained connection, characterized in that the carrier element is designed as a pendant, and that the second security element (2) is integrated at least in sections in the security code (3) of the first security element (1).
  2. The arrangement according to claim 1, characterized in that the second security element (2) is designed as a body having at least one receiving space (7) for the medium (4).
  3. The arrangement according to any one of the preceding claims, characterized in that the second security element (2) as a body is inextricably linked in the form of the closed connection with the article (5, 5A, 5B, 5C) or the living organism.
  4. The arrangement according to any one of the preceding claims, characterized in that the second security element (2) as a body has at least one hollow fiber (9) as a receiving space (7) for the medium (4).
  5. The arrangement according to any one of the preceding claims, characterized in that the second security element (2) as a body has at least one fiber (10) which forms a receiving space (7) for the medium (4).
  6. The arrangement according to any one of the preceding claims, characterized in that the medium (4) is designed such that an exciting energy pulse generates a predetermined response pattern.
  7. The arrangement according to claim 6, characterized in that an optical pulse is provided as an energy pulse, which generates a reflection pattern as a response pattern.
  8. The arrangement according to any one of the preceding claims, characterized in that a solid, a liquid or a gas is provided as the medium (4).
  9. The arrangement according to any one of the preceding claims, characterized in that during a manipulation, the medium (4) of the second security element (2) destroys the security code (3) of the first security element (1) at least in sections.
  10. The arrangement according to any one of the preceding claims, characterized in that the medium (4) of the second security element (2) indicates a manipulation by a color change.
  11. The arrangement according to any one of the preceding claims, characterized in that the first security element (1) is designed as a hologram.
  12. The arrangement according to any one of the preceding claims, characterized in that the security code (3) of the first security element (1) is designed as hidden or visible nanocode elements and/or as a hidden or visible barcode.
  13. A method of identifying and verifying an article or a living organism, characterized in that at least one security code (3) of a first security element (1) is detected on a carrier element (6) which is coupled to the article (5, 5A, 5B, 5C) or to the living organism via a second security element (2) as a pendant and that the second security element (2) which is arranged at least in sections on the pendant, is energetically excited and a predetermined response pattern is generated, the generated response pattern and the detected security code being compared with data stored in a database for identification and verification.
EP16179118.1A 2016-07-12 2016-07-12 Assembly and method for identifying and verifying an object Active EP3269557B1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
EP16179118.1A EP3269557B1 (en) 2016-07-12 2016-07-12 Assembly and method for identifying and verifying an object

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
EP16179118.1A EP3269557B1 (en) 2016-07-12 2016-07-12 Assembly and method for identifying and verifying an object

Publications (2)

Publication Number Publication Date
EP3269557A1 EP3269557A1 (en) 2018-01-17
EP3269557B1 true EP3269557B1 (en) 2019-09-11

Family

ID=56888899

Family Applications (1)

Application Number Title Priority Date Filing Date
EP16179118.1A Active EP3269557B1 (en) 2016-07-12 2016-07-12 Assembly and method for identifying and verifying an object

Country Status (1)

Country Link
EP (1) EP3269557B1 (en)

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
AU488652B2 (en) * 1973-09-26 1976-04-01 Commonwealth Scientific And Industrial Research Organisation Improvements in or relating to security tokens
GB0403569D0 (en) * 2004-02-18 2004-03-24 Tullis Russell Papermakers Ltd Apparatus and method for identifying an object having randomly distributed identification elements
US7497379B2 (en) * 2004-02-27 2009-03-03 Microsoft Corporation Counterfeit and tamper resistant labels with randomly occurring features
JP4900790B2 (en) * 2006-09-01 2012-03-21 日本発條株式会社 Identification medium, article, identification device, and identification medium identification method
DE102012201016A1 (en) * 2012-01-24 2013-07-25 Bundesdruckerei Gmbh Document-based key
DE102014207323B4 (en) * 2014-04-16 2018-08-16 Koenig & Bauer Ag Method for identifying an object

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
None *

Also Published As

Publication number Publication date
EP3269557A1 (en) 2018-01-17

Similar Documents

Publication Publication Date Title
DE69819243T2 (en) Process for preventing counterfeiting on manufactured articles
DE102008034268B4 (en) Multi-layer security seal and the use of the multi-layer security seal
EP2433239A1 (en) Unique identifier, method for providing said unique identifier and use of said unique identifier
DE10008851A1 (en) Manufacturing laser-writeable data media involves applying transparent, optically variable layer then producing marking through optically variable layer by action of laser beam
EP3671674B1 (en) Valuable item storage object
WO2009130009A2 (en) Method for producing a security feature on a flat substrate
EP3760451A1 (en) Security insert for an identification document and method for manufacturing a security insert for an identification document
EP2259930A2 (en) Security element
DE10204870A1 (en) Method for preventing counterfeiting of a valuable medium, e.g. banknote, passport, or chip card, whereby a random pattern is applied to the surface of the medium and parameters of the pattern then displayed in an attached code
CN107316075A (en) Jewelry identity reviews the integral multidimensional binding method for anti-counterfeit of material evidence and external member
WO2001039108A2 (en) System for individualizing an article
DE102006019557B4 (en) Packaging Unit
DE102015102731A1 (en) Multilayer body and security document
EP3269557B1 (en) Assembly and method for identifying and verifying an object
WO2017029247A1 (en) Valuable object and system for identifying and verifying a valuable object
DE102018207251A1 (en) Method for producing a security element with two security features and use of the method
DE102017110892A1 (en) Method for authenticating an item, in particular a security item, and security item
AT17151U1 (en) Security feature with a marking section and a code section
EP1456814B1 (en) Planar sheet material with an activating coating
DE102007000881A1 (en) Document with an integrated display device, method for producing a document and a reader
DE202005011521U1 (en) Security system for book type document especially a passport has security markings applied to each page
EP2849121B1 (en) Package marking and method for marking a package and verification of a packaged product
EP2920001B1 (en) Set of a plurality of value and/or security products and method for producing a security feature
DE202006006773U1 (en) Method for applying security codes to packaged items has two separate code streams with each protected by removable covers
DE2852661A1 (en) Security plate - comprising laminate with insert to prevent tampering with displayed information

Legal Events

Date Code Title Description
PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text: ORIGINAL CODE: 0009012

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: THE APPLICATION HAS BEEN PUBLISHED

AK Designated contracting states

Kind code of ref document: A1

Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR

AX Request for extension of the european patent

Extension state: BA ME

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: REQUEST FOR EXAMINATION WAS MADE

17P Request for examination filed

Effective date: 20180711

RBV Designated contracting states (corrected)

Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: EXAMINATION IS IN PROGRESS

17Q First examination report despatched

Effective date: 20181016

GRAP Despatch of communication of intention to grant a patent

Free format text: ORIGINAL CODE: EPIDOSNIGR1

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: GRANT OF PATENT IS INTENDED

INTG Intention to grant announced

Effective date: 20190520

GRAS Grant fee paid

Free format text: ORIGINAL CODE: EPIDOSNIGR3

GRAA (expected) grant

Free format text: ORIGINAL CODE: 0009210

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: THE PATENT HAS BEEN GRANTED

AK Designated contracting states

Kind code of ref document: B1

Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR

REG Reference to a national code

Ref country code: GB

Ref legal event code: FG4D

Free format text: NOT ENGLISH

REG Reference to a national code

Ref country code: CH

Ref legal event code: EP

REG Reference to a national code

Ref country code: AT

Ref legal event code: REF

Ref document number: 1177947

Country of ref document: AT

Kind code of ref document: T

Effective date: 20190915

REG Reference to a national code

Ref country code: DE

Ref legal event code: R096

Ref document number: 502016006528

Country of ref document: DE

Ref country code: IE

Ref legal event code: FG4D

Free format text: LANGUAGE OF EP DOCUMENT: GERMAN

REG Reference to a national code

Ref country code: NL

Ref legal event code: FP

REG Reference to a national code

Ref country code: LT

Ref legal event code: MG4D

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: FI

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20190911

Ref country code: SE

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20190911

Ref country code: HR

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20190911

Ref country code: LT

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20190911

Ref country code: NO

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20191211

Ref country code: BG

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20191211

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: ES

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20190911

Ref country code: AL

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20190911

Ref country code: RS

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20190911

Ref country code: LV

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20190911

Ref country code: GR

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20191212

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: RO

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20190911

Ref country code: PT

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20200113

Ref country code: PL

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20190911

Ref country code: EE

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20190911

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: IS

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20200224

Ref country code: CZ

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20190911

Ref country code: SM

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20190911

Ref country code: SK

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20190911

REG Reference to a national code

Ref country code: DE

Ref legal event code: R097

Ref document number: 502016006528

Country of ref document: DE

PLBE No opposition filed within time limit

Free format text: ORIGINAL CODE: 0009261

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: NO OPPOSITION FILED WITHIN TIME LIMIT

PG2D Information on lapse in contracting state deleted

Ref country code: IS

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: DK

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20190911

Ref country code: IS

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20200112

26N No opposition filed

Effective date: 20200615

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: SI

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20190911

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: MC

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20190911

REG Reference to a national code

Ref country code: BE

Ref legal event code: MM

Effective date: 20200731

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: FR

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20200731

Ref country code: LU

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20200712

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: BE

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20200731

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: IE

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20200712

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: TR

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20190911

Ref country code: MT

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20190911

Ref country code: CY

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20190911

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: MK

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20190911

PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code: NL

Payment date: 20230608

Year of fee payment: 8

PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code: IT

Payment date: 20230724

Year of fee payment: 8

Ref country code: GB

Payment date: 20230609

Year of fee payment: 8

Ref country code: CH

Payment date: 20230801

Year of fee payment: 8

Ref country code: AT

Payment date: 20230706

Year of fee payment: 8

PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code: DE

Payment date: 20230712

Year of fee payment: 8