WO2003049022A1 - Method and system for generating and authenticating a security identification mark - Google Patents

Method and system for generating and authenticating a security identification mark Download PDF

Info

Publication number
WO2003049022A1
WO2003049022A1 PCT/HU2002/000130 HU0200130W WO03049022A1 WO 2003049022 A1 WO2003049022 A1 WO 2003049022A1 HU 0200130 W HU0200130 W HU 0200130W WO 03049022 A1 WO03049022 A1 WO 03049022A1
Authority
WO
WIPO (PCT)
Prior art keywords
identification mark
security identification
security
mark
sentence
Prior art date
Application number
PCT/HU2002/000130
Other languages
French (fr)
Inventor
Zoltán MAGDA
Original Assignee
Magda Zoltan
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Magda Zoltan filed Critical Magda Zoltan
Priority to AU2002349167A priority Critical patent/AU2002349167A1/en
Publication of WO2003049022A1 publication Critical patent/WO2003049022A1/en

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07DHANDLING OF COINS OR VALUABLE PAPERS, e.g. TESTING, SORTING BY DENOMINATIONS, COUNTING, DISPENSING, CHANGING OR DEPOSITING
    • G07D7/00Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency
    • G07D7/20Testing patterns thereon
    • G07D7/202Testing patterns thereon using pattern matching
    • G07D7/2033Matching unique patterns, i.e. patterns that are unique to each individual paper
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/06009Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking
    • G06K19/06046Constructional details
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/08Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code using markings of different kinds or more than one marking of the same kind in the same record carrier, e.g. one marking being sensed by optical and the other by magnetic means
    • G06K19/083Constructional details
    • G06K19/086Constructional details with markings consisting of randomly placed or oriented elements, the randomness of the elements being useable for generating a unique identifying signature of the record carrier, e.g. randomly placed magnetic fibers or magnetic particles in the body of a credit card
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07DHANDLING OF COINS OR VALUABLE PAPERS, e.g. TESTING, SORTING BY DENOMINATIONS, COUNTING, DISPENSING, CHANGING OR DEPOSITING
    • G07D7/00Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency
    • G07D7/004Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency using digital security elements, e.g. information coded on a magnetic thread or strip
    • G07D7/0047Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency using digital security elements, e.g. information coded on a magnetic thread or strip using checkcodes, e.g. coded numbers derived from serial number and denomination

Definitions

  • the invention relates to a method of generating a security identification mark, wherein a mark - to be located on the object attached to the security identification mark - with unique features is generated by a three-dimensional arrangement of at least one fibrelike material.
  • the invention relates to a method and a system for proving the authenticity of a security identification mark.
  • US 5.612.524 describes a system of identification mark, furthermore the procedure determin- ing the authenticity of the identification mark and its information content, where the identification mark contains a data field to be read by computer, generated on the carrier to be identified, attached to the object to be protected, containing information applicable for unique identification of the identification mark. It furthermore contains an orientation element to be read by computer, developed on the carrier and located adjacent to the data field, serving for the reading and promoting of the identification mark, moreover a mark-reading tool, identifying the attached object from the information of the mark.
  • the aim of the innovation is to generate a security identification mark supplied with unique features, disabling fake, furthermore to implement a simple method to determine the authenticity of such security identifying mark, with small investment.
  • a method suitable for generating a security identification mark is proposed, wherein a mark - to be located on the object attached to the security identification mark - with unique features is generated by a three-dimensional arrangement of at least one fibre-like material, and further comprising the steps of
  • the method further includes the step of arranging at least two sheets on one another.
  • the method further includes the step of locating said at least one sheet or several sheets on a separate substrate.
  • the method further includes the step of associating said at least one sheet with a protective coating.
  • the method further includes the step of shaping the security identification mark like a stamp.
  • the method further includes the step of providing the security identification mark with a track carrying information, extending along at least one side of the mark.
  • the method further includes the step of placing a reference sign on the track.
  • the method further includes the step of placing a group indication sign on the track.
  • the method further includes the step of repeating the scanning of the identification mark and creating of the identifying sentence if the resulting value of the identifying sentence is not equal with the reference value but falls within predetermined tolerance.
  • a system suitable for proving the authenticity of a security identification mark generated by a method according to the invention comprising scanning means for reading the security identification mark; data processing means operated by program means for scanning, recognising, identificationing and recording, data base structuring and maintaining.
  • Figure 1 is a top view of a possible embodiment of the security identification mark as per the invention
  • Figure 2 shows a magnified portion of the security identification mark of Figure 1, in case of illuminating from a predetermined first direction,
  • Figure 3 shows the security identification mark of Figure 2, in case of illuminating from a direction opposite with the first one
  • Figure 4 is a schematic top view of a possible embodiment of the proposed security identification mark
  • Figure 5 is a possible implementation of the applied sample for generating the identifying sentence
  • Figure 6 is a flowchart of a possible mode of effectuation of the process concerning the definition of authenticity of the security identification mark as per the invention.
  • security identification procedures may be classified into two large groups: on the one hand indication procedures connected to digital or electronic marks providing for authen- ticity, usually applying different encryption methods, algorithms; on the other hand identification processes connected to objects, documents, or persons.
  • the security identification mark as per the invention respectively the procedure creating this and the procedure and equipment determining authenticity belong to the second group.
  • Figure 1 shows merely an example of the highlighted detail of the proposed security identifi- cation mark, with a length of 1 -20 mm and a diameter of 10- 100 ⁇ m, made of fibre 1.
  • the method used with old folk crafts, like jigger, or paper mould through which fibres 1 were developed to cloth, or paper sheet, we mill out of fibre 1 pile fibres of at least two different colours, but usually of at least three different colours at random, stochastically, at accidental coincidence and with this we eventually produce one single flat layer, the size of which is determined freely in two dimensions.
  • the thickness of the sheet is larger than the diameter of a single fibre, as the consequence of random disarrangement, interlacement, sticking of fibres 1.
  • the security rate of the proposed security identification mark may be influenced by several parameters, like the length, width, that is area of the security identification mark, the number of layers, the colour of fibres 1 forming the individual layers and so on.
  • combinations of 3*106 are provided by layer if the size of the security identification mark is of the size of 24*36 mm, which in case of three layers provides for a theoretical combination of 10 19 '
  • the above described structural solution will be expanded by further characters in an expedient way. For example according to the proposed mode of evaluation, we locate the security identification mark created in this manner on a separate, carrier layer, to highlight the colour of fibres 1 forming the security identification mark in a beneficial way.
  • this carrier lays may be used for sticking the security identification mark in a manner that it may not be removed, or if so, outward signs are left.
  • the security identification mark is covered by protective layer on top, protecting the set of fibres 1 from mechanical impacts, namely from changing the arrangement of fibres.
  • the protective coating is made of such material and with such transparency that when analysed later, it should leave the arrangement and colour of fibres 1 reliably detective.
  • the procedure proposed for generating the proposed security identification mark comprises two main parts: on the one hand generation of the security identification mark itself, on the other hand entry and recording of the essential parameters of the security identification mark generated in this unique manner.
  • an essential element of the procedure concerning the determination whether the security identification mark described in the study is genuine is to check whether the mark is a genuine three-dimensional one.
  • Proposed resolution is 1800*1800, or 2400*2400, which in case of fibres 1 with the diameter described earlier results in thickness of 4-5 image points of fibre and with this we are able to follow the spatial position of fibre 1 accurately.
  • the whole image of the read security identification mark is filed either in any standard file format used in information technology or in a graphical file of special format for security reasons. Following this we determine a sample area of size, shape and number as specified by us in advance within the security identification mark, which is then used to create identifying sentence of unique feature concerning the security identification mark, or series of bits with the help of fibres 1 located on the sample area.
  • Static method results in lower security level, as sentence creating takes place with standard parameters; while the dynamic one means higher level of protection, as the parameters of the algorithm used for the creation of identifying sentence will change by some other parameter, for example time function.
  • a security identification mark which has tracks 2 on each its left hand side and top, the area of which crossing one another, namely the right bottom corner of the square-shaped area will serve as 3 reference point, that is 0,0 point of a two-dimensional co-ordinate system.
  • centroid median namely the point of crossing of fibres 1, which will always be an individual basic image point. Following this we take a more coarse resolution, for example the raster of the size of 5*5 shown in the figure. In case the basic resolution was 1800*400, then the resulting raster here is 360*480. If the image point of crossing is to be found anywhere in this raster, then we accept that the image point of crossing is at the appropriate location and with this we are able to eliminate the reading e ⁇ ors which are not too coarse.
  • the arrangement and colour content of the random pile of fibres 1 of the created security identification mark is such that in practical life these would be applicable for rapid and reliable identification, in a given case for identification of legal ef- fects only to an uncertain extent, therefore also in such case the security identification mark shall be destroyed.
  • Figure 2 shows a case when the pile of fibres 1 were illuminated from below - concerning the figure - and it is well visible that the shadow of the top red fibre 1 is reflected to the below laying green and white fibres 1, respectively in the figure it reflects to the white carrier offset upwards from the red fibre 1.
  • Figure 3 present a case when the pile of fibres 1 were illuminated from above and the shadow of the red fibre 1 is reflected to the green and white fibres 1 lower than the fibre, furthermore it is reflected downwards from the red fibre to the below laying white carrier.
  • the security identification mark is a genuine three-dimensional one and the next step is to create an identifying sentence on basis of the same sample area as for creating the mark, with the same algorithm.
  • the central data base - storing the parameters necessary for the verification of security identi- fication mark - should be a data base accessible for the system through line or cordless communication, run by accredited operator.
  • the security identification mark may be placed for example on textile glass ca ⁇ ying layer of the thickness of 0,3 mm; the layers necessary for identification may be produced of colour, bonded synthetic fibres of 45 ⁇ m, developed into layer with the thickness of 0,4 mm.
  • One or several layers placed on the ca ⁇ ying layer it then led through water-white epoxy resin, then after hardening they are cut to pieces, for example ones of 8*12, 12*18, 24*36 mm. After this we may apply self-stick adhesive layer supplied with protective foil to the bottom of the carrying layer, by which we may fix the security identification mark on the object to be protected.
  • the system providing for the determination of authenticity of the security identification mark consists of the security identification marks themselves, scanners or page-readers executing mark reading, furthennore IT equipment operated with data-base structuring and maintenance programme implementing recognition and identification, furthermore recording. These may be supplemented with different archiving and security units, copy system of paper data car- rier, and so on.
  • the security identification mark On the tracks 2 bordering or su ⁇ ounding the security identification mark we may include data as indicating 4 pieces of information, barcode, price, validity, whereas in the range providing for 3 reference points we may place indication of the groups created from the individual security identification marks. In a given case these show right from looking whether the security identification mark was applied at the specified field of application. For example the security identif ⁇ cation mark intended for the field of vehicles belongs to a different group that the group of security identification marks developed for some kind of security.
  • the security identification mark generated with the procedure as per the invention is such "fingerprint” or "watermark", the information content of which is determined by us through amending the size, structure of the mark, it may not be copied by photo printing, it is practically impossible to model it in three-dimensional way, with appropriate accuracy.
  • Fields of application are almost unlimited, it can be used for certifying vehicles, securities, seal tags, personal identification, entry systems.

Abstract

A method of generating a security identification mark with unique features, attached inseparably to the object to be identified, comprising mixing fibres from at least two set of fibres of different colour and arranging the fibres stochastically or randomly in at least one layer; forming said layer into a sheet; illuminating and scanning said sheet from at least two different directions; storing the resulting images of the scans in respective graphical files; determining at least one sample area on the scanned security mark, calculating an identification sentence according to a predetermined algorithm; recording and storing the images of the identification mark with a value of the assigned identification sentence as reference images and reference value.A method of proving the authenticity of a security identification mark, comprising illuminating and scanning the security identification mark from at least two different directions; comparing the graphical image files obtained by the scanning with the recorded and stored reference graphical image files of the security identification mark; examining whether the scanned security identification mark is a genuine three-dimensional security identification mark; in positive case creating an identifying sentence value from at last one predetermined sample area of the security identification mark; comparing the created identifying sentence value with a reference value of the recorded reference identifying sentence; determining the authenticity of the security identification mark.

Description

METHOD AND SYSTEM FOR GENERATING AND AUTHENTICATING A SECURITY IDENTIFICATION MARK
Field of the Invention On the one hand, the invention relates to a method of generating a security identification mark, wherein a mark - to be located on the object attached to the security identification mark - with unique features is generated by a three-dimensional arrangement of at least one fibrelike material. On the other hand, the invention relates to a method and a system for proving the authenticity of a security identification mark. Background of the Invention
In everyday life, mainly thanks to more and more sophisticated technologies, there is contin- uos demand for unique, security identification marks, which - attached to documents, other objects - are able to guarantee the genuine nature and authenticity of objects connected with them, with the help of appropriate method and tools. There are several known methods and tools for the above purpose; a group of these are solutions where the security identification mark is visible to the naked eye, and as a consequence of some feature tampering is not possible as per the original intent, on the other hand in practical life it is not undetectable.
The most generally known solution of such nature is for example the incorporation of a fibre effect element, namely a thread mark into the bank note. This solution proves in three- dimensional way that the bank note has not been produced with some less sophisticated method, for example it has not been photocopied, printed, etc., in which cases although the thread mark is obviously located at the appropriate place on the printout, however should any doubt occur, the fake nature of the object can be immediately determined by feeling. Other solutions, proposals concern an identification mark generated mark-wise, which is affirmed to the object to be protected so that it may not be removed, for example functionally mounted. The production, features of this mark are such that those cannot be simulated with simple, home methods. The group of these security identification mark includes different hologram marks, marks. Another group of security identification marks to be also checked visually is different watermarks, one shortcoming of which is that they are only applicable to identify paper-based documents; everyday experience shows that paper base material supplied with watermark is relatively easy to be obtained by unauthorised persons and in this case the information printed on paper supplied with appropriate watermark may not be differentiated from authentic, legal documents.
US 5.612.524 describes a system of identification mark, furthermore the procedure determin- ing the authenticity of the identification mark and its information content, where the identification mark contains a data field to be read by computer, generated on the carrier to be identified, attached to the object to be protected, containing information applicable for unique identification of the identification mark. It furthermore contains an orientation element to be read by computer, developed on the carrier and located adjacent to the data field, serving for the reading and promoting of the identification mark, moreover a mark-reading tool, identifying the attached object from the information of the mark.
The shortcoming of this solution is that the mark containing the data field recorded on the carrier and to be read by computer is not developed in a manner - either by material, or any other features - that no one else should be able to generate such mark; although it promotes unique effect and easy reading, but cannot be used for security purposes.
The aim of the innovation is to generate a security identification mark supplied with unique features, disabling fake, furthermore to implement a simple method to determine the authenticity of such security identifying mark, with small investment.
Summary of the Invention In order to accomplish the set aim, on the one hand, a method suitable for generating a security identification mark is proposed, wherein a mark - to be located on the object attached to the security identification mark - with unique features is generated by a three-dimensional arrangement of at least one fibre-like material, and further comprising the steps of
- mixing fibres from at least two set of fibres of different colour and arranging the fibres stochastically or randomly in at least one layer;
- forming said at least one layer into a sheet;
- illuminating and scanning said sheet from at least two different directions;
- storing the resulting images of the scans in respective graphical files;
- determimng at least one sample area on the scanned security mark, calculating an identifi- cation sentence according to a predetermined algorithm;
- recording and storing the images of the identification mark with a value of the assigned identification sentence as reference images and reference value. Preferably, the method further includes the step of arranging at least two sheets on one another.
Preferably, the method further includes the step of locating said at least one sheet or several sheets on a separate substrate. Preferably, the method further includes the step of associating said at least one sheet with a protective coating.
Preferably, the method further includes the step of shaping the security identification mark like a stamp.
Preferably, the method further includes the step of providing the security identification mark with a track carrying information, extending along at least one side of the mark.
Preferably, the method further includes the step of placing a reference sign on the track.
Preferably, the method further includes the step of placing a group indication sign on the track.
On the other hand, a method suitable for proving the authenticity of a security identification mark is proposed, comprising the steps of
- illuminating and scanning the security identification mark from at least two different directions;
- comparing the graphical image files obtained by the scanning with the recorded and stored reference graphical image files of the security identification mark; - examining whether the scanned security identification mark is a genuine three- dimensional security identification mark;
- in positive case creating an identifying sentence value from at last one predetermined sample area of the security identification mark;
- comparing the created identifying sentence value with a reference value of the recorded reference identifying sentence;
- determining the authenticity of the security identification mark in compliance with predetermined tolerance of the comparison result.
Preferably, the method further includes the step of repeating the scanning of the identification mark and creating of the identifying sentence if the resulting value of the identifying sentence is not equal with the reference value but falls within predetermined tolerance. On the third hand a system suitable for proving the authenticity of a security identification mark generated by a method according to the invention is proposed, comprising scanning means for reading the security identification mark; data processing means operated by program means for scanning, recognising, identificating and recording, data base structuring and maintaining.
Brief Description of the Drawings
The invention is described more detailed with reference to the accompanying drawings, in which
Figure 1 is a top view of a possible embodiment of the security identification mark as per the invention,
Figure 2 shows a magnified portion of the security identification mark of Figure 1, in case of illuminating from a predetermined first direction,
Figure 3 shows the security identification mark of Figure 2, in case of illuminating from a direction opposite with the first one, Figure 4 is a schematic top view of a possible embodiment of the proposed security identification mark,
Figure 5 is a possible implementation of the applied sample for generating the identifying sentence, and
Figure 6 is a flowchart of a possible mode of effectuation of the process concerning the definition of authenticity of the security identification mark as per the invention.
Detailed Description of the Preferred Embodiment
In general security identification procedures may be classified into two large groups: on the one hand indication procedures connected to digital or electronic marks providing for authen- ticity, usually applying different encryption methods, algorithms; on the other hand identification processes connected to objects, documents, or persons.
The security identification mark as per the invention, respectively the procedure creating this and the procedure and equipment determining authenticity belong to the second group.
Figure 1 shows merely an example of the highlighted detail of the proposed security identifi- cation mark, with a length of 1 -20 mm and a diameter of 10- 100 μm, made of fibre 1. Similarly to the method used with old folk crafts, like jigger, or paper mould, through which fibres 1 were developed to cloth, or paper sheet, we mill out of fibre 1 pile fibres of at least two different colours, but usually of at least three different colours at random, stochastically, at accidental coincidence and with this we eventually produce one single flat layer, the size of which is determined freely in two dimensions. The thickness of the sheet is larger than the diameter of a single fibre, as the consequence of random disarrangement, interlacement, sticking of fibres 1.
If we analyse this material forming flat sheet not with the naked eye, but with any equipment of higher resolution - for example microscope - we experience that we are able to follow the space location and colour of fibres 1 very accurately.
This also concerns if in a given case we do not place one, but two, or more layers formed in this manner on one another, as in the set of random fibres 1 providing one single sheet, the fibres 1 are not closely compact, but the gaps between the individual fibres 1 are well visible with microscope. These being of the size that through these gaps we may see the fibres 1 of the other layer arranged beyond the upper layer.
It was my experience in course of my analysis that we are able to follow up the arrangement and colour of fibres 1 up to 3-6 layers, depending on the size of fibres 1 and the circumstances under which the layer was produced.
The security rate of the proposed security identification mark may be influenced by several parameters, like the length, width, that is area of the security identification mark, the number of layers, the colour of fibres 1 forming the individual layers and so on. In the event we work with three base colours, combinations of 3*106 are provided by layer if the size of the security identification mark is of the size of 24*36 mm, which in case of three layers provides for a theoretical combination of 1019 ' In order to support the usage, handling of the proposed security identification mark, the above described structural solution will be expanded by further characters in an expedient way. For example according to the proposed mode of evaluation, we locate the security identification mark created in this manner on a separate, carrier layer, to highlight the colour of fibres 1 forming the security identification mark in a beneficial way. Depending on the given utilisa- tion, this carrier lays may be used for sticking the security identification mark in a manner that it may not be removed, or if so, outward signs are left. In case of an expedient implementation, the security identification mark is covered by protective layer on top, protecting the set of fibres 1 from mechanical impacts, namely from changing the arrangement of fibres. The protective coating is made of such material and with such transparency that when analysed later, it should leave the arrangement and colour of fibres 1 reliably detective.
It is obvious that in case we generate the security identification mark similarly to a stamp and if in this case at least on one side of the security identification mark, but possibly on two adjacent sides tracks 2 are formed each, furthermore if in such case it is also possible to determine reference points 3 in the meeting range of tracks to support the determination of authenticity at a later point of time.
Otherwise on the tracks 2 we may display information 4 supporting the administration of the security identification mark. At a later point of time, when the security identification mark is checked this information provides control for the person performing checking also by visual inspection. The procedure proposed for generating the proposed security identification mark comprises two main parts: on the one hand generation of the security identification mark itself, on the other hand entry and recording of the essential parameters of the security identification mark generated in this unique manner.
As to be seen later on, an essential element of the procedure concerning the determination whether the security identification mark described in the study is genuine is to check whether the mark is a genuine three-dimensional one.
When entering the parameters of the security identification mark we read the security mark by utilising the widely used photo scanner, or page-reader of higher resolution.
Proposed resolution is 1800*1800, or 2400*2400, which in case of fibres 1 with the diameter described earlier results in thickness of 4-5 image points of fibre and with this we are able to follow the spatial position of fibre 1 accurately.
The whole image of the read security identification mark is filed either in any standard file format used in information technology or in a graphical file of special format for security reasons. Following this we determine a sample area of size, shape and number as specified by us in advance within the security identification mark, which is then used to create identifying sentence of unique feature concerning the security identification mark, or series of bits with the help of fibres 1 located on the sample area.
There are two basic forms of creating identifying sentence: static and dynamic.
Static method results in lower security level, as sentence creating takes place with standard parameters; while the dynamic one means higher level of protection, as the parameters of the algorithm used for the creation of identifying sentence will change by some other parameter, for example time function. In the present description I am presenting an example for the creation of static identifying sentence for easier understanding of the procedure as per the study. hi course of this our starting point should be a security identification mark, which has tracks 2 on each its left hand side and top, the area of which crossing one another, namely the right bottom corner of the square-shaped area will serve as 3 reference point, that is 0,0 point of a two-dimensional co-ordinate system.
In the event we read a colour image from the security identification mark, then in case of bitmap type of graphical file title and content belong to the individual image points. In case of the usual RGB display, three bites (for example 120818 17) will make out one red colour shape. In order to create an identifying sentence we should select a typical image point; such image point is available for example if one red fibre 1 crosses another red, another blue, another yellow fibre 1.
Applying the appropriate algorithm we calculate the centroid median, namely the point of crossing of fibres 1, which will always be an individual basic image point. Following this we take a more coarse resolution, for example the raster of the size of 5*5 shown in the figure. In case the basic resolution was 1800*400, then the resulting raster here is 360*480. If the image point of crossing is to be found anywhere in this raster, then we accept that the image point of crossing is at the appropriate location and with this we are able to eliminate the reading eπors which are not too coarse.
We create the identifying sentence out of several groups, as series of alphanumeric characters comprising several characters in each group. In practice it is expedient to apply identifying sentence of five characters each in the five groups. In our present example we create 3*3 alphanumeric series of characters for simple understanding, in compliance with Table 1 below. Table 1
Figure imgf000010_0001
Consequently the resulting identifying sentence: HK8-P3L-L37. We may naturally supplement the identifying sentence also with parity information or error checking code, as known in the specialised areas, however this will not affect the essence of the solution.
Following this we should check in the data base concerning security identification marks whether there is any identifying sentence very similar, very close to the identifying sentence created now.
Namely if such sentence does exist, then under normal circumstances the two security identi- fication marks may not be identified and differentiated from one another in every case, with high reliability, which should be filtered out from the very beginning. In such event we destroy the security identification mark created subsequently, belonging to the identifying sentence, whereas in opposite case we continue to entry the parameters of the security identification mark. With consideration to high reliability, we place the mark into the reading device at the subsequent occasions and read it twice to check whether the results of reading are identical with one another. hi case these are not identical, then the arrangement and colour content of the random pile of fibres 1 of the created security identification mark is such that in practical life these would be applicable for rapid and reliable identification, in a given case for identification of legal ef- fects only to an uncertain extent, therefore also in such case the security identification mark shall be destroyed.
In the event we achieve the same result in course of reading twice, then we store the image of the security identification mark, the information entered to the track of the graphical file in the data base, and we qualify the security identification mark as applicable for use.
To determine the authenticity of the proposed security identification mark I present a possible method in Figure 6, wherein as a fist step we have to decide whether the given security identification mark actually exists, real, or it is some duplicate prepared through printing, or photo technology. This may be proved by determining whether the security identification mark is three- dimensional, as if we have a three-dimensional security identification mark then in compliance with the invention - through the random arrangement of fibres 1 - it practically cannot be counterfeited, or created in several copies in a manner completely identical with one another. The existence of three-dimensional structure may be simply proved by illuminating the security identification mark from two, different directions and scan or read it in this manner.
Namely, as the consequence of illuminating from diverse directions, the shadow of the individual fibres 1 will always shape as per the prevailing illuminating and the two shadows cannot be brought together in one single copy in a manner that this should not turn out at later verification. Figure 2 shows a case when the pile of fibres 1 were illuminated from below - concerning the figure - and it is well visible that the shadow of the top red fibre 1 is reflected to the below laying green and white fibres 1, respectively in the figure it reflects to the white carrier offset upwards from the red fibre 1.
On the other hand Figure 3 present a case when the pile of fibres 1 were illuminated from above and the shadow of the red fibre 1 is reflected to the green and white fibres 1 lower than the fibre, furthermore it is reflected downwards from the red fibre to the below laying white carrier.
In the event the images read with different illuminating are identical with the image prepared when creating the security identification marks, then the security identification mark is a genuine three-dimensional one and the next step is to create an identifying sentence on basis of the same sample area as for creating the mark, with the same algorithm. We compare the received identifying sentence with the sentence stored in the data base and in case the two are identical, we consider the security identification mark authentic.
In the event there is no full identity we check whether the diversion falls within the predetermined tolerance. If so, we repeat this process, respectively in case of diversion of a deter- mined extent we consider the security identification mark genuine. In case the diversion is larger than the allowed tolerance, we determine that the security identification mark is not identical with the security identification mark stored in the data base with given parameters, namely it has been manipulated in some manner.
The central data base - storing the parameters necessary for the verification of security identi- fication mark - should be a data base accessible for the system through line or cordless communication, run by accredited operator.
The security identification mark may be placed for example on textile glass caπying layer of the thickness of 0,3 mm; the layers necessary for identification may be produced of colour, bonded synthetic fibres of 45 μm, developed into layer with the thickness of 0,4 mm. One or several layers placed on the caπying layer it then led through water-white epoxy resin, then after hardening they are cut to pieces, for example ones of 8*12, 12*18, 24*36 mm. After this we may apply self-stick adhesive layer supplied with protective foil to the bottom of the carrying layer, by which we may fix the security identification mark on the object to be protected. The system providing for the determination of authenticity of the security identification mark consists of the security identification marks themselves, scanners or page-readers executing mark reading, furthennore IT equipment operated with data-base structuring and maintenance programme implementing recognition and identification, furthermore recording. These may be supplemented with different archiving and security units, copy system of paper data car- rier, and so on.
The advantage of the proposed procedure is that we may implement origin identification with such simple raw material, small equipment expenditures, which practically cannot be faked.
On the tracks 2 bordering or suπounding the security identification mark we may include data as indicating 4 pieces of information, barcode, price, validity, whereas in the range providing for 3 reference points we may place indication of the groups created from the individual security identification marks. In a given case these show right from looking whether the security identification mark was applied at the specified field of application. For example the security identifϊcation mark intended for the field of vehicles belongs to a different group that the group of security identification marks developed for some kind of security.
The security identification mark generated with the procedure as per the invention is such "fingerprint" or "watermark", the information content of which is determined by us through amending the size, structure of the mark, it may not be copied by photo printing, it is practically impossible to model it in three-dimensional way, with appropriate accuracy.
When applying the procedure to determine whether the security identification mark is genuine, further versions are also possible within the scope of patent protection, so for example illuminating the mark with different colour of light, we receive black and white graphical file instead of colour one, the processing of which provides for less possibilities for eπors, fewer data and higher rapidity in a given case.
Fields of application are almost unlimited, it can be used for certifying vehicles, securities, seal tags, personal identification, entry systems.

Claims

Claims
1. A method of generating a security identification mark, wherein a mark - to be located on the object attached to the security identification mark - with unique features is generated by a three-dimensional arrangement of at least one fibre-like material, characterised by the steps of
- mixing fibres (1) from at least two set of fibres (1) of different colour and aπanging the fibres (1) stochastically or randomly in at least one layer;
- forming said at least one layer into a sheet;
- illuminating and scanning said sheet from at least two different directions; - storing the resulting images of the scans in respective graphical files;
- determining at least one sample area on the scanned security mark, calculating an identification sentence according to a predetermined algorithm;
- recording and storing the images of the identification mark with a value of the assigned identification sentence as reference images and reference value.
2. A method according to claim 1, characterised in that at least two sheets are aπanged on one another.
3. A method according to claim 1 or 2, characterised in that said at least one sheet is or several sheets are located on a separate substrate.
4. A method according to any preceding claims, characterised in that said at least one sheet is associated with a protective coating.
5. A method according to any preceding claims, characterised in that the security identification mark is stamp-shaped.
6. A method according to claim 5, characterised in that the security identification mark is provided with a track (2) caπying information, extending along at least one side of the mark.
7. A method according to claim 6, characterised in that the track (2) contains a reference sign.
8. A method according to any preceding claims, characterised in that the track (2) contains a group indication sign.
9. A method of proving the authenticity of a security identification mark, characterised by the steps of
- illuminating and scanning the security identification mark from at least two different directions; - comparing the graphical image files obtained by the scanning with the recorded and stored reference graphical image files of the security identification mark;
- examining whether the scanned security identification mark is a genuine three- dimensional security identification mark;
- in positive case creating an identifying sentence value from at last one predetermined sample area of the security identification mark;
- comparing the created identifying sentence value with a reference value of the recorded reference identifying sentence;
- determining the authenticity of the security identification mark in compliance with predetermined tolerance of the comparison result.
10. A method according to claim 9, characterised in repeating the scanning of the identification mark and creating of the identifying sentence if the resulting value of the identifying sentence is not equal with the reference value but falls within predetermined tolerance.
11. A system for proving the authenticity of a security identification mark generated by a method according to any of claims 1 to 8, characterised in that it comprises scanning means for reading the security identification mark; data processing means operated by program means for scanning, recognising, identification and recording, data base structuring and maintaining.
PCT/HU2002/000130 2001-12-03 2002-11-26 Method and system for generating and authenticating a security identification mark WO2003049022A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
AU2002349167A AU2002349167A1 (en) 2001-12-03 2002-11-26 Method and system for generating and authenticating a security identification mark

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
HUP0105243 2001-12-03
HU0105243A HUP0105243A2 (en) 2001-12-03 2001-12-03 Method for producing security identification marks as well as method and system for verification thereof

Publications (1)

Publication Number Publication Date
WO2003049022A1 true WO2003049022A1 (en) 2003-06-12

Family

ID=89979950

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/HU2002/000130 WO2003049022A1 (en) 2001-12-03 2002-11-26 Method and system for generating and authenticating a security identification mark

Country Status (3)

Country Link
AU (1) AU2002349167A1 (en)
HU (1) HUP0105243A2 (en)
WO (1) WO2003049022A1 (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2006053736A (en) * 2004-08-11 2006-02-23 Fuji Xerox Co Ltd Method, apparatus and program for determining authenticity
WO2012154017A1 (en) * 2011-05-12 2012-11-15 Vasiliev Serghei Method for verifying the authenticity of securities and device for its realization
RU2654460C1 (en) * 2016-07-06 2018-05-17 Владимир Дмитриевич Шкилев Method of three-dimensional identification of a solid object

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2324065A (en) * 1997-04-09 1998-10-14 James Howard Slater An identification code for banknotes or credit cards comprising a pattern of random beads
US20010041214A1 (en) * 1999-04-01 2001-11-15 Brian Brogger System for retrospective identification and method of making articles for retrospective identification

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2324065A (en) * 1997-04-09 1998-10-14 James Howard Slater An identification code for banknotes or credit cards comprising a pattern of random beads
US20010041214A1 (en) * 1999-04-01 2001-11-15 Brian Brogger System for retrospective identification and method of making articles for retrospective identification

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2006053736A (en) * 2004-08-11 2006-02-23 Fuji Xerox Co Ltd Method, apparatus and program for determining authenticity
EP1777663A1 (en) * 2004-08-11 2007-04-25 Fuji Xerox Co., Ltd. Authenticating method, device, and program
EP1777663A4 (en) * 2004-08-11 2010-12-15 Fuji Xerox Co Ltd Authenticating method, device, and program
US7936914B2 (en) 2004-08-11 2011-05-03 Fuji Xerox Co., Ltd. Authenticity determination method, apparatus, and program
WO2012154017A1 (en) * 2011-05-12 2012-11-15 Vasiliev Serghei Method for verifying the authenticity of securities and device for its realization
RU2654460C1 (en) * 2016-07-06 2018-05-17 Владимир Дмитриевич Шкилев Method of three-dimensional identification of a solid object

Also Published As

Publication number Publication date
HU0105243D0 (en) 2002-02-28
AU2002349167A1 (en) 2003-06-17
HUP0105243A2 (en) 2003-06-28

Similar Documents

Publication Publication Date Title
JP7093352B2 (en) Composite 2D barcodes, digital certificate media, generators, readers and methods
KR101117914B1 (en) Counterfeit and tamper resistant labels with randomly occurring features
US8756707B2 (en) Method of manufacturing security document and method for authenticating the document
EP1784757B1 (en) Authenticity verification methods, products and apparatuses
US7239734B2 (en) Authentication of identification documents and banknotes
JP2793366B2 (en) Articles tagged with anti-counterfeiting and method of identifying counterfeiting of such articles
US20070016790A1 (en) Identification document and related methods
EA023501B1 (en) Univocal label, method for producing the same and method for verifying the originality of a product provided therewith
US20080185438A1 (en) Secure Barcode
WO2013063872A1 (en) Two-dimensional bar code-based anti-counterfeiting method, label, and label manufacturing method
US8123139B2 (en) Virtual code window
CN1955986A (en) A personal authentication card with vision inspection security and a method of manufacturing the same
RU2469405C2 (en) Method and apparatus for checking valuable documents
US20120162666A1 (en) Position marking for identifying a surface region and method for identifying/authenticating on the basis of the marked surface region
WO2003049022A1 (en) Method and system for generating and authenticating a security identification mark
RU2165643C1 (en) Information authenticating method
RU2523174C1 (en) Method of protecting information on physical (paper) medium
CA2739508A1 (en) Method of manufacturing security document and method for authenticating the document
CN104123105A (en) Printing digital watermark embedding technology
AU2004242534B2 (en) Counterfeit and tamper resistant labels with randomly occurring features
UA133350U (en) ID: LABEL LABEL ID

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE ES FI GB GD GE GH GM HR ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ OM PH PL PT RO RU SC SD SE SG SI SK SL TJ TM TN TR TT TZ UA UG US UZ VC VN YU ZA ZM ZW

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR IE IT LU MC NL PT SE SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
DFPE Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101)
122 Ep: pct application non-entry in european phase
NENP Non-entry into the national phase

Ref country code: JP

WWW Wipo information: withdrawn in national office

Country of ref document: JP