METHOD AND SYSTEM FOR GENERATING AND AUTHENTICATING A SECURITY IDENTIFICATION MARK
Field of the Invention On the one hand, the invention relates to a method of generating a security identification mark, wherein a mark - to be located on the object attached to the security identification mark - with unique features is generated by a three-dimensional arrangement of at least one fibrelike material. On the other hand, the invention relates to a method and a system for proving the authenticity of a security identification mark. Background of the Invention
In everyday life, mainly thanks to more and more sophisticated technologies, there is contin- uos demand for unique, security identification marks, which - attached to documents, other objects - are able to guarantee the genuine nature and authenticity of objects connected with them, with the help of appropriate method and tools. There are several known methods and tools for the above purpose; a group of these are solutions where the security identification mark is visible to the naked eye, and as a consequence of some feature tampering is not possible as per the original intent, on the other hand in practical life it is not undetectable.
The most generally known solution of such nature is for example the incorporation of a fibre effect element, namely a thread mark into the bank note. This solution proves in three- dimensional way that the bank note has not been produced with some less sophisticated method, for example it has not been photocopied, printed, etc., in which cases although the thread mark is obviously located at the appropriate place on the printout, however should any doubt occur, the fake nature of the object can be immediately determined by feeling. Other solutions, proposals concern an identification mark generated mark-wise, which is affirmed to the object to be protected so that it may not be removed, for example functionally mounted. The production, features of this mark are such that those cannot be simulated with simple, home methods. The group of these security identification mark includes different hologram marks, marks. Another group of security identification marks to be also checked visually is different watermarks, one shortcoming of which is that they are only applicable to identify paper-based documents; everyday experience shows that paper base material supplied with watermark is
relatively easy to be obtained by unauthorised persons and in this case the information printed on paper supplied with appropriate watermark may not be differentiated from authentic, legal documents.
US 5.612.524 describes a system of identification mark, furthermore the procedure determin- ing the authenticity of the identification mark and its information content, where the identification mark contains a data field to be read by computer, generated on the carrier to be identified, attached to the object to be protected, containing information applicable for unique identification of the identification mark. It furthermore contains an orientation element to be read by computer, developed on the carrier and located adjacent to the data field, serving for the reading and promoting of the identification mark, moreover a mark-reading tool, identifying the attached object from the information of the mark.
The shortcoming of this solution is that the mark containing the data field recorded on the carrier and to be read by computer is not developed in a manner - either by material, or any other features - that no one else should be able to generate such mark; although it promotes unique effect and easy reading, but cannot be used for security purposes.
The aim of the innovation is to generate a security identification mark supplied with unique features, disabling fake, furthermore to implement a simple method to determine the authenticity of such security identifying mark, with small investment.
Summary of the Invention In order to accomplish the set aim, on the one hand, a method suitable for generating a security identification mark is proposed, wherein a mark - to be located on the object attached to the security identification mark - with unique features is generated by a three-dimensional arrangement of at least one fibre-like material, and further comprising the steps of
- mixing fibres from at least two set of fibres of different colour and arranging the fibres stochastically or randomly in at least one layer;
- forming said at least one layer into a sheet;
- illuminating and scanning said sheet from at least two different directions;
- storing the resulting images of the scans in respective graphical files;
- determimng at least one sample area on the scanned security mark, calculating an identifi- cation sentence according to a predetermined algorithm;
- recording and storing the images of the identification mark with a value of the assigned identification sentence as reference images and reference value.
Preferably, the method further includes the step of arranging at least two sheets on one another.
Preferably, the method further includes the step of locating said at least one sheet or several sheets on a separate substrate. Preferably, the method further includes the step of associating said at least one sheet with a protective coating.
Preferably, the method further includes the step of shaping the security identification mark like a stamp.
Preferably, the method further includes the step of providing the security identification mark with a track carrying information, extending along at least one side of the mark.
Preferably, the method further includes the step of placing a reference sign on the track.
Preferably, the method further includes the step of placing a group indication sign on the track.
On the other hand, a method suitable for proving the authenticity of a security identification mark is proposed, comprising the steps of
- illuminating and scanning the security identification mark from at least two different directions;
- comparing the graphical image files obtained by the scanning with the recorded and stored reference graphical image files of the security identification mark; - examining whether the scanned security identification mark is a genuine three- dimensional security identification mark;
- in positive case creating an identifying sentence value from at last one predetermined sample area of the security identification mark;
- comparing the created identifying sentence value with a reference value of the recorded reference identifying sentence;
- determining the authenticity of the security identification mark in compliance with predetermined tolerance of the comparison result.
Preferably, the method further includes the step of repeating the scanning of the identification mark and creating of the identifying sentence if the resulting value of the identifying sentence is not equal with the reference value but falls within predetermined tolerance.
On the third hand a system suitable for proving the authenticity of a security identification mark generated by a method according to the invention is proposed, comprising scanning means for reading the security identification mark; data processing means operated by program means for scanning, recognising, identificating and recording, data base structuring and maintaining.
Brief Description of the Drawings
The invention is described more detailed with reference to the accompanying drawings, in which
Figure 1 is a top view of a possible embodiment of the security identification mark as per the invention,
Figure 2 shows a magnified portion of the security identification mark of Figure 1, in case of illuminating from a predetermined first direction,
Figure 3 shows the security identification mark of Figure 2, in case of illuminating from a direction opposite with the first one, Figure 4 is a schematic top view of a possible embodiment of the proposed security identification mark,
Figure 5 is a possible implementation of the applied sample for generating the identifying sentence, and
Figure 6 is a flowchart of a possible mode of effectuation of the process concerning the definition of authenticity of the security identification mark as per the invention.
Detailed Description of the Preferred Embodiment
In general security identification procedures may be classified into two large groups: on the one hand indication procedures connected to digital or electronic marks providing for authen- ticity, usually applying different encryption methods, algorithms; on the other hand identification processes connected to objects, documents, or persons.
The security identification mark as per the invention, respectively the procedure creating this and the procedure and equipment determining authenticity belong to the second group.
Figure 1 shows merely an example of the highlighted detail of the proposed security identifi- cation mark, with a length of 1 -20 mm and a diameter of 10- 100 μm, made of fibre 1.
Similarly to the method used with old folk crafts, like jigger, or paper mould, through which fibres 1 were developed to cloth, or paper sheet, we mill out of fibre 1 pile fibres of at least two different colours, but usually of at least three different colours at random, stochastically, at accidental coincidence and with this we eventually produce one single flat layer, the size of which is determined freely in two dimensions. The thickness of the sheet is larger than the diameter of a single fibre, as the consequence of random disarrangement, interlacement, sticking of fibres 1.
If we analyse this material forming flat sheet not with the naked eye, but with any equipment of higher resolution - for example microscope - we experience that we are able to follow the space location and colour of fibres 1 very accurately.
This also concerns if in a given case we do not place one, but two, or more layers formed in this manner on one another, as in the set of random fibres 1 providing one single sheet, the fibres 1 are not closely compact, but the gaps between the individual fibres 1 are well visible with microscope. These being of the size that through these gaps we may see the fibres 1 of the other layer arranged beyond the upper layer.
It was my experience in course of my analysis that we are able to follow up the arrangement and colour of fibres 1 up to 3-6 layers, depending on the size of fibres 1 and the circumstances under which the layer was produced.
The security rate of the proposed security identification mark may be influenced by several parameters, like the length, width, that is area of the security identification mark, the number of layers, the colour of fibres 1 forming the individual layers and so on. In the event we work with three base colours, combinations of 3*106 are provided by layer if the size of the security identification mark is of the size of 24*36 mm, which in case of three layers provides for a theoretical combination of 1019 ' In order to support the usage, handling of the proposed security identification mark, the above described structural solution will be expanded by further characters in an expedient way. For example according to the proposed mode of evaluation, we locate the security identification mark created in this manner on a separate, carrier layer, to highlight the colour of fibres 1 forming the security identification mark in a beneficial way. Depending on the given utilisa- tion, this carrier lays may be used for sticking the security identification mark in a manner that it may not be removed, or if so, outward signs are left.
In case of an expedient implementation, the security identification mark is covered by protective layer on top, protecting the set of fibres 1 from mechanical impacts, namely from changing the arrangement of fibres. The protective coating is made of such material and with such transparency that when analysed later, it should leave the arrangement and colour of fibres 1 reliably detective.
It is obvious that in case we generate the security identification mark similarly to a stamp and if in this case at least on one side of the security identification mark, but possibly on two adjacent sides tracks 2 are formed each, furthermore if in such case it is also possible to determine reference points 3 in the meeting range of tracks to support the determination of authenticity at a later point of time.
Otherwise on the tracks 2 we may display information 4 supporting the administration of the security identification mark. At a later point of time, when the security identification mark is checked this information provides control for the person performing checking also by visual inspection. The procedure proposed for generating the proposed security identification mark comprises two main parts: on the one hand generation of the security identification mark itself, on the other hand entry and recording of the essential parameters of the security identification mark generated in this unique manner.
As to be seen later on, an essential element of the procedure concerning the determination whether the security identification mark described in the study is genuine is to check whether the mark is a genuine three-dimensional one.
When entering the parameters of the security identification mark we read the security mark by utilising the widely used photo scanner, or page-reader of higher resolution.
Proposed resolution is 1800*1800, or 2400*2400, which in case of fibres 1 with the diameter described earlier results in thickness of 4-5 image points of fibre and with this we are able to follow the spatial position of fibre 1 accurately.
The whole image of the read security identification mark is filed either in any standard file format used in information technology or in a graphical file of special format for security reasons. Following this we determine a sample area of size, shape and number as specified by us in advance within the security identification mark, which is then used to create identifying
sentence of unique feature concerning the security identification mark, or series of bits with the help of fibres 1 located on the sample area.
There are two basic forms of creating identifying sentence: static and dynamic.
Static method results in lower security level, as sentence creating takes place with standard parameters; while the dynamic one means higher level of protection, as the parameters of the algorithm used for the creation of identifying sentence will change by some other parameter, for example time function. In the present description I am presenting an example for the creation of static identifying sentence for easier understanding of the procedure as per the study. hi course of this our starting point should be a security identification mark, which has tracks 2 on each its left hand side and top, the area of which crossing one another, namely the right bottom corner of the square-shaped area will serve as 3 reference point, that is 0,0 point of a two-dimensional co-ordinate system.
In the event we read a colour image from the security identification mark, then in case of bitmap type of graphical file title and content belong to the individual image points. In case of the usual RGB display, three bites (for example 120818 17) will make out one red colour shape. In order to create an identifying sentence we should select a typical image point; such image point is available for example if one red fibre 1 crosses another red, another blue, another yellow fibre 1.
Applying the appropriate algorithm we calculate the centroid median, namely the point of crossing of fibres 1, which will always be an individual basic image point. Following this we take a more coarse resolution, for example the raster of the size of 5*5 shown in the figure. In case the basic resolution was 1800*400, then the resulting raster here is 360*480. If the image point of crossing is to be found anywhere in this raster, then we accept that the image point of crossing is at the appropriate location and with this we are able to eliminate the reading eπors which are not too coarse.
We create the identifying sentence out of several groups, as series of alphanumeric characters comprising several characters in each group. In practice it is expedient to apply identifying sentence of five characters each in the five groups. In our present example we create 3*3 alphanumeric series of characters for simple understanding, in compliance with Table 1 below.
Table 1
Consequently the resulting identifying sentence: HK8-P3L-L37. We may naturally supplement the identifying sentence also with parity information or error checking code, as known in the specialised areas, however this will not affect the essence of the solution.
Following this we should check in the data base concerning security identification marks whether there is any identifying sentence very similar, very close to the identifying sentence created now.
Namely if such sentence does exist, then under normal circumstances the two security identi- fication marks may not be identified and differentiated from one another in every case, with high reliability, which should be filtered out from the very beginning. In such event we destroy the security identification mark created subsequently, belonging to the identifying sentence, whereas in opposite case we continue to entry the parameters of the security identification mark. With consideration to high reliability, we place the mark into the reading device at the subsequent occasions and read it twice to check whether the results of reading are identical with one another. hi case these are not identical, then the arrangement and colour content of the random pile of fibres 1 of the created security identification mark is such that in practical life these would be applicable for rapid and reliable identification, in a given case for identification of legal ef-
fects only to an uncertain extent, therefore also in such case the security identification mark shall be destroyed.
In the event we achieve the same result in course of reading twice, then we store the image of the security identification mark, the information entered to the track of the graphical file in the data base, and we qualify the security identification mark as applicable for use.
To determine the authenticity of the proposed security identification mark I present a possible method in Figure 6, wherein as a fist step we have to decide whether the given security identification mark actually exists, real, or it is some duplicate prepared through printing, or photo technology. This may be proved by determining whether the security identification mark is three- dimensional, as if we have a three-dimensional security identification mark then in compliance with the invention - through the random arrangement of fibres 1 - it practically cannot be counterfeited, or created in several copies in a manner completely identical with one another. The existence of three-dimensional structure may be simply proved by illuminating the security identification mark from two, different directions and scan or read it in this manner.
Namely, as the consequence of illuminating from diverse directions, the shadow of the individual fibres 1 will always shape as per the prevailing illuminating and the two shadows cannot be brought together in one single copy in a manner that this should not turn out at later verification. Figure 2 shows a case when the pile of fibres 1 were illuminated from below - concerning the figure - and it is well visible that the shadow of the top red fibre 1 is reflected to the below laying green and white fibres 1, respectively in the figure it reflects to the white carrier offset upwards from the red fibre 1.
On the other hand Figure 3 present a case when the pile of fibres 1 were illuminated from above and the shadow of the red fibre 1 is reflected to the green and white fibres 1 lower than the fibre, furthermore it is reflected downwards from the red fibre to the below laying white carrier.
In the event the images read with different illuminating are identical with the image prepared when creating the security identification marks, then the security identification mark is a genuine three-dimensional one and the next step is to create an identifying sentence on basis of the same sample area as for creating the mark, with the same algorithm.
We compare the received identifying sentence with the sentence stored in the data base and in case the two are identical, we consider the security identification mark authentic.
In the event there is no full identity we check whether the diversion falls within the predetermined tolerance. If so, we repeat this process, respectively in case of diversion of a deter- mined extent we consider the security identification mark genuine. In case the diversion is larger than the allowed tolerance, we determine that the security identification mark is not identical with the security identification mark stored in the data base with given parameters, namely it has been manipulated in some manner.
The central data base - storing the parameters necessary for the verification of security identi- fication mark - should be a data base accessible for the system through line or cordless communication, run by accredited operator.
The security identification mark may be placed for example on textile glass caπying layer of the thickness of 0,3 mm; the layers necessary for identification may be produced of colour, bonded synthetic fibres of 45 μm, developed into layer with the thickness of 0,4 mm. One or several layers placed on the caπying layer it then led through water-white epoxy resin, then after hardening they are cut to pieces, for example ones of 8*12, 12*18, 24*36 mm. After this we may apply self-stick adhesive layer supplied with protective foil to the bottom of the carrying layer, by which we may fix the security identification mark on the object to be protected. The system providing for the determination of authenticity of the security identification mark consists of the security identification marks themselves, scanners or page-readers executing mark reading, furthennore IT equipment operated with data-base structuring and maintenance programme implementing recognition and identification, furthermore recording. These may be supplemented with different archiving and security units, copy system of paper data car- rier, and so on.
The advantage of the proposed procedure is that we may implement origin identification with such simple raw material, small equipment expenditures, which practically cannot be faked.
On the tracks 2 bordering or suπounding the security identification mark we may include data as indicating 4 pieces of information, barcode, price, validity, whereas in the range providing for 3 reference points we may place indication of the groups created from the individual security identification marks. In a given case these show right from looking whether the security identification mark was applied at the specified field of application. For example the security
identifϊcation mark intended for the field of vehicles belongs to a different group that the group of security identification marks developed for some kind of security.
The security identification mark generated with the procedure as per the invention is such "fingerprint" or "watermark", the information content of which is determined by us through amending the size, structure of the mark, it may not be copied by photo printing, it is practically impossible to model it in three-dimensional way, with appropriate accuracy.
When applying the procedure to determine whether the security identification mark is genuine, further versions are also possible within the scope of patent protection, so for example illuminating the mark with different colour of light, we receive black and white graphical file instead of colour one, the processing of which provides for less possibilities for eπors, fewer data and higher rapidity in a given case.
Fields of application are almost unlimited, it can be used for certifying vehicles, securities, seal tags, personal identification, entry systems.