Security element for marking or identifying objects and living beings

a security element and living being technology, applied in the field of security elements for marking, authenticating, or identifying objects, can solve the problems of inability to determine authenticity or only with great effort, the assignment of certain security elements remains an unresolved problem, and the forgery cannot be distinguished from the original, so as to improve forgery security, accelerate the formation of crackles, and improve the effect of forgery

Inactive Publication Date: 2012-07-12
KISTERS FRIEDRICH
View PDF1 Cites 23 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

[0064]Crackle formation can be accelerated by the use of ultrasound. A treatment can occur, for example, after a reading process to prevent possibly existing copies from remaining undetected in a subsequent examination. The use of a point ultrasound source is preferable, so that only previously defined or randomly selected areas are treated. If these areas are included in a subsequent scanning operation and the database is updated, then it is not possible to forge this feature lastingly. Additional security is achieved by a defined selection of the areas to be scanned or by a selection with the use of an algorithm. In a variant, one of the layers can be formed so that it does not undergo any crackle pattern formation. Another variant can include a material that allows only individual changes, therefore, for example, forms crackles but no shrinkages or nicks.
[0065]In another variant, a final layer can be provided, which lies over the topmost layer and in itself does not form crackles. It can include a liquid or gel-like material. This material can be protected permanently or limited in time by a protective film before the drying, whereby in a preferred embodiment the protective film is removed for activating the security feature. In another embodiment, such a layer is formed over the crackle pattern-forming layer so that the crackle itself is no longer visible to the human eye. A visualization can occur, for example, by examination with infrared light, which further makes forgery much more difficult. In addition with some heating this layer can form its own crackle pattern or change its composition and thereby its appearance. The composition of the material is preferably such that in an attempt to remove the security element or to separate the layers, a component of the liquid or the gel destroys other layers, which provides further for an improved forgery security.

Problems solved by technology

However, because of the available possibilities for forgery, the absolutely certain assignment of such security elements has remained an unresolved problem thus far.
Further, an identical printed image with an identical protective lacquer can be applied to a forgery, as a result of which the forgery can no longer be distinguished from the original.
Determination of authenticity is not possible or possible only with great effort.
This system is not forgery-proof either.
In addition, the identity cannot be unequivocally assigned to a specific person.
False negatives and operator-, user-, or transmission-related errors also continue to be possible.
This production process, nevertheless, does not represent protection from copies, because all originals retain their specific security features and these can ultimately be reconstructed.
The aforementioned existing methods for authentication (access control) of persons or for marking of originals are inflexible, on the one hand, because they include predefined authentication steps.
On the other hand, they do not include any effective mechanism for protection against forgery.
In addition, existing systems are not capable of determining who an authorized person is, because they only compare information that they receive.
Apart from false-negative cases, false-positive cases are also a daily problem.
This type of three-factor authentication is not sufficient, however, because false negatives and other discrepancies can continue to occur.
Further, the consistency of the transmitted data is not checked, which enables possible hacker attacks.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security element for marking or identifying objects and living beings
  • Security element for marking or identifying objects and living beings
  • Security element for marking or identifying objects and living beings

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0081]In FIG. 1, two crackle layers 10, 12 are arranged one above the other. The individual crackle layers 10, 12 form varyingly pronounced tears or cracks 14, 16, 18. Depending on the extent, the tears of the topmost layer 12 can pass through to the underlying layer 10 as a single tear (cf. tear 18). Tears 16 can arise in the topmost layer 12 because of the drying process. Such tears can arise, for example, also by the drying or shrinking 11 of the underlying layer 10. Naturally, also an overlying layer can influence an underlying layer and cause stress cracks. Depending on the employed method, tears can be introduced selectively in this way to create a crackle. If a layer shrinks, it can also form furrows, which are similarly characteristic like crackle structures. As a result, shrinkages can also be used as a security feature, apart from or in addition to the crackle structures.

[0082]The individual layers 10, 12 can be scanned by different measuring methods for data acquisition o...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

PropertyMeasurementUnit
wavelengthaaaaaaaaaa
wavelengthaaaaaaaaaa
wavelengthsaaaaaaaaaa
Login to view more

Abstract

A security element for marking, authenticating or identifying objects or living beings, such as people, animals or plants is provided that includes one or more layers of materials that are arranged next to or on top of each other or that overlap, which have security markings. At least one layer of the security element has, at least regionally, a crackle pattern in form of tears or cracks, nicks, wear areas or shrinkages and possible impurities, which can be scanned and detected together or separately as security features. A method for producing such a security element and to a use thereof for authenticating a person or an object, or for authorizing, triggering, continuing, carrying out and ending an action is also provided.

Description

[0001]This nonprovisional application is a continuation of International Application No. PCT / EP2010 / 004270, which was filed on Jul. 14, 2010, and which claims priority to German Patent Application No. DE 10 2009 033 221.9, which was filed in Germany on Jul. 14, 2009, and which are both herein incorporated by reference.BACKGROUND OF THE INVENTION[0002]1. Field of the Invention[0003]The present invention relates to a security element for marking, authenticating, or identifying objects, particularly documents, securities, stamps, labels, bank bills, bank notes, identity documents, personal identity cards, other ID cards, passports, (chip) cards, access cards, credit cards, access control cards, tickets, driver's licenses, vehicle documents, bank notes, checks, postage stamps, labels, vignettes, paintings, art objects, furniture, measuring devices, machine parts, machines, vehicles, cameras, cell phones, computers, computer-like devices, data storage media, printed materials, books, fab...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(United States)
IPC IPC(8): B42D15/00B23P17/04
CPCY10T29/49B42D2035/34B42D25/29B42D25/405G07C11/00B42D25/21
Inventor KISTERS, FRIEDRICH
Owner KISTERS FRIEDRICH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products