Login| Sign Up| Help| Contact|

Patent Searching and Data


Title:
PERSONAL DATA STORABLE TATTOO FOR HUMAN IDENTIFICATION
Document Type and Number:
WIPO Patent Application WO/2018/220432
Kind Code:
A1
Abstract:
A system for storing public identification on the tattoo by concealing a Quick Response (QR) code within the tattoo and confining the admittance by authentication process for accessing the information is presented. The QR code includes a two-dimensional bar code with embedded public key and a removable or separable security code. The two-dimensional bar code includes the Uniform Resource Locator (URL) address to a secure website and the public identification. When the bar code is scanned for the first time the user is provided with a registration screen to enter the security code and information that may be publicly viewed, as well as a time limit for the expiration of the identification. When the Personal data storable tattoo (PDST) is scanned, only the public information may be viewed unless the security code is entered.

Inventors:
TACHOTH VASUDEVAN (IN)
Application Number:
PCT/IB2017/054808
Publication Date:
December 06, 2018
Filing Date:
August 05, 2017
Export Citation:
Click for automatic bibliography generation   Help
Assignee:
TACHOTH VASUDEVAN (IN)
International Classes:
G06F21/31; G06F17/30; G06K9/00
Foreign References:
US20150053759A12015-02-26
US20140181941A12014-06-26
Other References:
DEAN KUTZER, 1ST QR CODE TATTOO.WMV, 27 March 2012 (2012-03-27), Retrieved from the Internet [retrieved on 20171226]
Download PDF:
Claims:
STATEMENT OF CLAIMS

1. I claim that I have developed personal data storable tattoo for human identification which basic details for the identification, tracking, and authentication purposes.

2. I claim that my invention is based on the quick response code within the tattoo.

3. I claim that this tattoo reveals the personal information by scanning of QR code.

4. I claim that this QR code include two dimensional bar with embedded public key and a removable or separable security code.

5. I claim that the personal data storable tattoo for human identification can be used iin administrative departments for trustworthy procedure which is needed for government identification purposes.

6. I claim that this system doesn't harm the nature or human being.

7. I claim that my invention (PDST) stores all the information about a person and helps in various fields of recognition faced by that individual.

8. I claim that personal data storable tattoo for human identification can be used for all human beings.

9. I claim that personal data storable tattoo for human identification is a novel device developed by myself and the idea has never been used anywhere to the best of my knowledge.

AMENDED CLAIMS

received by the International Bureau on 23 February 2018 (23.02.2018)

1. I claim that I have developed personal data storable tattoo for human identification which basic details for the identification, tracking, and authentication purposes.

2. I claim that the tattoo inserting is permanent so that it won't get ruin or misplaces or missed.

3. I claim that my invention is based on the quick response code within the tattoo.

4. I claim that this tattoo reveals the personal information by scanning of QR code.

5. I claim that this QR code include two dimensional bar with embedded public key and a removable or separable security code.

6. I claim that the personal data storable tattoo for human identification can be used in administrative departments for trustworthy procedure which is needed for government identification purposes.

7. I claim that this system doesn't harm the nature or human being.

8. I claim that my invention, PDST, stores all the information about a person and helps in various fields of recognition faced by that individual.

9. I claim that personal data storable tattoo for human identification can be used for all human beings.

10. 1 claim that personal data storable tattoo for human identification is a novel device developed by myself and the idea has never been used anywhere to the best of my knowledge.

Description:
Personal Data Storable Tattoo for Human Identification

Field of invention and use of invention

This invention relates to personal security and it is applicable in the field of human identification. The device stores personal information in the form of tattoo by concealing a Quick Response (QR) within the tattoo and confining the admittance by authentication process for accessing the information is presented. The QR code includes a two-dimensional bar code with embedded public key and a removable or separable security code. The two-dimensional bar code includes the Uniform Resource Locator (URL) address to a secure website and the public identification. When the bar code is scanned for the first time the user is provided with a registration screen to enter the security code and information that may be publicly viewed, as well as a time limit for the expiration of the identification. When the Personal data storable tattoo (PDST) is scanned, only the public information may be viewed unless the security code is entered. This technology is easily accessible even with a mobile phone. Thus personal data storable tattoo can be reliably used for the identification, tracking, and authentication purposes.

Prior art and problem to be solved

Human identification and associated problems exist from the prehistoric period; specifically, when they started to live in groups or society. Even the practice of naming originated as a way to identify an individual from other societal members. Nowadays the need for a reliable identification method has intensified because most of the public sectors have been computerized. Along with the progress of technology, the means for human identification also have changed to a different level. Governments of each nation have their own protocols to identify a citizen with the respective nationality. Voters card, Permanent Account Number (PAN) card, Passport, Driving License, signature etc are considered for identification and authentication purposes. But chance of forgery is high in these methods by which terrorists, smugglers etc can effortlessly get into a target country and many related cases were reported. A unique system which attracted the researchers in this area is biometrics, where identification of a human being relies on his physiological or behavioral characteristics. Currently biometric system is said to be the most reliable and secure way of recognizing an individual. Fingerprint, finger veins, palm, voice, iris, retina, hand geometry, face, ear, skin color, eye color, gait and eye movement are widely studied for implementing in civilian applications. The features like these are distinctive and consistent for each human. Among these fingerprint is a broadly accepted biometric system for identification and authentication owing to the complicated structure consisting of ridges and valleys which are unique even in the case of identical twins. But attributes like fingerprint, palm, face, iris, skin color, ear etc can be easily counterfeited and it is difficult to understand whether the person was dead or alive during the time of identification. X et al reported an authentication method based on a person's palm vein pattern which cannot be replicated since veins lie beneath the skin and thus provides a high degree of protection. Y et al presented a Gaze Analysis Technique (GANT) in which they studied the eye movement patterns of individuals and created a database for the same. Their paper was founded on the statement that the way an individual gazes at an image might be a typical quality which is exploitable in identification objectives. Similar biometric trait was studied by Z et al and concluded that eye movements stimulated by the neurological interactions are irreplaceable and resilient to counterfeits. Gait based identification system depending on inertial sensors located on the waist has also been investigated by researchers. D et al surveyed the technique by applying it on large number of subjects and different ground slope conditions. Inquiry by E et al presented a 2D ear imaging method which segments the curved region of ear using Fourier descriptors and morphological operators. They stated that since ear has immunity to sanitation problems, fretfulness and privacy it is an exclusive trait for future biometric applications. F et al introduced a combined system of fingerprint and finger vein images. The convenience in imaging of human hand and its features exposed in various illuminations are clearly mentioned in the same article. However, all the systems reported before have complex processes involved and some of the methods are vulnerable to spoofing attacks. The identification ways to be implemented in government related functions or civilian applications should be resistant to falsifications and able to present a trustworthy procedure. Our manuscript introduces a novel idea of a reliable and safe human identification technique derived from the basis of Quick Response (QR) codes and tattoo. Tattooing is a painful process of creating permanent marks on human body for different reasons. This tradition is in existence from the later Stone Age known as Neolithic period. Archaeological documentation says that tattooed skin of a human body dated between 3370 and 3100 BC is the oldest sighting in this field. The custom of tattooing has been subjected to wide research and some earlier reports explain the specific motive behind the respective ritual. Research paper of G et al categorizes those intentions to ten classes and concludes that most of the tattoo bearers do it for being special or unique from others and embossing own body. Apart from these, the system had been performed as a mean for identifying a person affiliated to a particular group or subculture. Here we are presenting a modernized version of tattoo based human identification which combines the accessibility and security of QR codes.

Objects of the invention

Shortcomings of currently used identification methods led to the idea of a personal data storable tattoo. QR code is hidden inside the tattoo thereby providing access control to the genuine person. Administrative departments can make use of this technology for trustworthy procedure which is needed for government identification purposes. PDST stores all the information about a person and helps in various fields of recognition faced by that individual. Thus personal data storable tattoo can be reliably used for the identification, tracking, and authentication purposes.

Summary

Personal Data Storable Tattoo (PDST) agrees the integrity of information through its secure design and sign-in formalities. Photograph or signature on a document can be altered according to the requirements. Reproduction of a false identity card is not a difficult process. Thus, many criminals including terrorists are taking advantage of these possibilities. Personal Data Storable Tattoo put forth solutions for identity related problems and unauthorized access. Tracking of missing children will be easier if PDST is applied. Tattoo printed on the child's body comprise information such as the child's name, address, school details and parent's or guardian's phone number. Likewise this tattoo is good for persons suffering from memory loss (Alzheimer's disease, dementia etc). In both the above cases authorities can identify the individual through personal information inserted in the tattoo via QR coding and contact his/her guardian. PDST is very helpful for corpse identification also. Many suicide and murders are reported nowadays. Recognition of dead body is a big trouble faced by the Police department and other related officials. PDST provides all the information regarding the victim and makes the procedures easier for them. Terrorists trying to deceive through similar outfits of army people will not be able to counterfeit PDST. Hence, defense sector can accomplish the identification of military cadets via this tattoo. Another application of Personal Data Storable Tattoo is in civilian and governmental functions. Identification and authentication are the two important steps involved in all government procedures. Currently these are achieved through certain identity cards consisting of individual's photo and signature. These can be falsified easily and hence there is no guarantee in the identity of a human. But PDST is a secure way that can be implemented with hundred percentage security and reliability. Hence PDST will be a revolutionary invention if it get accepted and applied.

Detailed Description

A. QR coding

QR codes are two dimensional matrix codes possessing great data holding capacity and rapid readability. There are 40 types of codes that can contain variety of characters like numerical, alphanumerical, and kanji. QR codes store information in both directions i.e. vertically and horizontally. Square shaped black and white modules present at the four corners encode data. These can be decoded using Smartphone or other phones installed with decoding software. For example, by scanning the QR code on a product it is easy to link to its brand's website without typing the URL. This attracted the business sector and thus, QR codes are highly employed in the marketing field. Another attribute is that QR codes are machine-readable and it is not possible for a human being to read the content. Hence information sharing via QR codes is secure and dependable. Data restoration capability in consequence of error correction potential and resistance to damages is an attractive feature which enables QR coding system for authentication and identification applications. Some of the nations are implementing this coding system in their governmental functions. On account of its high security and reliability many QR code based authentication mechanisms such as card-less ATM transactions, online banking, image hiding, etc have been reported. H et al studied the possibility of using QR codes for preventing the flow of fake drugs in medical field. Its feature of insensitivity to noise has been investigated by J et al and utilized for the noiseless message reception. Because of its data hiding capacity, safety, consistency, and error correction mechanism, QR coding is confirmed as an ISO standard.

B. Working

The first stage of PDST includes registration by the individual with the knowledge of an authorized officer. For this, details of an individual (name, permanent address, and phone number) and a hyperlink are converted to QR code via QR code generator. It is then concealed in an image and the code-embedded image is tattooed on human body using Computer Numeric Control (CNC) tattoo machine. Scan the code hidden in the tattoo using a Smartphone. A registration window opens and the individual should register an account with username and password, then the person should enter the whole details regarding family, identity card, passport, education, occupation, contact, blood group, citizenship, case history (if any), and more according to the requirement of government. Thus, through registration process the whole information about that person including photo and fingerprint will be recorded and added to the website. When the QR code is scanned for the second time, i.e. after the registration, a screen which shows the details converted to QR code (name, permanent address, phone number, and hyperlink) is displayed. On clicking the hyperlink, it directs to a website log in page where the individual have to enter the username and password. If the entered particulars match the recorded ones, another window opens which consists of the complete data related to that person.

QR code can be hidden inside the tattoo by altering the color of the pixel image. This can be reproduced by the error correction code. Even though the tattoo is noticeable, the QR code entrenched in it will be invisible to normal human vision. When the image is scanned, the pixels of the QR code will be revealed and this will direct us to the data embedded within it. This step is followed by the authentication process, by linking the QR code to the appropriate user by password or biometric information.