Login| Sign Up| Help| Contact|

Patent Searching and Data


Title:
AUTHENTICATION METHOD FOR VEHICULAR NUMBER PLATE RECOGNITION
Document Type and Number:
WIPO Patent Application WO/2015/170245
Kind Code:
A1
Abstract:
The prior art provides a number of tools that reliably perform the automatic recognition of vehicle license plates; such cools are generally based on techniques of automatic recognition of images, and in particular on so-called OCR techniques (Optical Character Recognition) which are now cheap enough to find wide application. However, many applications of these methods of license plates recognition suffer from the fact that it is quite easy to counterfeit a plaque. The present invention proposes a method that allows to authenticate the recognition of a license plate through the verification that in the same place of the plate recognition, there is also the simultaneous presence of another object for acknowledgment, more complex to counterfeit and that normally circulates together with the authentic plate which corresponds to recognized plate number.

Inventors:
DE BETTIN FRANCESCO (IT)
Application Number:
PCT/IB2015/053262
Publication Date:
November 12, 2015
Filing Date:
May 05, 2015
Export Citation:
Click for automatic bibliography generation   Help
Assignee:
DBA LAB S P A (IT)
International Classes:
G06K9/32; G08G1/017; G07B15/06
Foreign References:
EP2249288A22010-11-10
US20090268030A12009-10-29
US20040167861A12004-08-26
Other References:
None
Attorney, Agent or Firm:
BRUNI, Giovanni (Bruni & PartnersCorso Duca degli Abruzz, 78 Torino, IT)
Download PDF:
Claims:
AUTHENTICATION METHOD FOR VEHICULAR NUMBER PLATE

RECOGNITION

Authentication method of automatic recognition for a vehicular plate number characterized in that it comprises at least the following operating phases:

a. automatic recognition of vehicle plate number using a local license plate recognition system;

b. sending to an authentication center, by said local system for license plate recognition, an authentication request which at least includes, together with said authentication request, the recognized plate number and a piece of information relating to the place where the recognition was achieved; c. check that such recognized plate number corresponds to the number of a real plate belonging to the set of plates for which an authentication service is active;

d. in the case of a recognized plate number corresponding to a real plate which belongs to said set of plates for which an authentication service is active, association to said recognized plate number, which has to be authenticated, of at least one physical object for acknowledgment, different from the plate itself;

e. check that said physical object for acknowledgment is present at the same time in which the recognition happened, in an area including the place where the plate number recognition was achieved.

Method according to claim 1 wherein said object for acknowledgment referred in point "d." is a radio-mobile terminal, accessible via a radio-mobile network through a radio-mobile address, and said radio-mobile terminal frequently circulates in association with the vehicle to which the real plate corresponding to said recognized plate number is attached.

Method according to the preceding claim in which said radio-mobile terminal is localized by said authentication center by accessing to the location information

1 address.

4. Method according to claim 2 wherein said radio-mobile terminal receives a message from said authentication center.

5. Method according to claim 4 wherein said radio-mobile terminal sends to said authentication center information processed or inserted locally.

6. Method according to claim 2 wherein an authorized user, having proper

credentials to access data stored in said authentication center, is able to insert in said authentication center a new radio-mobile address through which a new radio-mobile terminal is reachable, and said new radio-mobile terminal is associated to a real plate belonging to said set of plates for which an

authentication service is active; or said authorized user is able to remove a radio- mobile address previously stored in said authentication center.

2

Description:
AUTHENTICATION METHOD FOR VEHICULAR NUMBER PLATE

RECOGNITION

DESCRIPTION

The typical field of application of the present invention relates the recognition of vehicle number plates.

The prior art suggests a number of tools that perform said automatic recognition of vehicle number plates.

These instruments are generally based on techniques for automatic recognition of images, and in particular on so-called OCR (Optical Character Recognition) techniques. In general, the recognition of license plates according to the prior art occurs when a vehicle passes through an area in which there is a video coverage taken by cameras installed with an appropriate positioning. The images taken by the cameras are automatically processed and, in a first phase, the performed analysis just provides for the fast identification of the presence of a license plate within the image. The image processing then continues by the application of OCR techniques to the image detail that contains the license plate and, if the quality of the picture is sufficiently good, the characters (letters and numbers) of the plate are easily recognized.

At this stage, the most sophisticated tools also compare other details of the plates with templates of plate of a large number of countries, and they are therefore able to recognize the nationality of the vehicle and even if the analyzed plate is roughly counterfeited.

The quality of the cameras used for this kind of application is generally sufficient to operate, with the necessary resolution, in various lighting conditions. Furthermore, it is possible to equip the camera system with additional control subsystems; so that there are systems that control the orientation of the cameras and their focus in order to cover, with the resumption of optimal images, a larger area with the same number of cameras. In short, it can be said that the prior art offers tools able to perform the recognition of license plates of vehicles entering a specific area in which some cameras adequate to support such application were previously positioned. Zone" (L I Z) oi many city centers: m this application, the license plates ot all vehicles entering these LTZ are recognized and, if some of these are not present in a list of license plates allowed to transit across these LTZ, for these vehicles, will be initiated the process that will lead to the generation of a sanction to the owner of the vehicle that came into that ZTL without having permission.

The main application limit of these tools of plate recognition (excluding cost issues, where it is always possible to find room for improvement in order to increase the market) lies in offering robustness with respect to the counterfeiting of the plates.

The processes of image analysis, can reduce the extent of this kind of problem through a more and more detailed analysis of the plates, in order to sense many details

increasingly significant and useful for the unmasking of counterfeit plates, however, the limitation of applicability of the instrument is structural, in fact a plaque is always a simple enough object to be counterfeited, and therefore the application of the tools of plate recognition can be exploited only in cases where the risks related to a falsification of a plaque are acceptable.

For example, if a vehicle with a perfectly counterfeited license plate enters a LTZ of a city center, the risk you run is to not be able to impose the appropriate punishment to the transgressor. Such a risk is evidently considered acceptable.

It is different the case in which a driver wants to benefit from payment services billed through the recognition of the license plate of his vehicle. An interesting example could be the payment for the fuel at a service station. From the technical point of view it might be possible to envisage a payment service, managed by an intermediary (e.g. a bank), which provides that a vehicle is recognized through the plate number when it approaches to a fuel dispenser, whether the number plate was included in a list of license plates enabled to such service, the dispenser may be automatically unlocked to refuel, and payment may be completed by such intermediary who then may charge that to the owner of the vehicle, identified through the recognition of the plate number (the payment could take place, for example, according to a procedure analogous to that which occurs with payments made by credit card).

In this last application, compared with the regulated access in the LTZ, the risk associated with the possibility that an impostor is being supplied with fuel at the expense of another person, simply imitating the plate, is a risk that could considerably affect the overall attractiveness of the payment service. it is reliable against the risk of fraud.

Aim of the present invention then consists in indicating an authentication method of the recognition of a plate number of a vehicle that can be carried out before using the information associated with said recognition to enable subsequent operaTioTis.

Another aim of the present invention is to indicate a flexible enough method which allows to provide at least two levels of authentication: a first level in which the holder of the vehicle, whose plate number has been recognized, does not need to do anything, and a second level in which a confirmation action by such holder is requested.

Finally, another aim of the present invention is to indicate an authentication method that can be applied with the necessary speed so as to allow its application to "real time" services.

These and other aims are reached by implementing a method which exploits other information which are available for the authentication of the number plate recognition. In particular, the first piece of information which is certainly always available, in addition to the sequence of letters and numbers that compose the license plate number to be authenticated, consists in the position of the vehicle. In fact, the cameras showing the images from which the recognition of plates' number is performed are installed in known locations, and can film just the plaques that are in a well-defined physical space. Authentication consists in certifying, with a reasonable degree of certainty, the coincidence between the "authentic" license plate corresponding to the recognized plate number and the physical plate on which the automatic recognition has been done.

Therefore the authentication can be carried on through the assessment (which has to be performed through a process independent from the process of optical recognition of license plate) that the "authentic" license plate corresponding to the recognized plate number is actually in the location where the recognition took place.

If said assessment is performed with a high degree of reliability, an erroneous authentication can happen only in the infrequent case in which a "false" license plate and the "authentic" one are in the same place.

It is therefore clear that, thanks to said assessment, the possibility of frauds is greatly reduced; in fact, a potential fraudster could counterfeit only the license plates while they are in his vicinity. plate recognition, using the just described method, consists in the localization ot the "authentic" license plate (which corresponds to the recognized plate number).

The solution to the above mentioned technical problem, namely to locate the

"authentic" plate, can be traced back to a new simpler problem which consists to prove that something that is associated with the "authentic" license plate (that which corresponds to the recognized plate number) is located right in the place where the plate number recognition took place.

The above proposed method therefore provides that, following a recognition of a plate number, action is taken to verify that another object (other than the plate), which must however be associated with said "authentic" license plate, is actually located in the place of recognition and, if that verification is successful, it can therefore be certified, with reasonable accuracy, the authenticity of the recognized license plate number.

The adopted approximations affect the level of authentication security: authentication is therefore incorrect in the case where a counterfeited license plate number is recognized in the place where there is still an object associated with the "authentic" license plate of which the recognized license plate number is a counterfeit.

Said objects associated with the "authentic" license plate for acknowledgment may, in theory, be many and, of course, they are chosen among those objects that, with high probability, can be in the same place of the "authentic" license plate corresponding to the plate number to be authenticated.

The most natural association is between the plate and the vehicle itself to which the plate is attached. A vehicle can be described by brand, model and color; and there are many well-known techniques that allow for the recognition of the brand and model of a vehicle with high reliability. For example exist laser scanners that can reconstruct the three dimensional shape of a vehicle that passes through a passage equipped with said scanners; comparing the detected three-dimensional shape with a collection of templates associated with all possible models of vehicle, the model of the vehicle that has passed through said passage can be identified. The color of the vehicle is rather easy to recognize from simple video footage, possibly the same analyzed for the recognition of the plate number. Said video footage could eventually be used for the recognition of the brand and model of the vehicle (thereby avoiding the resort to the installation of systems of scanners with laser technology), even if this is a type of video recognition definitely more complex than that for the plate number recognition. perform via the computer both the recognition of a plate number and the recognition of brand, model and color of a vehicle which enters a specific area with said plate. It is therefore possible, always by computer, to state that a particular plate number is recognized simultaneously in the same place where there is also the vehicle, defined in terms of brand, model and color, previously associated to the "authentic" plate corresponding to the recognized plate number.

The authenticity certification of a license plate recognized following the verification set out above, runs the risk to be erroneous only in the case in which a counterfeited plate is applied to a vehicle of the same brand, model and color of the one associated to the corresponding "authentic" license plate.

An even more secure authentication level can be provided through direct authentication by the holder of the recognized license plate. In fact, through the recognition of a plate number, it is possible to date back to the owner of the same, and with the help of now widespread media (e.g. by means of a communication over a mobile radio network), it is possible to require to the holder of recognized plate number a confirmation action proving that he is actually doing something related to the reason why said recognition of his plate occurred.

The authentication method just outlined in its essential steps presents also other aspects of particular importance that are better described hereinafter.

The authentication method according to the present invention can in fact be effectively applied by the aid of other existing systems or systems that can be arranged specially for the implementation of the method itself.

In particular, a function of "authentication center" is essential: it is a function which, in practice, is executed by a computer. In the following, therefore, the expression

"Authentication Server" will be used in order to refer both to the physical system (for example a computer) that is supporting the function of "authentication center" and to the functionality itself.

In addition to the presence of said "Authentication Server", it is recommended the availability of the coverage of a mobile network in the same area where the video coverage is provided for the automatic number plate recognition (it is important to note that the availability of mobile coverage is nowadays a widespread prerogative so that it can be taken for granted). the authenticated recognition ot the plate number ot their vehicle have to provide a contact for communication over a radio-mobile network. This latter prerogative is particularly important in the case in which the method requires a confirmation of authentication by the user, but it is even more important in the case, which is extremely interesting, in which said second object for acknowledgment, which has to be localized for authentication of the plate number recognition, is a radio-mobile terminal (instead of a recognized vehicle, defined in terms of brand, model and color). In fact, the actual diffusion of personal radio-mobile terminals is pervasive and therefore a mobile terminal (or a small number of mobile terminals) can be chosen as the object for acknowledgment to be associated to an "authentic" license plate in order to implement the authentication method described in this invention.

The availability of all these system components allows to implement the authentication method of automatic recognition of license plates according to the teachings of the present invention that will be better and further described in the following description, in the appended claims which make up an integral part of the same description and by the illustration of some practical embodiments described as a way of non-limiting examples in the following and in the accompanying drawing of Figure 1 which shows a flow chart which summarizes the macro phases of a typical implementation of the method disclosed in the present invention.

The method represented in Figure 1 explicitly makes reference to the case in which the authentication is based on the location of a radio mobile terminal, chosen as the object for acknowledgment. This choice is a slightly more complex case than the case in which the object for acknowledgment is the vehicle to which the license plate is associated and, above all, is well adapted to implement the previously mentioned authentication method based on two security levels. However, the case in which the object for acknowledgment is different from a radio mobile terminal (e.g. a vehicle defined in terms of brand, model and color) is a simplified case of application of the same process shown in the block diagram of Figure 1.

In the upper part of Figure 1, in the area indicated with the number 100, the locally executed steps are represented while, in the lower region of the figure indicated by the number 200, below the dashed line, they are represented the steps that are managed necessarily carried out locally where the recognition of the license plate occurs.

Number 110 indicates a block associated to a phase which consists in automatic recognition of the number plate of a vehicle and realized with known systems.

Number 120 indicates the first phase of the authentication process which consists in transmitting to the so called "Authentication Server" both the recognized plate number (the sequence of numbers and letters of the plate, and possibly the nationality and type of license plate) and the information about the place and time where the recognition took place.

As soon as such information are in the "Authentication Server", a first check is carried out: said first check is indicated in Figure 1 with the number 210, and consists in determining whether the recognized plate number belongs to the set of plates for which an authentication service is active.

The phase 210 highlights an important constraint of the conceived method: namely the authentication can take place only for those plates for which an authentication service was previously activated.

If said recognized plate were not in said set of plates for which an authentication service is active, authentication would end unsuccessfully. On the other hand, in the case in which said plate recognized was present in said set of plates, the authentication process would continue with the next step which is indicated with the number 220.

Phase 220, is one of the most characterizing stages for the method conceived according to the teachings of the present invention and consists in the localization of a radio mobile terminal associated to the license plate to be authenticated.

In fact, the method foresees that, at the "Authentication Server", in the set of plates for which an authentication service is active, it is available an association between each license plate and at least one radio-mobile address.

In the most usual case, said radio-mobile address is a telephone number associated with a SIM (Subscriber Identification Module) card.

Should however be noted as mobile services are constantly changing. The standard that currently represents the state of the art is the LTE (Long Term Evolution) standard which, as the name that identifies it suggests, is a standard for which continuous developments are foreseen. In particular it is envisaged the definition of different identities (and therefore different syntax to define the mobile contact) to refer to different types of terminals that can be connected to the mobile radio networks. For M I C (Machine Type Communication), i.e. communications between machines: these communications are characterized by some distinctive features, so it is expected that the terminals (and the SIM cards) that will support such communications between machines will be contacted through specific addresses and through specific semantics of contact. In particular, the concept of SIM will be understood more broadly, and will not necessarily continue to be associated with a card (or cards) as we usually conceive it now.

Ultimately, an embodiment of a plate recognition authentication according to the teachings of the present invention, provides that the authentic plate is associated to a mobile telephone number.

The introduction of the phase 220 is essential in the definition of the inventive idea as it changes the technical problem previously identified. By the association of a mobile address to an "authentic" plate, the problem of localization of said "authentic" plate becomes the problem of the location of the mobile terminal to which the said

"authentic" plate is associated.

The rationale underlying the above change of the technical problem is easy to understand, since mobile terminals are a personal item that everyone always carries with him, so a user driving a vehicle, in all likelihood, will bring his own mobile terminal. The method described in this invention thus allows to authenticate the license plates' recognition of those vehicles driven by "owners" who, when activating the service of authentication of their license plates' recognition, must have notified to the

"Authentication server" a mobile address on which basing their authentication.

An essential peculiarity of all radio-mobile services consists in the fact that all radio- mobile terminals which are active in a wide geographic network are localized. In fact, if a terminal is not localized, any communication towards that terminal could not be forwarded, unless making a "broadcast" communication directed to all terminals (it is clear that this last option is a non-sense as it would immediately saturate the network). Therefore, it is clear that the localization of each radio-mobile terminal active (switched on, with a valid subscription and under radio coverage) is known with a certain degree of precision, which is sufficient to route correctly the communications directed to said terminal. It is also clear that such information (about the terminal localization) is available at the management systems of the mobile operator that operates the service associated with the SIM of the considered terminal. with the license plate which has to be authenticated by the "Authentication Server". It is clear that the different procedures able to perform said localization may be divided into two groups:

1) the "Authentication Server" accesses the information which is available at the mobile operator, and consequently the localization is immediate;

2) the "Authentication Server" can not access the location information that is

available at the mobile operator and can only use the address (then the

"Authentication Server" can just contact the terminal).

The first case can be arranged through a series of agreements between the various mobile operators and the subject who operates the "Authentication Server" (i.e. the entity that performs authentication). It should be said that, according to the evolutionary scenarios of mobile services, a lot of new location-based services will be soon introduced in the market of mobile communications, and therefore the localization is expected to become a typical service offered by mobile operators to third parties.

Also the second case is however quite interesting from the application point of view. Phase 220 can be carried out even without recourse to the location information that is in the availability of the mobile operator. In fact, the "Authentication Server" can establish a contact with the terminal, send a message and, via said message, a pre-installed application (for example pre-installed at the time of activation of the authentication service) may be executed; and said application can simply transmit to the

"Authentication Server" the localization of the terminal itself.

There are several ways by which a mobile terminal can localize itself. For example, the localization could be achieved through the analysis of the received radio base stations or, more directly, the terminal itself could incorporate a satellite locator (e.g. GPS or "Galileo"); in this latter case, it is noted that the integration of said locators in mobile terminals is now very common since they are indispensable also for many other extremely popular applications.

Ultimately, although it can be performed in many different ways, phase 220 can be summarized as a phase in which the "Authentication Server" acquires the information about the location of a terminal associated with the license plate to be authenticated. authentic license plate corresponding to the recognized plate number to be authenticated is not a radio-mobile terminal, but a vehicle defined through some of its characteristics, phase 220 is a simple verification step to check that the vehicle associated with the authentic license plate is present in the area where recognition took place. This check can easily be done since the "Authentication Server", in addition to the data related to the recognized number plate, can also examine information relating to vehicles recognized within the monitored area, eventually including the characteristics of the vehicle bearing the recognized license plate; said information is easily retrievable locally with the aid of known systems as it has been explained earlier in the present description.

The next phase is shown in Figure 1 with the number 230 and it is a decision phase in which, if the recognized license plate is in a place where it is present the object for acknowledgment too, authentication is attested: said object for acknowledgment may be a radio-mobile terminal or a predetermined vehicle defined through some of its features. Said phase 230 is now further detailed in the case of application in which the

authentication method is based on the detection of the presence or absence of a radio- mobile terminal in the area recognition.

Being available both the location information of the plate on which the recognition occurred and the location information of a mobile terminal associated with the

"authentic" plate corresponding to recognized license plate, the "Authentication Server" performs a check that the two objects are located in the same place (of course the verification will have the margins of accuracy that derive from the precision of the two localizations). The outcome of this check can determine three different progresses of the method according to the invention.

- The case in which the terminal and the recognized license plate are localized in different places will determine an outcome of "Authentication denied". In this case, any service based on license plate recognition should take into account that it was not possible to authenticate the recognized license plate and therefore it will develop consequently.

On the other hand, in the event in which the terminal and the recognized plate are localized in the same place, two other cases may occur:

- direct positive authentication, in me case oi direct positive autnentication, me assumption is mat me mere iact mat tne recognized license plate and the terminal associated with authentic plate are in the same place, constitutes a proof of authenticity of the plate.

In fact any counterfeiter, in addition to the counterfeited plate, should also have taken the mobile terminal associated with authentic plaque, or would have to forge a plate of a vehicle that was occasionally close, assuming that the "owner" of the authentic plate had its active mobile terminal nearby.

It is clear that these cases are very unlikely and still very complex to be implemented. In addition, authentication based on a check associated with the mobile terminal is extremely safe because the authentication that is performed on the mobile terminal is very reliable (it is not easy to clone a SIM card).

The authentication implemented as described above is also very user friendly. In fact, the user doesn't need to perform any operation; he just need to carry with him his own terminal (with its SIM), the one associated with the authentication service of his license plate.

An interesting variant of the described method comes from the observation that, while the mobile terminal is a personal device, a vehicle can be used by multiple users: for example, a car can be used by all members of a family. In this case, it can be allowed the association of a number of radio mobile addresses to a single license plate, and the authentication can be successful if at least one of the terminals associated with the "authentic" plate is located in the same place of the recognized plate.

The observation that the radiomobile address is a personal characteristic, while a vehicle can be shared among multiple persons, allows to introduce an interesting potentiality of the method: in fact the method can easily handle a level of selectivity in the

authentication, making it possible only if the vehicle is conducted by an "authorized user". In fact, the authentication is successful only when there is the simultaneous presence (in the place of recognition of the plate) of at least one of the radiomobile addresses belonging to people previously stored on the database in the "Authentication Sever". Such potentiality offered by the method, based on the detection of the presence of radiomobile terminals, also allows the management of fleets of vehicles that can be assigned to different users: e.g. a fleet of company cars at the disposal of employees and consultants, or even fleets of cars used for the rental. In these cases it is possible to create appropriate credentials to access the database at the "Authentication Server", thus address to a particular plate number, together with the period that a particular vehicle is assigned to a particular user.

It is also to be noted that the radio-mobile address might not necessarily be a personal address: as mentioned earlier, in fact, in the coming years, it is expected a widespread communication among machines. In particular it is expected that all the vehicles are mandatory equipped with a radio-mobile vehicular terminal in order to support automatically an emergency call in case of accident: a call in which, among other things, the position of the vehicle at the time of the accident have to be communicated. Said terminal, associated with the vehicle with the main purpose of supporting the emergency call, may also be the one used for the authentication process according to the teachings of the present invention. The use of such a terminal would also result particularly safe as it is easily associated with anti-theft systems and, consequently, the authentication service may be so arranged as to be robust with respect to cases of theft; anyway the integration of the authentication method in cases of theft of the vehicle is not a subject of the present invention, it is sufficient here just to highlight that the method can be so arranged as to be able to offer guarantees also in the case of theft of the vehicle.

A further consideration about the safety of the method against attempts of fraud can be carried out in relation to the case where the localization of the terminal is performed through a software application installed on the terminal itself; in this case, the user may disable the application (or directly disable the authentication service) when he expects to have no need for authentication and, doing so, he would introduce an additional safety factor preventing any illegal authentication by anyone.

The described method is flexible enough to also provide for an additional level of authentication security.

A further phase that allows to perform an authentication based on explicit confirmation by the holder of the plate to be authenticated is shown in Figure 1, and it is indicated with the number 240.

Said explicit confirmation is easily implementable by exploiting the fact that the described method also provides for the establishment of a communication session between the "Authentication Server" and the mobile terminal on which the

authentication itself is executed. authenticated is contacted by the "Authentication Server", and it transmits a message to the terminal. Via said message, similarly to the request for the localization of the terminal, a software application installed in advance can be activated, and it can propose to the user the insertion of a security code known by the user himself. This code can be a secret code or a code containing characters communicated to the user during the process of authentication request. For example, in the case of an authentication request in order to unlock a fuel dispenser, the required confirmation code might contain a part that the user can acquire from the dispenser itself. Of course, in this case, such code must be known to the "Authentication Server" which will compare it with the code inserted by the user: this is not a problem because the "Authentication Server" can be connected to the fuel dispenser as it is connected to the plate number recognition system (obviously both the fuel dispenser and the plate number recognition system are local systems, they are in the same place and both connected to the "Authentication Server").

In the just mentioned example a further variant is evident: in fact, phase 240 can substitute and make unnecessary some steps of the preceding phases 220 and 230. In fact it is sufficient that the "Authentication Server" identifies the association between the terminal and the recognized license plate. At this point the localization of the terminal is not strictly necessary, as the terminal can be reached in order to forward the confirmation of authentication request without any localization by the "Authentication Server". The localization is in fact automatically verified by the fact that the user will be asked to enter a code which can be known only if he is in a certain place.

Phase 240 is thus a decision-making phase that asks the user to transmit a key. That key can prove his identity and his willingness to confirm the authentication. In addition, such key, when it is dependent from the place in which it is inserted, since it is communicated to the user directly in the place where he is, it can also prove the presence of said user in a certain place.

The verification of correctness of the inserted key thus allows to certify the

authentication of the license plate recognition, or to deny authentication of the recognition, in the case of incorrect insertion of the key (or if the key is not inserted within a predetermined time limit). "owner" oi the plate must personally coniirm the authentication through his personal terminal and by entering a security code.

In extreme synthesis, said method is characterized in that it includes at least the following essential operational phases:

a. sending to an "Authentication Server", by a local system of license plate

recognition, an authentication request in which, together with said request, they are transmitted both the recognized number plate and an information that allows to identify the place where the recognition took place;

b. check that the recognized license plate corresponds to an "authentic" license plate belonging to the set of plates for which an authentication service is active; c. in the case of a plate belonging to the set of license plates for which an

authentication service is an active, association to said license plate of at least one physical object for acknowledgment;

d. verification that said physical object for acknowledgment is present in an area including the place where the license plate recognition occurred, at the same time of said recognition.

It is clear that said physical objects for acknowledgment associated with the "authentic" plates must be chosen among objects usually traveling together with said "authentic" plates; and then favorite objects for the implementation of the method taught by the present invention are: the vehicle to which the authentic license plate is attached or one or more mobile terminals belonging to the people who habitually travel on board of said vehicle.

The authentication of the license plate recognition based on the adoption as an object for acknowledgment (as specified in point "c." of the aforementioned method) of a terminal for radiomobile communications, provides that the terminal is active in a network for radio-mobile communications. It is essential that said terminal for radio- mobile communications is activated following an authentication procedure independent from the authentication process of the plate recognition. This is what commonly happens in all cellular radio-mobile networks in which the terminals are activated on a network after a very reliable authentication procedure, based on the fact that the Identification Module).

Moreover, as explained above, it is underlined that the verification referred to in point "d." can be performed in many ways and with many practical variants, without departing from the fundamental inventive concept of the method which is based on the fact that the recognition of a plate number is certified as authentic, if this recognition takes place in a place where it is also possible to attest the presence of a radio-mobile terminal active on a radio-mobile network, and said terminal (which, to be active on that radio-mobile network, must have completed a successful authentication procedure) had previously been associated with the license plate to be authenticated.

The main advantages of the present invention consist in the fact that a method such as the one described allows to meet the purposes it was conceived for.

In particular, in the case of method based on the adoption, as the object for

acknowledgment, of a terminal for radio-mobile communications, it is possible to benefit of the widespread coverage of radio-mobile cellular networks, whereby this authentication method of plate recognition is in fact applicable in all places where there is a cellular radio-mobile coverage.

Furthermore, the fact of using, in the authentication method, a very efficient

geographical telecommunications network able to support real-time communications (such as radiomobile networks are), allows to conceive said authentication service by a centralized "Authentication Server", placed remotely rather than in the areas where plate recognition happens, and said "authentication Server" can be implemented using a computer powerful enough and fast enough to perform the authentication procedure in such a short time that it could be considered, in the user perspective, a real time authentication.

As already said above, the method is subject to numerous variants, and the process can be enriched with different accessories to be used in many different application contexts. A very interesting application context is the context of electronic payments. There are in fact many cases in which a payment can be associated to the transit of a vehicle in a specific area; one such case is the case of refueling: in fact a vehicle, to be refueled, must necessarily approach a fuel dispenser. (tnis is already nappening regularly tor security reasons ; me "owner" or tne venicie could associate the license plate of his vehicle to his credit card and the debit transaction could be subject to the authentication of license plate recognition carried out according to the teachings of the present invention.

The above example just refers to a process of electronic payment but does not enter into details. In fact, it is not the specific object of the present invention to identify new methods of electronic payment. This description just aims to describe an authentication method of vehicle license plate recognition and to highlight the benefits of application. In fact, the identification of a vehicle via its license plate is particularly interesting as all vehicles have a univocal license plate and systems for license plates recognition are mature systems that do not require any adaptation action on vehicles.

Other systems of recognition and identification of a vehicle require installation of appropriate equipment on board of the vehicles, and they are based on the adoption of communications standards that are slow to be widely adopted.

The authentication service described in this invention can instead be benefited by any holder of a vehicle (which will necessarily be a weblog vehicle) who has a subscription to a service of mobile telecommunications and a credit card. Therefore, it is a service that, if properly managed, could be activated with a lot of flexibility and offered virtually to the entire population living in the more developed countries.

For example, a traveler who is planning a trip to a foreign country, could enable the fuel payment service on his credit card, and associate, for authentication, his own radio- mobile number, and the service could be activated just for the short period of time in which the traveler is staying in said foreign country he is visiting.

As already said, but it is useful to repeat once again, the just described invention lends itself to numerous variants that may offer additional advantages compared to those previously mentioned, but these further variants can be made by the man skilled in the art without departing from the invention as it is clear from the present description and in the claims appended hereto.

Furthermore, the invention can be realized in a partial way as well as all the various details described may be replaced with technically equivalent elements or solutions.