htsi

image

imageHome imageAbout us imageServices imageManagment imageTechnologies imageContacts

en/bg/ru


 

 

Objective of the Security Marking Technology

Car and Vehicle Marking CD

Labels and Packing

Arms, ammunitions and spare parts

Banknotes

Case Study

Glossary

Documents and ID Cards

The basic principle of our technology consists in introducing at different levels of the visible marking (visible image, logo, number, etc.) of additional, hidden (secret) information. That additional hidden (secret)information is different and specific not only for each level where it is embedded, but also for each individual object of protection and is generated and provided by independent sources (manufacturer, control authority, etc.) The link and relationship between the visible image (information, number, logo, etc.) and the embedded (hidden, secret) information for any specific level is recorded in a database on a writ only media CD-ROM/DVD-R to ensure protection against unauthorized and/or undesired modifications or corrections.

Untitled-4.gif
 
In view of the independence of the different levels of protection, access to the personalization procedure will have only the respective authorities, responsible for the provision and generation of the hidden visual information (encoded) for the respective level.

In such a way we obtain an independent protection within the protection and if by chance an information at one level is falsified or forged, as a result of leak of security information or corruption within one organization, the encrypted information for the other levels remains valid and safe. Thus if somebody had the intention to brake the security codes and reproduce the original security markings, he would need also to replace the original records in the databases for each level of protection. As a result the possibility of fraud, forgery and reproduction of the original unique security marking is very much limited.