1. Field of the Invention- The present invention concerns a device for protecting theidentity of objects. The practice of applying protective sealsmade from sealing wax to documents, particularly to letters andparcels, has been known for centuries. Their purpose is notonly to identify the originator or the sender, but also tosafeguard the integrity of the enclosure of such documents andthereby to protect such objects against access by unauthorizedpersons, i.e., to prevent forgery, in short, to protect theidentity of the objects. 
2. Description of the Related Art- These known measures for protecting the identity of objects haveoften proved to be inadequate. Not only are the seals broken,whereby unauthorized persons may gain knowledge and takeadvantage of the sealed objects, it also happens frequently thatthe contents of the documents are changed, i.e., falsified,before a forged seal is applied in place of the original seal. 
- Another example to be mentioned are the tamper seals, mostlymade of lead and known for far over 100 years, that are used tosafeguard the object that is to be protected, such as forexample a measuring instrument for registering the consumptionof electricity, water, gas or thermal energy, against access andmanipulation by unauthorized individuals. This kind of seal isusually combined with a safety loop that consists of a sectionof wire and is installed on the measuring instrument in such amanner that the loop will have to be cut or the seal has to bebroken in order to remove the safety loop that prevents accessto the enclosure of the measuring instrument. In a practicalcase where the loop is found cut open or the seal broken orrecognized as a forged replacement and the instrument has beentampered with, the meter reader will need to involve anadditional person to witness the evidence of tampering or elserisk to have the case dismissed for lack of sufficient proof.The preceding examples show that not only document seals can bebroken and forged with relative ease; wire seals, too, can beopened usually by destroying them, and with some skill can beclosed in a makeshift way after the illegal manipulation or caneven be replaced by forged ones. Thus, one concludes that inpractice they cannot infallibly perform their intended functionof protecting the identity of objects. This problem is all themore aggravated as wire seals in their function as devices forprotecting the identity of objects are used in a wide variety of other applications and for the most diverse purposes. Only as examples and not to introduceany restrictions, one might mention trip and flight recorders, storage depots,warehouses, particularly facilities that are officially put under seal by the customs authorities,the load compartments of delivery vehicles that are locked and sealed duringtransit, freight containers, safety vaults, money-transfer containers, safety-deposit boxesand transportation containers for valuables. 
- As a further known measure for protecting the identity of objects such asvehicles of all kinds, for example automobiles or their engine blocks, combinations ofnumbers and/or letters are punched into the car body or the engine block for identification.Here, too, it has proved to be a disadvantage that after a vehicle theft it is relativelyeasy to obliterate this kind of number/letter combination and replace it with anew one that matches forged vehicle documents. As a rule, stolen vehicles prepared inthis manner cannot be found and apprehended in road-checks, particularly when crossingnational borders, except by extraordinarily time-consuming efforts. 
- Furthermore, it is to be mentioned that in WO-A-97/38364 a device accordingto the preamble ofclaims 1 or 2 is disclosed but without a simple and effectiveidentity-protection loop. 
SUMMARY OF THE INVENTION- Therefore the object of the present invention is to provide a device forprotecting the identity of objects as well as of persons, which assures that the dangerthat a forgery or a misuse could occur without being recognized is practically eliminated. 
- The inventive device that solves this problem is essentially characterizedby the features of the characterising part ofindependent claims 1 or 2, respectively.By using the identity-protection loop which is formed by a light conductor or by asemi-conductor chain as defined inclaims 1 or 2 it is easy to check whether manipulationtook place with the intention of adversely affecting the identity of the object. Ifthe security device is accessed by authorized persons and a change is made in the objectin the intervening time interval, the corresponding new data can be stored andinterrogated in analogous fashion. A falsification can be recognized from the fact that the respective identity has either not been issued or is a duplicate of a previouslyissued identity. 
- It should be emphasized that the word "chip" is to be understood in thebroadest possible sense. It includes electrical, electronic as well as optical moduleswhich, based on a program for identity protection, control the component elementswhich are found in any electronic or optical computing system. 
- In the practice of the device according to the invention, if a chip of this kind is fastenedto a vehicle (the vehicle being the object to be protected) or to an essential partof the same such as an engine block and if the data that define the identity of the vehicleor the engine block are stored in the chip through carrier-frequency transmission by means of the terminal,then this chip, as it forms a single unit with the object thatis defined by its data, is an essential and continuallyavailable means for identifying the object. In case the vehicleis being checked, a discrepancy between the data in the vehicledocuments and the data on the vehicle or in a central data bankthat can be interrogated from the chip will be immediatelyevident, as it is impossible for unauthorized individuals tochange the data on the chip, e.g., to match the data on newreplacement papers. A theft will be immediately evident in thismanner. 
- The inventive device can also be successfully used in the samemanner to protect the identity of objects in the form ofdocuments, such as letters and parcels, in that the previouslyused wax seal is replaced by the aforementioned chip which isfirmly attached to the cover of the letter or parcel. After thechip has been attached to the object, the non-erasable data onthe chip that define the identity of the object can beinterrogated only by authorized individuals by means of theterminal. 
- The inventive device further extends to a device for performing the aim ofthe invention is further characterized bythe distinguishing elements stated inclaim 3. The term"antenna" as used in this claim and in the further context is tobe understood in the broadest sense, including in the sense of atransponder. If the object whose identity is to be protectedis, e.g., a valuable boat, a valuable passenger automobile or avaluable truck or even only its engine, the device in aparticularly suitable embodiment of the invention isdistinguished by the characteristics defined inclaim 8. As arule, the capsule containing the chip for protecting an objectis connected to the latter in such a manner that it will be easyto bring the terminal sufficiently close to the object. Inthese normal cases, it is particularly practical to form theantenna that is connected to the chip by embedding it in theneutral material of the capsule, preferably a polymer, as a partof the capsule-chip unit. 
- However, in the aforementioned case where the objects to beprotected are of larger dimensions, e.g., if the objects arevehicles, an antenna will be needed which is arranged outside ofthe capsule and connected with the chip in the manner stated inclaim 10. This kind of an antenna, which is galvanically coupledwith the chip and arranged separately outside of the capsule ispractical in unfavorable spatial conditions where the terminalcannot be brought into the immediate vicinity of the capsuleeven for a short time. In the case of vehicle checks,particularly border checks, the non-erasable data on the chipthat confirm the identity of the vehicle in accordance with thevehicle documents can be called up from the outside byactivating the terminal. 
- For this purpose, according to a first, particularly simpleembodiment, a capacitor is connected to the chip in the mannercharacterized inclaim 11. 
- A more elegant possibility of exchanging data between the chipand the terminal is available if the device is designedaccording to the characteristic elements ofclaim 12. 
- A battery of the kind provided inclaim 12 can be in the form ofa so-called long-life battery, i.e., a battery of sufficientcapacity to last for a long time, considering the small amountof power needed for a data transmission. A longer lifetime isachieved if in the data interrogation, the data transmission isperformed by using a carrier-frequency based energy transmissionto the chip. 
- As an alternative it is also possible to use a battery that islocated inside the capsule and is rechargeable, according toclaim 13, with inductively transmitted energy from outside thecapsule, preferably from the terminal. It is especiallyadvantageous if the battery is integrated into the capsule as anenvironmentally compatible plastic or foil battery. 
- The examples described above are of the kind where the intendedfaultless identity protection is already assured by using thechip in a unitary arrangement together with its enclosingcapsule and firmly attached to the object to be protected. 
- However, in all those cases where it is usually necessary to usean identity-protection loop with a seal,the invention is applicable, comprising the light conductor.By comparing the signal data emitted atone end of the loop, e.g., in the form of electric pulses, tothe signal data returning with a certain delay at the other endof the loop, the integrity of the loop is ascertained as long asthe relationship between the emitted and the returned signaldata remains the same. Also, if the signal data emitted at oneend of the loop return in the form of light signals at the otherend of the loop, the integrity of the loop is likewise assured. 
- From the point of view of building the device, an arrangementwith the characteristics ofclaim 16 is very advantageous. 
- When light conductors are used in the identity-protection loop,a further technical refinement can be advantageous in which thelight intensity measured at the receiving end of the loop iscompared with the light intensity at the other end of the loop. 
- The conditions are further tightened if the light signals arepolarized. A temporary opening of the identity-protection loopin order to illegally access the secured object is impossibleunder these conditions, not only because of the time that willbe needed, but not available, for the repair, but also becauseof the fact that the original polarity and light intensitycannot be restored at the receiving end. 
- In view of the desired degree of security, it is advantageous ifin an attempt at opening the capsule and exchanging the lightconductor, the carrier base that is formed, e.g., of a polymermaterial and on which the chip is mounted is inevitablydestroyed so that the entire capsule-chip unit cannot be usedagain; this, too, gives assurance against an unauthorizedintrusion into the identity protection. 
- It needs to be mentioned at this point that it is practical touse the known modern technique of printing semiconductors ontopolymer carrier films; see report IEDM (International ElectronicDevice Meeting) 97/331 "Polymeric Integrated Circuit and LightEmitting Diodes", a report of Philips Research Laboratories. 
- Further, for the production and the design of the chips that areconnected to the polymer carrier films, it is efficient to alsouse the most modern technology that is employed by the firmsTexas Instruments, Motorola, and others in the production of theelectronic tags that they developed (Scientific American, April1997,page 32, "Check your bags"). These tags contain a chipthat simultaneously performs the functions of a memory,processor, sender, and receiver and is combined with a miniaturebattery as well as an antenna. 
- Reference should also be made to the known technology for thewireless remote accessing of identification or communicationcards that is being employed here and which is the subject ofthe international standard ISO/IEC 14.443. The energy transferfrom the terminal RCCD (Remote Communication Control Device) tothe chip RICC (Remote Interface Communication Card) is takingplace at a radio carrier frequency of fc = 13.56 MHz which isamplitude-modulated for the data transmission with a frequencyof approximately fs = 850 kHz. 
- Further, for the sake of completeness it should be mentionedthat the invention is, of course, not restricted to the moduleelements that have been developed in the past decades for theproduction of "electronic tags". Rather, it is possible to alsouse in the production of seals the particularly compact elementsthat are made from biological molecules, i.e., to make use ofthe latest breakthroughs in the field of computers (ScientificAmerican, March 1995). 
- In the above, the possibility of forming an identity-protectionloop from a light conductor has been presented. It has beenfound that a very effective alternative is obtained if theidentity-protection loop is designed instead as a semiconductorchain that is connected with the chip and has the form of adelay chain with a plurality of delay circuit elements, thenumber of which determines the point in time when the pulse thatoriginated from the chip, after traveling through the delaychain, arrives back at the chip. This semiconductor chain ispreferably based on a polymeric carrier material and thus isflexible like a light conductor. 
- It is possible to inscribe the start and delay times into thechip as a part of the initialization and to compare themcontinually by means of a predetermined clock frequency. Ofcourse, the delay time is altered by any change in the number oflinks in the chain, e.g., by the short-circuiting of time-delayelements. This will be recognized by the chip and interpretedas an intrusion into the identity-protection loop, i.e., as a"breaking of the seal tag". The electronic circuit of the sealcan, of course, be operated in a passive as well as an activemode. In order to operate the semiconductor chain in thepassive mode, the carrier frequency may be reduced to a suitableclock frequency by means of a frequency divider. In the activemode, the chip can also register the exact time of theintrusion. If the chip can be supplied with position data froma terminal that incorporates the GPS (Global Positioning System)functions, this makes it possible to also determine and registerthe location of the intrusion in addition to the time. 
- The aforementioned semiconductor chain can also be designed as apure resistor chain. For the determination of the delay time, it has proven to be particularly advantageous if thecharacteristic elements of claim 17 are employed. 
- The identity-protection loop can, as described above, bedesigned as a light conductor or as a semiconductor chain in theform of a delay line. A further alternative, in which thecharacteristic elements ofclaim 31 are employed, has proven tobe very advantageous. 
- In the above, a device according toclaim 1 or 2 is presented in various embodiments wherein a relativelyexpensive capsule-chip unit is employed which, when used incombination with an identity-protection loop, in the closedcondition will permit no opening of the capsule for separatingthe two ends of the identity-protection loop without causing thedestruction of the loop or the capsule-chip unit.Alternatively, however, it is possible to provide thepossibility for a separation, i.e., opening of the loop, if careis taken that the act of opening, if it was perpetrated by anunauthorized individual, is infallibly determined and alsoregistered in the chip. The relatively inexpensive devicerepresenting this variation of the invention in which thispossibility is realized is essentially characterized by thedistinguishing elements ofclaim 32. Each of the two ends ofthe identity-protection loop that is formed by a semiconductorchain is, as a matter of practicality, connected with theassociated snap fastener through electrical contacts.Alternatively, the connection can also be made by optical means.It should be mentioned that this less expensive snap fastenerversion, too, by using a kind of barbed hook on the ball-shapedpart that forms one part of the snap fastener, can be designedso that after closing the snap fastener the possibility of reopeningis precluded, except by forcing the device and acceptingits destruction. 
BRIEF DESCRIPTION OF THE DRAWING- Examples of embodiments of the invention are explained in thefollowing, making reference to the attached drawing, wherein 
- Fig. 1 represents a schematic cross-sectional view of a capsulewith the inserted ends of an identity-protection loop that isformed by a semiconductor chain,
- Fig. 2 represents a circuit schematic of a semiconductor chainthat forms an identity-protection loop,
- Fig. 3 represents a diagram to illustrate the delayedpropagation of a pulse in a periodically operated semiconductorchain,
- Fig. 4 represents a cross-sectional view similar to Fig. 1 withan identity-protection loop that is formed by a light conductor,
- Fig. 5 represents a schematic view of a GPS display indicationof a GPS recorder that is connected with the capsule-chip unit,
- Fig. 6 represents a top view of one of the snap fastener partsthat is formed by a spring component,
- Fig. 7 represents a top view of the snap fastener part of Fig. 6with a portion broken away to illustrate the chip that islocated behind it,
- Fig. 8 represents two snap fastener parts of a matching pairattached to the corresponding ends of an identity-protectionloop.
DETAILED DESCRIPTION OF THE INVENTION
- Fig. 1 shows acylindrical capsule 1 of a neutral material thatdoes not interfere with the function of the identity-protectionloop, e.g., a polymer. The capsule is assembled from twocapsule parts 2 and 3 into which the respective ends 4 and 5 ofan identity-protection loop are inserted. 
- As shown in Fig. 2, the identity-protection loop in theillustrated example is in the form of a delay line that isformed by a semiconductor chain. The latter comprises, e.g., asequence oftransistors 6 as well as associated R-C elements 7serving as delay elements. 
- The number of the chain links arranged along the semiconductorchain in the form of R-C elements 7 andtransistors 6 determinesthe travel time T of a pulse fromend 4 to theother end 5 ofthe identity-protection loop. This travel time T of the chain,which is an identifying characteristic of the identity loop, ismeasured at the initialization of the chip and is written intothe chip. Given that with every change in the number of chainlinks the delay, and thereby the travel time, is changed, it ispossible to determine by any comparison of the actually measuredtravel time with the stored characteristic travel time whetherthe identity-protection loop has remained intact or whether achange in the number of chain links, e.g., by short-circuiting,has occurred. 
- In contrast to the aperiodically operated semiconductor chain ofFig. 2, in the periodic operation illustrated in Fig. 3 a clocksignal is used for controlling the pulses of a pulse chain.This clock signal is obtained through frequency division, usingthe carrier-frequency available from the terminal, as indicatedschematically by "clock" in Fig. 3. Associated with each of theclock intervals 1, 2, 3 ... on the X-axis is a correspondingdelay t of, e.g., 10, 20, 30 ... milliseconds on the Y-axis.Here, too, an intrusive manipulation in the semiconductor chaincauses the travel time to deviate from the stored signaltransmission time. 
- Thelarger part 2 of the capsule contains achip 8, anantenna9, as well as abattery 10. In addition,connector sleeves 11and 12 for the connection of the respective ends 13 and 14 ofthe identity-protection loop are firmly imbedded in the plasticmaterial, e.g., epoxy resin, of thecapsule 1. The end 13 ofthe loop with theconnector sleeve 11 already forms an integralunit with the plastic material ofcapsule 1. As shown in thedrawing, the opposite, free end 14 of the loop runs coaxiallywithconnector sleeve 12 and also withpart 3 of the capsule andremains axially movable relative to the latter until the partsare fixedly connected. In this, a tubular guide 15 is helpful,which is provided with astep 16 to limit the travel into theconnector sleeve 12 so that the end 14 of the loop at itsextremity does not bear against the bottom 17 of the connectorsleeve. As shown, not only thechip 8 but also theantenna 9and thebattery 10 are each electrically connected on one sidewith the electricallyconductive connector sleeve 11 and on theother side with the alsoconductive connector sleeve 12. 
- The twoparts 2 and 3 of the capsule can be solidly connectedwith each other by means of a quick-setting adhesive. For this purpose, a conicaladhesive container 18 is attached at one endof the guide 15, which passes coaxially through the container.Adjoining thecontainer 18 is a cylindrical guide 19 which, in amanner not specifically shown, extends into a central opening ofpart 3 of the capsule, so thatpart 3 can move along guide 19 inthe direction towardspart 2 of the capsule. Facing the slopedsurface of theadhesive container 18 is a correspondingly slopedexterior surface 20 ofpart 2 of the capsule.Surface 20 hassharp protrusions 21. Likewise,protrusions 22 of the same kindare provided on the surface portion ofpart 3 that facespart 2.The walls of theadhesive container 18 that contains the quick-settingadhesive are pierced, i.e., destroyed by theprotrusions21 and 22 when the connection ofparts 2 and 3 is closed, sothat the adhesive is released and flows to the peripheral areaof thepart 3 of the capsule, i.e., a cone-shaped contactsurface 23, and to the corresponding contact surface 24 of thepart 2 of the capsule. In this closed capsule, the parts thatare essential to its function are protected against anyintrusion from the outside and thus no longer accessible tomanipulations by unauthorized individuals. Any attempt, e.g.,to open one of the ends of the identity-protection loop, theequivalent of breaking a conventional lead seal, would causeirreparable and immediately recognizable damage to thefunctionally essential components. 
- In Fig. 4, an alternative possibility is illustrated in whichthe identity-protection loop is formed by a light-conductor asthe conductive core.Chip 8 is again mounted on apolymer film25 or the like with conductive traces by which the chipcommunicates with the two ends 4 and 5 of the light conductor,which comprises a glass fiber cable, throughlight sources 26and light-sensing semiconductors 27. At its oneend 4, thelight conductor is welded to aprism 28 that is arranged abovethe light source, and at itsother end 5 it is likewise weldedtolight sensor 27 through aprism 29. 
- In this embodiment, too, where a light conductor is used inplace of a semiconductor chain, the free end of the lightconductor can be inserted concentrically into the cylindricalcapsule, similar to the example of the semiconductor chain, andconnected to a closed unit by adhesive bonding of thelargerpart 2 of the capsule with the other,smaller part 3. In itsclosed condition, thecapsule 1 in either embodiment in practicehas a length of about 25 mm and a diameter of less than 20 mm.Analogous to the first example where the identity-protectionloop takes the form of a semiconductor chain in accordance withFigures 1 and 2, so also when using a loop consisting of a glassfiber cable, there is assurance that intrusions by unauthorizedindividuals will necessarily cause the destruction offunctionally essential parts of the capsule-chip unit 1, andthat such intrusions will be immediately recognizable. 
- In the example of Fig. 1, the required energy is supplied by thebattery 10, so that this "seal tag" represents an active unit.In the case of the embodiment according to Fig. 4, in whichthere is no battery, the power supply is provided by a capacitor(not shown in the drawing) receiving energy during an activetransaction through power emission from the terminal. 
- The mobile terminal used for the surveillance of the capsule-chipunits and (if applicable) their associated identity-protection loops enables on the one hand the aforementionedwireless transmission and storage of data in the chip as well asthe recall of the data stored in the chip for the purpose of anidentity check. On the other hand, there is the possibility oftransmitting energy from the terminal to the capsule-chip unitand thus to communicate also with units of the kind that has noresident long-life energy source. 
- The GPS recorder shown in a frontal view in Fig. 5 makes itpossible to determine and register the exact location of theintrusive manipulation in the identity-protection loop, i.e.,the "breaking of the tag", by means of a special, appropriatelyequipped transportation terminal. The latter determines inaccordance with the known state of the art the current GPSlocation and writes it to the identity-protection chip. Theprevious location is thereby overwritten. If the object undersurveillance is removed from the surveillance range of thetransportation terminal or in case of an identity violation, thelast stored location remains on the chip. This function can beoperated in a passive as well as an active mode. 
- The required event timing function can be provided in theelectronic circuitry of the capsule-chip unit or the terminal. 
- Figures 6 through 8 serve to illustrate another embodiment, inwhich a snap fastener of the customary design with twofastenercomponents 33 and 34 is being used. Thefastener component 33,a spring module with insertedspring 35 in the illustratedexample, takes on the function of a comparatively simpleembodiment of the capsule. Namely, as shown in Fig. 7 butpartially covered by the fastener component, saidfastenercomponent 33 comprises the associatedchip 8 which is accessedby contacts 36. At the center of the chip there is an opto-coupler37 comprising, e.g., a light source in the form of alight emitting diode or a light sensor, as also employed in theexample of Fig. 4. Accordingly, the fastener part 34 in theshape of a spherical element comprises, e.g., the light sourcein the form of a light emitting diode that is located at the tipof the ball-shaped projection. In the closed state, this lightsource works together with thelight sensor 37 of Fig. 7. Fig.8 shows the conductive traces 38 that run along thesemiconductor chain of the identity-protection loop, theends 4,5 of which can be connected to each other through the snapfaster 33, 34.