CN101405753B - Card capable of performing true/false judgment by a fluorescent particle chip - Google Patents

Card capable of performing true/false judgment by a fluorescent particle chip Download PDF

Info

Publication number
CN101405753B
CN101405753B CN2006800476488A CN200680047648A CN101405753B CN 101405753 B CN101405753 B CN 101405753B CN 2006800476488 A CN2006800476488 A CN 2006800476488A CN 200680047648 A CN200680047648 A CN 200680047648A CN 101405753 B CN101405753 B CN 101405753B
Authority
CN
China
Prior art keywords
card
true
pit
light
chip
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN2006800476488A
Other languages
Chinese (zh)
Other versions
CN101405753A (en
Inventor
南条真一郎
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
International Frontier Technology Laboratory Inc
Original Assignee
International Frontier Technology Laboratory Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by International Frontier Technology Laboratory Inc filed Critical International Frontier Technology Laboratory Inc
Priority claimed from PCT/JP2006/325225 external-priority patent/WO2007072794A1/en
Publication of CN101405753A publication Critical patent/CN101405753A/en
Application granted granted Critical
Publication of CN101405753B publication Critical patent/CN101405753B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Abstract

The present invention relates to a card capable of performing autentication by radio-active materail chip. A card authentication is performed. An authentication chip for performing authentication by a copy-disabled hologram chip is attached to a card and when or after the card is introduced into a handling device, the authentication chip information is read to perform authentication. Read may be performed in a planar shape but a linear shape can reduce the processing load. An arbitrary straight line or a curved line may be used as a read line shape by modifying the read position in association with the card movement when the card is placed to be read. When the card introduced to a terminal device is an unauthorized one, the card is ejected or an alarm is issued when the card is introduced inside.

Description

Can carry out the card of genuine/counterfeit discriminating by the hologram chip
Technical field
The present invention relates to card, bank note, security etc. is needed structure and the method for the true and false of these article being carried out authentication of the article of true and false authentication easily by forgery.
Background technology
In the today that is called as card society; The card that One's name is legion occurs, the card that the cash card of bank, the credit card of trust company etc. are relevant with owner's property, relevant card is used with proof of identification as the prepaid card of securities and driving license, health insurance cards, passport etc.
The card relevant with property and in the magnetic stripe that is arranged at the surface or the back side, write information needed mostly as the card of securities uses ATM (Automatic Teller ' s Machine: Automatic Teller Machine) wait automatic equipment or manual reading device from magnetic stripe, to read magnetic information and carry out various processing.
The example of present cash card treatment scheme that shown in Figure 1 is.
When (1) everyone was inserted into cash card in the card insert opening of end device such as ATM when card, the sensor of card insert opening detected it, and card is taken in the auto levelizer.
(2) when being taken into card, end device reads card information from the magnetic recording portion of card.Under the situation of cash card, read in card informations such as bank's sign indicating number, branch's sign indicating number, account classification, account number.And under the situation of credit card, card identifier, valid period, account classification, account number are recorded in the magnetic recording portion as card information.In addition, exist in the situation that records password in cash card or the credit card, in the case, password is also read.
(3) end device judges whether the card that is inserted is the card that can in this end device, handle.
(4) be not identified according to the card information that is read in be expression can the situation of information processed under; Perhaps; Even if regular card and because damaged or dirt etc. and can not read under the situation of card information, end device will block inappropriate card that conduct can not handle and spue.
(5) be that beginning communicates with main frame under the information of regular card and the magnetic recording portion situation about correctly being read at card.
(6) host requests input password.
(7) corresponding to the request from main frame, the Cali inputs password with the person.
(8) when the Cali with the person when inputing password from the request of main frame, main frame compares password of being inputed and the password of in main frame, storing corresponding to the card information that is read.
(9) under inconsistent situation, in the magnetic recording portion of card, this is write down and asks to input once more password, when the password of input once more is correct; And the formality after carrying out; Under inconsistent situation, likewise, password is inputed in request again; When password input error accumulative total becomes three times, the invalid punishment that the invalid and execution of card is taken in the end device etc.
(10) under the situation of unanimity, main frame judge the Cali with the person be correct card everyone, request input Withdrawal Amount.
(11) person of utilization imports the amount of money that requires drawing.
(12) if require the amount of money of drawing suitable, then see the cash of this amount of money off, cash card is withdrawed from from end device, and carry out book keeping operation or the detailed book of distribution processing to bankbook, closing the transaction.And, being recorded under the situation in the cash card at password, this password is concluded the business as correct password, still, from magnetic recording portion, wipes this password afterwards.
Shown in Fig. 2 (a) is the example of employed cash card in the current cash card treatment scheme shown in Fig. 1.In the figure, the 1st, the cash card main body by plastic cement etc. constitutes is formed with the magnetic stripe 2 of the information that write down and the arrow 3 of expression cash card direction of insertion in its face side.And, omitted diagram, still, required item is published is the embossing literal.
Use is called as the device that brush reads device (skimmer) can easily read the information that is written in the magnetic stripe, so, produce to make and forge card and use the loss of forging card time and again.
As its countermeasure, use the IC-card that is built-in with semiconductor memory to replace magnetic card, banks etc. are planning to popularize.
But even this IC-card also can read in the information of preserving in the storer, under the situation that cost is forged time, can not say so is perfectly safe.In addition, it is very expensive that IC-card is compared with magnetic card, can not expect to popularize rapidly.
Under the situation of bank cash card, only can use just, still in a country; Under the situation of credit card; Need also can use in foreign country, whole magnetic cards that will use in the whole world are the IC-card that credit card is replaced into uniform specification, and this in fact also is being impossible.
And, on cash card and credit card, to carry out embossing and process and be provided with information such as owner's name, these information also are used in magnetic information, so embossing information becomes forges the clue that blocking is done.
Lose under the perhaps stolen situation at these magnetic cards of experience or IC-card; The owner notices this fact easily, still, returns after stolen under the situation in one's hands; Under the situation about particularly returning, take place easily to use and forge the loss that card causes not noticing.
Not to prevent improper use through the forgery that prevents card but be used to the means of judging that whether suitable the card user is, used the password that constitutes by 4-digit number in the past.This password uses the number that can analogize time and again, and a lot of losses have taken place in the past.Recently, not only use to analogize but also to use and means supervision password such as take the photograph steathily and steal, utilize password to prevent improper use, this becomes extremely difficult.
Owing to forge the loss that card causes, a part has adopted bio-identification (biologicall test) technology of utilizing pattern recognition technique in order to prevent.The representative of biological identification technology has iris recognition, fingerprint recognition, palmmprint to discern, refer to vein identification, palm vein identification, the identification of nail vein, among these, and the identification except iris recognition; Contact-type and non-contact type are arranged; No matter be any, all need typing figure in advance, because the figure typing needs labour and time, authentication also to need the time; So use cost is very big.
Under the situation of contact-type, need directly contact with pick-up unit, so, exist on the health or physiological unplessantness displeasure.In addition, authentication section loses under situation perhaps the worst under the situation of authentication section damage, in other cases, can not carry out biological identification.In addition, in verification process, only carry out the part authentication, so this neither completely safe plan.
In addition, for the biological authentification system that can only use by the card owner, the time or the card processing unit that use card not at one's side, so, the entrusted agent block handle can not, this point inconvenience very concerning the user.
As preventing one of means of forging, on credit card, bank note, security etc., on plastics, be equipped with and form irregular embossing hologram.This embossing hologram replication is very difficult, so, in fact can not forge the card that has the embossing hologram; But under current use-pattern, people are through visual these information that reads; So, can use similar embossing hologram to forge and use card etc.
Shown in Fig. 2 (b) is to have the example of credit card of carrying out the hologram of true and false authentication with sense organ.In the figure, the 1st, with the credit card main body of formations such as plastic cement, be formed with the magnetic stripe 2 of the information that write down and the arrow 3 of expression credit card direction of insertion in its face side.In addition, though the diagram of omission,, required item is published with the embossing literal.
For this credit card 1, be that front end inserts end device with the part that records arrow 3, be attached with the true and false trusted authentication chip 4 that for example constitutes by the embossing hologram at its leading section.
Under the situation of credit card, different with cash card, magnetic stripe is arranged on the back side of card, still, blocks identically to the direction of insertion of end device, and consequently, the read direction and the cash card of the magnetic information of credit card are opposite.
For true and false trusted authentication chip 4, the operator who card is inserted end device with visual be that sense organ is confirmed illustrative figure " A ", rather than read by card terminal apparatus.
Because the individual's who differentiates ability has difference; Even and same individual; Also can create a difference owing to differentiate environment and psychological condition, physical qualification etc., so once bringing into play very big effect in the screening though carry out real and fake discrimination through sense organ, reliability is low.
For utilizing sense organ to carry out the true and false seriously; Authentication environment and psychological condition, physical qualification etc. on the individual's who carries out authentication ability, have deviation, even same individual also can be owing to there are differences, thus; The bigger effect of performance in the primary screening, but reliability is lower.
Opening flat 6-124866 communique, spy the spy opens flat 6-318282 communique, spy and opens flat 7-220077 communique, spy and open flat 9-319849 communique, spy and open flat 11-180079 communique, spy and open flat 10-143621 communique, spy and open that 2000-47557 communique, spy are opened flat 2000-48146 communique, the spy opens the structure that wire ground reading of data has been shown in the 2002-74283 communique.
In the method that these known documents are put down in writing, anyly all read the embossing hologram with straight line along the long side direction of the card of the rectangular shape that has formed embossing hologram or diffraction grating (grating).Therefore, have device fairly simple, handle also simple such advantage, but the anti-forgery property of itself is low.
In addition; Open the authentication technique that has used diffraction grating shown in the flat 11-272836 communique the spy; Open the authentication technique of the interference of having used embossing hologram and figure shown in the 2002-279480 communique the spy, open the authentication technique that has used embossing hologram and sub-image shown in the 2002-341733 communique the spy.
Opening flat 6-124866 communique, spy the spy opens flat 6-318282 communique, spy and opens flat 7-220077 communique, spy and open flat 9-319849 communique, spy and open flat 11-180079 communique, spy and open flat 10-143621 communique, spy and open 2000-47557 communique, spy and open the structure that flat 2000-48146 communique, spy are opened the ground of wire shown in 2002-74283 communique reading of data.
In the method that these known documents are put down in writing, anyly all read the embossing hologram with straight line along the long side direction of the card of the rectangular shape that has formed embossing hologram or diffraction grating (grid).Therefore, have device fairly simple, handle also such advantage easily, but the anti-forgery property of itself is low.
In addition; Open the authentication technique that has used diffraction grating shown in the flat 11-272836 communique the spy; Open the authentication technique that has used embossing hologram and optical interference shown in the 2002-279480 communique the spy, open the authentication technique that has used embossing hologram and sub-image shown in the 2002-341733 communique the spy.
Utilize auxiliary implement to carry out in the real and fake discrimination, using the aperture plate etc., magnifier etc. of fine line, special line, miniature literal, special shape to amplify utensil, perhaps using the special filter that optical interference takes place to carry out real and fake discrimination.
Specifically; The material of performance special optical characteristics such as luminous base material, luminescent layer press mold, luminous printing ink, thermochromism printing ink, photochromic ink is sneaked among base material, luminescent layer press mold, the printing ink etc.; Use auxiliary implements such as particular filter, UV-lamp, still, these final authentications depend on people's sense organ; So reliability is lower.
Utilizing mechanical treatment to carry out in the true and false authentication, the characteristic that mechanically material is had detects and carries out true and false authentication, as detected object, has the detection of magnetic, light characteristic etc.
Specifically, exist: luminescent material, magnetic material are blended among base material, luminescent layer press mold, the printing ink etc., use checkout equipment to detect; Utilize OCR literal, magnetic stripe font code, magnetically or optically enclose the customizing messages of encode, use magnetic, optical detection apparatus to detect.
Authenticity as a certified mechanical processing technologies, "Financial operations と Suites artifact メ re-ku su" Bank of Japan Monetary Institute (http://www.imes.boj.or.jp/japanese/jdps/2004/04-J-12 . pdf) and "The 6th Information Center キ Rue Te イ · Shin pts zip ウ Rousseau" Financial distinction cliff ru ni メ Suites artifact re-ku su "Full mode specifications" (http://www.imes.boj.or.jp/japanese/kinyu/2004/kk23-2-6 . pdf) is shown: Instead of biometric information inherent in the medium does not have a random configuration reproducibility artificial artifact biometric recognition system (artifact-metric? system).
In the artifact character recognition, utilize the magnetic figure of the quantity of electric charge at random, the resonance figure of electric conductivity optical fiber, the accidental formed figures such as sympathetic response figure of vibration sealing of magnetic chart shape, storage unit at random of magnetic chart shape, the magnetic stripe of magnetic chart shape, the recorded at random of image graphics, the magnetic optical fiber of anaglyph figure, the optical fiber of transparent figure, the polymer optical fiber of light reflective graphics, the optical fiber of shot-like particle.
Become and have " the card main information " that is added in " the card information-recording " that add when card issued the user, the manufacturing process that blocks in the item of improper use or forgery of card.(Refer to "even carry IC Cal a cloth to prevent counterfeiting technology coupon surface tension nn Full cloth sleeve black boots," the Ministry of Finance Printing Bureau (http://www.npb.go.jp/ja/info/ichb.pdf))
The card information-recording is for printed when the hair fastener, the additional information of card main body, is equivalent to possessor's information, valid period etc. and issues relevant information.
Distorting of representational mode as improper use is the behavior of rewriting whole or a part of information-recording of card information-recording, wipes regular information and adds the wrongful information that writes.
The card main information is from the card of being issued, to remove the information that the card after the card information-recording self is had, be with the physical form of card, main preprinted operation in printed layers and the protection laminate layers etc. of the background style substrate of being enclosed accompany the information of card matrix.
Forgery is the sharp practice that the card main body is carried out; Through being that pattern or style etc. duplicate or imitate, and make approximate in appearance card and carry out to the information that accompany the card main body; Specifically; Utilize scanner etc. to read in pattern appended on the real card certificate face or style etc., add processing, revise, use printer to wait and carry out.
Forgery countermeasure technology to card itself only limits to printing technology, utilizes the combination of mode of printing, printing ink, printing style, though the technology that does not also play a decisive role is at present arranged a lot.
The true and false authentication method that authentication is forged distinguishes useful sense organ authentication substantially, with the auxiliary implement authentication, use the mechanical treatment authentication.
The true and false authentication that utilizes sense organ to carry out is that the sense organ with mankind such as vision, senses of touch comes the authentication true and false; The holograms that the color, watermark of main body arranged, appended style or color etc. change through changing the angle of observing in the true and false authentication that utilizes vision to carry out etc. have in the true and false authentication that utilizes sense of touch to carry out and detect appended concaveconvex shape, the texture of test card main body etc.Specifically; Logo mark (logo-mark), sytlized font, anti-copying and scanning line, characteristic printing ink, hologram, optical change material, sub-image style etc. duplicate and duplicate is difficult; In addition, exist fingers senses such as visually can easily carrying out true and false authentication, embossing processing, additional concavo-convex, perforation upward, visually to carry out true and false authentication.
Fig. 3 illustrates the spy and opens the disclosed existing example that is equipped with by the card of the artifact feature identification chip of clipped wire in the flat 10-44650 communique, in the figure, (a) is overall diagram, (b) is sectional view, (c) is the enlarged drawing of artifact feature identification chip.
For this card 1; On the lighttight card matrix 7 that is formed with the opening that true and false trusted authentication chip uses; The range upon range of lamellar artifact feature identification chip (artifact-metricschip) 4 that the light-transmissive resin of having sneaked into clipped wire 5 is arranged; Range upon range of above that card surface plate 6, this card surface plate 6 with card matrix 7 on the identical position of formed opening be formed with opening and be formed with magnetic stripe 2 and arrow 3.
For clipped wire 5, do not have any systematicness ground and be not blended in the light-transmissive resin three-dimensionally, so, be that each artifact feature identification chip 4 is intrinsic via the configuration figure of the clipped wire 5 that opening observed.This is utilized, the light that sees through artifact feature identification chip 4 is photographed, thereby the configuration figure of observation clipped wire 5 can be discerned each artifact feature identification chip 4 and promptly block via opening.
The spy opens disclosed another existing example that the card of the artifact feature identification chip that is made up of fiber is installed in the 2003-29636 communique shown in Fig. 4.In the figure, (a) being overall diagram, (b) is sectional view, (c) is the enlarged drawing of artifact feature identification chip.
For this card; In the opening of lighttight card matrix 1, embed artifact feature identification chip 8; And being formed with magnetic stripe 2 and arrow 3 on the surface of card matrix 1, this artifact feature identification chip 8 is sneaked into grid component 9 three-dimensionally and is constituted with short and small fiber 10 in transparent resin.In artifact feature identification chip 8, owing to the figure and the short and small fiber 10 of grid component 9 produces conoscope image.
It is intrinsic that this conoscope image is that each artifact feature identification chip 8 promptly blocks, and this is utilized, and takes the identification figure of the artifact feature identification chip 8 of true and false trusted authentication chip according to transmitted light or reflected light, to sticking into capable authentication.
Machinery for the such figure of living things feature recognition or artifact feature identification reads, and generally reads with camera head and carries out according to the pattern recognition technology.Therefore, there is the possibility of forging with reproduction technology.
Opening flat 6-124866 communique, spy the spy opens flat 6-318282 communique, spy and opens flat 7-220077 communique, spy and open flat 9-319849 communique, spy and open flat 11-180079 communique, spy and open flat 10-143621 communique, spy and open that 2000-47557 communique, spy are opened flat 2000-48146 communique, the spy opens the structure that wire ground reading of data has been shown in the 2002-74283 communique.
In the method that these known documents are put down in writing, anyly all read the embossing hologram with straight line along the long side direction of the card of the rectangular shape that has formed embossing hologram or diffraction grating (grating).Therefore, have device fairly simple, handle also simple such advantage, but the anti-forgery property of itself is low.
In addition; Open the recognition technology of having used diffraction grating shown in the flat 11-272836 communique the spy; Open the recognition technology of having used embossing hologram and striped shown in the 2002-279480 communique the spy, open the recognition technology of having used embossing hologram and sub-image shown in the 2002-341733 communique the spy.
Like this, do not establish the technology of the true and false of judging card self, just can not realize the card that to forge.
Thereby, be unrealized and can not forge the technology of card.
Patent documentation 1: the spy opens flat 10-44650 communique
Patent documentation 2: the spy opens the 2003-29636 communique
Patent documentation 3: the spy opens flat 6-124866 communique
Patent documentation 4: the spy opens flat 6-318282 communique
Patent documentation 5: the spy opens flat 7-220077 communique
Patent documentation 6: the spy opens flat 9-319849 communique
Patent documentation 7: the spy opens flat 11-180079 communique
Patent documentation 8: the spy opens flat 11-272836 communique
Patent documentation 9: the spy opens flat 10-143621 communique
Patent documentation 10: the spy opens the 2000-47557 communique
Patent documentation 11: the spy opens the 2000-48146 communique
Patent documentation 12: the spy opens the 2000-66567 communique
Patent documentation 13: the spy opens the 2000-298880 communique
Patent documentation 14: the spy opens the 2002-74283 communique
Patent documentation 15: the spy opens the 2002-279480 communique
Patent documentation 16: the spy opens the 2002-341733 communique
Patent documentation 17: the spy opens the 2005-205897 communique
Patent Document 1: "The financial services と Suites artifact メ re-ku su" Bank of Japan Monetary Institute (http://www.imes.boj.or.jp/japanese/jdps/2004/04-J-12.pdf)
Non-Patent Document 2: "The 6th Information Center キ Rue Te イ · Shin pts zip ウ Rousseau" Financial distinction cliff ru ni メ Suites artifact re-ku su "Full mode specifications" (http://www.imes.boj.or.jp/japanese/kinyu/2004/kk23-2- 6.pdf)
Non-Patent Document 3: "Even portable IC Cal a cloth to prevent counterfeiting technology coupon surface tension nn Full cloth sleeve black boots," the Ministry of Finance Printing Bureau (http://www.npb.go.jp/ja/info/ichb.pdf)
Non-Patent Document 4: Nikkei Oh Toray ro ni ku su ku Suites, No. 883
Summary of the invention
The invention of structure, card disposal route and the card processing unit of following card is provided in this application: can be general in the past cash card or credit card be increased basic change ground and improve security.
Therefore, will be fixed on the card indissociably by the true and false trusted authentication chip that embossing hologram or diffraction grating form.
Additional card true and false authenticate device in to the device that sticks into the row processing in the detection of information of true and false trusted authentication chip, except fixed card is carried out, utilizes by action the mobile of caused true and false trusted authentication chip that be taken into of card and scans.
Utilize the embossing hologram or the diffraction grating of interference of light to have spatial structure, so, except directly making the duplicate, can not duplicate according to prototype.So,, also can not use and forge card even as in the past, duplicated the data in magnetic recording data or the IC chip.
And refusal uses under the situation that will carry out improper use, can avoid damage in possible trouble, perhaps tolerates the use of wrongful card to a certain extent, finally controls wrongful card, thereby confirms improper user easily.Improper card use is prevented trouble before it happens or definite easily improper card user, thus, suppress improper use.
Description of drawings
Fig. 1 is the processing flow chart of current cash card.
Fig. 2 is the current cash card and the key diagram of credit card.
Fig. 3 is to use the example of the existing card of the artifact feature identification that is formed by metallics.
Fig. 4 is to use the example of the existing card of the artifact measurement that is formed by fibre plate.
Fig. 5 is to use the explanation of card of the application invention of embossing hologram.
Fig. 6 be to use the embossing hologram true and false authentication information write example.
Fig. 7 is the explanation of true and false trusted authentication chip installation site.
Fig. 8 is the example by the true and false authentication information of the present invention of computer manufacture.
Fig. 9 is the example of the random number used in the truth identification chip of the present invention.
Figure 10 is the example arrangement of the random number in truth identification chip of the present invention, used.
Figure 11 makes the random number used in the truth identification chip of the present invention example as binary number.
Figure 12 is the example that the random number used in the truth identification chip of the present invention is arranged as binary number.
Figure 13 is the increase example of the random number used in the truth identification chip of the present invention.
Figure 14 makes the increase random number used in the truth identification chip of the present invention example as binary number.
Figure 15 makes the increase random number used in the truth identification chip of the present invention example as quaternary number.
Figure 16 is the example that the random number used in the truth identification chip of the present invention is arranged as quaternary number.
Figure 17 is the explanation that is obtained the method for a plurality of true and false trusted authentication chips by a random number series.
Figure 18 is to use the explanation of the true and false trusted authentication chip reading device of camera head.
Figure 19 is to use the explanation of true and false trusted authentication chip reading device of the read element of arranged.
Figure 20 is to use the explanation of true and false trusted authentication chip reading device of the monochromatic reading device of arrayed.
Figure 21 is the structure of the monochromatic pick-up unit of arrayed.
Figure 22 is to use the explanation of real and fake discrimination chip reader of the polychrome reading unit of arrayed.
Figure 23 is the structure of the polychrome pick-up unit of arrayed.
Figure 24 is combination paraboloidal mirror and polygonal mirror and the explanation of the true and false trusted authentication chip reading device that constitutes.
Figure 25 is the explanation that utilizes the true and false trusted authentication chip reading device of the present invention of single read element.
Figure 26 is the explanation that utilizes the true and false trusted authentication chip reading device of the present invention of two read elements.
Figure 27 is the explanation of read path.
Figure 28 is the explanation of other read paths.
Figure 29 is the example of read path of the true and false trusted authentication chip of scale-of-two random number.
Figure 30 is the example that the unique point of the true and false trusted authentication chip of scale-of-two random number is extracted out.
Figure 31 is the example that the unique point of the true and false trusted authentication chip of quaternary random number is extracted out.
Figure 32 is the example of the true and false trusted authentication chip of scale-of-two random number being handled through simulation process.
Figure 33 is contraposition with mark, reads beginning end lines, the synchronizing signal example with mark.
Figure 34 is the example that the card true and false is distinguished treatment scheme.
Figure 35 is other examples that the card true and false is distinguished treatment scheme.
Figure 36 is another example that the card true and false is distinguished treatment scheme.
Description of symbols
1 card
2 magnetic stripes
3 arrows
4,8,12,15,18,21,22,32,42,46,61 true and false trusted authentication chips
5 metallicss
6,14,33,34 surface plate
7,35 substrates
9 grid
10 fibre plates
16,19,22,23,25,101,104,106,107,108 pits
17,20,24,103 do not form the part of pit
Mark is used in 48 contrapositions
49 read initial
50 read end lines
51,52 end index lines
111 read element matrixes
112,131,133 read elements
113,114 read element array shells
The red read element array of 115R
The green read element array of 115G
The blue read element array of 115B
110 camera heads
120 half tubular parabolic mirrors
121 light pass through the hole
122 polygonal mirrors
125,127 half tubular half-parabola reflector
130,132 housings
135,136 straight line paths
134 multi-thread paths
Embodiment
Below, with reference to accompanying drawing the optimal way that carries out an invention is described.
Fig. 5 illustrates the basic structure of the card that embossing hologram chip has been installed.In the figure, (a) being overall diagram, (b) is sectional view, (c)~(e) is the enlarged drawing of embossing hologram chip.
For this card 11, the surface plate 14 that is formed with opening has been installed on the card matrix 13 of opaqueness, in this opening, embed embossing hologram chip 12.In addition, on surface plate 14, be formed with magnetic stripe 2 and arrow 3.
Embossing hologram chip is made up of the pit of the degree of depth of 1/4 wavelength of employed laser and the part that do not form pit; Have the part of pit, shoot laser is offset by incident laser, thus; Detection is less than shoot laser; In the part that does not have pit, shoot laser is not offset by incident laser, and shoot laser is detected.
Under the situation of CD, employed laser is the infrared laser of λ=780nm, λ/4=195nm.Under the situation of DVD, use the red laser of λ=650nm, λ/4=151.25nm.Under the situation of DVD of future generation, the bluish violet color laser of λ=405nm, the Ultra-Violet Laser of λ=351nm, the extreme ultraviolet laser of λ=266nm are used in research, and λ/4 are that the degree of depth of pit is respectively 101.25nm, 87.75nm, 66.5nm.
The most basic structure has been shown (c), on hologram chip 15, has disposed the pit 16 of the 1/4 wavelength degree of depth of using laser and do not form the part 17 of pit with proper spacing.Under the situation of example shown in this figure, the solid line shown in the four-headed arrow representes that incident light and emergent light all exist, and the dotted line shown in the unidirectional arrow is represented incident light is arranged and do not had emergent light.
(d) show the example that the direction that makes laser tilts,, then can not read the data that write if there is not the information at pitch angle.In this example, on hologram chip 18, dispose with proper spacing the 1/4 wavelength degree of depth of using laser inclination pit 19 and do not form the part 20 of the inclination of pit.
Under the situation of the example shown in this figure, the solid line shown in the four-headed arrow representes that incident light and emergent light all exist, and the dotted line shown in the unidirectional arrow is represented to have incident light and do not had emergent light.It is impossible that the embossing hologram chip that duplicates this structure is close to.In addition, the structure shown in (c) also can coexist with the structure (d).
(e) show the example of the laser that utilizes the multi-wavelength, if there is not the whole wavelength information of employed laser, reading of the data that then write is difficult.In this example; On embossing hologram chip 21, dispose pit 25 and the part 24 that does not form pit of the 1/4 wavelength degree of depth of the pit 23 of the 1/4 wavelength degree of depth of the pit 22 of the 1/4 wavelength degree of depth of redness (R) laser, green (G) laser, blue (B) laser with proper spacing.
Under the situation of the example shown in this figure, the solid line shown in the four-headed arrow representes that incident light and emergent light all exist, and the dotted line shown in the unidirectional arrow is represented to have incident light and do not had emergent light.It is impossible that the embossing hologram chip that duplicates this structure is close to.And the structure shown in (d) also can coexist with the structure (e).
True and false trusted authentication chip embodiment 1
The true and false authentication information that in pit, writes is described through Fig. 6.In order to read in reliably, dispose the pit of expression information regularly.What represent with dot-and-dash line in the figure, is the configuration rule of pit.In the figure, (a) with (b) be the example that utilizes single wavelength laser, write down identical information.(c) utilize multi-wavelength (being three-wavelength in this case) laser.
In Fig. 6 (a) and (b), (c), the pit of configuration record information at regular intervals.(a) corresponding with Fig. 5 (c), on the position of 101010110 information that write down embossing hologram chip basal body 15, form pit 101, protective seam 100 is set above that.
True and false trusted authentication chip embodiment 2
(b) corresponding with Fig. 5 (d), in order to write down 101010110 information of embossing hologram chip basal body 18, on the position of information 1, form pit 104 with dip plane, on the position of information 0, form dip plane 103, protective seam 102 is set above that.Also can form the dip plane and the pit at the pitch angle different, make that the information of carrying out detects on the direction different with these dip plane 103 and pit 104 with these angle of inclination.
True and false trusted authentication chip embodiment 3
(c) corresponding with Fig. 5 (e); In embossing hologram chip basal body 21, form: the pit 108 that " 00101010 " information that is formed by the 780nm infrared laser is used; The pit 107 that " 01000100 " information that is formed by 650nm red light laser is used; The pit 106 that " 10010001 " information that is formed by 405nm blue light laser is used forms protective seam 105 above that.
True and false trusted authentication chip embodiment 4
In the true and false trusted authentication chip that utilizes machinery to read, need not put down in writing the figure that people such as literal or pattern can authentication.In Fig. 8, the embodiment by the pit that is suitable for the true and false trusted authentication chip that two-value data that machinery reads constitutes that is made by computing machine is shown.
For this true and false authentication embossing hologram chip; 1024 two-value datas that are made up of the embossing hologram are configured to 32 * 32 matrix; In the figure, the place that has write two-value data " 0 " representes that with blank the place that has write two-value data " 1 " is represented with " * ".
Method to obtaining this two-value data describes.The radioactive ray that nuclear fission to utilizing radiomaterial shown in Figure 9 is radiated detect and obtain, the instance of the true random number of sexadecimal 256 (digit) (truerandom number); For encryption key employed random numbers such as (crypt key), provide as such sexadecimal number usually.
In Figure 10, the matrix that the sexadecimal random number shown in Fig. 9 is arranged in 8 row, 32 row is shown.This sexadecimal number can be replaced into 4 bits and represent.
That is, " 0 " of sexadecimal number is with " 0000 " performance of binary number, and likewise, " 1 " usefulness " 0001 " shows; " 2 " usefulness " 0010 " performance, " 3 " usefulness " 0011 " performance, " 4 " usefulness " 0100 " performance, " 5 " usefulness " 0101 " performance; " 6 " usefulness " 0110 " performance, " 7 " usefulness " 0111 " performance, " 8 " usefulness " 1000 " performance, " 9 " usefulness " 1001 " performance; " A " usefulness " 1010 " performance, " B " usefulness " 1011 " performance, " C " usefulness " 1100 " performance; " D " usefulness " 1101 " performance, " E " usefulness " 1110 " performance, " F " usefulness " 1111 " performance.
Based on this, 256 sexadecimal random number shown in Figure 9 is replaced into after the scale-of-two random number shown in figure 11.One sexadecimal number replaces with tetrad, so 256 sexadecimal number becomes 256 * 4=1024 binary number.These binary numbers directly obtain at random number generator, so, in this case, do not need this replacement operator.
It is arranged in the matrix of 8 row, 32 row shown in Figure 10, and, be the matrix that unit is arranged in 32 row, 32 row in the position with binary number shown in Figure 12.
At last, the place that is equivalent to binary number 0 in the matrix of Figure 12 not writing information and keep intact, at the local writing information that is equivalent to 1 " * " expression, thereby obtain true and false trusted authentication chip shown in Figure 8.
The true and false trusted authentication chip that forms like this has the true and false authentication information of 32 row * 32 row * 1 bit (bit)=1024 bits, the i.e. true and false authenticate key of 1024 bits.
Embossing hologram chip shown in Fig. 6 (c) can use the light of a plurality of wavelength.Therefore, next illustrate as two-value data be suitable for that machinery reads and by the bowl configurations example of the card true and false trusted authentication chip of the light of the general redness of the utilization of computer manufacture (R), green (G) and blue (B).
For these " R ", " G ", " B ", also comprise " 0 " of the state that does not write data, can show one of four states altogether.In other words, can they be handled as quaternary number, promptly " 00 ", " 01 ", " 10 ", " 11 " show enough four 2 bit numbers of quaternary number ability.
Figure 13 illustrates 256 sexadecimal random number shown in Figure 9 with the figure shown in 256 the sexadecimal random number before.At this, " sexadecimal random number series a " is random number series same as shown in Figure 9, and " sexadecimal random number series b " is the random number series of " sexadecimal random number series a " front.
In Figure 14, illustrate with this sexadecimal random number series be transformed into the scale-of-two random number series and show as 0 in order to be transformed into, the quaternary number of R, G, B and random number series after dividing by per 2 bits.
And; Shown in figure 15, binary number " 00 " is transformed into quaternary number " 0 ", binary number " 01 " is transformed into quaternary number " R "; Binary number " 10 " is transformed into quaternary number " G ", binary number " 11 " is transformed into quaternary number " B ".
Shown in figure 16, with Fig. 8 or the identical ground of binary number shown in Figure 12, the quaternary number that obtains like this is arranged in the matrix of 32 row * 32 row.The true and false trusted authentication chip that forms like this has the true and false authentication information of 32 row * 32 row * 2 bits=2048 bits, in other words has a true and false authenticate key of 2048 bits.
Real and fake discrimination chip embodiment 5
Obtain the method for a plurality of true and false trusted authentication chips by a random number series according to Figure 17 explanation.In the figure, (a) and (b), (c), (d) are respectively 16 * 16 the matrix figures that the matrix figure according to 32 * 32 shown in Fig. 8 obtains, and are initial point with coordinate (0,0) (a); (b) be initial point with coordinate (1,0), (c) with coordinate (0; 1) being initial point, is starting point with coordinate (1,1) (d).Like this, can obtain a plurality of matrix figures by a matrix figure that obtains from random number series shown in Figure 6.
In order to obtain a plurality of matrix figures, in addition, can utilize the use starting position that changes random number series shown in Figure 6, or change the whole bag of tricks such as making starting position of matrix figure shown in Figure 7 from a random number series.
Thus, the card issuer can carry out the secret keeping as main random number series with a random number series, and can obtain a plurality of matrix figures based on this main random number series.In addition, a plurality of matrix figures can automatically be managed according to former dot information.
Embodiment utilization shown in Fig. 8, Figure 12 and Figure 17 is with the binary number record true and false authentication information of 1 bit performance, and the embodiment utilization shown in Figure 16 is with the quaternary number record true and false authentication information of 2 bits performance.As these prolongation, also can use with the existing octal numeral of 3 bit tables, with the existing sexadecimal number of 4 bit tables.
True and false trusted authentication chip installation site
Fig. 7 illustrates the installation site of the true and false trusted authentication chip with these structures.Installation site for true and false trusted authentication chip 46; Except the position of card main body substantial middle shown in Figure 5, also can be the lower rear position shown in the bottom center position shown in the lower front end position shown in the rear positions placed in the middle shown in the middle position placed in the middle shown in the front position placed in the middle shown in Fig. 7 (a), (b), (c), (d), (e), (f).Though the top position also can,, under the situation of the possibility that the information that exists influence from magnetic stripe reads, preferably avoid being configured in the top position.
Reading device embodiment 1
To the hologram chip is that reading of true and false trusted authentication chip describes.In read method, have: the method that the hologram chip is directly read as face, the method that face is read as the set of line and the method that face is read as the set of point.
Be the example of camera head of the basic structure of use of method that the hologram chip is directly read as face shown in Figure 18.From the card main body 11 that constitutes by card substrate 13, card upper surface panel 14, hologram chip 15, read hologram chip 15 with camera head 110, use pattern recognition technique to carry out authentication.
When card 11 was taken in the reading device and stops, the hologram chip 15 of 110 pairs of never illustrated laser beam source irradiations of camera head was photographed, and according to the image after the photography hologram chip 15 is carried out authentication, and consequently, the true and false of card 11 is by authentication.
Reading device embodiment 2
In Figure 19, the detecting element by matrix configuration is constituted and the structure example of planar the reading device that reads describes.In the figure, (a) being the figure of the summary structure of expression reading device, (b) is the figure of the corresponding relation of expression card and reading device.In the figure, the 11st, the card main body, the 13rd, substrate, the 14th, upper surface panel, the 15th, as the true and false trusted authentication chip of hologram chip.The 111st, to cover the big or small read element matrix that disposes small-sized read element 112 of hiding true and false trusted authentication chip 15 planarly; Each read element is made up of light source and photo detector; This light source is made up of semiconductor laser etc., and this photo detector is made up of light emitting diode etc.
When card 11 was taken in the reading device and stops, true and false trusted authentication chip 15 was positioned under the planar read element matrix 111, and read element matrix 111 reads the true and false authentication information of true and false trusted authentication chip 15.
Reading device embodiment 3
Device to the surface of true and false trusted authentication chip is read as the set of line describes.
Be the example of read element array-like ground configuration shown in Figure 20.In the figure, (a) being the figure of summary structure of the test section of expression reading device, (b) is the expression card and the figure of the corresponding relation of the read element of array-like.Card 11 among this figure is identical with the card shown in Figure 19, so omit the explanation to card.
In the figure; The 113rd, the housing with length of growing slightly than the moving direction width of true and false trusted authentication chip 15, wherein, a plurality of read elements 112 are configured to wire; Constitute the read element array; Each read element is made up of light source and photo detector, and this light source is made up of semiconductor laser etc., and this photo detector is made up of light emitting diode etc.
In this reading device, when card 11 is taken in the card reading device, under the read element array.At this moment, the read element 112 of array-like configuration reads the true and false authentication information in the true and false trusted authentication chip 15.
Figure 21 representes the example arrangement of the read element of reading device shown in Figure 20.Shown in (a), on base station, 32 read elements that will from " D00 " to " D31 " are arranged to row.And as arrangement, shown in (b), it is also passable that reading unit " D00 " to " D31 " is made zigzag arrangement.
Reading device embodiment 4
Utilizing quaternary number shown in Figure 16 shown in Figure 22 is the structure example of the card identification apparatus under the situation of different multiple color.In this example, be the basis, in housing 114, accommodate red read element array 115R, green read element array 115G, blue read element array 115B with the read element array shown in Figure 20.
These red read element array 115R, green read element array 115G, blue read element array 115B are illustrations, and other any color combination can certainly.
In Figure 23, the structure example of the read element array when use laser R shown in Figure 22, laser G, laser B are shown.Concerning this read element array, respectively 32 laser R read element arrays " R00 "~" R31 ", laser G read element array " G00 "~" G31 ", laser B read element array " B00 "~" B31 " are arranged in three row.
Reading device embodiment 5
In the exploitation of DVD of future generation; Use optical head or three-wavelength laser instrument have been studied; And use and the corresponding photodetector of three-wavelength detect; This shaven head use optical system will be integrated with the laser of laser instrument with laser instrument, DVD of future generation with laser instrument, DVD from CD, and this three-wavelength laser instrument can be by three kinds of laser of an element emission.(with reference to Nikkei electron, No. 883 the 119th page, 2004.9.27 distribution) if this photodetector is arranged in row to be used, then utilize the structure identical with Figure 20, can constitute the read element array of laser R, laser G, laser B.
Reading device embodiment 6
Reading device at new construction shown in Figure 24.The light scanning unit that polygon prismatic mirror (polygonal mirror) reflection lasering beam that utilization is rotated uses uses in laser beam printer etc.For this scanning element, can only utilize rotatablely moving of polygonal mirror to carry out photoscanning, still, the folded light beam that obtains becomes radial and is reflected, so, incide to the light beam out of plumb object portion.Therefore, for the photoscanning that utilizes polygonal mirror to carry out, can not say so is suitable for reading the mode of using in the detecting unit of hologram chip of information in the degree of depth of utilizing pit and incident light wavelength.
As the mode that obtains parallel beam, in reflecting telescope and parabola antenna, utilize parabolic.The relation of parabolic and parallel rays has been shown among Figure 24 (a).In the figure, what be designated as X is the X axle, and what be designated as Y is and the Y axle of X axle quadrature that O is an initial point.P shows as Y=-X 2Para-curve.In this para-curve, focal point F is positioned at the position of X=0, Y=-1/4, is parallel to the straight line polished object line P reflex time of Y axle, all focuses on focal point F.On the contrary, be the straight line polished object line P reflex time of basic point with the focal point F, become parallel with the Y axle.
In Figure 24 (b), show and use the basic structure that this principle reads the device of embossing hologram.In the figure, the 120th, have paraboloidal catoptron, form half tubular that on direction, has length perpendicular to paper.And, on the position of the initial point that is equivalent to Figure 24 (a), form the light that light is passed through and pass through hole 121.And, have the parallel rotation axis of extending direction axle with half tubular parabolic mirror 120 in the along of half tubular parabolic mirror 120, and configuration has the polygon mirror (polygonal mirror) 122 of polygon reflecting surface.In addition, the 124th, the hologram chip.
By incided on the polygonal mirror 122 through hole 121 through light at emitted laser Shu Guang on the Y direction of Figure 24 (a) by light light-emitting component 123.The laser beam light that incides on the polygonal mirror is reflected, and reflection on half tubular parabolic mirror 120, incides on the hologram chip 124.
Because polygonal mirror 122 is configured in the along of half tubular parabolic mirror 120; So; By polygonal mirror 122 reflection and incide laser beam light on the half tubular parabolic mirror 120 by secondary reflection again; Reflex to on the parallel direction of the direct of travel that receives 123 emitted laser Shu Guang of light light-emitting component, incide on the hologram chip 124.Incide that laser beam light on the pit of hologram chip 124 is not cancelled and when being reflected, reverse along the path identical with incoming laser beam light, reflection lasering beam light is incided receive on the light light-emitting component 123.As can understanding from this explanation, from receive light light-emitting component 123 emitted laser bundle light all with hologram chip 124 incident vertically.
Reading device embodiment 7
In the hologram chip reader shown in Figure 24 (b), to observe from receiving light light-emitting component 123, the information of hologram chip 124 of part that is equivalent to the rear side of polygonal mirror 122 can not read.Though can in this part, not write required information, or write unwanted information; But; According to the structure shown in Figure 24 (c), be not equivalent to the part of the rear side of polygonal mirror 122, can read the full detail that is written in the hologram chip 124.
Shown in Figure 24 (c) is the basic structure that is used for above-mentioned purpose, uses the half the of half tubular parabolic mirror.In the figure, the 125th, have paraboloidal catoptron, but only utilize the X of Figure 24 (a) to form half tubular that on direction, has length perpendicular to paper for negative part.In addition, because do not need, do not pass through hole 121 so do not form the light that forms among Figure 24 (b).And in the along of half tubular half-parabola reflector 125, configuration has the turning axle parallel with the extending direction axle of half tubular half-parabola reflector 125 and has the polygon mirror (polygonal mirror) 122 of polygon reflecting surface.In addition, the 126th, embossing hologram chip.
By receive light light-emitting component 123 to polygonal mirror 122 emitted laser Shu Guang by polygonal mirror 122 reflection, incide on the half tubular half-parabola reflector 125 and be reflected, impinge perpendicularly on the hologram chip 126.In this holographic read-out device, to observe from receiving light light-emitting component 123, the hologram chip 124 of part that is equivalent to the rear side of polygonal mirror 122 only is the end, so the influence that the part that can not read is brought is little.
Reading device embodiment 8
And; Shown in Figure 24 (d); Employing make the littler and polygonal mirror 122 of the central part of half barrel parabolic mirror 127 not with half barrel parabolic mirror, 127 opposed off-set constructions; Thus, make the part complete obiteration that to read, can read the information that is written in embossing hologram chip 128 all parts.
Reading device embodiment 9
With a plurality of wavelength the reading device of a plurality of Figure 24 (b), (c), (d) is set accordingly, thereby can reads a plurality of wavelength.
Reading device embodiment 10
Explanation is read the face of true and false trusted authentication chip as the set of point reading device.In Figure 25, show the reading device that uses single read element.In Figure 25, (a) be the summary structure of the relation of card and reading device, (b) be the key diagram of Data Detection method.In the figure, the 11st, the card main body, the 13rd, substrate, the 14th, the card upper surface panel, the 15th, true and false trusted authentication chip, the 131st, read element, the 130th, the housing of harvesting read element 131, this read element 131 with card 11 the direction that is taken into the direction quadrature on move.
To with the moving of card 11 the direction that is taken into the direction quadrature, can utilize some the simulation rectilinear motion that causes as rotatablely moving of fulcrum, the rectilinear motion that causes to the rectilinear motion conversion from rotatablely moving, or the suitable motions such as rectilinear motion that cause by linear motor etc.At the typical example of mobile route shown in (b), in this example,, move on the direction of in (b), representing with arrow with even velocity, the straight line path 135 after synthetic with the moving direction of card itself moves.Read element 131 might not move, also can move to the optional position of blocking on 11 the direction that is taken into the direction quadrature on use regularly.
Reading device embodiment 11
Reading device shown in Figure 25 uses single read element, and is still, shown in figure 26; It is a plurality of making this read element; Thereby can read through a plurality of paths, can improve reliability of reading, still; Owing to should information processed be the information of wire, so that processing burden can not become is big.
In Figure 26, (a) be the summary structure of the relation of card and reading device, (b) be the key diagram of detection method.Card 11 among this figure is identical with the card 11 shown in Figure 25, so omit the explanation to card.
For this embodiment, except first reading device that constitutes by read element 131 and housing 130 of embodiment shown in Figure 25, also has second reading device that constitutes by read element 132 and housing 133.
Second reading device that is made up of read element 132 and housing 133 shown in this figure moves on the direction opposite with the moving direction of first reading device that is made up of read element 131 and housing 130, and still, moving direction also can be identical.
The typical example in path has been shown (b), in this example, has moved on the direction that first reading device and second reading device are represented with arrow respectively in (b) with even velocity, move in the path 135,136 after synthesizing along the moving direction with card itself.
Read path
Exist because the possibility of error is read in the generation such as bad of tracking error or reading device.Under these circumstances, in Figure 27, shown in 134, read by a plurality of read elements simultaneously, utilize its mean value or most decision, determine the final information that reads.
Reading device embodiment 12
Situation to being applied to Figure 12 and true and false trusted authentication chip shown in Figure 16 describes.
For the convenience of explaining, use Figure 29 that the example that has used binary number shown in Figure 12 is described.This also can likewise be applied to use the example of quaternary number shown in Figure 16.
In Figure 29, the true and false verify data that detects on the path from the linearity of coordinate (0,0) towards (31,31) is 11000101001001101010101101110111.In addition, the true and false verify data that detects on the path from the linearity of coordinate (0,31) towards (31,0) is 11100101001010000000110000010011.
This detection path is not limited to the path shown in Figure 29, for example, can adopt free routing shown in Figure 28, and, also can read middle change each the execution.
In addition, also can after reading, in machinery, carry out coordinate transform.
For the combination in such Data Detection path,, also be the so abundant big numeral of 32 * 32=1024 even do not return under such condition in the Data Detection path.Although like this, in order to compare, the information of the figure of in reading device, preserving in advance also only is 1024 bits.
In addition, for the example of binary number shown in Figure 16, compare with the example of quaternary number, the quantity of information of the different figures that only are to compare for detection information is increased to 2048 bits, so omit explanation.
Read path
Several examples at read path shown in Figure 28.(a)~(d) be to use the example of single information read path, (e)~(f) be to use the example of two read paths.In addition, also can make read path is more than three.
For these read paths, also can realize through the read element of selecting, switch Figure 21 and detection arrays shown in Figure 23.For example, in detection arrays shown in Figure 21, the detecting element that calls over D00, D01, D02, D03...D28, D29, D30, D31 obtains path shown in Figure 25 135.Read path is not limited to these examples, can adopt path arbitrarily.And, also can carry out electrical readout with irregular order.
The method that the unique point extracting method used in the living things feature recognition is differentiated the true and false of Figure 12 and true and false trusted authentication chip shown in Figure 16 that is applied in is described.According to Figure 30, the method that the true and false of the true and false trusted authentication chip that the binary number information by 0,1 shown in Figure 12 is formed is carried out authentication is described.In the figure, " 0 " continuous more than four is represented with the white black mark of putting upside down, identical ground, and " 1 " continuous more than four is represented with the encirclement mark.
For example, " 0000 " has from coordinate (16,1) ... The beginning 13.
" 00000 " has from coordinate (15,5) ... The beginning 7.
" 000000 " has from 1 of coordinate (13,31) beginning.
" 0000000 " has from 3 of coordinate (24,2) beginning.
" 000000000000 " has from 1 of coordinate (6,12) beginning.
" 00000000000000 " has from 1 of coordinate (7,15) beginning.
" 1111 " have from coordinate (14,4) ... The beginning 12.
" 11111 " have from coordinate (0,7) ... The beginning 8.
" 111111 " have from 1 of coordinate (19,1) beginning.
" 1111111 " have from 1 of coordinate (12,19) beginning.
" 11111111 " have from coordinate (17,6) ... The beginning 2.
" 1111111111 " have from 1 of coordinate (14,3) beginning.
Detect these unique points respectively, detect their starting position coordinate, thus, can carry out authentication the true and false of true and false trusted authentication chip.
Reading device embodiment 13
Utilize Figure 31, the method that the true and false of using the true and false trusted authentication chip that quaternary number shown in Figure 16 forms is carried out authentication is described.Shown in figure 16, in this matrix, as unique point, 5 " 000 ", 3 " 0000 ", 0 " 00000 ", 2 " 000000 " are transversely arranged.
In addition, at transversely arranged 9 " RRR ", 4 " RRRR ", 0 " RRRRR ".
In addition, at transversely arranged 5 " GGG ", 4 " GGGG ", 1 " GGGGG ".
In addition, at transversely arranged 8 " BBB ", 0 " BBBB ", 3 " BBBBB ".
Detect these unique points respectively, detect their starting position coordinate, thus, can carry out authentication the true and false of true and false trusted authentication chip.For the unique point of being extracted out; Except transversely arranged be one row same authenticated information; Also can utilize the identical authentication information that vertically is arranged as row, the identical authentication information that becomes hook to arrange; And, also can utilize the particular arrangement of confirming by different authentication informations such as " 0RGB ".
And, using under the situation of two value informations, use the authentication information in interstage, the grey of the two-stage of the centre of black two value informations in vain for example, thus, make quaternary number.For such structure, not only more difficult the forgery, and if utilize medium tone with in the binary message being 0 severally use as puppet, the puzzled of adulterator becomes big.
For the utilization of medium tone, under the situation of quaternary information such as use 0, R, G, B, also be same, also can utilize 3 octal numeral, 4 sexadecimal number etc.
Illustrated true and false authentication method so far is the method for the true and false authentication information of digitized record being carried out digitized processing, still, in Figure 32, the structure of the true and false authentication information of digitized record being carried out simulation process is shown.
In the figure; For example use Figure 25 or true and false trusted authentication chip reading device shown in Figure 26; Path with 135 and 136 expressions is scanned the figure of the true and false trusted authentication chip shown in (a), thus, obtain (b) and (c) shown in electric signal; These electric signal figures and the regular electric signal figure of being stored are compared, thereby the true and false of card true and false authentication body and card itself is carried out authentication.
Reading device embodiment 14
From the viewpoint strict regulations cash card of versatility and the physical specification of credit card, so the physical specification of the parts that are provided with above that is also very strict certainly.But, can not negate the possibility that produces distortion owing to excessive use.
In order to tackle such situation, preferably in true and false trusted authentication chip, form contraposition shown in Figure 33 in advance with mark 48.With mark, can be one for contraposition the most simply, still,, be provided with a plurality of in order to carry out contraposition more reliably.
In addition, contraposition is not only useful in wire reads with mark, and in planar the reading of using camera head, also is useful.
In order to read more reliably; Be also used as contraposition and use mark; The reading the starting position and read end position of card identification body, be provided with arbitrarily that mark, for example moving direction read initial 49 and moving direction reads end lines 50 and end index line 51,52 further is set.
Relative motion through card identification body and reading device blocks reading of information on the identification body, so, in order to read reliably, need make card discern the synchronized movement of body and reading device.Therefore, if on card identification body, form the mark 53 that synchronizing signal is used in advance, just can make the motion of reading device and reading synchronously of mark.
In addition, also can utilize in the signal normalization when signal Processing (normalization) and read the mark that beginning, end lines and/or synchronizing signal are used.
These contrapositions with mark, read the mark that beginning, end lines and/or synchronizing signal use and all constitute by the fluorescent material particle, for example, form through the suitable printing element as ink-jet printer.
Treatment scheme embodiment 1
Embodiment in the true and false of card shown in Figure 34~Figure 36 authentication processing flow process.Be the embodiment 1 of basic structure shown in Figure 34.
(1) the use person of Cali is front end when being inserted into the card insert opening of end devices such as ATM with cash card with arrow portion, and the sensor of card insert opening detects this, and card is taken in the auto levelizer.
When (2) being taken into card, end device reads in card information from the magnetic recording portion of card.
(3) end device judges whether the card that is inserted is the card that enough this end devices of ability are handled.
(4) can not confirm according to the card information that is read under the situation that expression can be handled; Perhaps; Even if regular card and because damaged or stained grade and can not reading under the situation of card information, end device will block inappropriate card that conduct can not handle and withdraw from.
(5), under the mechanical scanning of moving of the card when being taken into, the state that perhaps after card is taken into, stops, reading in the true and false authentication information that is write in the true and false trusted authentication chip with the utilization card for end device.
(6) end device judges whether the true and false authentication information that is read in is proper.
(7) be judged as the true and false authentication information when incorrect when end device, the card that is inserted is judged as the card that is not regular, from end device, card is withdrawed from, and end process.
And, the judgement of the legitimacy of true and false authentication information with and subsequent the processing of card also can handle parallel carrying out with other.
(8) it is in the right season being judged as true and false authentication information at end device, the withdraw the money further input operation of the amount of money etc. of request user.
(9) user is according to the withdraw the money input operation of amount of money etc. of request.
(10) main frame judges whether the content of input operation of the amount of money of withdrawing the money etc. is suitable.
(11) be judged as because the content of the input operation of the former thereby amount of money that causes withdrawing the money such as Sorry, your ticket has not enough value etc. when improper, will be blocked and from end device, withdraw from main frame, and end process.
(12) be judged as the content of input operation of the amount of money of withdrawing the money etc. when suitable when main frame, export, will block and from end device, withdraw from according to withdrawing the money etc., and end process.
Treatment scheme embodiment 2
Embodiment 2 in the true and false of card shown in Figure 35 authentication processing flow process.In the example shown in Figure 34, when card true and false authentication information is incorrect, will blocks from end device and withdraw from, relative therewith, for this card true and false authentication processing flow process, when the card authentication information is incorrect, card is taken in the end device, give the alarm.The easy like this exposure of carrying out wrongful card.
(1) the use person of Cali is front end when being inserted into the card insert opening of end devices such as ATM with cash card with arrow portion, and the sensor of card insert opening detects this, and card is taken in the auto levelizer.
(2) when being taken into card, end device reads in card information from the magnetic recording portion of card.
(3) end device judges whether the card that inserts is the card that enough this end devices of ability are handled.
(4) can not confirm to represent according to the card information that is read in can the situation of information processed under; Perhaps; Even if regular card and because damaged or stained grade and can not reading under the situation of card information, end device will block inappropriate card that conduct can not handle and withdraw from.
(5), under the mechanical scanning of moving of the card when being taken into or the state that after card is taken into, stops the true and false authentication information that in true and false trusted authentication chip, is write is read in the utilization card for end device.
(6) end device judges whether the true and false authentication information that is read in is correct.
(7) be judged as the true and false authentication information when improper at end device, the card that is inserted is judged as the card that is not regular, will block harvesting in end device, and, give the alarm.
If this alarm only sending away from the place of terminating machine and in terminating machine, carrying out the fault demonstration, is then controlled irregular card user easily.
In addition, the judgement of the legitimacy of true and false authentication information with and subsequent the processing of card also can handle parallel carrying out with other.
(8) end device is when to be judged as true and false authentication information be regular information, the withdraw the money further input operation of the amount of money etc. of request user.
(9) user is according to request, the input operation of the amount of money of withdrawing the money etc.
(10) main frame judges whether the content of input operation of the amount of money of withdrawing the money etc. is suitable.
(11) content of input operation that is judged as the amount of money of withdrawing the money etc. at main frame will be blocked and from end device, withdraw from because Sorry, your ticket has not enough value etc. when former thereby improper, and end process.
(12) be judged as the content of input operation of the amount of money of withdrawing the money etc. when suitable at main frame, export, will block and from end device, withdraw from according to withdrawing the money etc., and end process.
Treatment scheme embodiment 3
Embodiment 3 in the true and false of card shown in Figure 36 authentication processing flow process.In the embodiment 2 of the card true and false authentication processing flow process shown in Figure 35; When true and false authentication information is incorrect, directly card is taken in the end device and only and gives the alarm, with respect to this; For this card true and false authentication processing flow process, the Cali is operated with the person.Thus, can carry out the exposure of improper card reliably.
When (1) the use person of Cali was the card insert opening of the front end end device that is inserted into ATM etc. with cash card with arrow portion, the sensor of card insert opening detected this, and card is taken in the auto levelizer.
(2) when being taken into card, end device reads in card information from the magnetic recording portion of card.
(3) end device judges whether the card that is inserted is the card that enough this end devices of ability are handled.
(4) can not confirm to represent according to the card information that is read in can the situation of information processed under; Perhaps; Even if regular card and because damaged or dirt etc. and can not read under the situation of card information, end device will block inappropriate card that conduct can not handle and withdraw from.
Under the mechanical scanning of moving of the card when (5) end device is taken into to utilize card, the state that perhaps after card is taken into, stops, the true and false authentication information that in true and false trusted authentication chip, is write is read in.
(6) end device judges whether the card true and false authentication information that is read in is correct.
(7) end device is judged as the true and false authentication information when incorrect, the withdraw the money further input operation of the amount of money etc. of request user.
In addition, the judgement of the legitimacy of true and false authentication information with and subsequent the card processing also can carry out concurrently with other processing.
(8) user is according to request, the further input operation of the amount of money of withdrawing the money etc.
(9) will block and receive and keep in the end device, and give the alarm.
If this alarm only sending away from the place of terminating machine and in terminating machine, carrying out the fault demonstration, is then controlled irregular card user easily.
(10) it is in the right season being judged as card true and false authentication information at end device, the withdraw the money further input operation of the amount of money etc. of request user.
(11) user is according to the withdraw the money input operation of amount of money etc. of request.
(12) main frame judges whether the content of input operation of the amount of money of withdrawing the money etc. is suitable.
(14) content of input operation that is judged as the amount of money of withdrawing the money etc. at main frame will be blocked and from end device, withdraw from because Sorry, your ticket has not enough value etc. when former thereby inappropriate, and end process.
Make such structure, thus, not only wrongful card user uses the time of end device elongated, be used for its time of controlling elongated, and it is operated, thus, can gather evidences such as fingerprint.At this moment, when adopting the contact-making switch of contact-type, the collection of fingerprint becomes more reliable.
From the viewpoint of versatility, the physical specification of cash card and credit card is by strict regulations, so the physical specification of the parts that are provided with above that is also strict certainly.But, can not negate owing to excessively using the possibility that produces distortion.
Utilizability on the industry
True and false trusted authentication chip discussed above, the card with true and false trusted authentication chip can be applied to bank cash card, credit card, prepaid card, some card, security, ID card, mechanism's pass, certificate etc.
In addition; Also can replace embossing hologram chip, use by incident light identical and catoptrical interference to produce optical figuring, promptly send pearly luster (nacreous) or have the natural material of iris (iridescent) or the chip of artificial material with the embossing hologram.

Claims (22)

1. a card is made up of substrate and true and false trusted authentication chip, wherein,
Said true and false trusted authentication chip is layered on the said substrate, in said true and false trusted authentication chip, is formed with the embossing hologram, and this embossing hologram is that pit and the part that does not form said pit of 1/4 wavelength of incident light constitutes by the degree of depth.
2. card as claimed in claim 1, wherein,
Said pit is the pit with different depth, and said different depth is corresponding to the different wave length of said incident light.
3. like the card of claim 1 or 2, wherein,
Also range upon range of on said true and false trusted authentication chip have a surface plate, and said surface plate is made up of the high material of permeability to said incident light.
4. like the card of claim 1 or 2, wherein,
Said pit is configured to rectangular.
5. card as claimed in claim 4, wherein,
Said pit disposes based on true scale-of-two random number.
6. card as claimed in claim 5, wherein,
Said pit is based on the part of the pit of true scale-of-two random number configuration.
7. card as claimed in claim 4, wherein,
Said pit disposes based on true quaternary random number.
8. card as claimed in claim 7, wherein,
Said pit is based on the part of the pit of true quaternary random number configuration.
9. card as claimed in claim 1, wherein,
On said true and false trusted authentication chip, also dispose and read contraposition and use mark.
10. card as claimed in claim 9, wherein,
Disposed said to read contraposition be a mark with mark.
11. card as claimed in claim 9, wherein,
On said true and false trusted authentication chip, dispose and a plurality ofly read contraposition and use mark.
12. card as claimed in claim 9, wherein,
Dispose and read initial, read end lines and end index line.
13. like claim 9,10,11 or 12 card, wherein,
Also dispose the mark that synchronizing signal is used.
14. an embossing hologram chip reader reads the embossing hologram of the true and false trusted authentication chip that is installed on the card, this embossing hologram is that pit and the part that does not form said pit of 1/4 wavelength of incident light constitutes by the degree of depth, wherein,
Said reading device has the camera head that is used to shine the light source of said true and false trusted authentication chip and is used for the said true and false trusted authentication chip of irradiation is thus photographed.
15. an embossing hologram chip reader reads the embossing hologram of the true and false trusted authentication chip that is installed on the card, this embossing hologram is that pit and the part that does not form said pit of 1/4 wavelength of incident light constitutes by the degree of depth, wherein,
Said reading device has with said true and false trusted authentication chip incident light of the same area and receives the light light-emitting element matrix.
16. an embossing hologram chip reader reads the embossing hologram of the true and false trusted authentication chip that is installed on the card, this embossing hologram is that pit and the part that does not form said pit of 1/4 wavelength of incident light constitutes by the degree of depth, wherein,
The incident light that said reading device has with said true and false trusted authentication chip same widths receives the light light-emitting device array.
17. an embossing hologram chip reader reads the embossing hologram of the true and false trusted authentication chip that is installed on the card, this embossing hologram is that pit and the part that does not form said pit of 1/4 wavelength of incident light constitutes by the degree of depth, wherein,
Catoptron, polygonal mirror, incident light that said embossing hologram chip reader possesses parabolic tubular receive the light light-emitting component; The turning axle of said polygonal mirror is configured in the focus of said catoptron, and incident light receives the light light-emitting component to be configured in the behind of said catoptron.
18. like the embossing hologram chip reader of claim 17, wherein,
Said parabola is whole parabolic, is formed with light through the hole in the central authorities of said catoptron, and said incident light receives the light light-emitting component to be configured in the behind of said catoptron.
19. like the embossing hologram chip reader of claim 17, wherein,
Said parabola is a half paraboloid.
20. like the embossing hologram chip reader of claim 17, wherein,
Said parabola is the parabola littler than half paraboloid, said polygonal mirror offset configuration.
21. an embossing hologram chip reader reads the embossing hologram of the true and false trusted authentication chip that is installed on the card, this embossing hologram is that pit and the part that does not form said pit of 1/4 wavelength of incident light constitutes by the degree of depth, wherein,
Said embossing hologram chip reader has the incident light that can move at the Width of said true and false trusted authentication chip and receives the light light-emitting component, and said incident light receives the light light-emitting component to read the embossing hologram of the true and false trusted authentication chip in moving.
22. like the embossing hologram chip reader of claim 21, wherein,
Also have another incident light and receive the light light-emitting component.
CN2006800476488A 2005-12-19 2006-12-19 Card capable of performing true/false judgment by a fluorescent particle chip Expired - Fee Related CN101405753B (en)

Applications Claiming Priority (5)

Application Number Priority Date Filing Date Title
JP2005365416 2005-12-19
JP365416/2005 2005-12-19
JP2006200823 2006-07-24
JP200823/2006 2006-07-24
PCT/JP2006/325225 WO2007072794A1 (en) 2005-12-19 2006-12-19 Card which can be authenticated by hologram chip

Publications (2)

Publication Number Publication Date
CN101405753A CN101405753A (en) 2009-04-08
CN101405753B true CN101405753B (en) 2012-07-11

Family

ID=40494865

Family Applications (2)

Application Number Title Priority Date Filing Date
CN2006800476488A Expired - Fee Related CN101405753B (en) 2005-12-19 2006-12-19 Card capable of performing true/false judgment by a fluorescent particle chip
CNA2006800476473A Pending CN101395619A (en) 2005-12-19 2006-12-19 Card capable of authentication

Family Applications After (1)

Application Number Title Priority Date Filing Date
CNA2006800476473A Pending CN101395619A (en) 2005-12-19 2006-12-19 Card capable of authentication

Country Status (1)

Country Link
CN (2) CN101405753B (en)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPWO2010137694A1 (en) * 2009-05-29 2012-11-15 国際先端技術総合研究所株式会社 Card key and card lock
JP5945600B2 (en) * 2012-07-23 2016-07-05 昌栄印刷株式会社 IC card authenticity determination system and IC card used in the system
SG11201608112YA (en) * 2014-04-04 2016-10-28 Visa Int Service Ass Payment device with holographic security element
US9590983B2 (en) * 2014-04-09 2017-03-07 Cardex Systems Inc. Self-authenticating chips
CN111461275A (en) * 2020-04-26 2020-07-28 厦门浩邈科技有限公司 Method for detecting copy IC card

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2000123109A (en) * 1998-10-09 2000-04-28 Victor Co Of Japan Ltd Optical recording medium and optical recording medium writer/reader
JP2002040219A (en) * 2000-07-19 2002-02-06 Dainippon Printing Co Ltd Computer hologram, reflection plate using computer hologram, reflection type liquid crystal display device using computer hologram

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2000123109A (en) * 1998-10-09 2000-04-28 Victor Co Of Japan Ltd Optical recording medium and optical recording medium writer/reader
JP2002040219A (en) * 2000-07-19 2002-02-06 Dainippon Printing Co Ltd Computer hologram, reflection plate using computer hologram, reflection type liquid crystal display device using computer hologram

Also Published As

Publication number Publication date
CN101395619A (en) 2009-03-25
CN101405753A (en) 2009-04-08

Similar Documents

Publication Publication Date Title
US8397987B2 (en) Card which can be authenticated by hologram chip
US8408470B2 (en) Object for authentication verification, authentication verifying chip reading device and authentication judging method
EP1354304B8 (en) Security, identification and verification systems
US5900954A (en) Machine readable record carrier with hologram
EP1147478B1 (en) Validation method for electronic cash cards and digital identity cards utilizing an optical data storage
EP0644508B1 (en) Secure optical identification method and means
US8235286B2 (en) Card capable of authentication
CN101405753B (en) Card capable of performing true/false judgment by a fluorescent particle chip
US5932865A (en) Anti-counterfeit validation method for electronic cash cards employing an optical memory stripe
JPWO2007072795A1 (en) A card that can be identified with a phosphor particle chip
US20050024955A1 (en) Non-falsifiable information carrier material, information carrier produced therefrom and test device therefor
JP2000194794A (en) Optical information reader and optical recording medium
WO2007072796A1 (en) Card capable of performing authentication by radio-active material chip
JP2001118123A (en) Optical information reader and optical recording medium
JPH08287203A (en) Method and means for safe optical discrimination
JPH04176696A (en) Forgery preventing card and discrimination thereof

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
REG Reference to a national code

Ref country code: HK

Ref legal event code: DE

Ref document number: 1132351

Country of ref document: HK

C14 Grant of patent or utility model
GR01 Patent grant
REG Reference to a national code

Ref country code: HK

Ref legal event code: GR

Ref document number: 1132351

Country of ref document: HK

C17 Cessation of patent right
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20120711

Termination date: 20131219