AU682778B2 - Authentication technique - Google Patents

Authentication technique Download PDF

Info

Publication number
AU682778B2
AU682778B2 AU28929/95A AU2892995A AU682778B2 AU 682778 B2 AU682778 B2 AU 682778B2 AU 28929/95 A AU28929/95 A AU 28929/95A AU 2892995 A AU2892995 A AU 2892995A AU 682778 B2 AU682778 B2 AU 682778B2
Authority
AU
Australia
Prior art keywords
data
storage means
article
card
storing
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Ceased
Application number
AU28929/95A
Other versions
AU2892995A (en
Inventor
Michael Fernand Alexander Derome
Andrew Laurence Smith
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Thorn Secure Science Ltd
Original Assignee
Thorn Secure Science Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Thorn Secure Science Ltd filed Critical Thorn Secure Science Ltd
Publication of AU2892995A publication Critical patent/AU2892995A/en
Application granted granted Critical
Publication of AU682778B2 publication Critical patent/AU682778B2/en
Anticipated expiration legal-status Critical
Ceased legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/08Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
    • G07F7/10Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
    • G07F7/1016Devices or methods for securing the PIN and other transaction-data, e.g. by encryption
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/08Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/08Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
    • G07F7/086Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means by passive credit-cards adapted therefor, e.g. constructive particularities to avoid counterfeiting, e.g. by inclusion of a physical or chemical security-layer

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Credit Cards Or The Like (AREA)
  • Signal Processing For Digital Recording And Reproducing (AREA)
  • Storage Device Security (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Description

WO 90102901 WO 9602901PCTIGIB95IOI6I AUTIIErN'I'ICAION T-ECIINIQLTJE- This invention relates to a technique for authenticating products, cards, tokens and the like so as to combat illicit copying thereof.
Copying of products, cards, tokens and the like (hereinafter referred to generally as "valued articles" to avoid repetition) is a major problem and various techniques have been devised to combat such copying, In particular, techniques have been devised based upon the inclusion, on valued articles, of twin sets of data, one set being characteristic of the holder of the valued article or its producer or issuer (as the case may be) and the other set i0 being derived from the first set by some unique route that is difficult to replicate. When the valued article is to be authenticated, the two sets of data included thereon are read, the derivative set by wa of a device which is conscious of the aforementioned unique route, and the two sets of data thus recovered are compared to authenticate the valued article, or at least to show that the person purporting to be the owner or holder of the valued article is not an impostor.
Techniques of this general kind are described for example in United States Patents nos. 4,879,747 and 4,995,081 to Leighton and Micali.
This invention aims to further improve upon such techniques by (inter alia) taking advantage of certain special characteristics of recording media available for incorporation in valued articles.
According to a first aspect of the invention, there is provided a Itaio i= =for an article of value, comprising first and second data-storage means being carried by the article, each data-storage means storing data for authenticating or identifying the article and/or a transaction associated with the article, the first data-storage means storing first data as a non-random pernanently structured magnetic characteristic which varies from place to place on the first storage mieans, the second storage means storing data obtained by operation of the secret key of a secret key/public :-ey cryptosystem pair upon data comprising the first data and additional data.
Such an authentication means can make copying and counterfeiting more difficult than with a permanently structured magnetic characteristic alone whilst enabling conventional read heads to be employed to read the data in the first mtorage means.
According to a second aspect of the invention, there is provided a method of authenticating an article of value, comprising:, SUBSTITUTE SHEET (RULE 26) WO 96/02901 PCT/GB95/(01611 a) storing authentification data in a first storage means carried by the article as a non-random permanently structured magnetic characteristic which varies from place to place on the storage means, b) operating on said authentification data and additional data using the secret key of a secret key/public key cryptosystem pair hereby creating encrypted data, c) storing the encrypted data in a second storage means carried by the article, d) reading the encrypted data from the second storage means, e) operating on the encrypted d; vith the public key of said cryptosystem pair to give decrypted authentifihLaon data and decrypted additional data, and f) comparing the decrypted authentification data with the authentification data stored in the first storage means thereby authenticating the article of value and/or the additional data..
In order that the invention may be clearly understood and readily carried into effect, some embodiments of the invention will now be described (by way of example only) with re rnce to the accompanying drawings, of which: ure 1 shows a credit card which can be authenticated by means of one example of the n'vention, and Figure 2-4 illustrates schematically and by way of example the operation of various features of the invention in a typical transaction.
Figure 5 shows a block diagram of a method of authentication according to an aspect of the invention, Referring now to Figure 1, there is shown in outline a technique in accordance with one example of this invention.
A valued article, in this case a credit card, is shown schematically at 1. The credit card 1 comprises conventional printed and/or embossed material 2 including holograms and trade marks or logos characteristic of the card issuing and/or handling company. There is also open information about the card holder and open account information and, on the reverse side, a signature strip 3 and a magnetic strip 4.
In accordance with this example of the invention, the magnetic strip 4 is formed with a magnetic watermark in the manner described, for example, in UK patent no.
1331604 whereby a structural variation of a magnetic characteristic from place to place SUBSTITUTE SHEET (RULE 26) i _I WO 96/02901 PCT/GII95/0SIOI1611 3 along the strip is indelibly formed into the strip. This information can be read quite readily but the structural variation is cxceedingly difficult to replicate in any manner which is not immediately rejected by the technique used to read the relevant information, Thus the information stored on the card I in strip 4 although overt is secure. Tape containing the structural function described above is marketed by THORN Secure Science International Ltd under the trade mark Watermark Magnetism and thus the structural variation aforesaid will be referred to hereinafter as a magnetic watermark.
To add further security, however, this example of the invention provides that the information recorded indelibly in strip 4, together with further information, is operated on, as described hereinafter, to generate a second piece of information which (hereinafter called a "certificate") is also recorded on the card 1, but in a conventional "soft magnetic" form; either on the strip 4 itself or on a further strip (not shown). It will be appreciated that information can be recorded conventionally on strip 4, superimposed upon the structural variations which have been referred to hereinbefore. Usually, there are two or more tracks of the strip 4 which are assigned to conventionally recorded data, and the strip is read by a composite head which contains normal magnetic heads for the conventionally recorded information and one or more special heads for the information recorded by structural variation.
The operation upon the information recorded indelibly in strip 4 referred to above comprises, in its most basic form, signature by the secret key of a cryptosystem pair. The signed information is recorded on the card I, in this example on one of the tracks of strip 4 read by a conventional head. It can thus be reproduced and, after being operated on by the public key of the cryptosystem pair to "de-sign" it, compared with the information indelibly recorded as described earlier, to confirm that the "de-signed" information contains information which matches that recorded indelibly as the magnetic watermark.
Thus not only is the card authenticated as genuine because it contains the magnetic watermark but also the transaction information recorded less securely on the card is authenticated because it contains the signed version of the watermark.
This prevents watermarked cards being acquired illegally and false information entered in the accessible, conventional recording tracks. It also enables the logistics of card manufacture and distribution to be made more secure, because card stock is useless without the watermarked magnetic stripe and vice versa, and even if the two are acquired together, they cannot be used without knowledge of the secret code used to sign the watermarked information for incorporation in the certificate to be recorded conventionally on the card.
SUBSTITUTE SHEET (RULE 26) i i i WO 96/02901 PCT/GBI95/01611 Thus, in principle, the watermarked informatuon is casy to read but difficult to replicate in a manner that will not be rejected on reading, and the conventionally recorded information, whilst easily read and replicated, does not reveal its connection through the secret key to the watermarked information.
The conventionally recorded information need not be recorded on the strip 4. It could, for example, be recorded on a separate magnetic strip on the card, or in a different medium altogether, such as an integrated circuit chip. In this latter event, the chip can be relatively cheap since it is not required to contain high levels of security or complex anticopying procedures. In essence it operates as a low-level storage medium only.
The certificate information which is conventionally recorded, eg., on strip 4 or on a separate strip or in a chip, can usefully comprise a commencement date for the card's utility and also other information, such as the expiry date, credit limit, transaction availability and one or more pieces of information about the card-holder and/or biometric information derived from and characteristic to the holder.
In particular, the maiden name of the holder's mother might be included, as may basic physiological information such as height, hair colour, eye colour, etc., or a scan of a fingerprint or some other data peculiar to the card holder. In this latter respect, a particularly beneficial technique for deriving fingerprint data in a form that readily lends itself to recordal as described above is described in European Patent Application No.91302280.2 (Publication No. 450786). the contents of which are incorporated herein by reference.
The invention may, as mentioned previously, be used on a wide variety of value articles, such as (without limitation) sound recordings, spirits, vehicle components, and a wide range of secure documents, such as passports, identity cards, driving licences and the like.
It will be appreciated that, since the information recorded together with the signed version of the magnetic watermark, in the certificate contains a number of conformatory and/or instructional pieces of information, all of that information can be trusted as being genuine, since it was signed together with the watermark information, using the secret key.
Thus nothing that is outside the control of the card issuer/manufacturer needs to be treated secretly or kept in confidence.
The strength of the magnetic watermark and the use of the secret key is all that is required to obtain the significantly improved level of security provided by this invention.
SUBSTITUTE SHEET (RULE 26) IPC WO 961/02901 PCT/GI95/01611 Thus, the technique ensures that valued articles cannot be used before they have officially been issued, or after they have expired. For off-line transactions, the reader can be sure that card expiry data and credit limits, for example are genuine. If the off-line reader includes biometric sensing, the reader can also be sure that the registered card holder is oresent. During on-line operations, the credit limit, expiry date and PIN (if present) can be up-dated if required since the central computer can generate a new signed certificate to be written on the card.
Conveniently RSA public key cryptography is used, but alternative procedures can be used if desired. In any event, a particular "certificate' signed information including the watermark data) is relevant only to one specific card and could only have been generated by one specific issuer the one with access to the secret key of the RSA (or other) cryptosystem pair. As a result, the certificate can be stored on a soft magnetic track with no loss of security.
Some refinements of and enhancements to the invention will now be described in order to explain more fully the operation of a typical system.
Secure operation of an extended system is largely concerned with communication among system components, some of which are more trusted than others. The functionality of several of those data links which are particularly relevant to valued articles, protected as described hereinbefore, will now be described.
A simplified diagram of key usage is shown in Fig. 2. As it is based on RSA public key cryptography, only the public keys are communicated. Each secret key remains in a highly secure location, within the organisation that generated it.
The system provider's public key (PPK) is stored within each card reader (CAD), in a memory location which cannot be overwritten. It sed by the CAD to check other data that has been signed by the provider, and is therefore trustworthy.
An example of this is each issuer's public key (IPK), which is signed by the system provider's secret key (PSK), as shown above.
In practice, there will be large numbers of CADs, each holding the same data. In addition, each CAD holds its own unique key (not shown), which distinguishes it from all other CADs, and enables it to communicate unambiguously with the issuer.
To initialise a card, the issuer first collects all the data that the CAD might need to know about the card holder and the card, as shown in Fig. 3 in a block marked DATA.
This includes the number recorded as the magnetic watermark, the PAN, expiry date, PIN SUBSTITUTE SHEET (RULE 26) I M I WO 96/102901 PCTIGB95/01611 policy, and so on, and is sufficient for the CAD to decide when an off-line transaction is appropriate.
The DATA block, when signed by the issuer's secret key (ISK), becomes the secure certificate, which is then copied onto a soft data area on the card.
In normal use, the CAD reads the certificate from the card, and decrypts the original data.
The production of updated certificates on-line also follows the above procedure, the CAD acting as intermediary between the issuer and the card, The card is preferably provided with a transaction counter, which resides on the card, and the main purpose of which is to restrict the number of off-line transactions allowed before a new certificate is required. In addition, the availability of a transaction count allows the issuer to carry out further checks against attempted friud. Printing the transaction number on each receipt gives the card holder a convenient indication of card usage.
In Fig. 4 the CAD has read the DATA block from the certificate, as described above. Held within the data block is the issuer's off-line policy, and the maximum off-line transaction count. The CAD also reads the card transaction count (CTC) from the card. It then has enough information to decide whether the transaction can continue off-line or not, In either case, provided that the transaction is approved, the CAD increments the CTC on the card, and prints the CTC as part of the card holder's receipt.
The increment line to the card has been shown in Fig. 4 as a separate connection, for clarity. In practice, it would be part of a digital interface, whose operation could not readily be blocked. To check that the transaction count has indeed incremented, the CAD re-reads the new transaction count from the card.
It is highly unusual for systems to be provably secure. Even when a system is believed to be secure, it is wise to plan for the contingency that supposedly secret information might become public knowledge. In the system described, the secret key of the system provider, and the secret keys of the issuers, should be kept securely, However, even if these keys become known, the system provided by this invention can be reconfigured, quickly and economically to use new key sets.
For instance, suppose that an issuer's secret key becomes known. The consequent threat is that a fraudster might produce certificates purporting to come from the issuer, and thereby use out-of-date cards for off-line transactions.
SUBSTITUTE SHEET (RULE 26) i- M I ~II WO 96/02901 PCT'IGB95/01611 To recover rom this situation, the issuer generates a new key set, and gets the public key signed by the system provider. As each CAD comes on-line, the suspect public key is replaced by the new one. To allow this, the CAD must have a protocol which allows issuer keys to be updated. As the new key is signed by the system provider, it can be accepted by the CAD as genuine, Then, as each card is presented to the updated CAD, any card using the old public key is given an on-line transaction, which results is its next certificate being signed with the new public key. Furthermore, an updated card, when presented to a CAD which was still using the old public key, would result in an on-line transaction during which the CAD would be updated.
Thus the procedure required to change the issuer's public key is secure, fast, economical, and transparent to the user.
The procedure for updating the system provider's key is similar, but somewhat more complex, since the system provider is the centre of trust. One option is to store a choice of system provider public keys in each CAD, when the system is initialised. If one key becomes compromised, the system can move over to the next key. This involves re-signing all the issuer's keys, and updating the CADs as and when they come on line. The cards need not be updated. As before, the change is transparent to the user.
In the event that the article contairs a PIN, that information may be secured within a relatively inaccessible region of an integrated, circuit chip. In this case, the card itself can check the PIN when keyed in. Alternatively, an encrypted PIN may be stored within the "certificate" on the article and the CAD can then check the PIN, as is presently done at offline ATMs.
In another embodiment, the integrated circuit chip is replaced by a two dimensional bar code which can be read optically.
Figure 5 shows a flow diagram of a method according to the second aspect of the invention. The blocks have the following significances. Block 50 denotes storing authentification data in a first storage means carried by the article as a non-random permanently structured magnetic characteristic which varies from place to place on the storage means.
Block 51 denotes operating on said authentification data and additional data using the secret key of a secret key/public key cryptosystem pair hereby creating encrypted data.
This will normally be performed by, for example, the card issuing authority in the case of credit or other cards.
SUBSTITUTE SHEET (RULE 26) I
I
WO 96/02901 PCT/GB95/01611 Block 52 denotes storing the encrypted data in a second storage means carried by the article.
Block 53 denotes reading the encrypted data from the second storage means.
Block 54 denotes operating on the encrypted data with the public key of said cryptosystem pair to give decrypted authentification data and decrypted additional data.
This will normally be performed by, for example, the card reading machine in the field in the case of credit or other cards.
Block 55 denotes comparing the decrypted authentification data with the authentification data stored in the first storage means thereby authenticating the article of value and/or the additional data. This will normally also be performed by the card reading system.
In general, the data stored in the second storage means may be read magnetically, optically or electronically depending upon the nature of the storage means employed.
SLBSTITUTE SHEET (RULE 26)
L

Claims (9)

1. A method of authenticating an article of value, comprising: a) storing authentification data in a first storage means carried by the article as a non-random permanently structured magnetic characteristic which varies from place to place on the storage means, b) operating on said authentification data and additional data using the secret key of a secret key/public key cryptosystem pair hereby creating encrypted data, c) storing the encrypted data in a second storage means carried by the article, d) reading the encrypted data from the second storage means, e) operating on the encrypted data with the public key of said cryptosystem pair to give decrypted authentification data and decrypted additional data, and f) comparing the decrypted authentification data with the authentification data stored in the first storage means thereby authenticating the article of value and/or the additional data.
2. \-Ien. nst for an article of value, capable of being used in the method of claim 1, comprising first and second data-storage means being carried by the article, each data-storage means storing data for authenticating or identifying the article and/or a transaction associated with the article, the first data-storage means storing first data as a non-random permanently structured magnetic characteristic which varies from place to place on the first storage means, the second storage means storing data obtained by operation of the secret key of a secret key/public key cryptosystem pair upon data comprising the first data and additional data.
3. ifi r n according to claim 2 in which the first and second storage means comprise respective tracks on a common magnetic strip.
4. ifir; a In ,ean according to claim 2 in which the second storage means comprises a magnetic strip separate from said first storage means.
A aca!0- sfotre^ Tie.,r 4 narr. according to claim 2 in which the second storage means is carried by the first storage means. -0 AT O II A aAckc, score-
6. I-deti.af n, a e ,according to claim 2 in which the second storage means comprises a two dimensional bar code.
7. naaccording to claim 2 in which the second storage means comprises an integrated circuit.
8. tif= s Lea r- according to claim 7 in which the integrated circuit includes relatively open and relatively secure data storage areas, the relatively secure data storage area storing a personal identification number (PIN) associated with an authorized user or possessor of the article of value. c 'sore-
9. An article of value having in',h a according to any preceding claim carried thereby. i.NEDn SHEET V u v L
AU28929/95A 1994-07-15 1995-07-07 Authentication technique Ceased AU682778B2 (en)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
GB9414368 1994-07-15
GB9414368A GB9414368D0 (en) 1994-07-15 1994-07-15 Authentication technique
PCT/GB1995/001611 WO1996002901A1 (en) 1994-07-15 1995-07-07 Authentication technique

Publications (2)

Publication Number Publication Date
AU2892995A AU2892995A (en) 1996-02-16
AU682778B2 true AU682778B2 (en) 1997-10-16

Family

ID=10758427

Family Applications (1)

Application Number Title Priority Date Filing Date
AU28929/95A Ceased AU682778B2 (en) 1994-07-15 1995-07-07 Authentication technique

Country Status (11)

Country Link
EP (1) EP0771452A1 (en)
JP (1) JPH10503037A (en)
KR (1) KR970705106A (en)
CN (1) CN1152968A (en)
AU (1) AU682778B2 (en)
BR (1) BR9508281A (en)
CA (1) CA2195003A1 (en)
GB (2) GB9414368D0 (en)
TW (1) TW278167B (en)
WO (1) WO1996002901A1 (en)
ZA (1) ZA955824B (en)

Families Citing this family (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO1998055970A1 (en) * 1997-06-05 1998-12-10 Dix It S.R.L. Method for ascertaining the authenticity of a predetermined product
FR2771196B1 (en) * 1997-11-19 2001-08-03 Jacques Rivailler PROCESS FOR ENSURING THE TRACEABILITY OF SUCCESSIVE ELEMENTS OF A SERIES OF TRANSFORMATIONS AND APPLICATIONS THEREOF
FR2815155B1 (en) * 2000-10-09 2003-06-06 Jacques Rivaillier PRINCIPLE AND METHOD FOR MARKING, IDENTIFYING AND SECURING COMPUTER FILES, DOCUMENTS, SUB, CHEMICAL COMPOUNDS AND IMPLEMENTING APPARATUS
EP1436810A1 (en) * 2001-10-10 2004-07-14 Jacques Rivaillier Method of marking, identifying and securing computer files, documents, sounds and chemical compounds
CN1293574C (en) * 2001-12-18 2007-01-03 勒德洛公司 Flexible interconnect cable with ribbonized ends and method of manufacturing
US7137553B2 (en) * 2001-12-31 2006-11-21 Digital Data Research Company Security clearance card, system and method of reading a security clearance card
CN101596820B (en) * 2008-06-03 2010-08-18 北京中维华盾科技发展有限公司 Method for making fingerprint encryption certificates and cards
US8742369B2 (en) 2010-11-01 2014-06-03 Honeywell International Inc. Value documents and other articles having taggants that exhibit delayed maximum intensity emissions, and methods and apparatus for their authentication
US20150295919A1 (en) * 2014-04-09 2015-10-15 De Sonneville International Ltd. Self-authenticating card
US9590983B2 (en) 2014-04-09 2017-03-07 Cardex Systems Inc. Self-authenticating chips

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US3927393A (en) * 1973-05-02 1975-12-16 Minnesota Mining & Mfg Magnetic record medium authentication system
EP0583709A1 (en) * 1992-08-17 1994-02-23 THOMSON multimedia Unforgeable identification device, identification device reader and method of identification

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4806740A (en) * 1986-09-19 1989-02-21 Light Signatures, Inc. Magnetic characteristic identification system
US4837426A (en) * 1987-01-16 1989-06-06 Rand, Mcnally & Company Object verification apparatus and method
FR2618002B1 (en) * 1987-07-10 1991-07-05 Schlumberger Ind Sa METHOD AND SYSTEM FOR AUTHENTICATING ELECTRONIC MEMORY CARDS
FR2657981A1 (en) * 1990-02-05 1991-08-09 Kodak Pathe Process for certifying an information carrier and carrier obtained according to the process
US5388158A (en) * 1992-11-20 1995-02-07 Pitney Bowes Inc. Secure document and method and apparatus for producing and authenticating same

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US3927393A (en) * 1973-05-02 1975-12-16 Minnesota Mining & Mfg Magnetic record medium authentication system
EP0583709A1 (en) * 1992-08-17 1994-02-23 THOMSON multimedia Unforgeable identification device, identification device reader and method of identification

Also Published As

Publication number Publication date
KR970705106A (en) 1997-09-06
GB9414368D0 (en) 1994-09-07
TW278167B (en) 1996-06-11
GB2291522A (en) 1996-01-24
BR9508281A (en) 1997-10-28
AU2892995A (en) 1996-02-16
GB2291522B (en) 1997-04-30
WO1996002901A1 (en) 1996-02-01
GB9513946D0 (en) 1995-09-06
EP0771452A1 (en) 1997-05-07
CN1152968A (en) 1997-06-25
CA2195003A1 (en) 1996-02-01
JPH10503037A (en) 1998-03-17
ZA955824B (en) 1996-02-21

Similar Documents

Publication Publication Date Title
US5786587A (en) Enhancement of chip card security
JP5274020B2 (en) Authentic card
US5694471A (en) Counterfeit-proof identification card
US5351302A (en) Method for authenticating objects identified by images or other identifying information
US5336871A (en) Holographic enhancement of card security
Hendry Smart card security and applications
EP0683471A1 (en) Enhancement of document security
US6615351B1 (en) Method for checking the authenticity of a data medium
US20070095928A1 (en) Physical items for holding data securely, and methods and apparatus for publishing and reading them
US20050087604A1 (en) Licensing and identification devices having coded marks and methods of making and authenticating such licensing and identification devices
RU2435218C2 (en) Card with possibility of authentication
GB2297856A (en) Electronic negotiable documents
AU682778B2 (en) Authentication technique
EP2374091A2 (en) Encrypted marking and method for securing and certifying the authenticity of a product
JP3787027B2 (en) Authentication type security system
JP2001052143A (en) Recording medium for authentication and authentication system
EP1578615A2 (en) Document with user authentication
JP3117122B2 (en) Authentication type security system
JP3980706B2 (en) IC card and authentication device thereof
JPH1173504A (en) Recording material for identification and authenticity discriminating method
JPH01173411A (en) Magnetic card with protective function
JP2839954B2 (en) Method and system for writing information on a medium that allows later to prove the originality of the information
JP4046918B2 (en) IC card, IC card reader and IC card system
WO2010089673A2 (en) A data authentication technology
CA2163749C (en) Method for authenticating objects identified by images or other identifying information

Legal Events

Date Code Title Description
MK14 Patent ceased section 143(a) (annual fees not paid) or expired