CA2664074A1 - Laser perforation image reader and method of reading laser perforation image - Google Patents
Laser perforation image reader and method of reading laser perforation image Download PDFInfo
- Publication number
- CA2664074A1 CA2664074A1 CA002664074A CA2664074A CA2664074A1 CA 2664074 A1 CA2664074 A1 CA 2664074A1 CA 002664074 A CA002664074 A CA 002664074A CA 2664074 A CA2664074 A CA 2664074A CA 2664074 A1 CA2664074 A1 CA 2664074A1
- Authority
- CA
- Canada
- Prior art keywords
- image
- perforation
- random
- reading
- shaped medium
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K7/00—Methods or arrangements for sensing record carriers, e.g. for reading patterns
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07D—HANDLING OF COINS OR VALUABLE PAPERS, e.g. TESTING, SORTING BY DENOMINATIONS, COUNTING, DISPENSING, CHANGING OR DEPOSITING
- G07D7/00—Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency
- G07D7/005—Testing security markings invisible to the naked eye, e.g. verifying thickened lines or unobtrusive markings or alterations
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K1/00—Methods or arrangements for marking the record carrier in digital fashion
- G06K1/02—Methods or arrangements for marking the record carrier in digital fashion by punching
- G06K1/04—Methods or arrangements for marking the record carrier in digital fashion by punching controlled by sensing markings on the record carrier being punched
Landscapes
- Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Artificial Intelligence (AREA)
- Computer Vision & Pattern Recognition (AREA)
- Credit Cards Or The Like (AREA)
Abstract
The present invention relates to a perforation image verification apparatus and a method of reading a plate-shaped medium based on a perforation image. More specifically, the present invention relates to a perforation image verification apparatus for reading a random-number perforation image perforated on a plate-shaped medium and then restoring an original image using an image restoration application, and a method of reading a plate- shaped medium based on a perforation image wherein an encryption function is used to form a random-number dot image and an inverse function of the encryption function is used to restore an original image. To this end, the perforation image verification apparatus of the present invention comprises a reader unit for reading an encrypted random-number perforation image perforated on a plate-shaped medium, an image restoration application unit for restoring an original image by applying a decryption function to the random-number perforation image, and a display unit for displaying the image restored by the image restoration application unit. As a result, whether the plate-shaped medium has been forged can be determined by comparing an image before encryption with the restored image.
Description
LASER PERFORATION IMAGE READER AND METHOD OF READING LASER
PERFORATION IMAGE
Technical field The present invention relates to a perforation image verification apparatus and a method of reading a plate-shaped medium based on a perforation image. More specifically, the present invention relates to a perforation image verification apparatus for reading a random-number perforation image perforated on a plate-shaped medium and then restoring an original image using an image restoration application, and a method of reading a plate-shaped medium based on a perforation image wherein an encryption function is used to form a random-number dot image and an inverse function of the encryption function is used to restore an original image.
Background Art In general, an identification check or an inquiry of identification information is performed by confirming a picture printed on an identification card or using a resident registration number, and the identification check or the inquiry of identification information at a mobile working area, such as a checkpoint, performance hall or the like, is performed merely by inquiring a resident registration number through a wireless transceiver and confirming replied personal information. In this case, measures for correctly checking and preventing the forgery of an identification card are needed, which are also required for checking a driver's license, admission ticket, check, or other various certificates.
However, since checking the forgery of an identification card, driver's license or the like is performed merely with naked eyes, there is a problem in that the checking reliability is lowered. Further, since personal information such as picture and resident registration number is exposed on the identification card or the like, a person who tries to forge the identification card or the like can easily access the personal information.
1.
Therefore, the forgery by copying and replacing a picture is attempted in a large scale, and the leakage of personal information is highly increased. In addition, since current techniques for preventing the forgery of admission tickets, checks and various certificates, including a technique for printing a hologram or a watermark, a technique for inserting a smart chip and determining the forgery using a specific reader, a technique for inserting a pattern unrecognizable with naked eyes and reading the pattern using an infrared reader, and the like, are already widely known, the y are extremely in effective against the forgery prevention.
A technique for perforating a shape that is the same as a picture printed on or attached to an identification card or an issuance number of a check using a laser perforation apparatus as shown in Fig. 1 can basically prevent the forgery using a scanner or a color printer. That is, since microholes with a size of 95 m to 125 m are drilled by using a laser instead of using a general papermaking technique, there is an advantage in that the forgery prevention can be effectively performed and a plate-shaped medium of the identification card or the like will not be damaged. However, even though a perforation images is formed, the perforation image can be recognized with naked eyes and perforation information can be easily understood. Thus, a desire for forgery may be stimulated.
Further, if the perforation image is character information, there is still a problem in that personal information such as a resident registration number may be leaked through the perforation image.
Disclosure of Invention Technical Problem The present invention is conceived to solve the aforementioned problems.
Accordingly, an object of the present invention is to provide a perforation image verification apparatus and a method of reading a plate-shaped medium based on a perforation image, wherein a desire for forgery is fundamentally excluded or leakage of personal information is also blocked by forming a random-number dot image from an original image using an encryption function and perforating only the formed random-number dot image on the plate-shaped medium, and forgery of an identification card, admission ticket, a variety of documents can be determined by comparing an image restored through an image restoration application with an original image.
To achieve the above object of the present invention, the present invention provides a perforation image verification apparatus which comprises a reader unit for reading an encrypted random-number perforation image perforated on a plate-shaped medium, an image restoration application unit for restoring an original image by applying a decryption function to the random-number perforation image, and a display unit for displaying the image restored by the image restoration application unit.
Technical Solution According to an aspect of the present invention, there is provided a perforation image verification apparatus, which comprises a reader unit for reading an encrypted random-number perforation image perforated on a plate-shaped medium, an image restoration application unit for restoring an original image by applying a decryption function to the random-number perforation image, and a display unit for displaying the image restored by the image restoration application unit.
At this time, the encrypted random-number perforation image may be created by applying an inverse function of the decryption function of the image restoration application unit to the original image.
Further, the image restoration application unit may include an image selection unit capable of omitting application of the decryption function if the random-number perforation image is a recognizable image. In addition, the image restoration application unit may include a character recognition unit for recognizing a portion of the decrypted original image as a character and then converting the recognized character image into character information. In particular, the character information may be a personal identification number. Moreover, the perforation image verification apparatus may further comprise an interface unit for allowing the apparatus to communicate with an external device, through which relevant information is further obtained from the external device using the personal identification number as a key.
The perforation image verification apparatus may further comprise an interface unit for allowing the apparatus to communicate with an external device. The reader unit may further have a function of reading a chip and include a function selection unit for selecting and reading at least one of the perforation image and chip information.
In addition, the plate-shaped medium is a common term referring to a medium containing an image or character to be encrypted in accordance with the present invention, which is either a plastic card including an identification card, a driver's license and a credit card, or a paper document including an admission ticket, a certificate, a bill and a check.
According to another aspect of the present invention, there is provided a method of reading a plate-shaped medium based on a perforation image, comprising the steps of defining an encryption function for converting a dot image and a decryption function that is an inverse function of the encryption function; reading an image to be perforated on the plate-shaped medium, forming the read image into a dot image, and inputting the dot image into a laser perforation apparatus; forming a random-number dot image by applying the encryption function to the formed dot image and manufacturing a plate-shaped medium on which a random-number perforation image corresponding to the formed random-number dot image is perforated; reading the plate-shaped medium using a perforation image reader and restoring an original dot image by applying the decryption function to the random-number perforation image; and displaying the original dot image on a display unit of the perforation image reader.
At this time, the method of the present invention may further comprise the step of obtaining more relevant information from an external device through an interface unit using the character information as a key.
PERFORATION IMAGE
Technical field The present invention relates to a perforation image verification apparatus and a method of reading a plate-shaped medium based on a perforation image. More specifically, the present invention relates to a perforation image verification apparatus for reading a random-number perforation image perforated on a plate-shaped medium and then restoring an original image using an image restoration application, and a method of reading a plate-shaped medium based on a perforation image wherein an encryption function is used to form a random-number dot image and an inverse function of the encryption function is used to restore an original image.
Background Art In general, an identification check or an inquiry of identification information is performed by confirming a picture printed on an identification card or using a resident registration number, and the identification check or the inquiry of identification information at a mobile working area, such as a checkpoint, performance hall or the like, is performed merely by inquiring a resident registration number through a wireless transceiver and confirming replied personal information. In this case, measures for correctly checking and preventing the forgery of an identification card are needed, which are also required for checking a driver's license, admission ticket, check, or other various certificates.
However, since checking the forgery of an identification card, driver's license or the like is performed merely with naked eyes, there is a problem in that the checking reliability is lowered. Further, since personal information such as picture and resident registration number is exposed on the identification card or the like, a person who tries to forge the identification card or the like can easily access the personal information.
1.
Therefore, the forgery by copying and replacing a picture is attempted in a large scale, and the leakage of personal information is highly increased. In addition, since current techniques for preventing the forgery of admission tickets, checks and various certificates, including a technique for printing a hologram or a watermark, a technique for inserting a smart chip and determining the forgery using a specific reader, a technique for inserting a pattern unrecognizable with naked eyes and reading the pattern using an infrared reader, and the like, are already widely known, the y are extremely in effective against the forgery prevention.
A technique for perforating a shape that is the same as a picture printed on or attached to an identification card or an issuance number of a check using a laser perforation apparatus as shown in Fig. 1 can basically prevent the forgery using a scanner or a color printer. That is, since microholes with a size of 95 m to 125 m are drilled by using a laser instead of using a general papermaking technique, there is an advantage in that the forgery prevention can be effectively performed and a plate-shaped medium of the identification card or the like will not be damaged. However, even though a perforation images is formed, the perforation image can be recognized with naked eyes and perforation information can be easily understood. Thus, a desire for forgery may be stimulated.
Further, if the perforation image is character information, there is still a problem in that personal information such as a resident registration number may be leaked through the perforation image.
Disclosure of Invention Technical Problem The present invention is conceived to solve the aforementioned problems.
Accordingly, an object of the present invention is to provide a perforation image verification apparatus and a method of reading a plate-shaped medium based on a perforation image, wherein a desire for forgery is fundamentally excluded or leakage of personal information is also blocked by forming a random-number dot image from an original image using an encryption function and perforating only the formed random-number dot image on the plate-shaped medium, and forgery of an identification card, admission ticket, a variety of documents can be determined by comparing an image restored through an image restoration application with an original image.
To achieve the above object of the present invention, the present invention provides a perforation image verification apparatus which comprises a reader unit for reading an encrypted random-number perforation image perforated on a plate-shaped medium, an image restoration application unit for restoring an original image by applying a decryption function to the random-number perforation image, and a display unit for displaying the image restored by the image restoration application unit.
Technical Solution According to an aspect of the present invention, there is provided a perforation image verification apparatus, which comprises a reader unit for reading an encrypted random-number perforation image perforated on a plate-shaped medium, an image restoration application unit for restoring an original image by applying a decryption function to the random-number perforation image, and a display unit for displaying the image restored by the image restoration application unit.
At this time, the encrypted random-number perforation image may be created by applying an inverse function of the decryption function of the image restoration application unit to the original image.
Further, the image restoration application unit may include an image selection unit capable of omitting application of the decryption function if the random-number perforation image is a recognizable image. In addition, the image restoration application unit may include a character recognition unit for recognizing a portion of the decrypted original image as a character and then converting the recognized character image into character information. In particular, the character information may be a personal identification number. Moreover, the perforation image verification apparatus may further comprise an interface unit for allowing the apparatus to communicate with an external device, through which relevant information is further obtained from the external device using the personal identification number as a key.
The perforation image verification apparatus may further comprise an interface unit for allowing the apparatus to communicate with an external device. The reader unit may further have a function of reading a chip and include a function selection unit for selecting and reading at least one of the perforation image and chip information.
In addition, the plate-shaped medium is a common term referring to a medium containing an image or character to be encrypted in accordance with the present invention, which is either a plastic card including an identification card, a driver's license and a credit card, or a paper document including an admission ticket, a certificate, a bill and a check.
According to another aspect of the present invention, there is provided a method of reading a plate-shaped medium based on a perforation image, comprising the steps of defining an encryption function for converting a dot image and a decryption function that is an inverse function of the encryption function; reading an image to be perforated on the plate-shaped medium, forming the read image into a dot image, and inputting the dot image into a laser perforation apparatus; forming a random-number dot image by applying the encryption function to the formed dot image and manufacturing a plate-shaped medium on which a random-number perforation image corresponding to the formed random-number dot image is perforated; reading the plate-shaped medium using a perforation image reader and restoring an original dot image by applying the decryption function to the random-number perforation image; and displaying the original dot image on a display unit of the perforation image reader.
At this time, the method of the present invention may further comprise the step of obtaining more relevant information from an external device through an interface unit using the character information as a key.
Brief Description of Drawings Fig. 1 is a view showing a sample of conventional securities on which its serial number is perforated.
Fig. 2 is a view showing a sample of a conventional identification card on which its picture is perforated.
Fig. 3 is a block diagram of a perforation image verification apparatus according the present invention.
Fig. 4 is a view showing the configuration of the whole system using a perforation image verification apparatus according the present invention.
Fig. 5 is a block diagram showing encryption and restoration processes using encryption and restoration applications.
Fig. 6 is a view showing the configuration of an identification card inquiry system used when it is connected to a computer at a fixed working area according to an embodiment of the present invention.
Fig. 7 is a view showing the configuration of a stand-alone identification card forgery determination system according to an embodiment of the present invention.
Best Mode for Carrying out the Invention Hereinafter, a preferred embodiment of the present invention will be described in more detail with reference to the accompanying drawings.
Fig. 3 is a block diagram of a perforation image verification apparatus according the present invention, and Fig. 4 is a view showing the configuration of the whole system using the perforation image verification apparatus according the present invention.
First, the perforation image verification apparatus 100 will be described. A
card reader unit 120 is constructed to accept a plate-shaped medium and performs a function of reading an encrypted random-number perforation image perforated on the plate-shaped medium. The encrypted random-number perforation image is created by applying an inverse function of a decryption function of a restoration application 140 to an original image. Recently, identification cards, credit cards and the like tend to include a memory chip and store a variety of data in the memory chip. Therefore, the card reader unit 120 further comprises a chip reader unit 121 capable of reading information stored in the memory chip in addition to an image reader unit 122 for reading a perforation image. The card reader unit also includes a function selection unit and thus can selectively read the perforation image or chip information. The selection of function in the function selection unit is made by alternatively selecting either a chip inquiry key 112 or an image inquiry key 113 included in a key input unit 110. In a case where neither the chip inquiry key 112 nor the image inquiry key 113 is selected, the perforation image is preferentially read by the image reader unit 122. The perforation image or chip information read by the card reader unit 120 is transferred to the restoration application 140. Here, the card reader unit 120 is described as a plastic carder reader, but it is obvious that the card reader unit can be easily modified into a document reader for reading admission tickets, checks or the like.
The restoration application 140 serves to restore an original image by applying a decryption function to the perforation image transferred from the card reader unit 120, and the restored image is then transferred to a display unit 150. The restoration application 140 includes an image selection unit such tha a process of applying the decryption function can be omitted in a case where the random-number perforation image transferred from the card reader unit 120 is a recognizable image. Further, the restoration application includes a character recognition unit capable of recognizing a portion of the restored original image, which is recognized as a character, and then converting the recognized portion into character information. At this time, the character information can be a variety of personal identification numbers, such as a resident registration number, depending on the type of the plate-shaped medium to which the present invention is applied.
The display unit 150 serves to output the chip information or the restored image transferred from the restoration application 140 onto a screen of the perforation image verification apparatus 100, and supports to output the chip information or the restored image through an external printer, if necessary.
The key input unit 110 includes, in addition to the chip inquiry key 112 and the image inquiry key 113, an additional information output key 111 for outputting additional information onto the screen of the perforation image verification apparatus 100 depending on the type of an inquiry, a function selection key 114 for allowing various types of identification inquiry, and a power key 115 for turning on and off the perforation image verification apparatus 100. Here, a connection terminal for connecting the perforation image verification apparatus to a wireless LAN 180 is provided at a lower end of the key input unit 110, and a plurality of connection lamps 116 for indicating a state where the perforation image verification apparatus 100 is connected with to a desktop computer 500, a notebook computer 600 or the like through an external interface 160.
The control unit 130 comprises a microcomputer and a control circuit, and is connected to components of the perforation image verification apparatus 100, including the key input unit 110, the card reader unit 120, the restoration application 140 and the like, to store input and output data for each of the components, to display the input and output data onto the screen or to. transmit and receive communication data.
A modem 170 is connected to a terminal cooperating with the perforation image verification apparatus 100 to perform wired communication.
The wireless LAN 180 is used such that the perforation image verification apparatus 100 can be connected to a central information providing server 700 using a wireless communication technique when the perforation image verification apparatus is used at a remote area such as a checkpoint.
The interface unit 150 (4 external interface unit 160) is used to connect the perforation image verification apparatus 100 to a desktop computer 500, a notebook computer 600 or the like at a fixed working area for the purpose of using the perforation image verification apparatus 100 only as a card input terminal, and also includes a connector or jack for connecting with the desktop computer 500 or the notebook computer 600.
The perforation image verification apparatus 100 of the present invention can be used in both wired and wireless communications. Preferably, TCP/IP and PPP
stacks are mounted on the perforation image verification apparatus for conveniently connecting with the Internet.
Further, an integrated circuit (IC) card security algorithm is used for security and authentication. If the perforation image verification apparatus 100 is portable and used standalone, a firewall is installed such that a connection with the central information providing server 700 should be allowed through a high-level authentication process. If the perforation image verification apparatus 100 is used only as a card reader terminal at a fixed area where a desktop computer 500, a notebook computer 600 or the like is installed, a security connection function of the perforation image verification apparatus 100 is blocked such that security regulations installed in the desktop computer 500 or notebook computer 600 can be observed.
Furthermore, it is preferred that power can be supplied through a rechargeable battery or an ordinary battery, and a recharge function using a cigar jack of a car can also be provided considering when the system is moved by a car.
Next, before describing the configuration of the whole system using the perforation image verification apparatus with reference to Fig. 4, encryption and decryption processes performed through encryption and restoration applications 40 and 140 will be first described with reference to Fig. 5. Fig. 5 shows an example of a rectangle that is a simple figure recognizable with naked eyes. An original image such as a picture 10 attached to an identification card or an image 20 for confirming an admission ticket is first converted into a dot image, and then, the converted dot image is composed of coordinates pointing to respective dots. The dot image is converted into random-number dot images 10a and 20a by means of an encryption function in the encryption application 40, and the random-number dot images 10a and 20a composed of converted coordinates can be obtained accordingly. Decryption of the random-number dot image 10a and 20a is performed by means of a decryption function in the restoration application 140. In such a case, there is the inverse function relationship between the encryption and decryption functions. That is, the following relationship is satisfied:
P* =MP , and P =M-'P`.
At this time, M denotes the encryption function, M"1 denotes the decryption function, P denotes coordinates of an original dot image, and P* denotes coordinates of an encrypted random-number dot image.
The random-number dot images 10a and 20a formed in the encryption process are inputted into a laser perforation apparatus 200 and perforated onto a plate-shaped medium.
Unlike the initial rectangular figure, the perforated image becomes an abstract image that cannot be recognized with naked eyes.
A person 50 possessing a plate-shaped medium such as an identification card 400a, an admission ticket 400b or a driver's license 400c where an encrypted image is perforated through the encryption and perforation processes has been subjected to an identification process and a process of confirming whether the plate-shaped medium has been forged, through the perforation image verification apparatus 100 at an area 60 where the identification is required. At this time, a person can connect to the information providing server 700 in a wired or wireless manner using the perforation image verification apparatus 100 and can use an additional service after the identification process has been performed.
For example, a variety of credit cards or the like can be used in connection with a network of a value-added network (VAN) service provider of a bank/credit card company or Korea Financial Telecommunications and Clearings Institute after it is confirmed through an identification and forgery determination system 2000 using a perforation image verification apparatus whether the card has been forged.
In particular, on the plate-shaped medium such as an identification card 400a or a driver's license 400c finally manufactured through the encryption and perforation processes is perforated only encrypted dot images 10a, 20a and 30a created through the encryption application 40, and the original images 10, 20 and 30 are not recorded thereon.
Accordingly, it is possible to prevent personal information such as a picture or a resident registration number from being leaked.
The perforation image verification apparatus 100 and the identification and forgery determination system 2000 using the same can be generally divided into a fixed type in which they are used at a fixed working area (district office, court, bank or the like) and a mobile type in which they are used at a mobile working area (checkpoint, area where questioning by a patrolling policeman is made using the verification apparatus, various performance halls, or the like).
Fig. 6 shows the system configuration and communication when the perforation image verification apparatus is used at a fixed working area (district office, court, bank or the like), wherein the perforation image verification apparatus 100 is connected to a desktop computer 500 or a notebook computer 600.
If a person possessing an identification card 400a or an admission ticket 400b requests a service (issuance of a variety of certificates, request for admission, banking transaction or the like) (step S 10), a worker on duty requests the person to show the identification card 400a or the admission ticket 400b (step SI1). If the person provides the identification card 400a or the admission ticket 400b (step S 12), the identification card 400a or the admission ticket 400b is inserted into the perforation image verification apparatus 100.
At this time, an object to be inquired can be selected by choosing either the chip inquiry key 112 or the image inquiry key 113 from the key input unit 110 of the perforation image verification apparatus 100, and an image restored by the restoration application 140 is displayed on the perforation image verification apparatus 100a and 100b and the desktop computer 500a or notebook computer 600a.
In this case, the restoration application of the perforation image verification apparatus 100 includes a character recognition unit for recognizing a portion of the restored original image that is recognized as a character and converting the recognized portion into character information. In particular, the character information can be a personal identification number, such as a resident registration number, depending on the type of the plate-shaped medium.
If it is determined by the worker that more personal information is necessary, the worker can connect to the information providing server 700 and requests additional information using the personal identification number recognized by the character recognition unit as a key (step S 14). The inquired information received from the information providing server 700 is displayed on the screen of the desktop computer or notebook computer 500a or 600a (step S 15). After the steps described above, the worker working at a fixed working area will provide the service requested by the person possessing an identification card (step S 13).
Next, Fig. 7 shows the system configuration and communication when the perforation image verification apparatus is used at a mobile working area (checkpoint, area where questioning by a patrolling policeman is made using the verification apparatus, various performance halls or the like), in which the procedures performed in Fig. 6 are performed in the same manner. However, a step of connecting to a wireless network (step S 16) is further needed to connect to the information providing server 700 for requesting additional information and receiving inquired information.
As such, the present invention can be applied to determining the authenticity of a variety of credit cards, membership cards, various kinds of documents or the like, and the identification of a person. Further, if an information access rule according to users is clearly established, the leakage of personal information can be absolutely prevented.
That is, patrolling men or workers at a checkpoint can efficiently prevent and manage crimes using a handheld card reader for identification in which information on criminals or the like is previously stored. Further, since a person possessing a card, an image shown on the card, and an image read by the card reader can be easily compared with one another, the forgery or falsification of the card can be completely found.
At this time, if the size of the perforation image verification apparatus 100 is adjusted in accordance with the size of an object to be confirmed, social costs required for removing fear of forgery prevailing in our society can be greatly reduced.
Further, the perforation image verification apparatus can be applied in various ways.
Meanwhile, although the present invention has been described and illustrated in connection with the specific preferred embodiments, it will be readily understood by those skilled in the art that various modifications and changes can be made thereto without departing from the spirit and scope of the present invention defined by the appended claims.
Industrial Applicability According to a perforation image verification apparatus and a method of reading a plate-shaped medium based on a perforation image, since a random-number perforation image perforated on a plate-shaped medium is restored using the perforation image verification apparatus to determine whether a plate-shaped medium has been forged, a desire for forgery can be blocked, and it can be correctly and promptly checked whether the plate-shaped medium has been forged. Further, since it is not necessary to record personal information on the plate-shaped medium, a problem of leakage of the personal information can also be prevented. Furthermore, the plate-shaped medium can be effectively checked at a remote area by applying a wireless communication technique thereto.
Fig. 2 is a view showing a sample of a conventional identification card on which its picture is perforated.
Fig. 3 is a block diagram of a perforation image verification apparatus according the present invention.
Fig. 4 is a view showing the configuration of the whole system using a perforation image verification apparatus according the present invention.
Fig. 5 is a block diagram showing encryption and restoration processes using encryption and restoration applications.
Fig. 6 is a view showing the configuration of an identification card inquiry system used when it is connected to a computer at a fixed working area according to an embodiment of the present invention.
Fig. 7 is a view showing the configuration of a stand-alone identification card forgery determination system according to an embodiment of the present invention.
Best Mode for Carrying out the Invention Hereinafter, a preferred embodiment of the present invention will be described in more detail with reference to the accompanying drawings.
Fig. 3 is a block diagram of a perforation image verification apparatus according the present invention, and Fig. 4 is a view showing the configuration of the whole system using the perforation image verification apparatus according the present invention.
First, the perforation image verification apparatus 100 will be described. A
card reader unit 120 is constructed to accept a plate-shaped medium and performs a function of reading an encrypted random-number perforation image perforated on the plate-shaped medium. The encrypted random-number perforation image is created by applying an inverse function of a decryption function of a restoration application 140 to an original image. Recently, identification cards, credit cards and the like tend to include a memory chip and store a variety of data in the memory chip. Therefore, the card reader unit 120 further comprises a chip reader unit 121 capable of reading information stored in the memory chip in addition to an image reader unit 122 for reading a perforation image. The card reader unit also includes a function selection unit and thus can selectively read the perforation image or chip information. The selection of function in the function selection unit is made by alternatively selecting either a chip inquiry key 112 or an image inquiry key 113 included in a key input unit 110. In a case where neither the chip inquiry key 112 nor the image inquiry key 113 is selected, the perforation image is preferentially read by the image reader unit 122. The perforation image or chip information read by the card reader unit 120 is transferred to the restoration application 140. Here, the card reader unit 120 is described as a plastic carder reader, but it is obvious that the card reader unit can be easily modified into a document reader for reading admission tickets, checks or the like.
The restoration application 140 serves to restore an original image by applying a decryption function to the perforation image transferred from the card reader unit 120, and the restored image is then transferred to a display unit 150. The restoration application 140 includes an image selection unit such tha a process of applying the decryption function can be omitted in a case where the random-number perforation image transferred from the card reader unit 120 is a recognizable image. Further, the restoration application includes a character recognition unit capable of recognizing a portion of the restored original image, which is recognized as a character, and then converting the recognized portion into character information. At this time, the character information can be a variety of personal identification numbers, such as a resident registration number, depending on the type of the plate-shaped medium to which the present invention is applied.
The display unit 150 serves to output the chip information or the restored image transferred from the restoration application 140 onto a screen of the perforation image verification apparatus 100, and supports to output the chip information or the restored image through an external printer, if necessary.
The key input unit 110 includes, in addition to the chip inquiry key 112 and the image inquiry key 113, an additional information output key 111 for outputting additional information onto the screen of the perforation image verification apparatus 100 depending on the type of an inquiry, a function selection key 114 for allowing various types of identification inquiry, and a power key 115 for turning on and off the perforation image verification apparatus 100. Here, a connection terminal for connecting the perforation image verification apparatus to a wireless LAN 180 is provided at a lower end of the key input unit 110, and a plurality of connection lamps 116 for indicating a state where the perforation image verification apparatus 100 is connected with to a desktop computer 500, a notebook computer 600 or the like through an external interface 160.
The control unit 130 comprises a microcomputer and a control circuit, and is connected to components of the perforation image verification apparatus 100, including the key input unit 110, the card reader unit 120, the restoration application 140 and the like, to store input and output data for each of the components, to display the input and output data onto the screen or to. transmit and receive communication data.
A modem 170 is connected to a terminal cooperating with the perforation image verification apparatus 100 to perform wired communication.
The wireless LAN 180 is used such that the perforation image verification apparatus 100 can be connected to a central information providing server 700 using a wireless communication technique when the perforation image verification apparatus is used at a remote area such as a checkpoint.
The interface unit 150 (4 external interface unit 160) is used to connect the perforation image verification apparatus 100 to a desktop computer 500, a notebook computer 600 or the like at a fixed working area for the purpose of using the perforation image verification apparatus 100 only as a card input terminal, and also includes a connector or jack for connecting with the desktop computer 500 or the notebook computer 600.
The perforation image verification apparatus 100 of the present invention can be used in both wired and wireless communications. Preferably, TCP/IP and PPP
stacks are mounted on the perforation image verification apparatus for conveniently connecting with the Internet.
Further, an integrated circuit (IC) card security algorithm is used for security and authentication. If the perforation image verification apparatus 100 is portable and used standalone, a firewall is installed such that a connection with the central information providing server 700 should be allowed through a high-level authentication process. If the perforation image verification apparatus 100 is used only as a card reader terminal at a fixed area where a desktop computer 500, a notebook computer 600 or the like is installed, a security connection function of the perforation image verification apparatus 100 is blocked such that security regulations installed in the desktop computer 500 or notebook computer 600 can be observed.
Furthermore, it is preferred that power can be supplied through a rechargeable battery or an ordinary battery, and a recharge function using a cigar jack of a car can also be provided considering when the system is moved by a car.
Next, before describing the configuration of the whole system using the perforation image verification apparatus with reference to Fig. 4, encryption and decryption processes performed through encryption and restoration applications 40 and 140 will be first described with reference to Fig. 5. Fig. 5 shows an example of a rectangle that is a simple figure recognizable with naked eyes. An original image such as a picture 10 attached to an identification card or an image 20 for confirming an admission ticket is first converted into a dot image, and then, the converted dot image is composed of coordinates pointing to respective dots. The dot image is converted into random-number dot images 10a and 20a by means of an encryption function in the encryption application 40, and the random-number dot images 10a and 20a composed of converted coordinates can be obtained accordingly. Decryption of the random-number dot image 10a and 20a is performed by means of a decryption function in the restoration application 140. In such a case, there is the inverse function relationship between the encryption and decryption functions. That is, the following relationship is satisfied:
P* =MP , and P =M-'P`.
At this time, M denotes the encryption function, M"1 denotes the decryption function, P denotes coordinates of an original dot image, and P* denotes coordinates of an encrypted random-number dot image.
The random-number dot images 10a and 20a formed in the encryption process are inputted into a laser perforation apparatus 200 and perforated onto a plate-shaped medium.
Unlike the initial rectangular figure, the perforated image becomes an abstract image that cannot be recognized with naked eyes.
A person 50 possessing a plate-shaped medium such as an identification card 400a, an admission ticket 400b or a driver's license 400c where an encrypted image is perforated through the encryption and perforation processes has been subjected to an identification process and a process of confirming whether the plate-shaped medium has been forged, through the perforation image verification apparatus 100 at an area 60 where the identification is required. At this time, a person can connect to the information providing server 700 in a wired or wireless manner using the perforation image verification apparatus 100 and can use an additional service after the identification process has been performed.
For example, a variety of credit cards or the like can be used in connection with a network of a value-added network (VAN) service provider of a bank/credit card company or Korea Financial Telecommunications and Clearings Institute after it is confirmed through an identification and forgery determination system 2000 using a perforation image verification apparatus whether the card has been forged.
In particular, on the plate-shaped medium such as an identification card 400a or a driver's license 400c finally manufactured through the encryption and perforation processes is perforated only encrypted dot images 10a, 20a and 30a created through the encryption application 40, and the original images 10, 20 and 30 are not recorded thereon.
Accordingly, it is possible to prevent personal information such as a picture or a resident registration number from being leaked.
The perforation image verification apparatus 100 and the identification and forgery determination system 2000 using the same can be generally divided into a fixed type in which they are used at a fixed working area (district office, court, bank or the like) and a mobile type in which they are used at a mobile working area (checkpoint, area where questioning by a patrolling policeman is made using the verification apparatus, various performance halls, or the like).
Fig. 6 shows the system configuration and communication when the perforation image verification apparatus is used at a fixed working area (district office, court, bank or the like), wherein the perforation image verification apparatus 100 is connected to a desktop computer 500 or a notebook computer 600.
If a person possessing an identification card 400a or an admission ticket 400b requests a service (issuance of a variety of certificates, request for admission, banking transaction or the like) (step S 10), a worker on duty requests the person to show the identification card 400a or the admission ticket 400b (step SI1). If the person provides the identification card 400a or the admission ticket 400b (step S 12), the identification card 400a or the admission ticket 400b is inserted into the perforation image verification apparatus 100.
At this time, an object to be inquired can be selected by choosing either the chip inquiry key 112 or the image inquiry key 113 from the key input unit 110 of the perforation image verification apparatus 100, and an image restored by the restoration application 140 is displayed on the perforation image verification apparatus 100a and 100b and the desktop computer 500a or notebook computer 600a.
In this case, the restoration application of the perforation image verification apparatus 100 includes a character recognition unit for recognizing a portion of the restored original image that is recognized as a character and converting the recognized portion into character information. In particular, the character information can be a personal identification number, such as a resident registration number, depending on the type of the plate-shaped medium.
If it is determined by the worker that more personal information is necessary, the worker can connect to the information providing server 700 and requests additional information using the personal identification number recognized by the character recognition unit as a key (step S 14). The inquired information received from the information providing server 700 is displayed on the screen of the desktop computer or notebook computer 500a or 600a (step S 15). After the steps described above, the worker working at a fixed working area will provide the service requested by the person possessing an identification card (step S 13).
Next, Fig. 7 shows the system configuration and communication when the perforation image verification apparatus is used at a mobile working area (checkpoint, area where questioning by a patrolling policeman is made using the verification apparatus, various performance halls or the like), in which the procedures performed in Fig. 6 are performed in the same manner. However, a step of connecting to a wireless network (step S 16) is further needed to connect to the information providing server 700 for requesting additional information and receiving inquired information.
As such, the present invention can be applied to determining the authenticity of a variety of credit cards, membership cards, various kinds of documents or the like, and the identification of a person. Further, if an information access rule according to users is clearly established, the leakage of personal information can be absolutely prevented.
That is, patrolling men or workers at a checkpoint can efficiently prevent and manage crimes using a handheld card reader for identification in which information on criminals or the like is previously stored. Further, since a person possessing a card, an image shown on the card, and an image read by the card reader can be easily compared with one another, the forgery or falsification of the card can be completely found.
At this time, if the size of the perforation image verification apparatus 100 is adjusted in accordance with the size of an object to be confirmed, social costs required for removing fear of forgery prevailing in our society can be greatly reduced.
Further, the perforation image verification apparatus can be applied in various ways.
Meanwhile, although the present invention has been described and illustrated in connection with the specific preferred embodiments, it will be readily understood by those skilled in the art that various modifications and changes can be made thereto without departing from the spirit and scope of the present invention defined by the appended claims.
Industrial Applicability According to a perforation image verification apparatus and a method of reading a plate-shaped medium based on a perforation image, since a random-number perforation image perforated on a plate-shaped medium is restored using the perforation image verification apparatus to determine whether a plate-shaped medium has been forged, a desire for forgery can be blocked, and it can be correctly and promptly checked whether the plate-shaped medium has been forged. Further, since it is not necessary to record personal information on the plate-shaped medium, a problem of leakage of the personal information can also be prevented. Furthermore, the plate-shaped medium can be effectively checked at a remote area by applying a wireless communication technique thereto.
Claims (12)
1. A perforation image verification apparatus, comprising:
a reader unit for reading an encrypted random-number perforation image perforated on a plate-shaped medium;
an image restoration application unit for restoring an original image by applying a decryption function to the random-number perforation image; and a display unit for displaying the image restored by the image restoration application unit.
a reader unit for reading an encrypted random-number perforation image perforated on a plate-shaped medium;
an image restoration application unit for restoring an original image by applying a decryption function to the random-number perforation image; and a display unit for displaying the image restored by the image restoration application unit.
2. The apparatus as claimed in claim 1, wherein the encrypted random-number perforation image is created by applying an inverse function of the decryption function of the image restoration application unit to the original image.
3. The apparatus as claimed in claim 1, wherein the image restoration application unit includes a character recognition unit for recognizing a portion of the decrypted original image as a character and then converting the recognized character image into character information.
4. The apparatus as claimed in claim 1, wherein the image restoration application unit includes an image selection unit capable of omitting application of the decryption function if the random-number perforation image is a recognizable image.
5. The apparatus as claimed in claim 3, wherein the character information is a personal identification number.
6. The apparatus as claimed in any one of claims 1 to 5, wherein the reader unit further has a function of reading a chip and includes a function selection unit for selecting and reading at least one of the perforation image and chip information.
7. The apparatus as claimed in any one of claims 1 to 5, further comprising:
an interface unit for allowing the apparatus to communicate with an external device.
an interface unit for allowing the apparatus to communicate with an external device.
8. The apparatus as claimed in any one of claims 1 to 5, wherein the plate-shaped medium is either a plastic card including an identification card, a driver's license and a credit card, or a paper document including an admission ticket, a certificate, a bill, and a check.
9. The apparatus as claimed in claim 5, further comprising:
an interface unit for allowing the apparatus to communicate with an external device, through which relevant information is further obtained from the external device using the personal identification number as a key.
an interface unit for allowing the apparatus to communicate with an external device, through which relevant information is further obtained from the external device using the personal identification number as a key.
10. A method of reading a plate-shaped medium based on a perforation image, comprising the steps of:
defining an encryption function for converting a dot image and a decryption function that is an inverse function of the encryption function;
reading an image to be perforated on the plate-shaped medium, forming the read image into a dot image, and inputting the dot image into a laser perforation apparatus;
forming a random-number dot image by applying the encryption function to the formed dot image and manufacturing a plate-shaped medium on which a random-number perforation image corresponding to the formed random-number dot image is perforated;
reading the plate-shaped medium using a perforation image reader and restoring an original dot image by applying the decryption function to the random-number perforation image; and displaying the original dot image on a display unit of the perforation image reader.
defining an encryption function for converting a dot image and a decryption function that is an inverse function of the encryption function;
reading an image to be perforated on the plate-shaped medium, forming the read image into a dot image, and inputting the dot image into a laser perforation apparatus;
forming a random-number dot image by applying the encryption function to the formed dot image and manufacturing a plate-shaped medium on which a random-number perforation image corresponding to the formed random-number dot image is perforated;
reading the plate-shaped medium using a perforation image reader and restoring an original dot image by applying the decryption function to the random-number perforation image; and displaying the original dot image on a display unit of the perforation image reader.
11. The method as claimed in claim 10, further comprising the step of:
recognizing a portion of the decrypted original image that is recognized as a character and converting the recognized image portion into character information.
recognizing a portion of the decrypted original image that is recognized as a character and converting the recognized image portion into character information.
12. The method as claimed in claim 11, further comprising the step of:
obtaining more relevant information from an external device through an interface unit using the character information as a key.
obtaining more relevant information from an external device through an interface unit using the character information as a key.
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR1020060091890A KR100869830B1 (en) | 2006-09-21 | 2006-09-21 | Laser Perforation Image Reader and its Method |
KR10-2006-0091890 | 2006-09-21 | ||
PCT/KR2007/004085 WO2008035859A1 (en) | 2006-09-21 | 2007-08-24 | Laser perforation image reader and method of reading laser perforation image |
Publications (1)
Publication Number | Publication Date |
---|---|
CA2664074A1 true CA2664074A1 (en) | 2008-03-27 |
Family
ID=39200662
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CA002664074A Abandoned CA2664074A1 (en) | 2006-09-21 | 2007-08-24 | Laser perforation image reader and method of reading laser perforation image |
Country Status (4)
Country | Link |
---|---|
EP (1) | EP2071489A4 (en) |
KR (1) | KR100869830B1 (en) |
CA (1) | CA2664074A1 (en) |
WO (1) | WO2008035859A1 (en) |
Families Citing this family (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10074025B2 (en) * | 2013-12-05 | 2018-09-11 | Shenzhen Pu Ying Innovation Technology Corporation Limited | Device and method for decoding graphic patterns |
US10087692B2 (en) | 2015-07-17 | 2018-10-02 | Saudi Arabian Oil Company | Laser propelled tractor with laser operated logging tools |
CN106742677A (en) * | 2016-12-22 | 2017-05-31 | 炬众钛合(天津)科技发展有限公司 | A kind of environmental protection package thing with optical tag |
EP3608121A1 (en) * | 2018-08-10 | 2020-02-12 | IAI Industrial systems B.V. | Forge-proof document |
US20220092879A1 (en) * | 2019-02-07 | 2022-03-24 | Assa Abloy Ab | Matching of face or facial image with a facial image comprised of a pattern of perforations |
KR20200142834A (en) | 2019-06-13 | 2020-12-23 | 함문성 | A forgery judging application system and its reading method for a randomized encryption printed image |
KR20240059615A (en) * | 2021-08-30 | 2024-05-07 | 도판 홀딩스 가부시키가이샤 | Transfer foil, transfer material, display type, verification method and verification device for authenticity of display type, and object authentication method |
Family Cites Families (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
DE2350418A1 (en) * | 1973-10-08 | 1975-04-10 | Gretag Ag | PROCEDURE AND EQUIPMENT FOR CREATING AND EVALUATING FALSE-PROOF MACHINELY READABLE PAYMENT RECEIPTS |
JPH05324945A (en) * | 1992-05-26 | 1993-12-10 | Omron Corp | Information identifying and recording medium and method and device for identifying information |
US5434917A (en) * | 1993-10-13 | 1995-07-18 | Thomson Consumer Electronics S.A. | Unforgeable identification device, identification device reader and method of identification |
US5479026A (en) | 1994-05-16 | 1995-12-26 | United Technologies Corporation | System having optically encoded information |
JPH08147434A (en) * | 1994-11-17 | 1996-06-07 | Mitsubishi Paper Mills Ltd | Information recording medium, and method and device for discriminating the same |
FR2740727B1 (en) * | 1995-11-08 | 1998-01-16 | Giusto Renato Di | PROCESS FOR EDITING OR PRINTING CHECKS AND LETTERS CHECK AND CHECK OR LETTER CHECK THUS OBTAINED |
NL1004433C2 (en) * | 1996-11-05 | 1998-05-08 | Iai Bv | Security feature in the form of a perforation pattern. |
AUPP053597A0 (en) * | 1997-11-25 | 1997-12-18 | Canon Information Systems Research Australia Pty Ltd | Device and method for authenticating and certifying printed documents |
-
2006
- 2006-09-21 KR KR1020060091890A patent/KR100869830B1/en not_active IP Right Cessation
-
2007
- 2007-08-24 EP EP07793682A patent/EP2071489A4/en not_active Withdrawn
- 2007-08-24 CA CA002664074A patent/CA2664074A1/en not_active Abandoned
- 2007-08-24 WO PCT/KR2007/004085 patent/WO2008035859A1/en active Application Filing
Also Published As
Publication number | Publication date |
---|---|
EP2071489A1 (en) | 2009-06-17 |
WO2008035859A1 (en) | 2008-03-27 |
KR100869830B1 (en) | 2008-11-21 |
EP2071489A4 (en) | 2010-09-08 |
KR20080026829A (en) | 2008-03-26 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8233658B2 (en) | Security system using encoded image with puzzled image | |
EP0730243B1 (en) | Identification card verification system and method | |
US9396506B2 (en) | System providing an improved skimming resistance for an electronic identity document | |
CA2490208C (en) | System and method for automatic verification of the holder of an authorisation document | |
CA2664074A1 (en) | Laser perforation image reader and method of reading laser perforation image | |
EP2237519A1 (en) | Method and system for securely linking digital user's data to an NFC application running on a terminal | |
JP5659505B2 (en) | Authentication apparatus and authentication method | |
JP4322455B2 (en) | Method and system for confirming originality of recorded information | |
JP6805662B2 (en) | Identification information generator, identification information generation program and identity verification support system | |
JP4395588B2 (en) | Manufacture, issuance, examination method and booklet of IC booklet | |
KR100834529B1 (en) | Management Terminal for Paper-baseor Valuable Papers | |
JP3839110B2 (en) | Card authentication system | |
Paci | Digital signature implementation on ID-1 cards as a personalization security feature | |
US20160162770A1 (en) | A Land Title Deed Comprising A Smart Chip | |
KR20070026738A (en) | Recording medium for managing paper-base(or valuable papers) | |
EP3057069B1 (en) | Document reading device for checking an identification document | |
KR20150043010A (en) | Complex system for discerning of a forged check and method for discerning of a forged check using the same | |
RU2253148C2 (en) | Identification device with protected photograph and also means and method for authentication of such an identification device | |
KR100558555B1 (en) | Apparatus and method for issuing ic card | |
KR20070026730A (en) | Management system for paper-base(or valuable papers) | |
KR20070026735A (en) | Management terminal for paper-base(or valuable papers) | |
Alliance | Secure Personal Identification Systems | |
KR20070026731A (en) | Management method for paper-base(or valuable papers) | |
KR20130029918A (en) | Authentication method using 2-dimensional code | |
KR20070026737A (en) | Management method for paper-base(or valuable papers) |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
EEER | Examination request | ||
FZDE | Discontinued |