CA2664074A1 - Laser perforation image reader and method of reading laser perforation image - Google Patents

Laser perforation image reader and method of reading laser perforation image Download PDF

Info

Publication number
CA2664074A1
CA2664074A1 CA002664074A CA2664074A CA2664074A1 CA 2664074 A1 CA2664074 A1 CA 2664074A1 CA 002664074 A CA002664074 A CA 002664074A CA 2664074 A CA2664074 A CA 2664074A CA 2664074 A1 CA2664074 A1 CA 2664074A1
Authority
CA
Canada
Prior art keywords
image
perforation
random
reading
shaped medium
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
CA002664074A
Other languages
French (fr)
Inventor
Myung-Sook Kim
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Publication of CA2664074A1 publication Critical patent/CA2664074A1/en
Abandoned legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K7/00Methods or arrangements for sensing record carriers, e.g. for reading patterns
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07DHANDLING OF COINS OR VALUABLE PAPERS, e.g. TESTING, SORTING BY DENOMINATIONS, COUNTING, DISPENSING, CHANGING OR DEPOSITING
    • G07D7/00Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency
    • G07D7/005Testing security markings invisible to the naked eye, e.g. verifying thickened lines or unobtrusive markings or alterations
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K1/00Methods or arrangements for marking the record carrier in digital fashion
    • G06K1/02Methods or arrangements for marking the record carrier in digital fashion by punching
    • G06K1/04Methods or arrangements for marking the record carrier in digital fashion by punching controlled by sensing markings on the record carrier being punched

Landscapes

  • Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Artificial Intelligence (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Credit Cards Or The Like (AREA)

Abstract

The present invention relates to a perforation image verification apparatus and a method of reading a plate-shaped medium based on a perforation image. More specifically, the present invention relates to a perforation image verification apparatus for reading a random-number perforation image perforated on a plate-shaped medium and then restoring an original image using an image restoration application, and a method of reading a plate- shaped medium based on a perforation image wherein an encryption function is used to form a random-number dot image and an inverse function of the encryption function is used to restore an original image. To this end, the perforation image verification apparatus of the present invention comprises a reader unit for reading an encrypted random-number perforation image perforated on a plate-shaped medium, an image restoration application unit for restoring an original image by applying a decryption function to the random-number perforation image, and a display unit for displaying the image restored by the image restoration application unit. As a result, whether the plate-shaped medium has been forged can be determined by comparing an image before encryption with the restored image.

Description

LASER PERFORATION IMAGE READER AND METHOD OF READING LASER
PERFORATION IMAGE

Technical field The present invention relates to a perforation image verification apparatus and a method of reading a plate-shaped medium based on a perforation image. More specifically, the present invention relates to a perforation image verification apparatus for reading a random-number perforation image perforated on a plate-shaped medium and then restoring an original image using an image restoration application, and a method of reading a plate-shaped medium based on a perforation image wherein an encryption function is used to form a random-number dot image and an inverse function of the encryption function is used to restore an original image.

Background Art In general, an identification check or an inquiry of identification information is performed by confirming a picture printed on an identification card or using a resident registration number, and the identification check or the inquiry of identification information at a mobile working area, such as a checkpoint, performance hall or the like, is performed merely by inquiring a resident registration number through a wireless transceiver and confirming replied personal information. In this case, measures for correctly checking and preventing the forgery of an identification card are needed, which are also required for checking a driver's license, admission ticket, check, or other various certificates.

However, since checking the forgery of an identification card, driver's license or the like is performed merely with naked eyes, there is a problem in that the checking reliability is lowered. Further, since personal information such as picture and resident registration number is exposed on the identification card or the like, a person who tries to forge the identification card or the like can easily access the personal information.
1.

Therefore, the forgery by copying and replacing a picture is attempted in a large scale, and the leakage of personal information is highly increased. In addition, since current techniques for preventing the forgery of admission tickets, checks and various certificates, including a technique for printing a hologram or a watermark, a technique for inserting a smart chip and determining the forgery using a specific reader, a technique for inserting a pattern unrecognizable with naked eyes and reading the pattern using an infrared reader, and the like, are already widely known, the y are extremely in effective against the forgery prevention.

A technique for perforating a shape that is the same as a picture printed on or attached to an identification card or an issuance number of a check using a laser perforation apparatus as shown in Fig. 1 can basically prevent the forgery using a scanner or a color printer. That is, since microholes with a size of 95 m to 125 m are drilled by using a laser instead of using a general papermaking technique, there is an advantage in that the forgery prevention can be effectively performed and a plate-shaped medium of the identification card or the like will not be damaged. However, even though a perforation images is formed, the perforation image can be recognized with naked eyes and perforation information can be easily understood. Thus, a desire for forgery may be stimulated.
Further, if the perforation image is character information, there is still a problem in that personal information such as a resident registration number may be leaked through the perforation image.

Disclosure of Invention Technical Problem The present invention is conceived to solve the aforementioned problems.
Accordingly, an object of the present invention is to provide a perforation image verification apparatus and a method of reading a plate-shaped medium based on a perforation image, wherein a desire for forgery is fundamentally excluded or leakage of personal information is also blocked by forming a random-number dot image from an original image using an encryption function and perforating only the formed random-number dot image on the plate-shaped medium, and forgery of an identification card, admission ticket, a variety of documents can be determined by comparing an image restored through an image restoration application with an original image.

To achieve the above object of the present invention, the present invention provides a perforation image verification apparatus which comprises a reader unit for reading an encrypted random-number perforation image perforated on a plate-shaped medium, an image restoration application unit for restoring an original image by applying a decryption function to the random-number perforation image, and a display unit for displaying the image restored by the image restoration application unit.

Technical Solution According to an aspect of the present invention, there is provided a perforation image verification apparatus, which comprises a reader unit for reading an encrypted random-number perforation image perforated on a plate-shaped medium, an image restoration application unit for restoring an original image by applying a decryption function to the random-number perforation image, and a display unit for displaying the image restored by the image restoration application unit.

At this time, the encrypted random-number perforation image may be created by applying an inverse function of the decryption function of the image restoration application unit to the original image.

Further, the image restoration application unit may include an image selection unit capable of omitting application of the decryption function if the random-number perforation image is a recognizable image. In addition, the image restoration application unit may include a character recognition unit for recognizing a portion of the decrypted original image as a character and then converting the recognized character image into character information. In particular, the character information may be a personal identification number. Moreover, the perforation image verification apparatus may further comprise an interface unit for allowing the apparatus to communicate with an external device, through which relevant information is further obtained from the external device using the personal identification number as a key.

The perforation image verification apparatus may further comprise an interface unit for allowing the apparatus to communicate with an external device. The reader unit may further have a function of reading a chip and include a function selection unit for selecting and reading at least one of the perforation image and chip information.

In addition, the plate-shaped medium is a common term referring to a medium containing an image or character to be encrypted in accordance with the present invention, which is either a plastic card including an identification card, a driver's license and a credit card, or a paper document including an admission ticket, a certificate, a bill and a check.

According to another aspect of the present invention, there is provided a method of reading a plate-shaped medium based on a perforation image, comprising the steps of defining an encryption function for converting a dot image and a decryption function that is an inverse function of the encryption function; reading an image to be perforated on the plate-shaped medium, forming the read image into a dot image, and inputting the dot image into a laser perforation apparatus; forming a random-number dot image by applying the encryption function to the formed dot image and manufacturing a plate-shaped medium on which a random-number perforation image corresponding to the formed random-number dot image is perforated; reading the plate-shaped medium using a perforation image reader and restoring an original dot image by applying the decryption function to the random-number perforation image; and displaying the original dot image on a display unit of the perforation image reader.

At this time, the method of the present invention may further comprise the step of obtaining more relevant information from an external device through an interface unit using the character information as a key.
Brief Description of Drawings Fig. 1 is a view showing a sample of conventional securities on which its serial number is perforated.

Fig. 2 is a view showing a sample of a conventional identification card on which its picture is perforated.

Fig. 3 is a block diagram of a perforation image verification apparatus according the present invention.

Fig. 4 is a view showing the configuration of the whole system using a perforation image verification apparatus according the present invention.

Fig. 5 is a block diagram showing encryption and restoration processes using encryption and restoration applications.

Fig. 6 is a view showing the configuration of an identification card inquiry system used when it is connected to a computer at a fixed working area according to an embodiment of the present invention.

Fig. 7 is a view showing the configuration of a stand-alone identification card forgery determination system according to an embodiment of the present invention.

Best Mode for Carrying out the Invention Hereinafter, a preferred embodiment of the present invention will be described in more detail with reference to the accompanying drawings.

Fig. 3 is a block diagram of a perforation image verification apparatus according the present invention, and Fig. 4 is a view showing the configuration of the whole system using the perforation image verification apparatus according the present invention.

First, the perforation image verification apparatus 100 will be described. A
card reader unit 120 is constructed to accept a plate-shaped medium and performs a function of reading an encrypted random-number perforation image perforated on the plate-shaped medium. The encrypted random-number perforation image is created by applying an inverse function of a decryption function of a restoration application 140 to an original image. Recently, identification cards, credit cards and the like tend to include a memory chip and store a variety of data in the memory chip. Therefore, the card reader unit 120 further comprises a chip reader unit 121 capable of reading information stored in the memory chip in addition to an image reader unit 122 for reading a perforation image. The card reader unit also includes a function selection unit and thus can selectively read the perforation image or chip information. The selection of function in the function selection unit is made by alternatively selecting either a chip inquiry key 112 or an image inquiry key 113 included in a key input unit 110. In a case where neither the chip inquiry key 112 nor the image inquiry key 113 is selected, the perforation image is preferentially read by the image reader unit 122. The perforation image or chip information read by the card reader unit 120 is transferred to the restoration application 140. Here, the card reader unit 120 is described as a plastic carder reader, but it is obvious that the card reader unit can be easily modified into a document reader for reading admission tickets, checks or the like.

The restoration application 140 serves to restore an original image by applying a decryption function to the perforation image transferred from the card reader unit 120, and the restored image is then transferred to a display unit 150. The restoration application 140 includes an image selection unit such tha a process of applying the decryption function can be omitted in a case where the random-number perforation image transferred from the card reader unit 120 is a recognizable image. Further, the restoration application includes a character recognition unit capable of recognizing a portion of the restored original image, which is recognized as a character, and then converting the recognized portion into character information. At this time, the character information can be a variety of personal identification numbers, such as a resident registration number, depending on the type of the plate-shaped medium to which the present invention is applied.

The display unit 150 serves to output the chip information or the restored image transferred from the restoration application 140 onto a screen of the perforation image verification apparatus 100, and supports to output the chip information or the restored image through an external printer, if necessary.

The key input unit 110 includes, in addition to the chip inquiry key 112 and the image inquiry key 113, an additional information output key 111 for outputting additional information onto the screen of the perforation image verification apparatus 100 depending on the type of an inquiry, a function selection key 114 for allowing various types of identification inquiry, and a power key 115 for turning on and off the perforation image verification apparatus 100. Here, a connection terminal for connecting the perforation image verification apparatus to a wireless LAN 180 is provided at a lower end of the key input unit 110, and a plurality of connection lamps 116 for indicating a state where the perforation image verification apparatus 100 is connected with to a desktop computer 500, a notebook computer 600 or the like through an external interface 160.

The control unit 130 comprises a microcomputer and a control circuit, and is connected to components of the perforation image verification apparatus 100, including the key input unit 110, the card reader unit 120, the restoration application 140 and the like, to store input and output data for each of the components, to display the input and output data onto the screen or to. transmit and receive communication data.

A modem 170 is connected to a terminal cooperating with the perforation image verification apparatus 100 to perform wired communication.

The wireless LAN 180 is used such that the perforation image verification apparatus 100 can be connected to a central information providing server 700 using a wireless communication technique when the perforation image verification apparatus is used at a remote area such as a checkpoint.

The interface unit 150 (4 external interface unit 160) is used to connect the perforation image verification apparatus 100 to a desktop computer 500, a notebook computer 600 or the like at a fixed working area for the purpose of using the perforation image verification apparatus 100 only as a card input terminal, and also includes a connector or jack for connecting with the desktop computer 500 or the notebook computer 600.

The perforation image verification apparatus 100 of the present invention can be used in both wired and wireless communications. Preferably, TCP/IP and PPP
stacks are mounted on the perforation image verification apparatus for conveniently connecting with the Internet.

Further, an integrated circuit (IC) card security algorithm is used for security and authentication. If the perforation image verification apparatus 100 is portable and used standalone, a firewall is installed such that a connection with the central information providing server 700 should be allowed through a high-level authentication process. If the perforation image verification apparatus 100 is used only as a card reader terminal at a fixed area where a desktop computer 500, a notebook computer 600 or the like is installed, a security connection function of the perforation image verification apparatus 100 is blocked such that security regulations installed in the desktop computer 500 or notebook computer 600 can be observed.

Furthermore, it is preferred that power can be supplied through a rechargeable battery or an ordinary battery, and a recharge function using a cigar jack of a car can also be provided considering when the system is moved by a car.

Next, before describing the configuration of the whole system using the perforation image verification apparatus with reference to Fig. 4, encryption and decryption processes performed through encryption and restoration applications 40 and 140 will be first described with reference to Fig. 5. Fig. 5 shows an example of a rectangle that is a simple figure recognizable with naked eyes. An original image such as a picture 10 attached to an identification card or an image 20 for confirming an admission ticket is first converted into a dot image, and then, the converted dot image is composed of coordinates pointing to respective dots. The dot image is converted into random-number dot images 10a and 20a by means of an encryption function in the encryption application 40, and the random-number dot images 10a and 20a composed of converted coordinates can be obtained accordingly. Decryption of the random-number dot image 10a and 20a is performed by means of a decryption function in the restoration application 140. In such a case, there is the inverse function relationship between the encryption and decryption functions. That is, the following relationship is satisfied:

P* =MP , and P =M-'P`.

At this time, M denotes the encryption function, M"1 denotes the decryption function, P denotes coordinates of an original dot image, and P* denotes coordinates of an encrypted random-number dot image.

The random-number dot images 10a and 20a formed in the encryption process are inputted into a laser perforation apparatus 200 and perforated onto a plate-shaped medium.
Unlike the initial rectangular figure, the perforated image becomes an abstract image that cannot be recognized with naked eyes.

A person 50 possessing a plate-shaped medium such as an identification card 400a, an admission ticket 400b or a driver's license 400c where an encrypted image is perforated through the encryption and perforation processes has been subjected to an identification process and a process of confirming whether the plate-shaped medium has been forged, through the perforation image verification apparatus 100 at an area 60 where the identification is required. At this time, a person can connect to the information providing server 700 in a wired or wireless manner using the perforation image verification apparatus 100 and can use an additional service after the identification process has been performed.
For example, a variety of credit cards or the like can be used in connection with a network of a value-added network (VAN) service provider of a bank/credit card company or Korea Financial Telecommunications and Clearings Institute after it is confirmed through an identification and forgery determination system 2000 using a perforation image verification apparatus whether the card has been forged.

In particular, on the plate-shaped medium such as an identification card 400a or a driver's license 400c finally manufactured through the encryption and perforation processes is perforated only encrypted dot images 10a, 20a and 30a created through the encryption application 40, and the original images 10, 20 and 30 are not recorded thereon.
Accordingly, it is possible to prevent personal information such as a picture or a resident registration number from being leaked.

The perforation image verification apparatus 100 and the identification and forgery determination system 2000 using the same can be generally divided into a fixed type in which they are used at a fixed working area (district office, court, bank or the like) and a mobile type in which they are used at a mobile working area (checkpoint, area where questioning by a patrolling policeman is made using the verification apparatus, various performance halls, or the like).

Fig. 6 shows the system configuration and communication when the perforation image verification apparatus is used at a fixed working area (district office, court, bank or the like), wherein the perforation image verification apparatus 100 is connected to a desktop computer 500 or a notebook computer 600.

If a person possessing an identification card 400a or an admission ticket 400b requests a service (issuance of a variety of certificates, request for admission, banking transaction or the like) (step S 10), a worker on duty requests the person to show the identification card 400a or the admission ticket 400b (step SI1). If the person provides the identification card 400a or the admission ticket 400b (step S 12), the identification card 400a or the admission ticket 400b is inserted into the perforation image verification apparatus 100.
At this time, an object to be inquired can be selected by choosing either the chip inquiry key 112 or the image inquiry key 113 from the key input unit 110 of the perforation image verification apparatus 100, and an image restored by the restoration application 140 is displayed on the perforation image verification apparatus 100a and 100b and the desktop computer 500a or notebook computer 600a.

In this case, the restoration application of the perforation image verification apparatus 100 includes a character recognition unit for recognizing a portion of the restored original image that is recognized as a character and converting the recognized portion into character information. In particular, the character information can be a personal identification number, such as a resident registration number, depending on the type of the plate-shaped medium.

If it is determined by the worker that more personal information is necessary, the worker can connect to the information providing server 700 and requests additional information using the personal identification number recognized by the character recognition unit as a key (step S 14). The inquired information received from the information providing server 700 is displayed on the screen of the desktop computer or notebook computer 500a or 600a (step S 15). After the steps described above, the worker working at a fixed working area will provide the service requested by the person possessing an identification card (step S 13).

Next, Fig. 7 shows the system configuration and communication when the perforation image verification apparatus is used at a mobile working area (checkpoint, area where questioning by a patrolling policeman is made using the verification apparatus, various performance halls or the like), in which the procedures performed in Fig. 6 are performed in the same manner. However, a step of connecting to a wireless network (step S 16) is further needed to connect to the information providing server 700 for requesting additional information and receiving inquired information.

As such, the present invention can be applied to determining the authenticity of a variety of credit cards, membership cards, various kinds of documents or the like, and the identification of a person. Further, if an information access rule according to users is clearly established, the leakage of personal information can be absolutely prevented.

That is, patrolling men or workers at a checkpoint can efficiently prevent and manage crimes using a handheld card reader for identification in which information on criminals or the like is previously stored. Further, since a person possessing a card, an image shown on the card, and an image read by the card reader can be easily compared with one another, the forgery or falsification of the card can be completely found.

At this time, if the size of the perforation image verification apparatus 100 is adjusted in accordance with the size of an object to be confirmed, social costs required for removing fear of forgery prevailing in our society can be greatly reduced.
Further, the perforation image verification apparatus can be applied in various ways.

Meanwhile, although the present invention has been described and illustrated in connection with the specific preferred embodiments, it will be readily understood by those skilled in the art that various modifications and changes can be made thereto without departing from the spirit and scope of the present invention defined by the appended claims.
Industrial Applicability According to a perforation image verification apparatus and a method of reading a plate-shaped medium based on a perforation image, since a random-number perforation image perforated on a plate-shaped medium is restored using the perforation image verification apparatus to determine whether a plate-shaped medium has been forged, a desire for forgery can be blocked, and it can be correctly and promptly checked whether the plate-shaped medium has been forged. Further, since it is not necessary to record personal information on the plate-shaped medium, a problem of leakage of the personal information can also be prevented. Furthermore, the plate-shaped medium can be effectively checked at a remote area by applying a wireless communication technique thereto.

Claims (12)

1. A perforation image verification apparatus, comprising:

a reader unit for reading an encrypted random-number perforation image perforated on a plate-shaped medium;

an image restoration application unit for restoring an original image by applying a decryption function to the random-number perforation image; and a display unit for displaying the image restored by the image restoration application unit.
2. The apparatus as claimed in claim 1, wherein the encrypted random-number perforation image is created by applying an inverse function of the decryption function of the image restoration application unit to the original image.
3. The apparatus as claimed in claim 1, wherein the image restoration application unit includes a character recognition unit for recognizing a portion of the decrypted original image as a character and then converting the recognized character image into character information.
4. The apparatus as claimed in claim 1, wherein the image restoration application unit includes an image selection unit capable of omitting application of the decryption function if the random-number perforation image is a recognizable image.
5. The apparatus as claimed in claim 3, wherein the character information is a personal identification number.
6. The apparatus as claimed in any one of claims 1 to 5, wherein the reader unit further has a function of reading a chip and includes a function selection unit for selecting and reading at least one of the perforation image and chip information.
7. The apparatus as claimed in any one of claims 1 to 5, further comprising:

an interface unit for allowing the apparatus to communicate with an external device.
8. The apparatus as claimed in any one of claims 1 to 5, wherein the plate-shaped medium is either a plastic card including an identification card, a driver's license and a credit card, or a paper document including an admission ticket, a certificate, a bill, and a check.
9. The apparatus as claimed in claim 5, further comprising:

an interface unit for allowing the apparatus to communicate with an external device, through which relevant information is further obtained from the external device using the personal identification number as a key.
10. A method of reading a plate-shaped medium based on a perforation image, comprising the steps of:

defining an encryption function for converting a dot image and a decryption function that is an inverse function of the encryption function;

reading an image to be perforated on the plate-shaped medium, forming the read image into a dot image, and inputting the dot image into a laser perforation apparatus;
forming a random-number dot image by applying the encryption function to the formed dot image and manufacturing a plate-shaped medium on which a random-number perforation image corresponding to the formed random-number dot image is perforated;
reading the plate-shaped medium using a perforation image reader and restoring an original dot image by applying the decryption function to the random-number perforation image; and displaying the original dot image on a display unit of the perforation image reader.
11. The method as claimed in claim 10, further comprising the step of:

recognizing a portion of the decrypted original image that is recognized as a character and converting the recognized image portion into character information.
12. The method as claimed in claim 11, further comprising the step of:

obtaining more relevant information from an external device through an interface unit using the character information as a key.
CA002664074A 2006-09-21 2007-08-24 Laser perforation image reader and method of reading laser perforation image Abandoned CA2664074A1 (en)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
KR1020060091890A KR100869830B1 (en) 2006-09-21 2006-09-21 Laser Perforation Image Reader and its Method
KR10-2006-0091890 2006-09-21
PCT/KR2007/004085 WO2008035859A1 (en) 2006-09-21 2007-08-24 Laser perforation image reader and method of reading laser perforation image

Publications (1)

Publication Number Publication Date
CA2664074A1 true CA2664074A1 (en) 2008-03-27

Family

ID=39200662

Family Applications (1)

Application Number Title Priority Date Filing Date
CA002664074A Abandoned CA2664074A1 (en) 2006-09-21 2007-08-24 Laser perforation image reader and method of reading laser perforation image

Country Status (4)

Country Link
EP (1) EP2071489A4 (en)
KR (1) KR100869830B1 (en)
CA (1) CA2664074A1 (en)
WO (1) WO2008035859A1 (en)

Families Citing this family (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10074025B2 (en) * 2013-12-05 2018-09-11 Shenzhen Pu Ying Innovation Technology Corporation Limited Device and method for decoding graphic patterns
US10087692B2 (en) 2015-07-17 2018-10-02 Saudi Arabian Oil Company Laser propelled tractor with laser operated logging tools
CN106742677A (en) * 2016-12-22 2017-05-31 炬众钛合(天津)科技发展有限公司 A kind of environmental protection package thing with optical tag
EP3608121A1 (en) * 2018-08-10 2020-02-12 IAI Industrial systems B.V. Forge-proof document
US20220092879A1 (en) * 2019-02-07 2022-03-24 Assa Abloy Ab Matching of face or facial image with a facial image comprised of a pattern of perforations
KR20200142834A (en) 2019-06-13 2020-12-23 함문성 A forgery judging application system and its reading method for a randomized encryption printed image
KR20240059615A (en) * 2021-08-30 2024-05-07 도판 홀딩스 가부시키가이샤 Transfer foil, transfer material, display type, verification method and verification device for authenticity of display type, and object authentication method

Family Cites Families (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE2350418A1 (en) * 1973-10-08 1975-04-10 Gretag Ag PROCEDURE AND EQUIPMENT FOR CREATING AND EVALUATING FALSE-PROOF MACHINELY READABLE PAYMENT RECEIPTS
JPH05324945A (en) * 1992-05-26 1993-12-10 Omron Corp Information identifying and recording medium and method and device for identifying information
US5434917A (en) * 1993-10-13 1995-07-18 Thomson Consumer Electronics S.A. Unforgeable identification device, identification device reader and method of identification
US5479026A (en) 1994-05-16 1995-12-26 United Technologies Corporation System having optically encoded information
JPH08147434A (en) * 1994-11-17 1996-06-07 Mitsubishi Paper Mills Ltd Information recording medium, and method and device for discriminating the same
FR2740727B1 (en) * 1995-11-08 1998-01-16 Giusto Renato Di PROCESS FOR EDITING OR PRINTING CHECKS AND LETTERS CHECK AND CHECK OR LETTER CHECK THUS OBTAINED
NL1004433C2 (en) * 1996-11-05 1998-05-08 Iai Bv Security feature in the form of a perforation pattern.
AUPP053597A0 (en) * 1997-11-25 1997-12-18 Canon Information Systems Research Australia Pty Ltd Device and method for authenticating and certifying printed documents

Also Published As

Publication number Publication date
EP2071489A1 (en) 2009-06-17
WO2008035859A1 (en) 2008-03-27
KR100869830B1 (en) 2008-11-21
EP2071489A4 (en) 2010-09-08
KR20080026829A (en) 2008-03-26

Similar Documents

Publication Publication Date Title
US8233658B2 (en) Security system using encoded image with puzzled image
EP0730243B1 (en) Identification card verification system and method
US9396506B2 (en) System providing an improved skimming resistance for an electronic identity document
CA2490208C (en) System and method for automatic verification of the holder of an authorisation document
CA2664074A1 (en) Laser perforation image reader and method of reading laser perforation image
EP2237519A1 (en) Method and system for securely linking digital user's data to an NFC application running on a terminal
JP5659505B2 (en) Authentication apparatus and authentication method
JP4322455B2 (en) Method and system for confirming originality of recorded information
JP6805662B2 (en) Identification information generator, identification information generation program and identity verification support system
JP4395588B2 (en) Manufacture, issuance, examination method and booklet of IC booklet
KR100834529B1 (en) Management Terminal for Paper-baseor Valuable Papers
JP3839110B2 (en) Card authentication system
Paci Digital signature implementation on ID-1 cards as a personalization security feature
US20160162770A1 (en) A Land Title Deed Comprising A Smart Chip
KR20070026738A (en) Recording medium for managing paper-base(or valuable papers)
EP3057069B1 (en) Document reading device for checking an identification document
KR20150043010A (en) Complex system for discerning of a forged check and method for discerning of a forged check using the same
RU2253148C2 (en) Identification device with protected photograph and also means and method for authentication of such an identification device
KR100558555B1 (en) Apparatus and method for issuing ic card
KR20070026730A (en) Management system for paper-base(or valuable papers)
KR20070026735A (en) Management terminal for paper-base(or valuable papers)
Alliance Secure Personal Identification Systems
KR20070026731A (en) Management method for paper-base(or valuable papers)
KR20130029918A (en) Authentication method using 2-dimensional code
KR20070026737A (en) Management method for paper-base(or valuable papers)

Legal Events

Date Code Title Description
EEER Examination request
FZDE Discontinued