CN101258528B - Authenticity verification - Google Patents

Authenticity verification Download PDF

Info

Publication number
CN101258528B
CN101258528B CN2006800325384A CN200680032538A CN101258528B CN 101258528 B CN101258528 B CN 101258528B CN 2006800325384 A CN2006800325384 A CN 2006800325384A CN 200680032538 A CN200680032538 A CN 200680032538A CN 101258528 B CN101258528 B CN 101258528B
Authority
CN
China
Prior art keywords
signature
article
piece
confirm
result
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN2006800325384A
Other languages
Chinese (zh)
Other versions
CN101258528A (en
Inventor
鲁塞尔·P·考伯恩
詹姆斯·D·R·布坎南
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ingenia Holdings UK Ltd
Original Assignee
Ingenia Holdings UK Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ingenia Holdings UK Ltd filed Critical Ingenia Holdings UK Ltd
Priority claimed from PCT/GB2006/002689 external-priority patent/WO2007012816A1/en
Publication of CN101258528A publication Critical patent/CN101258528A/en
Application granted granted Critical
Publication of CN101258528B publication Critical patent/CN101258528B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07DHANDLING OF COINS OR VALUABLE PAPERS, e.g. TESTING, SORTING BY DENOMINATIONS, COUNTING, DISPENSING, CHANGING OR DEPOSITING
    • G07D7/00Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency
    • G07D7/004Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency using digital security elements, e.g. information coded on a magnetic thread or strip
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/08Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code using markings of different kinds or more than one marking of the same kind in the same record carrier, e.g. one marking being sensed by optical and the other by magnetic means
    • G06K19/10Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code using markings of different kinds or more than one marking of the same kind in the same record carrier, e.g. one marking being sensed by optical and the other by magnetic means at least one kind of marking being used for authentication, e.g. of credit or identity cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K7/00Methods or arrangements for sensing record carriers, e.g. for reading patterns
    • G06K7/10Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation

Abstract

An article identification method can comprise: determining a signature from an article based upon an intrinsic characteristic of the article; and comparing the determined signature to a stored signature. The method can also comprise splitting the determined signature into blocks of contiguous data, performing a comparison operation between each block and respective blocks of the stored signature, and comparing an attribute of a comparison result from each block comparison to an expected attribute of the block comparison to determine a compensation value for use in determining a comparison result. The method can also comprise determining a similarity result between the determined signature and the stored signature, using the compensation value to adjust the determined signature. Thus an article damaged by stretching or shrinking can be successfully identified. Also, a non-linear signature determination can be accommodated without losing identification accuracy.

Description

Examining of authenticity
Technical field
The present invention relates to examining of authenticity, especially (but right and wrong exclusively) relates to such as personal identification (ID) but the examining of the authenticity of article card sell goods, vital document or other article.
Background technology
Many traditional discriminating (power) security systems depend on the process that concerning except that manufacturer anyone, is difficult to carry out, and this difficulty maybe be owing to the expense of fixed equipment, the complicacy of technical scheme or the two.Example is the providing of hologram on watermark and credit card or the passport in the banknote.Unfortunately, it is more seasoned that the criminal is becoming, and in fact can duplicate all that the original manufactured merchant can do.
Thus; A kind of known method of differentiating security system depends on certain process establishment secure token that utilization receives the natural law domination; It is unique that said process causes each token, and the more important thing is to have measurable unique property, thereby can be used as the follow-up basis of examining.According to the method, make and measure token, thereby obtain unique characteristic with the mode of setting.Said characteristic can be stored in Computer Database subsequently, perhaps otherwise keeps.This token can be embedded into the carrier article, in banknote, passport, I.D., vital document.Subsequently, can measure the carrier article once more, and the characteristic that relatively records be kept at the characteristic in the database, to determine whether coupling.
Secure token can be used to visit information, approval transaction or other many purposes.But impaired token and incomplete token identification equipment can cause being difficult to carry out the activity that token should provide startup to it.
Summary of the invention
At least part is considered the problem and the defective of conventional system, has made the present invention.
The present invention results partly from the work of inventor aspect the authentication technique that use to use the token of being processed by magnetic material at least; In the token of being processed by magnetic material, uniqueness provides (detailing among the PCT/GB03/03917 like Cowburn) by the defective of can not reproducing of the magnetic response that influences token in the magnetic material.As this part of work, magnetic material is manufactured into barcode format, promptly manufactures many parallel bands.As through read unique magnetic response of band with the inswept magnetic field of magnetic reader; Constituted optical scanner; It is through scan laser light beam on bar code, and utilize by the bar code band with its on form the contrast that the reflectivity of continuous variation of the article of bar code band causes and read bar code.This information is replenishing magnetic characteristic; Because in a kind of known self-authentication schemes; Bar code is used to the digital signature coding to unique magnetic response; For example as top about banknote said (for example referring to Kravolec " Plastic tag makes foolproof ID ", Technology research news, 2October 2002).
Make that the inventor is wide-eyed to be, when utilizing this optical scanner, find to support that the papery background material of magnetic chip produces unique optic response to scanner.Further determine many other and do not do the surface of any preparation, the face of for example various cardboards and plastics reveals identical effect.In addition, the inventor confirms that this unique property is at least partly caused by speckle, but also comprises non-speckle contribution.
Thereby find to obtain all advantages, and needn't use special token of preparing or the special article of preparing with any alternate manner based on speckle technique.Especially, found that paper, cardboard and the plastics of many types produce the scattered signal of unique property because of coherent light beam, so that can be from almost any paper document or carton package article obtain unique digital signature.
The above-mentioned known speckle reader that is used for safety equipment is based on the whole token of laser beam irradiation; And form the image (for example referring to GB 2221870 and US 6584214) of the effective solid angle part (significantsolid angle portion) of resulting speckle pattern, thereby the specklegram image of the token that obtains to constitute by big data point array with CCD.
The reader that the inventor uses is not worked in this manner.It uses four single channel detector (four simple phototransistors), and said four single channel detector separate each other angledly, only collects four component of signals from the laser beam of scattering.Laser beam is focused into and only covers the very hot spot on the surface of fraction.When mobile spot in the surface, said four single channel detector are collected signal from lip-deep different regional areas.Thereby the characteristic response from article is made up of the independent measurement result from a large amount of (general hundreds of or thousands of) the different regional areas on the article surface.Although use four phototransistors, but only be used to show and to obtain unique characteristic response from this single channel separately from the analysis of the data of single phototransistor! But, if comprise the more hyperchannel in four passages in the said response, can obtain higher level of security so.
From first aspect, the present invention provides a kind of item identification method.Said method comprises: the inherent characteristic according to article is confirmed signature from article; The signature of relatively confirming and the signature of preservation.Said method comprises that also a signature of confirming is divided into the polylith conjoint data, and carries out each piece and preserve the compare operation between the relevant block of signing.Thereby, can reach higher particle size fraction aspect the article examining.
In certain embodiments, said method also comprises the attribute and the piece expection attribute relatively of contrast piece comparative result relatively, confirms the offset of the usefulness of comparative result to confirm confession.Said method also comprises through utilizing offset to adjust definite signature, confirms the similarity result between the signature of determined signature and preservation.Thereby, can successfully discern because of elongation or the impaired article of contraction.In addition, can allow non-linear signature to confirm, and not lose recognition accuracy.Thereby the various physical alignment that can compensate during signature produces step depart from, and make to obtain correct comparative result.
In certain embodiments, confirm that signature comprises: value right token is exposed under the coherent radiation; Collect one group of data point, said one group of data point is measured coherent radiation from the scattering that is worth the inherent structure of right token; With the signature of confirming to be worth the right token according to said one group of data point.Thereby inherent characteristic can be the picture on surface that constitutes the material of article.
In certain embodiments; Be derived from the actual simple crosscorrelation peak location and the simple crosscorrelation peak location of expection that relatively comprise the comparative result between piece relatively confirming signature and the corresponding blocks of preserving signature of expection attribute of attribute and piece comparison of the comparative result of each piece comparison, with the offset of the usefulness of confirming the definite comparative result of confession.Thereby the physical alignment that expected results can be used to solve the scan period article departs from.
In certain embodiments, the confirming of offset comprises the best-fit function of estimating each piece simple crosscorrelation peak location relatively, and the best-fit function representation is from expecting the average departure of simple crosscorrelation peak location.Thereby, can be used to compensation from the average departure of desired location.Average departure can be measured according to many modes, and can obtain the best-fit function, and said best-fit function is a kind of in the various functions, and said various functions can comprise linear function, exponential function, trigonometric function and x 2Function.
In certain embodiments, said method also comprises the relatively more definite signature and the signature of a plurality of preservations.Can find out between the signature of definite signature and said a plurality of preservations near matching result.In addition, if the similarity result of the signature of confirming obtains non-matching result so less than each predetermined threshold of preserving signature.Thereby, can compare article and article signature database, to confirm whether these article are elements of this database.This can be used to confirm various article, product for example, transfer of value token, transfer of value approval token, the authenticity of right token and access token.
In certain embodiments, said method also can comprise the similarity result who calculates each comparison block.In certain embodiments; Said method also can comprise the similarity result and predetermined similarity threshold value of at least one predetermined block of comparison; Similarity result at said at least one predetermined block is lower than under the situation of predetermined similarity threshold value; Return negative comparative result, and regardless of the similarity result about whole signature.Thereby key component that can identify objects is examined for the authenticity of article, need be about the positive match of said key component and whole signature.
From second aspect, the present invention provides a kind of system of identify objects.Said system comprises the comparing unit of confirming the signature of unit and signature of operationally relatively confirming and preservation according to the inherent characteristic of article from the signature of the definite signature of article.Said comparing unit operationally is divided into the polylith conjoint data to the signature of confirming, and carries out each piece and preserve the compare operation between the relevant block of signing.Thereby, can carry out the high sreen analysis of article signature.
In certain embodiments, said comparing unit also operationally contrasts the attribute and the piece expection attribute relatively of piece comparative result relatively, confirms the offset of the usefulness of comparative result to confirm confession.Said comparing unit is also operationally through utilizing offset to adjust definite signature, confirms the similarity result between the signature of determined signature and preservation.Thereby, can successfully discern because of elongation or the impaired article of contraction.In addition, can allow non-linear signature to confirm, and not lose recognition accuracy.Thereby the various physical alignment that can compensate during signature produces step depart from, and make to obtain correct comparative result.
In certain embodiments, comparing unit can calculate the similarity result of each comparison block.Comparing unit also can compare the similarity result and predetermined similarity threshold value of at least one predetermined block; Similarity result at said at least one predetermined block is lower than under the situation of predetermined similarity threshold value; Return negative comparative result, and no matter the similarity result of whole signature.Thereby the key component of article can be identified, and through the detailed inspection higher than other regional rank of article.
In certain embodiments, through the motion of coherent light beam with respect to article is provided, each different pieces of information of guaranteeing to collect about the intrinsic property of article is relevant with the scattering from the different piece of article.Said motion is provided by the motor of mobile beam above the article of fixing in maintenance.Motor can be a servomotor, nonsynchronous (free running) motor, the motor of stepping motor or any suitable type.On the other hand, in low-cost reader, said driving can be manual.For example, operating personnel can pass static light beam, scanning light beam on article through making the carriage of placing article.The coherent light beam xsect at least than the low one magnitude (preferably at least two one magnitude) of the projection of article, consequently can be collected the considerable independent digit of quantity strong point usually.Can provide and make coherent light beam focus on the focalizer in the article.It is elongated focus that focalizer can be configured to make coherent light beam, and in this case, driver preferably is configured on article, move coherent light beam along the horizontal direction with respect to the major axis of elongated focus.The minute surface that utilizes cylindrical lens or be equal to is arranged, and can form elongated focus easily.
In other embodiments, can guarantee that different data points is relevant with scattering from the different piece of article, detector array comprises a plurality of probe access of arranging and be configured to detect from the scattering of the corresponding different piece of article.This orientation detector capable of using, collecting perhaps by the local signal of optical fiber, other measure realizes.With regard to other local collection of orientation detector or signal, coherent light beam need not be focused.In fact, coherent light beam can be static, and shines whole sample space.Through being fused to detector element or otherwise fixing lens, can realize orientation detector with respect to detector element.Can use optical fiber in conjunction with lenticule.
When detector array only is made up of the single detector passage, can produce the reader that to work.Other embodiment uses detector array, and is that said detector array comprises angled distribution and can collect one group of detector element of one group of data point, several detector elements of a best group for each different piece of reading the space.When signature comprises from the same group the contribution of comparison of data point mutually, can strengthen security.Be this simple crosscorrelation that relatively comprises easily.
Although only utilize a probe access just can produce the reader that to work, but preferably have two passages at least.This makes can carry out the comparison between detector signal, said relatively can be used for and the signal Processing of confirming that signature is relevant.2-10 probe access will be suitable for most the application, and 2-4 probe access is considered to the optimum balance between equipment simplicity and the security at present.
Detector element preferably is aligned to and is arranged in and the plane of reading space intersection, and each element is distributed in this plane with respect to the coherent light beam axle angledly, and any side that is preferably in beam axis has one or more detector elements.But, the on-plane surface detector array also is acceptable.
Found to use the simple crosscorrelation of the signal that obtains from different detectors can produce the increase level of security, and allowed the valuable data that can reproduce signature in the past more reliably along with the time.From the viewpoint of science, the effectiveness of cross correlation is somewhat unexpected, because speckle pattern nature uncorrelated (except that the signal from the opposed point in the pattern).In other words,,, between from the signal of different detectors, will there be zero cross correlation, as long as detector is not arranged on and excites in the crossing common plane in position to depart from the angle that excites the identical size in position according to definition for speckle pattern.So, use the value of simple crosscorrelation influence (contribution) to show that the pith of scattered signal is not a speckle.The influence of non-speckle can be counted as from complicated surface, the direct scattering of twisting thread such as the paper fiber, the perhaps result of diffuse scattering influence.At present, the relative importance of speckle and non-speckle scattered signal influence and unclear.But, according to the experiment of carrying out so far, detector is not obviously measured pure speckle pattern, but has the composite signal of speckle composition and non-speckle composition.
Comprise the simple crosscorrelation composition in the signature and also be of value to the raising security.Can utilize the high resolving power printing to produce even this is and reproduce the article of the surperficial interior contrast variation of true article, can not mate through scanning the cross-correlation coefficient that true article obtain.
In one embodiment, probe access is made up of the discrete detector assembly that is simple optical electric transistor form.Can use other simple discrete component, such as PIN diode or photodiode.Also can use integrated detector assembly, such as detector array, but this can increase the cost and the complicacy of equipment.
According to the initial experiment of revising the illumination angle of laser beam on article to be scanned; In the practice; Laser beam is preferably near vertically inciding on the surface of being scanned; Even so that acquisition article between twice measurement are degenerated the characteristic that also can almost record repeatedly from similar face steadily.At least some known readers use oblique incidence (referring to GB 2221870).In case obtain understanding, it seems that so this effect be significantly, but obviously not as the speckle reader of some prior art, and it is such obvious to comprise that the designing institute of speckle reader and first prototype reader of inventor's structure of GB 2221870 shows.First prototype reader working condition under laboratory condition of utilizing oblique incidence of inventor is quite good, but quite responsive to the degeneration as the paper of article.For example, be enough to cause when remeasuring, occur evident difference with finger friction paper.Second kind of prototype reader uses normal incidence, and finds to have the degeneration to the paper that causes because of regular job, and more serious incident; Such as: through various printers, comprise laser printer, through photoprinter; Write; Print, be intended to toast in the baking oven, and roll and the robustness of flattening again.
So, light source advantageously is installed, so as coherence-beam guidance to reading the space so that the nearly normal incidence of coherent light beam impinge upon on the article.Nearly normal incidence refers to ± and 5,10 or 20 °.On the other hand, light beam can be directed into oblique being mapped on the article.Under the situation of scanning light beam on the article, this has negative effect usually.
Be also noted that in the reader of in detailed description, describing that detector array is disposed in (in reflection) on the reflection direction, to detect from reading the backscattered radiation in space.But if article are transparent, detector can be disposed on the transmission direction so.
The signature generator can be visited the database of the signature of precedence record, and compares, and whether comprises the match of the signature that places the article of reading the space with the specified data storehouse.Database can be the part of the mass storage device of component part reader device, perhaps can be positioned at remote location, and can be by reader through the telecommunication link visit.Said telecommunication link can adopt any conventionally form, comprises Radio Link and fixed link, and available in the Internet.The data acquisition and processing (DAP) module at least can be according to the operation of certain operations pattern, so that allow to be increased to signature in the database, if do not find any match.
When using database; Except preserving signature, database also can be used for the signature in the database and about the out of Memory of article, such as the scanned copy of file; Passport possessor's photo; The place of production of product and the details of date of manufacture, but perhaps the details of the sale by subscription destination of merchandising (for example, to follow the tracks of grey import) connects.
The present invention is convenient to identification by various different materials, for example the article processed of paper, cardboard and plastics.
Inherent structure refers to the structure that article innately have because of its manufacturing, thereby is different from the structure that provides specially from security purpose, the structure that is for example produced by the token or the regenerated fiber that are included in the article.
Paper or cardboard refer to any article of being produced by wood pulp or the fibre technology that is equal to.Paper or cardboard can be handled with coating or macerate, perhaps cover with transparent material, such as viscose paper.If the long-time stability on surface are special misgivings, so available acrylic acid spraying clear coat comes treatment paper.
Thereby, can collect data point according to the irradiation position of coherent light beam.This can be through the local coherent light beam of scanning on article, and perhaps through using orientation detector to collect from the scattered light of the different piece of article, perhaps the combination through the two realizes.
In many application, it is digital signature that signature is envisaged as.With regard to present technology, the general size of digital signature in the scope of 8k bit, at present for high security, preferably has the digital signature of about 2k bit size at 200 bits.
Be not kept at digital signature in the database, but using under the situation of the label right token that obtains from signing, can accomplish another kind of realization of the present invention, wherein said label meets the machine-readable code agreement.
Description of drawings
Illustrate specific embodiment of the present invention with reference to accompanying drawing below, wherein:
Fig. 1 is the diagrammatic side view of reader device;
Fig. 2 is the perspective illustration how the reading space of the reader device of presentation graphs 1 is sampled;
Fig. 3 is the schematic block diagram of functional module of the reader device of Fig. 1;
Fig. 4 is the skeleton view of the reader device of Fig. 1, representes the profile of this reader device;
Fig. 5 is the skeleton view of another example of profile of the reader of presentation graphs 1;
Fig. 6 A is the schematic cross section of alternative reader structure;
Fig. 6 B is the skeleton view of another alternative reader structure;
Fig. 6 C is the skeleton view of another alternative reader structure;
Fig. 7 A is based on the diagrammatic side view that the alternative imaging scheme of the reader that shines was collected and covered to directional light;
Fig. 7 B is the schematic plan view of optics areal coverage of another alternative imaging scheme of reader, in this imaging scheme, in conjunction with the local irradiation by elongate light beam, uses orientation detector;
Fig. 8 A is the micrograph that image covers the paper of about 0.5 * 0.2 millimeter area;
Fig. 8 B is the micrograph that image covers the frosting of about 0.02 * 0.02 millimeter area;
Fig. 9 A representes to utilize the reader of Fig. 1, and from the raw data of single photodetector, said raw data is made up of photo detector signal and code device signal;
Fig. 9 B is illustrated in and utilizes code device signal to carry out linearization and ask after the mean value of amplitude the photodetector data of Fig. 9 A;
Fig. 9 C is illustrated in according to average level and carries out after the digitizing data of Fig. 9 B;
Figure 10 is a process flow diagram of representing how to produce from scanning the signature of article;
Figure 11 representes how to contrast the process flow diagram that signature database is examined the signature that scans the article that obtain;
Figure 12 representes how to consider the non-ideality in the scanning, the process flow diagram of the verification process of change Figure 11;
Figure 13 A representes from the example of the simple crosscorrelation data of scanning collection;
Figure 13 B is illustrated under the situation of scanned article distortion, from scanning the example of the simple crosscorrelation data of collecting;
Figure 13 C is illustrated in nonlinear velocity and scans under the situation of scanned article, from scanning the example of the simple crosscorrelation data of collecting;
Figure 14 is the synoptic diagram that the article of authenticity are examined in confession;
Figure 15 is the schematic sectional view of many scanner heads scanner;
Figure 16 is the schematic sectional view of many scanner heads position scanner.
Although the present invention allows various modifications and alterative version, but the accompanying drawing exemplified has been represented concrete embodiment, and here specifies.But, should understand that accompanying drawing and detailed description thereof are not intended to be confined to disclosed particular form to the present invention, on the contrary, the present invention belongs to covering all modifications, equivalent and the alternatives in the scope of the present invention that is limited accessory claim.
Embodiment
In order safety and authorization service to be provided, can to use the system that discerns physical uniquely, strengthen the reality of e-commerce system and the reliability of perception as the possibility that provider and final user reduce swindle in the environment such as e-commerce environment.
The following example that specifies the system be suitable for carrying out this article identification with reference to figure 1-11.
Fig. 1 representes the diagrammatic side view of first example of reader device 1.Optical reader equipment 1 is used for measuring signature from the article (not shown) in the reading space of the equipment of being placed on.Reading the space is formed by the reading fenestra 10 that is a slit in the shell 12.Shell 12 comprises the main optical module of equipment.The main shaft of said slit extends (referring to the insertion coordinate axis among Fig. 3) along the x direction.Main optical module is to be used for producing the lasing light emitter 14 of coherent laser light beam 15 and by k optical detection device (this example, k=4) detector array 16 that constitutes of 16a, 16b, 16c and 16d.Laser beam 15 is focused into along y direction (perpendicular to drawing) by cylindrical lens 18 and extends and be in the elongated focus in the plane of reading fenestra.In an illustration reader, the major axis dimension of said elongated focus is about 2 millimeters, and minor axis dimension is about 40 microns.These optical modules are included in the subassembly 20.In this example, four detecting element 16a...d begin the mode according to interdigital arrangement from beam axis, and the different angle distribution of setovering is in the both sides of beam axis, so that be collected in from the light that is present in scattering in the reflection of reading the article in the space.In this example, offset angle be-70 ° ,-20 ° ,+30 ° and+50 °.The angle of beam axis both sides is selected to and is unequal, so that the data point that they are collected is independent as much as possible.All four detecting elements are arranged in the common plane.Optical detection device 16a...d survey when coherent light beam during from the reading space scattering from placing the light of the article scattering on the shell.As shown in the figure, lasing light emitter is installed into guide laser beam 15, makes its beam axis on the z direction, thus laser beam 15 with vertical incidence impinge upon the article of reading in the fenestra.
Usually, depth of focus is preferably bigger, so that can not cause reading the marked change of the beam sizes in the fenestra plane along any difference in the article of z direction layout.In this example, depth of focus is about 0.5 millimeter, and this depth of focus is enough big, is enough to bring forth good fruit can controlling to a certain extent under the situation of article with respect to the position of scanner.Depth of focus, these parameters of numerical aperture and operating distance interdepend, and the result forms known the trading off between spot size and the depth of focus.
Driving motor 22 is disposed in the shell 12, and is so that by suitable bearing 24 or other device the linear movement of optics subassembly 20 is provided, as shown in arrow 26.Thereby driving motor 22 is used for the dried light beam of the linear mobile phase of x direction in reading fenestra 10 scopes, so that light beam 15 is scanned along the horizontal direction with respect to the major axis of elongated focus.Because coherent light beam 15 is chosen in the size of its along; So that has the xsect in xz plane (plane of accompanying drawing); Said xsect is far smaller than reads the space perpendicular to the plane of coherent light beam (promptly; Plane at the shell wall that the reading fenestra is set) projection in, therefore under the action of driving motor 22, the scanning of driving motor 22 can cause 15 pairs of coherent light beams to read a plurality of different pieces samplings in space.
This sampling of Fig. 2 graphic extension is how to represent through crossing over read area scanning elongate light beam, to the perspective illustration of read area sampling n time.Under the action at driving motor, when reading the scanning focused laser beam of fenestra, the sampling location of the laser beam of focusing represented by the adjacent rectangle of numbering 1-n, and said adjacent rectangle is to the area sampling of length " l " and width " w ".When along the slit scan driving motor, carry out data aggregation so that signal is collected in each position in a said n position.Thereby, collect a series of k * n data points, these data points are with relevant from the scattering of the n that reads the space different diagram parts.
Schematic illustration explanation is along the x direction in addition, i.e. direction of scanning, the optional range mark 28 that contiguous slit 10 forms at the downside of shell 12.Illustration between the x direction marked is spaced apart 300 microns.These marks are sampled by the afterbody of elongated focus, and under the linearizing situation that requires data on the x direction, such linearization are provided, and are said more in detail as follows.This is measured by other phototransistor 19 and carries out, and said phototransistor 19 is to be used to collect orientation detector from the light in the zone of the mark 28 adjacent with slit.
In alternative example, mark 28 can be read by own coding device transmitter/detector module 19, and said module 19 is parts of optics subassembly 20.Scrambler transmitter/detector module is used in the bar code reader.In an example, can use based on the Agilent HEDS-1500 module that focuses on light emitting diode (LED) and photodetector.Module by signal is issued the PIC ADC (referring to the explanation of following Fig. 3) as extra probe access.
With regard to 40 microns minimum focal spot size of illustration, and the sweep length on 2 centimetres the x direction, n=500 produces 2000 data points under the situation of k=4.Depend on required level of security, type of items, the exemplary value scope of the k * n of number of probe access " k " and other factors is contemplated to 100<k * n<10000.Found that the number k that increases detector can improve the measurement insensitiveness that the article surface that causes because of touch, printing etc. is degenerated.In practice, with regard to the prototype of using so far, rule of thumb is the sum at independent digit strong point, and promptly k * n should be 500 or bigger, so that produce acceptable high level of security for various surfaces.When scanner is predetermined when only being used on a kind of particular surface or the one group of particular surface, can use other minimum value (bigger or littler).
Fig. 3 is the schematic block diagram of the functional module of reader device.Motor 22 is connected with PIC (PIC) 30 through being electrically connected 23.The detector 16a...d of detector module 16 is connected with analog-digital converter (ADC) through corresponding electric connection line 17a...d, and analog-digital converter (ADC) is the part of PIC 30.Similarly electric connection line 21 linkage flags are read detector 19 and PIC 30.Obviously replace being electrically connected or combining being electrically connected, can use optics or wireless connections.PIC 30 connects 32 through data and is connected with personal computer (PC) 34.PC 34 can be desktop or laptop computer.As substitute, can use other smart machine, for example personal digital assistant (PDA) or special electronic device to PC.PIC 30 and the PC 34 common data acquisition and processing (DAP) modules 36 that are used for the signature of definite article according to one group of data point of detector 16a...d collection that form.
In some instances, PC 34 can connect 38 accessing databases (dB) 40 through interface.Database 40 can reside in the storer of PC 34, perhaps is kept in its driver.On the other hand, database 40 can be away from PC 34, and through radio communication, for example utilizes the mobile phone service that combines with the Internet, and perhaps WLAN (LAN) is visited.In addition, database 40 can be kept on the PC 34 this locality, but regularly downloads from long-range source.Database can be managed by remote entity, and said entity can only provide the visit to the part of entire database to specific PC 34, and/or can be according to the visit of security strategy restriction to database.
Database 40 can comprise the signature storehouse of the signature of precedence record.PC 34 can be programmed, so that it can accessing database 40 in using, and compares, and whether comprises the signature with the signatures match that places the article of reading the space with specified data storehouse 40.PC 34 also can be programmed, and adds signature in the database to permission, if do not find any signature match.
The mode of the streams data between PC and database can be depending on the position of PC, and the relation between PC operating personnel and the database manipulation personnel.For example, if PC and reader just are being used to confirm the authenticity of certain part article, PC will not need and can increase new article to database so, in fact can be direct accessing database, but provide signature for relatively to database.Whether in this arrangement, database can offer PC to the authenticity result, true to indicate these article.On the other hand, if PC and reader just are being used to write down or the authentication data storehouse in a certain project, signature can be provided for database so that be kept at wherein so, and without any need for relatively.But in this case, can compare, be repeated in the input database to avoid unitem.
Fig. 4 is the skeleton view of the profile of expression reader device 1.The reading fenestra 10 of shell 12 and slit is tangible.Auxiliary locator 42 also is significantly, is used for respect to read fenestra 10 and is positioned at the fixed position to the token of true-to-shape.In this example, the form of auxiliary locator 42 rectangular carriages, one jiao of file or packing box can be positioned at wherein.This guarantees that when the needs scan articles same section of article always can be placed in to be read in the fenestra 10.For the article of corner with sharp outline, such as paper, passport, I.D. and packing box etc., simple right angle carriage or equivalent are just enough.The position guiding apparatus that other shape can be provided such as the circular article that comprise CD and DVD, perhaps is with the article of curved surface to accept difform article such as the cylindricality packing container.In the time will only scanning a kind of article of size and dimension, a slit can be set hold this article.
Thereby, the scanning of the usefulness that is suitable for supplying the long-range release mechanism of examining the article authenticity and the example of signature generation equipment have been described above.Can dispose such system so as in more than one place scan articles, and check that optional is to check to guarantee that these article all are same article under two kinds of situation, to guarantee that between preliminary sweep and follow up scan, these article are not distorted.
Fig. 5 representes the alternative physics example of structure of reader, and a document feeder wherein is set, and places consistently to guarantee article.In this example, a shell 60 is provided, article feed tray 61 attaches on it.Pallet 61 can keep supplying one or more article 62 of reader scanning.Motor can drive feed rolls 64 and transmit article 62 through this device, and crosses the scanning fenestra of aforesaid optics subassembly 20.Thereby optics subassembly 20 can be according to the mobile generation optics subassembly that passes through article and the method for the relative motion between the article, and scan articles 62 in the above described manner.Through using this system, can utilize the motion of the scanned article of Motor Control with enough linearities, and needn't service range mark and linearization process.This equipment can be followed file scanner, any conventional form of photoprinter or file management system.Such scanner can be configured to handle advance to thin slice (a plurality of thin slices are linked together by the perforation closing line) and perhaps replace handles single thin slice.
Thereby, the equipment that is suitable for scanning the article in the auto-feed apparatus has been described above.According to the physical configuration of feed arrangement, this scanner can scan one or more single sheet material, the plurality of materials that links together, the perhaps three-dimensional article such as the packing carton box.
Fig. 6 representes another alternative physical arrangement of reader.In this example, the user makes article pass reader.Shown in Fig. 6 A, reader shell 70 can be equipped with the slit 71 that is used to insert the article that supply scanning.Optics subassembly 20 can be equipped with a scanning fenestra facing to slit 71, so that can scan the article 62 through slit.In addition, in slit 71, director element 72 can be set, be directed to article apart from the correct focal length of optics subassembly 20 and/or the constant speed passage of the article that pass slit is provided helping.
Shown in Fig. 6 B, reader can be configured to when article are moved along the vertical slit that runs through shell 70 (shown in arrow), scan articles.On the other hand, shown in Fig. 6 C, reader can be configured to when extending to the article insertion slit in the reader shell 70 or therefrom taking out article (shown in arrow), scan articles.Such scanner is particularly suitable for scanning the article of partially rigid at least, for example card, plastic sheet or sheet metal.This thin slice can be the plastic article such as credit card or other bank card.
Thereby, the scheme of the manual scanning that is used for article has been described above.This can be used for scanning bank card and/or credit card.Thereby, can present card for this card of terminal scanning that uses, the signature that obtains from this card can with the preservation signature comparison of this card, with the authenticity of checking this card and non-by distorting property.In the environment of reading military formula metal ID label (this label is carried by the allergy patient usually, to remind their allergy to other people), also can use this equipment.This can make treatment patient's healthcare givers can guarantee that the patient who is treating is actually the correct possessor of this label.Likewise, under the casualty accident situation, but the label of scanning discovery is to obtain authenticity, to guarantee that injures and deaths person is correctly validated before notifying family members and/or colleague.
The example of explanation is to be the basis by the local excitation of the coherent light beam of little xsect and the detector that is received in the light signal of the bigger regional inscattering that comprises the local excitation zone above.Can design a kind of optical system of functional equivalent, this optical system only replaces the orientation detector and the exciting of bigger zone of collecting light from regional area and is the basis.
Fig. 7 A schematically illustrates based on directional light with the form of side view and collects and by a kind of alternative imaging scheme of the reader of the covering irradiation of coherent light beam.Arrange a detector array 48 in conjunction with cylinder microlens array 46, so that only collect from reading the light in the corresponding phase adjacent band in the space in each phase adjacent band of detector array 48.Referring to Fig. 2, each cylindrical microlenses light signal that is arranged to collect from one of n sample strip.Thereby coherent illumination can take place with the covering irradiation of whole reading space (not shown) together.
In some cases, also can use the commingled system that combines local excitation and partial detection.
Fig. 7 B schematically illustrates this optics areal coverage that is mixed into the picture scheme of reader with the form of planimetric map, in said reader, and ins conjunction with local irradiation by elongate light beam, the use orientation detector.This example can be considered to the development of the example of Fig. 1, in the example of Fig. 1, is provided with orientation detector.In this example, provide three to be ranked to detector, every row's purpose is to collect light from the different piece along " l * w " excitation band.Coming from the collecting region with dashed lines circle on the plane of reading the space representes; So that first row's; For example 2 detectors are collected light signal from the top of excitation band, and second row's detector is collected light signal from the middle part of excitation band, and the 3rd row's detector is collected light signal from the bottom of excitation band.Every row's detector is represented as having the circular collection district that diameter is about 1/m, and wherein m is the number of the branch of excitation band, in this example, and m=3.Like this, for given sweep length l, the number at independent digit strong point can be increased to m doubly.As further described below, the different row or the many rows that are ranked in detector can be used to except that collecting other purposes the light signal of speckle pattern sampling more.For example, a row who is ranked in detector can be used to collect light signal according to the mode that is suitable for most bar code scanning more.If situation is like this, so in general, it is just enough that this row's detector only comprises a detector, because when only scanning about contrast, obtains cross correlation and have no benefit.
The primary structure assembly and the functional module of various reader devices have been described above, and explanation is used for confirming the numerical value processing of signature below.Obviously by some elements that are subordinated to PIC 30, this numerical value is handled the available to a great extent computer program that runs on the PC 34 and is realized.In alternative example, numerical value is handled and can be carried out by the one or more special-purpose numerical value treating apparatus of realizing with hardware or firmware.
Fig. 8 A covers under the situation of about 0.5 * 0.2 millimeter area the micro-image of paper at image.Fig. 8 A graphic extension in many cases, smooth surface on the macroscopic view, for example paper is a highly structural under micro-scale.For paper,, be highly structural on the paper microcosmic as the result of the multiple-limb network of the xylogen that constitutes paper or other fiber.Fig. 8 A also explains the characteristic length scales of xylogen, and said characteristic length scales is about 10 microns.The optical wavelength of this size and this routine coherent light beam has the diffraction of causing, thereby produces speckle, but also causes having the correct relation of the diffuse scattering of the distribution plan that depends on the fiber orientation.Thereby, recognize if, can make Wavelength of Laser be suitable for the feature size of this type commodity to be scanned so for specific class I goods design reader.According to Fig. 8 A, the local surfaces structure of every paper obviously also is unique in addition, because it depends on how every xylogen is arranged.Thereby a piece of paper does not differ from the token of special generation, and such as the special resin token or the magnetic material sediment of prior art, it is to be produced by the technological process that receives the natural law domination because it has, thereby particular structure.This is equally applicable to the article of many other types.
Fig. 8 B representes the same sampled images of frosting.This atomic force microscope images is clearly represented the uneven plane of the frosting that macroscopic view is smooth.Can guess that from Fig. 8 B the paper that graphic extension this surface ratio Fig. 8 A is more smooth, but utilize this routine signature to produce scheme, even the surface undulation of this level also can be by identification uniquely.
In other words, when can be directly when various every-day objects are measured unique characteristic, for the token that produces special preparation require great effort expensive come down to nonsensical.The data aggregation and the numerical value processing of the scattered signal of the natural structure that utilizes article surface (under the situation of transmission, article are inner) are described below.
Fig. 9 A representes the raw data from the single photodetector 16a...d of the reader of Fig. 1.Fig. 9 A relation curve of signal intensity I (arbitrary unit (a.u.)) that draw to the n that counts (referring to Fig. 2).The higher trace that between I=0-250, fluctuates is the original signal data from photodetector 16a.Low trace is the code device signal that picks up from mark 28 (referring to Fig. 2), and it is near I=50.
Fig. 9 B is illustrated in and utilizes code device signal to carry out after the linearization, the photodetector data of Figure 10 A (noticing that although the ratio of x axle is different from Figure 10 A, but this is unimportant).As stated, article with respect to the enough linear situation of the motion of scanner under, need not utilize linearization with respect to alignment mark.In addition, calculate the mean value of intensity, and from intensity level, deducted said mean value.Thereby the data value after the processing fluctuates at 0 upper and lower.
Fig. 9 C representes the data of Fig. 9 B after the digitizing.The digitization program that adopts is simple bifurcation digitization program, wherein any positive intensity level value of being configured to 1, and any negative intensity level is configured to 0.Recognize also and can use polymorphic digitizing, perhaps also can use any in many other possible digitizing solutions.Digitized important principal character only is to use identical digitization program consistently.
Figure 10 is a process flow diagram of representing how to produce from scanning the signature of article.
Step S1 is a data acquisition step, and is wherein in whole scan period, approximately every at a distance from the optical strength of 1 millisecond of acquisition at each photodetector.Simultaneously, the function as the time obtains code device signal.If notice that scanning motor has high linearization precision (for example, as stepping motor), can not require the linearization of data so.Said data are obtained by the PIC that obtains data from ADC 31 30.Data point is passed to PC 34 from PIC 30 in real time.On the other hand, data point can be stored in the storer among the PIC 30, when the end of scan, is passed to PC 34 subsequently.Below, the number n of the data point of each probe access of in each scanning, collecting is defined as N.In addition, value a k(i) be defined by from i of photodetector k and preserve intensity level, i from 1 to N.Illustrate among Fig. 9 A from the example of two raw data sets of such scanning acquisition.
Step S2 uses the number value interpolation to come local expansion and dwindles a k(i), thus coder transitions be at interval uniformly in time.This has proofreaied and correct the localized variation of electromotor velocity.Step S2 can be carried out in PC 34 by computer program.
Step S3 is an optional step.If be performed, step S3 carries out numerical differentiation about the time to data so.Desirable in addition is that data are used weak smooth function.Differential is surperficial useful to highly structural, because it is used for the irrelevant composition with respect to relevant (speckle) composition deamplification.
Step S4 is wherein for each photodetector, in the scope of N data points, obtains the step of the mean value of tracer signal.For each photodetector, from all data points, deduct this mean value, so that DATA DISTRIBUTION is around 0 intensity.Referring to Fig. 9 B, the example of the scan data set after Fig. 9 B is illustrated in linearization and deducts calculating mean value.
Step S5 digitized simulation photodetector data, thus the digital signature of representing this scanning calculated.Through using following rule: a k(i)>0 be mapped to binary one, a k(i)≤0 be mapped to binary zero and obtain digital signature.Digitized data set is defined by d k(i), wherein i from 1 to N.Except the digitized signature of the intensity data just explained, the signature of article also can comprise other composition.These other optional signature compositions are described below.
Step S6 is an optional step of wherein creating less " thumbnail " digital signature.This is through asking the mean value of adjacent many groups m reading, perhaps preferably realizing through selecting each c data points (c is the compressibility factor of breviary).The latter is more desirable, can disproportionately amplify noise because average.Regular to the same numbersization of using among the data set applying step S5 that reduces subsequently.The thumbnail digitizing is defined by t k(i), wherein i is 1 to N/c, and c is a compressibility coefficient.
Step S7 is the optional step that when having a plurality of probe access, is suitable for.This supplementary element is the simple crosscorrelation composition that between the intensity data that obtains from different photodetectors, calculates.With regard to 2 passages, there is a possible cross-correlation coefficient, with regard to 3 passages, there is nearly 3 cross-correlation coefficient, with regard to 4 passages, there is nearly 6 cross-correlation coefficient, or the like.Cross-correlation coefficient is useful, is good indicator of material type because found them.For example, for a kind of file of specific type, such as the passport of specified type, perhaps laser stamping paper, it seems that cross-correlation coefficient always be arranged in predictable scope.At a k(i) and a l(i) can the calculating normalization cross correlation between, wherein k ≠ l and k, l changes in all photodetector number of active lanes.Normalized Cross Correlation Function Γ is defined by:
Γ ( k , l ) = Σ i = 1 N a k ( i ) a l ( i ) ( Σ i = 1 N a k ( i ) 2 ) ( Σ i = 1 N a l ( i ) 2 )
Can by preserve for the cross correlation function of the usefulness of examining later on be the width of spike in the cross correlation function on the other hand, half maximal value place overall with (FWHM) for example.Further specify the use of cross-correlation coefficient in examining processing below.
Step S8 is another optional step, and step S8 is with the simple strength mean value of represents signal intensity profile.This mean value can be the population mean of each mean value of different detectors, perhaps can be the mean value of each detector, for example a k(i) root mean square (rms) value.If as in the above-mentioned reader, detector is arranged in the both sides of normal incidence in couples, can use the mean value of every pair of detector so.Found that this intensity level is the good rough filtercondition about material type, because it is the total reflectivity of sample and the simple indication of roughness.For example, can be removing mean value, promptly the non-normalized rms value after the DC background is as this intensity level.
The signed data that scan articles obtains can contrast the record that is kept in the signature database and compare so that examine, and/or writes in the database increasing a new signature record, thereby expands the available data storehouse.
New data-base recording will be included in the digital signature that obtains among the step S5.Optional is, this data-base recording can be by the littler thumbnail that in step S6, obtains about each photodetector passage, one or more the replenishing in cross-correlation coefficient that in step S7, obtains and the mean value that in step S8, obtains.On the other hand, thumbnail can be stored on their the independent database that is suitable for search fast most, and remaining data (comprising thumbnail) are stored on the MDL.
Figure 11 representes how to contrast signature database to examine from the process flow diagram of the signature that scans the article that obtain.
In a kind of simple realization, search database simply is to find out match objects according to the whole signature data set.But in order to quicken verification process, this process can be used less thumbnail and based on the prescreen of calculating mean value and cross-correlation coefficient, be described below.
Examine the first step that step V1 is a verification process, it will promptly carry out scanning step S1-S8 according to the process scanning article of top explanation.
Examine step V2 and obtain each thumbnail clauses and subclauses, and assess it and t kThe number of the match bit (i+j), wherein j is that the biased of placement error that is changed with the compensated scanning district moves.The value of j is determined, thereby confirms to provide the thumbnail clauses and subclauses of maximum match bit array.This is to be used for further " hitting record " of processing.
Examining step V3 was before the whole number signature of analyzing about this recorded and stored, the optional prescreen test that the digital signature of control scan is carried out.In this prescreen, the corresponding save value in the data-base recording that contrast is hit, the rms value that relatively in scanning step S8, obtains.If mean value is also inconsistent in preset range accordingly, refusal is further handled and is somebody's turn to do " hitting record " so.These article are rejected subsequently, because be not verified (that is, jump to and examine step V6, and send failure result).
Examining step V4 is another optional prescreen test of before analyzing complete digital signature, carrying out.In this prescreen, to impinging upon the corresponding save value in the data-base recording that hits, the cross-correlation coefficient that relatively in scanning step S7, obtains.If cross-correlation coefficient is also inconsistent in preset range accordingly, refusal is further handled and is somebody's turn to do " hitting record " so.These article are rejected subsequently, because be not verified (that is, jump to and examine step V6, and send failure result).
Examining executable another inspection that utilizes cross-correlation coefficient of step V4 is the width of spike in the inspection cross correlation function, here through value of preserving and the value that rescans of the preliminary sweep from scanning step S7 relatively, and the assessment cross correlation function:
Γ k , l ( j ) = Σ i = 1 N a k ( i ) a l ( i + j ) ( Σ i = 1 N a k ( i ) 2 ) ( Σ i = 1 N a l ( i ) 2 )
If obviously greater than the width of preliminary sweep, this can be counted as the article that rescan and distorted perhaps suspicious indicator signal the width of the spike that rescans so.For example, this inspection should be defeated and attempted to have bar code or other pattern that same intensity that photodetector expection obtains from the surface of just being scanned changes, the fraudster of fraud system through printing.
Examining step V5 is the main comparison between the corresponding save value in scanning digital signature that in scanning step S5, obtains and the data-base recording that hits.The complete digitized signature d that preserves k Db(i) be divided into q phase ortho position of n piece on k the probe access, promptly every has the qk position.The representative value of q is 4, and the representative value of k is 4, thereby generally obtains 16/piece.The digital signature d that contrast is subsequently preserved k Db(i+j) this qk position of coupling, the qk in corresponding position.If the number of match bit was more than or equal to predetermined threshold z in should determining Thresh, the number of match block is added 1 so.z ThreshRepresentative value be 13.All n piece is repeated this process.To different off-set value j whole process repeated, to compensate by the placement error of scanning area, till the maximum number that finds match block.M is the maximum number of match block through definition, through assessing the probability of computes accidental matches:
p ( M ) = Σ w = n - M n s w ( 1 - s ) n - w w n C
Wherein s is that (it depends on z again for the probability of the accidental matches between any two pieces ThresholdSelective value), M is the number of match block, p (M) is the M or the probability of polylith accidental matches more.Through scanning according to the different objects of analog material, the for example repeatedly scanning of paper document etc., each piece relatively in database is confirmed the value of s.For q=4, k=4 and z Threshold=13 situation, the representative value of s are 0.1.If the qk position is independent fully, so for z Threshold=13, theory of probability can provide s=0.01.The fact of finding out higher value according to experience is because the correlativity between k probe access, and the cause of the correlativity between the phase ortho position in the piece that is caused by limited laser facula width.When the data base entries of contrast a piece of paper compared, the typical scan of this paper was producing about 314 match block in 510 pieces altogether.Equality to top is provided with M=314, n=510, and s=0.1 can provide 10 -177The accidental matches probability.
Examine the result that step V6 sends verification process.The probability results that in examining step V5, obtains can be used on through in/failure the test, and wherein reference point is predefined probability threshold value.In this case, probability threshold value can be arranged on a certain rank by system, perhaps can be the variable element that is provided with in a certain rank that the user selects.On the other hand, the primitive form that probability results can probability itself is perhaps to utilize the relative terms (relatively poor/coupling that for example, do not match/mate good/coupling is outstanding) or the improved form of other classification to be exported to the user, as confidence level.
Recognize that many variations are possible.For example, replace regarding cross-correlation coefficient as the prescreen composition, they can be regarded as the part of main signature together with the digitizing intensity data.For example, cross-correlation coefficient can be digitized, and adds in the digitizing intensity data.Cross-correlation coefficient also can be by independent digitizing, and is used to produce bit string or analog, can search for said bit string according to the same way as of top thumbnail explanation about the digitizing intensity data subsequently, hits record so that find out.
Thereby, explained that above scan articles is with the many examples of acquisition based on the scheme of the signature of the intrinsic property of article.Also explained how to produce signature according to the data of collecting in scan period, how relatively the follow up scan of this signature and identical or different article is that the possibility of identical items has a great example of measuring to be provided at what scan in the follow up scan.
This system has many application, safety and screen article assuredly and belong to the row of said many application to prevent swindle and item tracing ability.
In some instances, can be optimised from the method that the article extraction of scanning is signed, so that the reliable recognition of article is provided, and no matter for example stretch or shrink the distortion that these article are caused.This stretching, extension of article or contraction can be caused by the infringement of water to papery article or cardboard article.
In addition, if article are non-linear to the relative velocity of the sensor in the scanner, concerning scanner, these article are elongated or shortened seemingly so.For example,, make these article through scanner if perhaps hold the people of article if article move along transfer system, so can this thing happens.Example that maybe the possible case that this thing happens is that the people utilizes scanner, such as the situation of the top scanner scanning bank card of explaining with reference to figure 8A, 8B and 8C.
As stated; When scanner is the basis with the scanner head that in scanner unit, moves with respect to the article that pasting scanner or in scanner, keep fixing; Optional range mark 28 can provide linearization guiding, any non-linear with the motion aspect that solves scanner head.Under the situation that article are moved by the people, these non-linear can amplifications greatly.
In order to solve the identification problem that causes by these non-linear effects, can adjust the analysis phase of the scanning of article.Thereby, with reference to Figure 12 improved proving program is described below.The process that realizes in this example uses the branch block analysis of data to solve nonlinear problem.
The process of carrying out according to Figure 12 can comprise the step with reference to the level and smooth and differentiated data of Figure 10 explanation; Calculate and deduct the step of mean value; Be used for obtaining to sign with some of the digitization step of thumbnail or all; But these steps are not illustrated in Figure 12, so that the content of Figure 12 is thickened.
As shown in Figure 12, through carrying out the scanning of article,, begin to utilize the scanning process of the checking scanning of branch block analysis at step S21 with the data of the intrinsic property that obtains to describe article.Scan-data subsequently step S22 be divided into continuous a plurality of (this can digitizing and any level and smooth/carry out before or after differential or the similar operations).In an example, 64 millimeters sweep length is divided into the piece of 8 equal in length.So, each piece represent scanned article by a sub-section of scanning area.
For each piece, at step S23, the reciprocity piece of each preservation signature that contrast article intention compares with it carries out cross-correlation calculation.This thumbnail method capable of using realizes, thumbnail of each piece.The result of these cross-correlation calculation of subsequent analysis is with the position of identification simple crosscorrelation spike.Subsequently in the step S24 position of simple crosscorrelation spike relatively, and under the situation that has splendid linear relationship between the preliminary sweep of article and the follow up scan desired location of simple crosscorrelation spike.
This available chart that concerns is represented, shown in Figure 13 A, 13B and 13C.In the example of Figure 13 A, the simple crosscorrelation spike is just in time in the position of expection, so that scanner head is linear fully with respect to the motion of article always, and article do not experience and stretch or shrink.Thereby the graph of relation of actual peak location and predetermined spike obtains straight line, this straight-line pass initial point, and slope is 1.
In the example of Figure 13 B, the simple crosscorrelation spike is close together than expection, so that the slope of best-fit line is less than 1.Thereby when initial scanning, these article shrink with respect to its physical characteristics.In addition, best-fit line does not pass through the initial point of this figure.Thereby compare with its position when the preliminary sweep, article are moved with respect to scanner head.
In the example of Figure 13 C, the simple crosscorrelation spike does not form straight line.In this example, their approximate fitting to are represented y 2The curve of function.Thereby in this scan period, article are slowed down with respect to moving of scanner head.In addition, because optimum fit curve is through initial point, so the position of article during obviously with respect to its preliminary sweep is moved.
Can be to the point diagram of simple crosscorrelation spike, the various functions of test match are to find out the best-fit function.Thereby, can use and consider elongation, to shrink, misalignment is quickened, the curve of deceleration and their combination.The example of proper functions comprises linear function, exponential function, trigonometric function, x 2Function and x 3Function.
In case confirmed the best-fit function at step S25, can confirm one group of running parameter at step S26 so, said one group of running parameter representes how many each simple crosscorrelation spikes departs from its desired location.At step S27, can be applied to scan-data to these compensating parameters subsequently, shrink, stretch so that eliminate basically in step S21 acquisition, misalignment, acceleration or deceleration are to the influence of scan-data.The best-fit function and the scan-data that obtain at step S25 adapt to more, and compensation effect is just good more.
As among the step S22, the scan-data after step S28 is compensation is divided into continuous polylith subsequently.Subsequently step S29 make each piece individually with the relevant block simple crosscorrelation of the signed data of preserving, thereby obtain cross-correlation coefficient.At this moment, at the value of step S29 analysis simple crosscorrelation spike, to confirm the uniqueness coefficient.Thereby can confirm whether the article that scan are identical with the article that when producing the signature of preserving, scanned.
Therefore, the physical deformation that compensates in the scanned article has been described above, and the compensation article are with respect to the non-linear method example of the motion of scanner.Utilize this method, can contrast the preservation signature of these article that obtain from the previous scanning of article, check scanned article, thereby confirm when carrying out slower scanning, whether there are identical article highly credibly.Thereby, can discern the article that constitute by yielding material reliably.In addition, can use scanner wherein is not linear scanner with respect to the motion of article, thereby allows to use the low-cost scanner of no movement control elements.
Another characteristic of the article that the branch block analysis of the signature that utilization produces according to the intrinsic property of article can detect is the local lesion to article.For example, this technology can be used to detect the modification to article that after original records scanning, produces.
For example, many files comprise possessor's photo such as passport, I.D. and driving license.If the authenticity of this article scanning comprises the part of photo, any change of making of comparison film will be detected so.Be example to be divided into signature 10 pieces arbitrarily, the photo on 3 pieces possibility overlay files in these 10 pieces, another part of other 7 piece overlay files is such as background material.If photo is replaced, so for these 7 pieces that any modification does not take place, the follow-up heavy coupling that should provide good of sweeping of file, but the photo of changing will produce the coupling of extreme difference.Through understanding these 3 pieces corresponding to photo, the fact of all these 3 pieces generation extreme difference couplings can be used to make automatically the authentication failed of file so, and does not consider the average mark in the whole signature scope.
In addition, many files comprise a people or a plurality of people's written explanation, for example by someone name of passport, driving license or I.D. identification, and perhaps bank account holder's name.Many files also comprise the place of the written signature of filling in possessor or reference.Utilization can detect change and print or write on name or other important words or digital modification on the file from the branch block analysis of the signature of the confession checking of file acquisition.The piece corresponding with the position of reformed printing or written contents should produce the very different coupling of piece that any modification does not take place mass ratio.Thereby, can detect the name or the written signature that are modified, even the whole matching of file is high enough to obtain through the result, this document can not be through validation test.
An example having represented I.D. 300 among Figure 30 0.I.D. 300 comprises possessor's name 302 of printing; Possessor's photo 304; Possessor's signature 306 (said signature can write on the I.D., perhaps is printed on the I.D. according to the scanning result of written signature or the signature of catching with the electronics mode) and the I.D. numbering of printing 308.In order to prevent the change of the duplicity of I.D., the scanning area that produces signature according to the intrinsic property of I.D. can comprise one or more in these elements.Marked the scanning area of each illustration among Figure 15, with the various possibilities of graphic extension.The scanning area 321 of illustration comprises part printing name 302 and part photo 304.The scanning area 322 of illustration comprises part printing name.The scanning area 323 of illustration comprises part signature 306.The scanning area 324 of illustration comprises part I.D. numbering 308.
Zone and the element selected for scanning area can be depending on many factors, comprise that the fraudster most possibly attempts the document element of changing.For example, for any file that comprises photo, most probable change target is photo normally, because photo is discerned the possessor intuitively.Thereby the scanning area of this file preferably is selected to the photo that comprises a part.Another element that possibly receive fraudulent modification is possessor's a signature, because a people is easy to pretend to have other people name, but is difficult to imitate another people's signature.So for documents signed (DS), especially do not comprise the documents signed (DS) of photo, scanning area preferably includes the part signature on the file.
So in the ordinary course of things, the authenticity of article test can comprise with regard to whole signature, the sufficiently high coupling of quality between signature verification and record signature, and the test of the sufficiently high coupling of quality in the scope of selected at least each piece of signature.Thereby, can select important zone concerning the authenticity of assessment article, because they are most important to obtaining sure identification result.
In some instances, can allow each piece except that being chosen as key blocks to present relatively poor matching result.Thereby although be torn or some is partially damaged, as long as key blocks provides good coupling, and signature is whole that good coupling is provided, and file just can be regarded as really so.
Thereby, the local lesion of identification to article has been described above, refusal exists the system of the false article of local lesion or change, many examples of method and apparatus in its presumptive area.Infringement in other zone or change can be left in the basket, thereby file can be regarded as really.
In some scanner devices, also possibly be difficult to confirm by the reference position of scanning area.In the example of discussing in the above, this is the most debatable concerning the example of Fig. 6 B, and in the example of Fig. 6 B, article to be scanned are through slit, so that the scanner head meeting " is seen " than the more article section of predetermined scanning area.A kind of method that overcomes this difficulty is to be defined as the edge that starts from article to scanning area.Since when make article through before be free space LZT, the data that receive at scanner head will experiences tangible step and change, the data of therefore fetching at scanner head can be used to confirm to scan where start from.
In this example, before article were applied to scanner, scanner head was exercisable.Thereby at the beginning, scanner head receive with in the corresponding data of the un-occupied space of scanner head front.When article passed through in the scanner head front, the data instant that scanner head receives became the data of describing these article.Thereby, but monitoring data and can abandon all data before this confirming where article start from.Can confirm position and the length of scanning area according to multiple mode with respect to the article leading edge.The simplest a kind of mode is that to make scanning area be whole article, so that through picking up the end that can detect article corresponding to the scanner head of the data of free space once more.Another kind method is to begin and/or stop data recorded at the scanning reading place of the said leading edge predetermined number of distance.Suppose that article always pass through scanner head with approximately identical speed, this can form consistent scanning area.Another kind of alternatives is to use the real marking on the article to begin and stop scanning area, but this needs more data to deal with the work to confirm which catches data corresponding to scanning area, and which data can be dropped.
Thereby; Scan articles has been described above; To collect data based on the intrinsic property of article; Compensation is to non-linear (words that need) in the infringement of article or the scanning process, and this article and based on the preservation signature of the last time scanning of article relatively, with many technology of confirming that twice scan articles be whether identical.
When using the biometrics technology, when examining authenticity or the identity of article such as the top recognition technology of explaining with reference to figure 1-14, the difficulty based on the repeatability aspect of the signature of biometric attribute can appear.Especially; In each signature that produces according to article, return slightly different result's tropism as the biological generation system of signing; When article when different signature produces equipment and signs production process with the different time experience; The slightly different part that might present article in each case makes and reliably examines the more difficulty that becomes.
Explanation overcomes the example of these difficult systems, method and apparatus below.At first, with reference to Figure 15, the many scanner head signature generation equipment that are used for database initialize are described.
As shown in Figure 15, reader unit 100 can comprise two optics subassemblies 20, and each optics subassembly 20 produces the signature of the article in the reading space 102 that is present in reader unit.Thereby the usefulness of the confession scanning of presenting can be produced two signatures of the possible alignment error amount that squints each other on the space by scanning twice so that in item database (contrast this item database after a while and can examine article), produce the article of its record of signing.Thereby, supply identification or examine authenticity article follow up scan can with the signatures of these two preservations.In some instances, can be regarded as successful match with these two couplings of preserving one of signature.
In some instances, can use more reading head, so that produce three, four perhaps multi-signatures more for each article.Each scanner head can be biased with respect to other scanner head, so that from the contiguous a plurality of positions of predetermined scanning position signature being provided.Thereby, can provide examining the out-of-alignment bigger robustness of article in when scanning.
Can be according to various factors, such as article by the width of sweep test, relevant by the overall dimensions of scan size and article, examine possible amount of mis-alignment and article material of scan period, select the side-play amount between the scanner head.
Thereby, scan articles has been described above, to create the system of a signature database, contrast this signature database and can check article, with identity and/or the authenticity of examining these article.
The example of another system of a plurality of signatures is provided in item database with reference to Figure 16 explanation below.
As shown in Figure 16, reader unit 100 ' can have single optics subassembly 20 and an aligning regulon 104.In the use, aim at regulon 104 and can change the aligning of optics subassembly 20 with respect to the reading space 102 of reader unit.Thereby optics subassembly 20 can repeatedly scan in different positions and place the article of reading the space, so that produce a plurality of signatures of these article.In this example, aim at regulon 104 and can regulate the optics subassembly, thereby read from two different positions.Thereby, supply identification or examine authenticity article follow up scan can with the signatures of these two preservations.In some instances, can be regarded as successful match with these two couplings of preserving one of signature.
In some instances, can use more reading head position, so that produce three, four perhaps multi-signatures more for each article.Each scanner head position can be biased with respect to other scanner head position, so that from the contiguous a plurality of positions of predetermined scanning position signature being provided.Thereby, can provide examining the out-of-alignment bigger robustness of article in when scanning.
Can be according to various factors, such as article by the width of sweep test, relevant by the overall dimensions of scan size and article, examine possible amount of mis-alignment and article material of scan period, select the side-play amount between the scanner head position.
Thereby, scan articles another example with the system of creating a signature database has been described above, contrast this signature database and can check article, with identity and/or the authenticity of examining these article.
Be used for writing scan (promptly although explained above; Create the scanning of the article of reference signature; Contrasting this reference signature after a while can checking article) scanner can use a plurality of scanner heads and/or scanner head position to produce a plurality of signatures of article, but also can be used for checking scanning after a while to similar system.
For example, supply the scanner of the usefulness of checking scanning can have a plurality of reading heads, thereby make it possible to produce a plurality of checking scan signatures.Each signature in these signatures can be compared with the database of record signature, and said database itself possibly comprise a plurality of signatures of each record article.Although the difference of each article signature possibly show variation; But because the whole still utmost points of these signatures are different from any signature of any other article; Therefore, the coupling between any writing scan signature and any checking scan signature should provide enough degree of confidence with regard to the identity and/or the authenticity of article.
Can be with top with reference to the said multiread head checking scanner of arranging of Figure 15 about the samely.Likewise, can be with top with reference to the said multiread head location verification scanner of arranging of Figure 16 about the samely.In addition, for writing scan appearance and checking scanner, the system of many scanner heads of combination and a plurality of scanner heads of each scanner head position can be combined into single equipment.
In a single day although embodiment quite at length has been described above, but make much of top disclosure, numerous variations and modification will become obvious for a person skilled in the art.Following claim intention is interpreted into and comprises all such variation and modifications, and their equivalent.

Claims (30)

1. system that is used for identify objects, said system comprises:
Operationally confirm the unit according to the definite signature of signing of the inherent structure of article, said signature confirms that the unit comprises:
The reading space that holds article;
Light source is used to produce coherent light beam, and is directed to a plurality of zones on the surface of reading the article in the space to the coherent light beam order;
Detector array; Be used for from the signal that when reading the zones of different of article in space, obtains when the coherent light beam scattering, collecting the data point set that comprises multi-group data point; Wherein every group of data point collected by corresponding detector element, makes that every group of different pieces of information point in the said multi-group data point is relevant with scattering from the corresponding zones of different of article; With
The data acquisition and processing (DAP) unit is used for confirming the signature of article according to the data point set that comprises multi-group data point; With
The comparing unit of the signature of operationally relatively confirming and the signature of preservation;
Wherein comparing unit operationally is divided into the polylith conjoint data to the signature of confirming, and carries out each piece and preserve the compare operation between the relevant block of signing.
2. according to the described system of claim 1; Wherein comparing unit also operationally contrasts the attribute and the piece expection attribute relatively of each piece comparative result relatively; Confirm the offset of the usefulness of comparative result to confirm confession; The comparing unit signature through utilizing offset adjustment to confirm is operationally also wherein confirmed the similarity result between the signature of determined signature and preservation.
3. according to the described system of claim 2, wherein comparing unit is operationally used offset and is adjusted definite signature, with compensation non-linear to the infringement of access token and/or when confirming that institute is confirmed to sign.
4. according to the described system of claim 3, wherein comparing unit is used offset and is adjusted definite signature, reads with compensation to concern the non-linear of aspect between the different piece in space.
5. according to the described system of claim 1, wherein read the space and be arranged such that article move with respect to detector array.
6. according to the described system of claim 1, wherein detector array is operationally with respect to reading spatial movement.
7. according to the described system of claim 1; Wherein comparing unit operationally contrasts a piece of definite signature and preserves the actual simple crosscorrelation peak location of the comparative result between the corresponding blocks of signing and the simple crosscorrelation peak location of expection, confirms the offset of the usefulness of comparative result to confirm confession.
8. according to the described system of claim 7; Wherein comparing unit operationally the best-fit function of the simple crosscorrelation peak location through estimating each piece comparison confirm offset, said best-fit function representation is from the average departure of the simple crosscorrelation peak location of expection.
9. according to the described system of claim 8, wherein the best-fit function is a linear function, exponential function, one of trigonometric function and x2 function.
10. according to the described system of claim 1, the signature of operationally relatively confirming and the signature of a plurality of preservations.
11. according to the described system of claim 10, operationally find out between the signature of definite signature and a plurality of preservations near matching result.
12. according to the described system of claim 10, if the similarity result of the signature of confirming so operationally returns non-matching result less than the predetermined threshold of the signature of each preservation.
13. according to each the described system among the claim 1-12, wherein comparing unit operationally calculates the similarity result of each comparison block.
14. according to the described system of claim 13, wherein comparing unit operationally compares the similarity result and predetermined similarity threshold value of at least one predetermined block.
15. according to the described system of claim 14, wherein under the situation of similarity result less than predetermined similarity threshold value of said at least one predetermined block, comparing unit operationally returns negative comparative result, and does not consider the similarity result of whole signature.
16. an item identification method comprises:
Inherent structure according to article is confirmed signature, confirms that wherein signature comprises:
Be directed to the coherent radiation order in a plurality of zones on the surface of reading the article in the space;
Use detector array to comprise the data point set of multi-group data point from the signal collection that obtains during from the inherent structure of article when the coherent radiation scattering; Wherein each not on the same group data point be to collect by the corresponding detector element of said detector array, make that every group of different pieces of information point in the said multi-group data point is relevant with scattering from the corresponding zones of different of article; With
According to data point set, confirm the signature of article; With
The signature of relatively confirming and the signature of preservation;
Be divided into the polylith conjoint data to the signature of confirming; With
Carry out each piece and preserve the compare operation between the relevant block of signing.
17., also comprise: contrast the attribute and the piece expection attribute relatively of each piece comparative result relatively, confirm the offset of the usefulness of comparative result to confirm confession according to the described method of claim 16; With signature, confirm the similarity result between the signature of determined signature and preservation through utilizing offset adjustment to confirm.
18. according to the described method of claim 16, comprise that also using offset adjusts definite signature, with compensation non-linear and/or when confirming that institute is confirmed to sign to the infringement of article.
19. according to the described method of claim 18, comprise that using offset adjusts definite signature, non-linear with in the relation of compensation between the different piece of article.
20., wherein collect data point set and comprise the mobile article that can move with respect to the detector of said detector array according to the described method of claim 16.
21., wherein collect data point set and comprise with respect to article and move said detector array according to the described method of claim 16.
22. according to the described method of claim 17; The attribute of the comparative result of each piece comparison of wherein said comparison and the expection attribute of piece comparison comprise a piece of the definite signature of contrast and preserve the actual simple crosscorrelation peak location of the comparative result between the corresponding blocks of signing and the simple crosscorrelation peak location of expection, confirm the offset of the usefulness of comparative result to confirm confession.
23. according to the described method of claim 22, wherein said definite offset comprises the best-fit function of estimating each piece simple crosscorrelation peak location relatively, said best-fit function representation is from the average departure of the simple crosscorrelation peak location of expection.
24. according to the described method of claim 23, wherein the best-fit function is one of linear function, exponential function, trigonometric function and x2 function.
25., comprise the relatively more definite signature and the signature of a plurality of preservations according to the described method of claim 16.
26. according to the described method of claim 25, also comprise between the signature of finding out definite signature and a plurality of preservations near matching result.
27., also comprise if the similarity result of the signature of confirming less than each predetermined threshold of preserving signature, returns non-matching result so according to the described method of claim 26.
28., also comprise the similarity result who calculates each comparison block according to each described method among the claim 16-27.
29., also comprise the similarity result and predetermined similarity threshold value of at least one predetermined block of comparison according to the described method of claim 28.
30. according to the described method of claim 29, also be included under the situation of similarity result less than predetermined similarity threshold value of said at least one predetermined block, return negative comparative result, and do not consider the similarity result of whole signature.
CN2006800325384A 2005-07-27 2006-07-19 Authenticity verification Expired - Fee Related CN101258528B (en)

Applications Claiming Priority (5)

Application Number Priority Date Filing Date Title
US70273205P 2005-07-27 2005-07-27
GB0515460A GB2429095B (en) 2005-07-27 2005-07-27 Verification of authenticity
GB0515460.4 2005-07-27
US60/702,732 2005-07-27
PCT/GB2006/002689 WO2007012816A1 (en) 2005-07-27 2006-07-19 Verification of authenticity

Publications (2)

Publication Number Publication Date
CN101258528A CN101258528A (en) 2008-09-03
CN101258528B true CN101258528B (en) 2012-03-21

Family

ID=34976722

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2006800325384A Expired - Fee Related CN101258528B (en) 2005-07-27 2006-07-19 Authenticity verification

Country Status (4)

Country Link
CN (1) CN101258528B (en)
AT (1) ATE483215T1 (en)
DE (1) DE602006017224D1 (en)
GB (1) GB2429095B (en)

Families Citing this family (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8171567B1 (en) 2002-09-04 2012-05-01 Tracer Detection Technology Corp. Authentication method and system
RU2380750C2 (en) 2004-03-12 2010-01-27 Инджениа Текнолоджи Лимитед Methods and devices for creation of printing products with possibility of their identification and their subsequent verification
BRPI0508631A (en) 2004-03-12 2007-08-07 Ingenia Technology Ltd apparatus for determining a signature of an article arranged in a reading volume, use of the apparatus, methods for identifying an article made of paper or cardboard, an article made of plastic, a product by its packaging, a document, a garment or footwear, and a disc, method for tagging an article, and, tagged article
GB2450131B (en) 2007-06-13 2009-05-06 Ingenia Holdings Fuzzy Keys
GB2461253B (en) 2008-05-23 2012-11-21 Ingenia Holdings Ltd Linearisation of scanned data
GB2461971B (en) * 2008-07-11 2012-12-26 Ingenia Holdings Ltd Generating a collective signature for articles produced in a mould
GB2466465B (en) 2008-12-19 2011-02-16 Ingenia Holdings Authentication
GB2476226B (en) 2009-11-10 2012-03-28 Ingenia Holdings Ltd Optimisation
CH710402A2 (en) * 2014-11-24 2016-05-31 Paper Dna Ag Paper authentication device.

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US3877019A (en) * 1970-03-02 1975-04-08 Object Recognition Systems Photomeasuring device for computer storage of photographic and other materials
US4599509A (en) * 1970-09-21 1986-07-08 Daniel Silverman Access security control
GB2304077A (en) * 1995-06-30 1997-03-12 Andrew John Farrall Security device comprising reflective particles
CN1238053A (en) * 1996-12-12 1999-12-08 贝克特股份有限公司 Article recognition and verification
US6741360B2 (en) * 2000-05-08 2004-05-25 European Community Method for identifying an object

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE69534475T2 (en) * 1994-03-08 2006-04-27 Cummins-Allison Corp., Mount Prospect Device for distinguishing and counting documents
JP2004171109A (en) * 2002-11-18 2004-06-17 Nippon Telegr & Teleph Corp <Ntt> Device authentication system

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US3877019A (en) * 1970-03-02 1975-04-08 Object Recognition Systems Photomeasuring device for computer storage of photographic and other materials
US4599509A (en) * 1970-09-21 1986-07-08 Daniel Silverman Access security control
GB2304077A (en) * 1995-06-30 1997-03-12 Andrew John Farrall Security device comprising reflective particles
CN1238053A (en) * 1996-12-12 1999-12-08 贝克特股份有限公司 Article recognition and verification
US6741360B2 (en) * 2000-05-08 2004-05-25 European Community Method for identifying an object

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
T.Haist and H.J.Tiziani.Optical detection of random features for high securityapplications.OPTICS COMMUNICATIONS147.1998,147173-179. *

Also Published As

Publication number Publication date
ATE483215T1 (en) 2010-10-15
DE602006017224D1 (en) 2010-11-11
GB2429095A (en) 2007-02-14
GB0515460D0 (en) 2005-08-31
CN101258528A (en) 2008-09-03
GB2429095B (en) 2008-08-13

Similar Documents

Publication Publication Date Title
CN101258528B (en) Authenticity verification
EP1730675B1 (en) Authenticity verification methods, products and apparatuses
CN101645133B (en) Methods and apparatuses for verifying and creating safe articles
CN101263530B (en) Verification of the an article
EP1908027B1 (en) Verification of authenticity
KR101168932B1 (en) Methods and apparatuses for creating authenticatable printed articles and subsequently verifying them
CN101297306A (en) Copying
US20070025619A1 (en) Verification
CN101258511A (en) Signature for access tokens
CN101258502A (en) Prescription authentication using speckle patterns
JP2009503670A (en) Authenticity verification
CN101263533A (en) Authenticity verification

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
ASS Succession or assignment of patent right

Owner name: ENGENYA HOLDINGS CO., LTD.

Free format text: FORMER OWNER: ENGENYA TECHNOLOGY CO., LTD.

Effective date: 20100413

C41 Transfer of patent application or patent right or utility model
COR Change of bibliographic data

Free format text: CORRECT: ADDRESS; FROM: LONDON, UNITED KINGDOM TO: TOTORA ISLAND, BRITISH VIRGIN ISLANDS

TA01 Transfer of patent application right

Effective date of registration: 20100413

Address after: The British Virgin Islands of Tortola

Applicant after: Ingenia Holdings UK. Ltd.

Address before: London, England

Applicant before: Ingenia Technology Ltd.

C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20120321

Termination date: 20150719

EXPY Termination of patent right or utility model