CN101263533A - Authenticity verification - Google Patents

Authenticity verification Download PDF

Info

Publication number
CN101263533A
CN101263533A CNA2006800330749A CN200680033074A CN101263533A CN 101263533 A CN101263533 A CN 101263533A CN A2006800330749 A CNA2006800330749 A CN A2006800330749A CN 200680033074 A CN200680033074 A CN 200680033074A CN 101263533 A CN101263533 A CN 101263533A
Authority
CN
China
Prior art keywords
signature
data
token
article
database
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CNA2006800330749A
Other languages
Chinese (zh)
Inventor
R·P·考博恩
J·D·R·布坎南
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ingenia Holdings UK Ltd
Original Assignee
Ingenia Technology Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ingenia Technology Ltd filed Critical Ingenia Technology Ltd
Publication of CN101263533A publication Critical patent/CN101263533A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4014Identity check for transactions
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/08Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code using markings of different kinds or more than one marking of the same kind in the same record carrier, e.g. one marking being sensed by optical and the other by magnetic means
    • G06K19/10Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code using markings of different kinds or more than one marking of the same kind in the same record carrier, e.g. one marking being sensed by optical and the other by magnetic means at least one kind of marking being used for authentication, e.g. of credit or identity cards
    • G06K19/14Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code using markings of different kinds or more than one marking of the same kind in the same record carrier, e.g. one marking being sensed by optical and the other by magnetic means at least one kind of marking being used for authentication, e.g. of credit or identity cards the marking being sensed by radiation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/02Payment architectures, schemes or protocols involving a neutral party, e.g. certification authority, notary or trusted third party [TTP]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/08Payment architectures
    • G06Q20/12Payment architectures specially adapted for electronic shopping systems
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/22Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder
    • G07C9/24Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder by means of a handwritten signature

Abstract

A method for authenticity verification. The method can comprise conducting a transaction between first and second parties, the parties being respectively located at first and second locations remote one-another, the outcome of the transaction being the transfer of title to goods and/or services from the first party to the second party. Data describing a value entitlement token of the second party can be captured to create a signature for the value entitlement token, the signature being based upon an intrinsic property of the value entitlement token. The signature can be transmitted from the second party to a third party which can compare the signature to a database of stored signatures. A validation result indicating whether the value entitlement token corresponds to a value entitlement token signature in the database can be transmitted from the third party to the first party.

Description

Authenticity verification
Technical field
The present invention relates to authenticity verification, and forward time or aspect, space improved authenticity verification to away from the situation (for example with reference to remote card-Ji transaction) of the position of the point of delivery of value, commodity or service more specifically to mandate for its intermediate value, commodity or service.
Background technology
Under ecommerce and similar situation, usually be away from the management value or providing commodity or the position of the entity of service is carried out about the transfer of the mandate of value, commodity or service.In such transaction, the payment of the mandate of value, commodity or service is usually carried out from remote location.Therefore wish that such transaction stands high-caliber security, so that final user and service provider or commodity supply person both sides' deception is dangerous minimum.
In order to solve the such problem to the authorized remote access of value, commodity or service, but implementation system is for such as online access or order the safety mechanisms that is used for paying object in the remote access system the facility.In these cases, can provide the numerical indicators of value being transferred to provider's mandate from the buyer.Typically this can comprise credit or debt-credit card number, and can be replenished by numerical value PIN (personal identification number) or character password.Yet this system does not guarantee that the buyer is actual has credit or debt-credit card, although credit or debt-credit card can be used as further safety practice to the restriction based on the conveying address of the address of drawing a bill.
Summary of the invention
Problem and the defective of considering legacy system at least in part propose the present invention.
The present invention is produced for the work of using the token application authorization technology of being made by the magnetic material by the inventor to small part, wherein can not provide uniqueness (describing in detail among the PCT/GB03/03917 at Cowburn) by replication defective in the magnetic material of the magnetic response that influences token.As the part of this work, the magnetic material is constructed with barcode standard, promptly is configured to a plurality of parallel tapes.Except that by reading with the magnetic reader scanning magnetic field unique magnetic response of tape, optical scanner is configured to by at scanning laser beam on the bar code and use the contrast that forms the variation reflectivity of the article on it from bar code tape and they to read bar code.This information is replenishing for magnetic properties, because the bar code digital signature of unique magnetic response that is used for encoding in a kind of certificate scheme of self knowing, for example also there is above description (for example to see to banknote, Kravolec " Plastic tag makes foolproof ID ", Technology research news, on October 2nd, 2002).
What make that the inventor is taken aback is to find that the paper background material that magnetic chip supports thereon provides unique optic response for scanner when using this optical scanner.When further investigating, confirm multiple other green surface, the surface as various types of cardboards and plastics shows same effect.Moreover verified by the inventor, unique trait to small part is produced by spot (speckle), but also comprises non--spot contribution.
Thereby have been found that and to obtain based on whole advantages of the technology of spot and needn't use the token of special preparation or prepare article specially with any alternate manner.Specifically, have been found that polytype paper, cardboard and plastics provide the unique trait scattered signal from coherent light beam, thereby by almost any paper document or card board package thing can obtain unique digital signature.
The above-mentioned known spot reader that is used for security arrangement seems based on partly (seeing for example GB2 221 870 and US 6 with the whole of laser beam irradiation token and with the remarkable solid angle that the CCD imaging generates resultant speckle patterns, 584,214), obtain the spot pattern image of the token formed by big number of arrays strong point thus.
The reader that the inventor uses is operation by this way not.It uses angled isolated four single channel detector (four simple optical electric transistors), only collects four component of signals from the scattering laser bundle.Laser beam is focused the only spot of the very fraction of covering surfaces.When scanning spot from the teeth outwards, collect signal from lip-deep different regional areas by four single channel detector.From the characteristic response of article thereby by forming from the independent measurement of a large amount of (typically hundreds of or thousands of) the different regional areas on the article surface.Although use four phototransistors, only use data analysis to show from single phototransistor, the unique trait response could be derived by this single channel individually! Yet,, obtain higher safe level if the other of four passages is also included within the response.
From first aspect, the invention provides a kind of method that is used for authenticity verification.This method can be included between first and second sides and conclude the business, and both sides lay respectively at first and second positions away from each other, and transaction results is to transfer to second party about the right of commodity and/or service from first party.The data of describing the value authorization token of second party can be hunted down and be used to be worth the signature of authorization token with establishment, and signature is based on the inherent attribute of value authorization token.Signature can be transferred to the third party from second party, and this third party can compare signature with the database of storage signature.The indicated value authorization token whether with database in the value authorization token corresponding checking result that signs can be transferred to first party from the third party.Thereby can be confident of the authenticity of ground check the value authorization token, with the deception copy of avoiding token or use and do not need token in the seller who is used for obtaining commodity and/or service or provider place actual presenting.
In one embodiment, first and third party's co-located, thus authentication and seller are single entities.Thereby the seller can provide its oneself the service for checking credentials.In other embodiments, these several sides are separate entities, provide authentication service thereby the single authentication entity can be a plurality of sellers.Such third party can be a payment liquidation organization (payment clearing authority).
In certain embodiments, this method also can comprise description value authorization token and/or its user's data are transferred to first party and/or third party from second party.This information can comprise card number, the card term of validity, card possessor's name or card possessor address.In one embodiment, this data can be compared with the database of the details of storing effective and/or invalid value authorization token and/or user.Thereby whether the susceptible of proof card has been reported and has been lost or stolen or do not forbidden that the user uses card.Also can check, with commodity or the service that determines whether that enough payment fundings are ordered.But this database and signature database co-located are perhaps separable.Two databases can be all by single payment authentication entity management, perhaps management separably.
In certain embodiments, creating first and/or second step of signing comprises: be exposed to coherent radiation writing authorization token; Collect the data point set of measurement from the scattering of the coherent radiation of the immanent structure of writing authorization token; Reach the signature of determining to write authorization token by data point set.Has the safety of high confidence level thus and the generation system of reliably signing can be used to provide authentication.
In one embodiment, can be divided into some of continuous data to signature, and compare operation between each piece and the relevant block from the storage signature of storing signature database.Can compare attribute with expectation attribute relatively, to determine that offset is to be used for determining the checking result from its comparative result.Offset can be used to compensate to the damage of value authorization token and/or non-linear in catching step.Thereby can consider the value authorization token that damages and/or wherein be not the data capture process of collecting data linearly, to guarantee validation value authorization token (even these factors are arranged) correctly, still can avoid false coupling simultaneously.
From second aspect, the invention provides a kind of system that is used for authenticity verification.This system can comprise first and second computer systems, and this first and second computer system and can be operated to communicate by letter between them through data communication channel away from each other.First computer system can be operated, so that conclude the business in the user and first computer system of second computer systems division, the result of transaction offers the user to the mandate about commodity and/or service by first computer system.System also can comprise the signature maker, this signature maker and second computer system co-located, and can operate to create the signature of user's value authorization token based on the inherent attribute of value authorization token.Second computer system can be able to operate with signature transmission to the three computer systems.The 3rd computer system can be able to operate so that signature is compared with the database of storage signature, with generation indicated value authorization token whether with database in the value authorization token corresponding checking result that signs.The 3rd computer system can further can be operated with a checking result transmission to first computer system.Thereby the authenticity of the ground check the value authorization token of can being confident of, copy or use with the deception of avoiding token, and do not need token being used for obtaining the seller of commodity and/or service or actual the presenting at provider place.The value authorization token can be credit and/or debt-credit card.
In one embodiment, the first and the 3rd computer system can be a single computer systems, thereby the seller can provide its oneself the service for checking credentials.Alternatively, they can be the computer systems of separating, thereby the 3rd computer system belongs to the payment liquidation organization that service is provided to a plurality of sellers.
In certain embodiments, second computer system can be operated so that description value authorization token and/or its user's data are transferred to the first and/or the 3rd computer system.This information can comprise card number, the card term of validity, card possessor's name or card possessor address.In one embodiment, this data can be compared with the database of the details of storing effective and/or invalid value authorization token and/or user.Thereby whether the susceptible of proof card has been reported and has been lost or stolen or do not forbidden that the user uses card.Also can check, to determine whether enough payment funding order goods or service.But this database and signature database co-located are perhaps separable.Two databases can be all by single payer certification entity management, perhaps management separably.
In certain embodiments, the signature maker can comprise: read the space, be arranged to receive article; Light source is used for producing coherent light beam; Detector assembly is used for the signal collection data point set that obtains when reading space scattering from coherent light beam, and wherein different data points is with relevant from the different piece that reads the space; And data acquisition and processing module, can operate to determine the signature of article by data point set.Thereby can be with high credit rating generation signature, to confirm the uniqueness of object with system capability.
In certain embodiments, the 3rd computer system can be operated with some of signature being divided into continuous data, and compares operation between each piece and the relevant block from the storage signature of storage signature database; And comparing with expectation attribute relatively from the attribute of its comparative result, with the offset of determining when determining that checking is as a result, to use, with compensation to the damage that is worth authorization token and/or non-linear in signature creation.Thereby the recoverable token is by the nonlinear path (because can damage token, stretching or compression as token) of signature maker.
In one embodiment, can be divided into some of continuous data to signature, and between each piece and relevant block, compare operation from the storage signature of storing signature database.Can realize the higher granularity of data processing thus.In certain embodiments, can compare attribute with expectation attribute relatively, with the offset of determining when determining that checking as a result, to use from its comparative result.Offset can be used to compensate to the damage of value authorization token and/or non-linear in catching step.Thereby can consider the value authorization token that damages and/or wherein be not the data capture process of collecting data linearly, to guarantee validation value authorization token (even these factors are arranged) correctly, still avoid false coupling simultaneously.In some example, can be elected to be key blocks to selected piece, thereby sure authentication result needs the piece level coupling and the whole signatures match of key blocks.This allows the article zone such as signature, name, photo and number to be marked as more important than other zone of article.
From the third aspect, the invention provides a kind of method that is used for authenticating credit or bank card.This method can comprise: scanning credit or bank card, to create signature based on its inherent attribute; Compare entity with signature transmission is arrived, this comparison entity can be operated so that the database of signing and storage is signed is compared.This method can comprise that also result based on the comparison creates authentication result.But thereby based on the database confirmation letter of true card with or the debt-credit card, is true card with what guarantee to submit to.Because this is based on the inherent attribute of card, the duplicate of the card of described expression same text, numeral and icon/daily record can not be checked by checking.
In one embodiment, this method also comprises: the data transmission of describing card and/or card possessor to confirming entity, is compared data with dead card and/or card possessor's database; And the result creates the checking result based on the comparison.Thereby can check the account that card is related, for example to guarantee that card does not also stop or reporting losing or stolen.Database can be represented entity identical or that separate, keeps discretely or together.
In certain embodiments, by providing coherent light beam relative article motion, the different pieces of information that has guaranteed to collect about the inherent attribute of article is with relevant from the scattering of article different piece.Motion can be provided by motor, and this motor is mobile beam on the article that are fixed.Motor can be servomotor, free-running operation motor, stepper motor or any suitable motor type.Alternatively, in low-cost reader, driver can be manual.For example, operating personnel can be by making the carriage that article wherein are installed pass stationary laser beam motion on article scanning light beam.The coherent light beam xsect is usually than little at least one order of magnitude of article projection (preferably at least two), thereby can collect the independent digit strong point of remarkable quantity.Can provide focalizer to be used for coherent light beam is brought into focus in article.Focalizer can be configured to coherent light beam is taken to the prolongation focus, in this case, driver preferably be configured to the direction of the main shaft traversed by that prolongs focus on, mobile coherent light beam above article.Prolong focus and can advantageously be provided with cylindrical lens or equivalent reflector apparatus.
In other embodiments, can guarantee different data points, because detector assembly comprises a plurality of probe access of arranging and be configured to detect from the scattering of the corresponding different piece of article with relevant from the scattering of article different piece.This can be by means of orientation detector, with optical fiber local collection signal or the realization of other means.Collect by means of orientation detector or other local signal, coherent light beam needn't focus on.Really, coherent light beam can be static, and shines whole sample space.Orientation detector can be implemented by the condenser lens that is fused to or is relatively fixed on the detector element.Optical fiber can be united use with Macro Lens.
When detector assembly only comprises the single detector passage, may form the reader of to work.Other embodiment uses detector assembly, comprises the one group of detector element that distributes angledly, and can operate so that each different piece that reads the space is collected one group of data point, preferably a small amount of detector element of a group.When signature has comprised contribution from the comparison between same group the data point, provide the security enhancing.This comparison can relate to intersection-relevant easily.
Although the work reader can be formed with only probe access, at least 2 passages are arranged preferably.Intersection between this permission formation detector signal-relevant, this is useful for the signal Processing that is associated with definite signature.Probe access between imagining 2 and 10 will be suitable for most of purposes, currently think that 2 to 4 is the optimum balance between equipment simplicity and the security.
Detector element advantageously is arranged to be arranged in and the plane of reading space intersection, and each a pair of parts are distributed in the plane with respect to the coherent light beam axle angledly, preferably make the either side of one or more detector elements at beam axis.Yet the on-plane surface detector assembly also is acceptable.
Have been found that the intersection of the signal that use obtains from different detectors-relevant has provided valuable data, it is used for increasing security level and also allows signature to duplicate more reliably in time.The use that intersects-be correlated with sees that from the science viewpoint some is wondrous, because speckle patterns is incoherent (except the signal of the corresponding point in the pattern) inherently.In other words, for speckle patterns, from by definition zero crossing-relevant will being arranged between the signal of different detectors, as long as they do not depart from described energized position with the equal amplitude angle in the common plane that intersects with energized position.Using the value of intersection-relevant contribution so indicating the pith of scattered signal is not spot.It is result from the direct scattering of complex surface (as the paper torsion of fibers) that the contribution of non-spot can be regarded as, or the diffusion contribution of scatters.At present, the relative importance of spot and non-spot scattered signal contribution is not clear.Yet the experiment of carrying out so far clearlys show that detector is not to measure pure speckle patterns, but measures the composite signal with spot and non-spot component.
Comprise that in signature intersection-correlated components also is useful for improving security.This is because even may use high resolving power to make article to reproduce the lip-deep contrast variation of true article, can not mate by scanning intersection-related coefficient that true article obtain.
In one embodiment, probe access is made up of the discrete detector element of simple optical electric transistor form.Can use other simple discrete elements, as PIN diode or photodiode.Also can use the integrated detector element, as detector array, although this can increase installation cost and complexity.
Treat the initial experiment of the irradiating angle of scan articles according to revising laser beam, in practice also as if preferably, incide the laser beam nearly orthogonal and be scanned the surface, but so that obtain, even when article are degenerated between measurement, also be like this from the characteristic of same surface duplicate measurements with very little variation.At least some known readers is used oblique incidence angle (seeing GB 2 221870).In case understand, this effect is seemingly obvious, but it obviously is not tangible immediately, as the designing institute that comprises some the prior art spot reader of reader of GB 2 221 870 and the first prototype reader built by the inventor confirms.The first prototype reader with the inventor at oblique incidence angle reasonably well works under laboratory condition, but very responsive for the degeneration as the paper of article.For example, be enough to make with the finger friction papers and occur marked difference when remeasuring.The second prototype reader uses the quadrature incident angle, and have been found that for the degeneration of paper very durable, described degeneration be since customary dispose in addition more serious incident (as: the various types of printers by comprising laser printer, by copy, write in the above, printing in the above, deliberately roasting in stove, and pressure rolling and expansion) produce.
Therefore advantageously light source is mounted to and coherent light beam is pointed to read the space, thereby it will be with the incident angle irradiating item with electron radiation near quadrature.By being meant near the quadrature incident angle ± 5,10 or 20 degree.Alternatively, light beam can be oriented to and have the oblique incidence angle on article.This has adverse effect usually at light beam under scan condition on the article.
Be noted that also in the reader of in detailed description, describing that detector assembly is arranged in the reflected light to survey from reading the radiation that space scattering returns.Yet if article are transparent, detector can be arranged in the transmitted light.
The signature maker can be able to be operated with the database of the signature of record before visiting and compare the coupling that whether comprises and be placed on the signature that reads the article in the space with the authentication data storehouse.Database can be the part of high-capacity storage, and it forms the part of reader, perhaps can visit by telecommunication link at remote location and by reader.Telecommunication link can have any traditional form, comprises wireless and fixed link, and can obtain on the internet.Do not add on the database so that find coupling then allow to sign if data obtain and processing module can be operated in some operator scheme at least.
When using database, except that the storage signature, in database, also be useful with being associated this signature about the out of Memory of the article details (for example, to follow the tracks of grey import) of destination (but sell) as the plan of the manufacturing location of the scanning copy of document, passport possessor's photo, product and time detail or merchandising.
The present invention allows the identification of the article that various kinds of materials (as paper, cardboard and plastics) make.
About immanent structure, we are meant article because it makes intrinsic structure, divide into the security purpose thus and the structure that provides specially, as by token or be included in the given structure of regenerated fiber in the article.
About paper or cardboard, we are meant any article of being made by wood pulp or equivalent fiber process.Paper or cardboard can perhaps can be coated with transparent material, as viscose paper with coating or impregnating.If the special long-time stability of worrying the surface, then paper can for example be disposed with acrylic acid spraying clear coat.
Thereby, as the function of coherent light beam irradiation position, can collect data point.This can collect to realize from the orientation detector of the scattered light of article different piece or by both combination by the local coherent light beam of scanning on article or by use.
The imagination signature is a digital signature in most of purposes.For the typical sizes of current techniques digital signature be at 200 bits to the scope of 8k bit, the wherein current digital signature size that preferably has about 2k bit for higher-security.
Can carry out further enforcement of the present invention and digital signature is not stored in the database, but authorization token is indicated the label that obtains from signature, wherein label meets machine-readable code agreement.
Description of drawings
Referring now to accompanying drawing specific embodiment of the present invention will be described for example, in the accompanying drawings:
Fig. 1 is the diagrammatic side view of the example of reader;
Fig. 2 is a perspective illustration, represent sample graph 1 how reader read the space;
Fig. 3 is the block schematic diagram of function element of the reader of Fig. 1;
Fig. 4 is the skeleton view of the reader of Fig. 1, represents its external form;
Fig. 5 is a skeleton view, and expression is used for another example of external form of the reader of Fig. 1;
Fig. 6 A passes the schematic cross-sectional view that can select reader configuration;
Fig. 6 B is another skeleton view that can select reader configuration;
Fig. 6 C is another skeleton view that can select reader configuration;
Fig. 7 A schematically illustrates may be selected to of reader that is used for based on directional light is collected and covering is shone with side view and looks like device;
Fig. 7 B schematically illustrates the optics track that may be selected to the picture device in addition that is used for wherein using in combination with the local irradiation with prolongation light beam the reader of orientation detector with planimetric map;
Fig. 8 A is the MIcrosope image on paper surface, makes image cover the zone of approximate 0.5 * 0.2mm;
Fig. 8 B is the MIcrosope image of frosting, makes image cover the zone of approximate 0.02 * 0.02mm;
Fig. 9 A represents to use the raw data of the reader of Fig. 1 from single photodetector, and this reader comprises photo detector signal and code device signal;
Fig. 9 B is illustrated in the photodetector data with Fig. 9 A after code device signal linearization and the average amplitude;
Fig. 9 C is illustrated in the data according to Fig. 9 B after the average level digitizing;
Figure 10 is a process flow diagram, and how expression is by scanning the signature that produces article;
Figure 11 is a process flow diagram, the signature of the article how expression obtains from scanning with respect to the signature database checking;
Figure 12 is a process flow diagram, and how expression can change the proof procedure of Figure 11 to take into account the nonideality in scanning;
Figure 13 A represents from the example of the intersection-related data of scanning collection;
Figure 13 b represents wherein to be scanned the article distortion from the example of the intersection-related data of scanning collection;
Figure 13 C represents wherein to be scanned article with nonlinear velocity scanning from the example of the intersection-related data of scanning collection;
Figure 14 is the schematically illustrating of article that is used for authenticity verification;
Figure 15 is the signal broken-open perspective view of many scanner heads scanner;
Figure 16 is the signal broken-open perspective view of many scanner heads position scanner;
Figure 17 is the signal summary of the distribution trading environment such as the electronic transaction environment; And
Figure 18 A, 18B and 18C are the schematic plan view of dissimilar credits or bank card.
Although the present invention allows various modifications and selection form, specific embodiment is represented in the accompanying drawings for example, and is here described in detail.Yet, should be appreciated that, accompanying drawing and it is described in detail do not plan to limit the invention to disclosed concrete form, but opposite, the present invention will cover and drop on by all modifications in the defined the spirit and scope of the present invention of appended claims book, equivalent and can select example.
Embodiment
In order to be provided at security and the authorization service in the environment such as e-commerce environment, the system that is used for discerning uniquely the physics object can be used to the possibility that reduces to swindle for supplier and final user, and strengthens reliability reality and sensation of e-commerce system.
Description is suitable for carrying out the example of the system of such article identification referring now to Fig. 1 to 11.
Fig. 1 represents the diagrammatic side view of first example of reader 1.Reader 1 is used for the article (not shown) that reading of slave unit arrange in the space and measures signature.Read the space and form, read aperture 10 and be the slit in the housing 12 by reading aperture 10.Housing 12 comprises the main optical element of equipment.Mainly extending on the x direction of slit (seen illustration axis in the drawings).Main optical element is to be used for producing the lasing light emitter 14 of coherent laser beam 15 and the detector assembly 16 that a plurality of k photodetector components is formed, and wherein k=4 in this example is designated as 16a, 16b, 16c and 16d.Laser beam 15 is focused into the prolongation focus of extending and be arranged in the plane of reading the aperture in y direction (perpendicular to drawing) by cylindrical lens 18.In the demonstration reader, prolong focus and have major axis dimension and the about 40 microns minor axis dimension of about 2mm.These optical elements are included in the sub-component 20.In this example, the either side that four detector element 16a...d are distributed in beam axis with interdigitated arrangement off-beams axis, reads the light of in the reflection that in space have article scattering to be collected in leisure with different angles.In this example, deviation angle is-70 ,-20 ,+30 and+50 degree.The angle of the either side of beam axis is selected to unequal, thereby the data point that they are collected is independently as far as possible.All four detector elements are arranged in the common plane.When coherent light beam when reading space scattering, detector element 16a...d surveys the light of the article scattering of placing from housing.As shown, light source is mounted to directed laser beam 15 makes its beam axis on the z direction, thereby it will shine the article that read in the aperture with the quadrature incident angle.
The degree of depth of generally wishing focus is big, thereby any difference in the article of locating on the z direction can not cause reading the marked change of beam sizes in the plane in aperture.In this example, the degree of depth of focus is approximate to be 0.5mm, must be enough to produce good result greatly, and wherein article with respect to the position-controllable system of scanner to a certain degree.These parameters of the degree of depth of focus, numerical aperture and operating distance are complementary, cause the known compromise selection between the spot size and the depth of focus.
Drive motor 22 is arranged in the housing 12, is used for providing through suitable bearing 24 or other device the rectilinear motion of optical sub-assembly 20, as arrow 26 indications.Drive motor 22 thereby be used for reading on the aperture 10 at x direction motion coherent light beam point-blank, thus light beam 15 with the direction of the major axis traversed by that prolongs focus on scan.Because coherent light beam 15 is of a size of the xsect that has the xz plane in (plane among the figure) at its focusing, this xsect much smaller than with the coherent light beam plane orthogonal in (promptly wherein being provided with in the plane of the housing wall read the aperture) read the projection in space, so the scanning of drive motor 22 will make coherent light beam 15 read a plurality of different pieces in space at the effect down-sampling of drive motor 22.
Comprise Fig. 2 so that this sampling to be described, and how synoptic diagram is represented to read sector scanning and prolong light beam and sample and read regional n time by striding across.When focussed laser beam along reading when scanning under the effect of aperture at driver, the sampling location of focussed laser beam is by the adjacent rectangle representative of numbering 1 to n, the zone of this adjacent rectangle sampling length ' l ', width ' w '.Carry out data aggregation, thereby when driver scans along the slit, collect the signal at each place of n position.Therefore, collect k * n sequence of data points, with different from the n that reads the space shown in the scattering of part relevant.
Also be illustrated schematically on the downside of the housing 12 adjacent the optional range mark 28 that forms along x direction (being the direction of scanning) with slit 10.On the x direction, the example interval between the mark is 300 microns.These marks are sampled by the afterbody that prolongs focus, and in this linearization that requires to be provided under the linearizing situation data on the x direction, as described in greater detail below.Measurement is undertaken by additional light electric explorer 19, and this additional light electric explorer 19 is orientation detectors, is set to collect light from the zone of the mark 28 adjacent with the slit.
In replacing example, mark 28 can be read by the own coding device transmitter/detector module 19 that is the part of optical sub-assembly 20.Scrambler transmitter/detector module is used in the bar code reader.In an example, can use based on the Agilent HEDS-1500 module that focuses on light emitting diode (LED) and photodetector.Module by signal is fed to as among the PIC ADC of extra detection channels (discussion of face Fig. 3 as follows).
The sweep length of 2cm on the reduced size of 40 microns focus and the x direction for example, n=500 provides 2000 data points under the situation of k=4.Depend on quantity ' k ' and other factor of desired safe level, type of items, probe access, the typical range of k * n value is contemplated to be 100<k * n<10,000.Find that also the quantity k that increases detector also improves the insensitivity of measurement to the surface degradation of the article of process disposal, printing etc.In practice, for the prototype of using so far, rule of thumb, and the sum at independent digit strong point, promptly k * n should be 500 or bigger, can accept high safe level so that various surfaces are provided.Plan only to be used for the occasion of a kind of particular surface type or surface type group at scanner, can use other minimum value (higher or lower).
Fig. 3 is the block schematic diagram of the function element of reader.Motor 22 is connected on the programmable interrupt controller (PIC) 30 by current source road 23.It is on the analog to digital converter (ADC) of PIC 30 parts that the detector 16a...d of detector module 16 is connected to by respective electrical connecting line 17a...d.Similar electric connection line 21 reads detector 19 to mark and is connected on the PIC 30.To understand, optics or Radio Link can be used for replacing the current source road, or combined with it.PIC 30 is by data connection 32 and personal computer (PC) 34 interfaces.PC 34 can be desk-top or laptop.As the alternative of PC, can use other intelligent apparatus, for example personal digital assistant (PDA) or special electronic unit.PIC 30 and PC 34 unite and form data and obtain and processing module 36, are used for determining from the data point set of detector 16a...d collection the signature of article.
In some example, PC 34 can have by interface and connects 38 accessing databases (dB) 40.Database 40 can reside in the storer on the PC 34, perhaps is stored on its driver.Alternatively, database 40 can be away from PC 34, and by the radio communication visit, for example use the mobile phone service or with the combined WLAN (wireless local area network) (LAN) in internet.Moreover database 40 can be stored on the PC 34 partly, but downloads from remote source termly.Database can be managed by remote entity, and this entity can offer specific PC 34 to the visit to the part in total data storehouse only, and/or can be based on security policies limited-access data storehouse.
Database 40 can comprise the storehouse of the signature of precedence record.PC 34 can be programmed, thus accessing database 40 in use, and compare with authentication data storehouse 40 and whether comprise being placed on the coupling of the signature that reads the article in the space.If also may be programmed to not find coupling then allow to sign, adds on the database PC 34.
The mode of disposing the streams data between PC and the database can be dependent on the relation between the operating personnel of the operating personnel of the position of PC and PC and database.For example, if PC and reader just are being used to confirm the authenticity of article, PC does not need and can add new article on the database to so, and direct accessing database in fact, but on the contrary, in order relatively signature to be offered database.In this layout, whether database can offer PC to the authenticity result is real with the indication article.On the other hand, if PC and reader just are being used to write down or validation database in object, signature can offer database so that be stored in wherein so, and may not need comparison.Yet in this case, can compare, enter in the database twice to avoid single object.
Fig. 4 is the skeleton view of reader 1, represents its external form.It is obvious that housing 12 and slit-shaped read aperture 10.Physical positioning assistor 42 also is significantly, and is used for being positioned at respect to the fixed position of reading aperture 10 to the article of definite form.In this example, physical positioning assistor 42 is forms of right angle rack, and the bight of document or packing case can be positioned in this right angle rack.This assurance same part of article when article need scan can be positioned in and read in the aperture 10.For the article in the bight with good qualification, as paper, passport, I.D. and packing case, simple angular support frame or equivalent are enough.The location guide thing that other shape can be provided to be accepting difform object, as comprises the circular object of CD and DVD or the object with curved surface such as having the cylindrically shaped packaging container.Occasion in that the size and dimension of object only will scan can provide the groove that is used for receiving object.
Thereby the scanning in the safety mechanisms of the remote validation that is applicable to the article authenticity and the example of signature generation equipment described now.A kind of like this system can be used to allow article being scanned more than a position, and, reach optionally in order to check to guarantee that article are not also altered between initial and follow up scan in order to check to guarantee that article are same article in both cases.
Fig. 5 represents to be used for the example of the replacement physique of reader, and it is consistent to guarantee that article are placed that the document feeding device wherein is provided.In this example, provide housing 60, this housing 60 has the article feeding pallet 61 that is attached on it.Pallet 61 can keep the one or more article 62 by reader scanning.Motor can drive feed rolls 64, passes device and strides across the scan aperture of optical sub-assembly 20 described above with belongings 62.Thereby article 62 can be in the mode of above-mentioned discussion, in the mode of the relative motion between optical sub-assembly and the article by article motion establishment, by optical sub-assembly 20 scannings.Use a kind of like this system, use motor may command to be scanned the motion of object, and the use of range mark and linearization process can be unnecessary with enough linearities.Equipment can be followed any conventional form that is used for file scanning device, photorepeater or document file management system.A kind of like this scanner can be configured to dispose straight line-feeding sheet material (wherein a plurality of sheet materials are linked together by for example perforate binding element), and on the contrary, disposes single sheets.
Thereby a kind of equipment that is applicable to the article in the scanning auto-feed type device described now.According to the physical layout of feed arrangement, scanner may be able to scan one or more single material sheets, the joining sheet material or material or the three-dimensional object such as packing cardboard.
Fig. 6 represents to be used for the example of the further replacement physique of reader.In this example, pass through reader by user's mobile article.As shown in Figure 6A, reader housing 70 can be provided with groove 71 therein, is used for the insertion of article to be scanned.Optical sub-assembly 20 can be provided with the scan aperture of pointing in the groove 71, thereby can scan the article 62 by groove.In addition, induction element 72 can be provided in the groove 71, with help article is directed to from the correct focal length of optical sub-assembly 20 and/or the constant speed that supplies article to pass groove and passes through.
Shown in Fig. 6 B, reader can be configured to scan articles when moving along the longitudinal fluting that runs through housing 70, as the arrow indication.Alternatively, shown in Fig. 6 C, reader can be configured in being inserted into the groove that extends in the reader housing 70 or when it is removed scan articles, as the arrow indication.Such scanner may be particularly suitable for being scanned up to the firm article of small part, as card, plastics or metal sheet.Such sheet material for example can be the plastic article such as credit card or other bank card.
Thereby, a kind of device that manually starts scan articles has been described now.This can be used to scan bank card and/or credit card.Card can be scanned in the end that use presents this card thus, and can compare with the storage signature of card from the signature that card is obtained, with the authenticity of checking card with do not alter character.A kind of like this device also can be used in the environment that for example reads military affairs-pattern metal ID-label (this label is usually also carried by the autopath so that other people pays attention to their allergy).This can make the medical worker can dispose patient, to guarantee that the patient who is disposed in fact is correct label possessor.Equally, under accident conditions, can scan recover label with the checking authenticity, with guarantee notify the household and/or colleague before correctly discerned the wounded.
Above-mentioned example is based on the part excitation with little xsect coherent light beam, and combined with detector, this detector is received in the light signal of scattering on the much bigger zone that comprises local excitation area.Might design a kind of optical system of function equivalent, this optical system replaces based on orientation detector, and the excitation in this orientation detector and much bigger zone is only collected light from regional area in combination.
Fig. 7 A schematically illustrates a kind of like this imaging device of reader that is used for collecting and having based on directional light the covering irradiation of coherent light beam with side view.Detector array 48 is arranged with cylindrical Macro Lens array 46 combinedly, thus the adjacent strip of detector array 48 only the corresponding adjacent strip from read the space collect light.With reference to Fig. 2, each cylindrical Macro Lens is arranged in from one of n sampling tape and collects light signal.(not expression in diagram) can take place with whole covering illumination (blanket illumination) of reading the space in coherent illumination then.
Commingled system with combination of local excitation and partial detection also may be useful in some cases.
Fig. 7 B schematically illustrates a kind of like this optics track that mixes imaging device that is used for reader with planimetric map, uses orientation detector in combination with the local irradiation with prolongation light beam in this reader.This example can think to provide the development of Fig. 1 example of orientation detector.In this example, provide three to be ranked to detector, each row's target is from collecting light along the different piece of ' l * w ' excitation tape.Be represented as dashed circle from the collecting zone that reads space plane, thereby for example 2 detectors of first row are collected light signal from the top part of excitation tape, second row's detector is partly collected light signal from the middle part of excitation tape, and the 3rd row's detector is collected light signal from the bottom part of excitation tape.It is the circular collection zone of l/m that each row of detector is illustrated as having diameter approximate, and wherein m is the sub-division numbers of excitation tape, wherein m=3 in this example.By this way, for given sweep length l, the quantity at independent digit strong point can increase m doubly.As further described below, one or more different rows' orientation detector can be used for collecting the purpose outside the light signal, its speckle patterns of sampling.For example, one of described row can be used for collecting light signal in the mode of bar code scan optimization.If situation is like this, then usually this row only to comprise a detector just enough be not favourable because when only scanning contrast, intersect-be correlated with.
Now describe the primary structure element and the function element of various reader, now description has been used for determining the numerical value processing of signature.To understand, this numerical value is handled and can be implemented with computer program for major part, and this computer program moves on the PC 34 with some elements that are subordinated to PIC 30.Replace in the example, numerical value is handled and can be undertaken by the special-purpose numerical value treating apparatus in hardware or firmware.
Fig. 8 A is the MIcrosope image on paper surface, and this image covers the zone of approximate 0.5 * 0.2mm.This figure is involved to illustrate such as the macroscopical flat surfaces from paper, is highly structural under micro-scale under many circumstances.For paper, owing to form the result of the interval reticular tissue of the wood of paper or other fiber, the surface is a highly structural microscopically.Figure also shows the characteristic length scale of the xylogen that is used for about 10 microns.Therefore the correct relation that this size has the optical wavelength of the coherent light beam of this example also causes spot to cause diffraction, and also spreads scattering (it has the profile that is dependent on the fiber orientation).Thereby will recognize, if reader design becomes to be used for the commodity of particular category, then can make the feature size of the suitable merchandise classification that will scan of optical maser wavelength.Also obvious from this figure is that the local surfaces structure of every paper will be unique, because it depends on how each root xylogen is arranged.Paper thus with the token of special establishment (as the specific resin token or the magnetic material deposition of prior art) do not have different because as the result who is made by the process of natural law domination, it has unique structure.This is equally applicable to the article of multiple other type.
Fig. 8 B represents the isoboles picture of frosting.This atomic force microscopy image is clearly represented the uneven surface of macroscopical smooth frosting.As from can guessing and assessing the figure, the paper smooth surface that shows among this surface ratio Fig. 8 A is even but the surface undulation of this level also can use the signature generation scheme of this example to be discerned uniquely.
In other words, when unique trait with direct mode when various every-day object can be measured, the effort and the expense that prepare token specially may become meaningless.Describing now the data aggregation and the numerical value of the scattered signal of the natural structure that utilizes article surface (or under the transmitted light situation article inside) handles.
Fig. 9 A represents from the single raw data among the photodetector 16a...d of the reader of Fig. 1.Curve map with respect to the n (see figure 2) of counting with arbitrary unit (a.u.) the signal intensity I that draws.Higher trace fluctuation between I=0-250 is the original signal data from photodetector 16a.Low trace is the code device signal that mark 28 (see figure 2)s from about the I=50 are picked up.
Fig. 9 B is illustrated in the photodetector data (although n.b. x axle is different with Figure 10 A scale, this is unimportant) with Fig. 9 A after the code device signal linearization.As mentioned above, in the article occasion enough linear, can not need to utilize linearization with respect to alignment mark with respect to the motion of scanner.In addition, the mean value of intensity is calculated, and deducts from intensity level.Processes data values thus side above freezing and below the fluctuation.
Fig. 9 C is illustrated in the digitizing data of Fig. 9 B afterwards.The digitization program that adopts is a kind of simple binary quantization scheme, wherein any positive intensity level value of being arranged on 1 place, and bears positive intensity level and is arranged on zero place any.To recognize, can replace use many-state digitized, or any of multiple other possible number means.Digitized main key character only is as one man to use same digitization program.
Figure 10 is a process flow diagram, and how expression is by scanning the signature that produces article.
Step S1 is that data obtain step, and during this step, approximate every 1ms obtains the optical strength at each photodetector place during the whole length of scanning.Simultaneously, the function as the time obtains code device signal.Note,, can not require the linearization of data so if scan module has high linearization precision (for example, as stepper motor).Data are obtained by the PIC 30 that obtains data from ADC 31.Data point is transferred to PC34 from PIC 30 in real time.Alternatively, data point can be stored in the storer among the PIC 30, and forwards PC 34 then when the end of scan to.The number of data points n of each probe access of collecting in each scanning is by the following N that is defined as.And, value a k(i) be defined as intensity level from i of photodetector k storage, wherein i from 1 to N.The example of two raw data sets that obtain from this scanning shows among Fig. 9 A.
Step S2 uses the numerical value interpolation with local expansion and contraction a k(i), thus the scrambler transition in time equably at interval.The localized variation of this correcting motor speed.This step can be undertaken by computer program in PC34.
Step S3 is an optional step.If carry out, this step is with respect to time numerical value ground differential data.Also may wish weak smooth function is applied to data.Difference may be useful for the surface of highly structural, because this is used for respect to the uncorrelated contribution of relevant (spot) contribution decay from signal.
Step S4 is the average step that each photodetector is obtained tracer signal on N data point.For each photodetector, this mean value deducts from all data points, thereby data are distributed near zero intensity.Reference table shows linearization and deducts Fig. 9 B of the example of calculating mean value scan data set afterwards.
The described analog photoelectricity detector data of step S5 digitizing is to calculate the digital signature of the described scanning of expression.Digital signature obtains by using following rule: a k(i)>0 video into scale-of-two ' 1 ', and a k(i)<0 video into scale-of-two ' 0 '.The digitalized data collection is defined as d k(i), wherein i from 1 to N.The signature of article can comprise other component except that the digitized signature of the intensity data of describing just now.These other optional signature components are described now.
Step S6 is an optional step of creating less ' thumbnail ' digital signature.This or the group by average adjacent m reading together or more preferably pick up by every c data point and carry out, wherein c is the supercompressibility factor of thumbnail.The latter is preferred, because on average may disproportionately amplify noise.The same digitizing rule of using in step S5 is applied to the data set that reduces then.The thumbnail digitizing is defined as t k(i), wherein i is from 1 to N/c, and c is a supercompressibility factor.
Step S7 is a plurality of probe access applicable optional steps when existing.Extraneous component is intersection-correlated components of calculating between the intensity data that obtains of the different photodetectors from photodetector.For 2 passages, have an intersection-related coefficient, have up to 3 intersection-related coefficients for 3 passages, and have up to 6 intersection-related coefficients for 4 passages, or the like.Intersection-related coefficient is useful, is good indications of material type because have been found that them.For example, for the document of particular type, as the passport or the laser stamping paper of given type, intersection-related coefficient seems all the time and is arranged in predictable range.The standardization intersection-being correlated with can be at a k(i) and a l(i) calculate between, wherein k ≠ l, and k, l travel through all photodetector channel numbers and change.Standardization intersection-related function Γ is defined as
Γ ( k , l ) = Σ i = 1 N a k ( i ) a l ( i ) ( Σ i = 1 N a k ( i ) 2 ) ( Σ i = 1 N a l ( i ) 2 )
For verifying that later on another aspect of using stored crossing-related function is the width at intersection-related function medium wave peak, for example half width (FWHM).Further describe the use of the intersection-related coefficient in checking is handled below.
Step S8 is another optional step of calculating the simple strength mean value of indicator signal intensity distributions.This can be to the ensemble average of each mean value of different detectors or average to each detector, as a k(i) root mean square (rms) value.If detector, then can use average to every pair of detector as the paired either side that is arranged in the quadrature incident light in the above-mentioned reader.Have been found that intensity level is the good roughing filter that is used for material type, because it is the simple indication of sample overall reflectivity and roughness.For example, people can be removing mean value (being the direct current background) nonstandardized technique rms value afterwards as intensity level.
In order to verify purpose, the signed data that obtains from scan articles can be compared with the record that keeps the signature database, and/or be written to database and expand existing database with the new record that adds signature.
The new database record will comprise the digital signature that obtains among the step S5.This alternatively by the intersection-related coefficient that obtains among the less thumbnail version that obtains for each photodetector passage among its step S6, the step S7, and step S8 in one or more mean values of obtaining replenish.Alternatively, thumbnail can be stored in them and oneself search on the separate databases of optimizing for quick, and the remainder of data (comprising thumbnail) is stored on the master data base.
Figure 11 is a process flow diagram, the signature of the article that expression can be how obtains from scanning with respect to the signature database checking.
In simple enforcement, but the simple search database finds coupling with the complete or collected works based on signed data.Yet, in order to quicken proof procedure, process can use less thumbnail and based on described calculating mean value and intersection-related coefficient pre--screen out.
Verification step V1 is the first step of proof procedure, and this step is promptly carried out scanning step S1 to S8 according to the said process scan articles.
Verification step V2 obtains each thumbnail clauses and subclauses, and assesses it and t kThe quantity of the match bit (i+j), wherein j is a bit offset, this bit offset changes with the error of compensation in scanning area is placed.The value of j is determined, and determines to provide the thumbnail clauses and subclauses of the maximum quantity of match bit then.This uses ' hitting ' for further processing.
Verification step V3 be optionally pre--screen out detection, this detections is carried out before analyzing to the digital signature of this recording storage (signing corresponding to scanning digital).This pre--in screening out, the rms value that obtains among the scanning step S8 is compared with the corresponding stored value in the data-base recording that hits.If corresponding mean value is inconsistent in the predefine scope, then from further processing, get rid of ' hitting '.Refuse then article as not-confirm (that is, jump to verification step V6, and send failure result).
Verification step V4 is carried out before analyzing digital signature further alternative pre--screen out detection.This pre--in screening out, the intersection-related coefficient that obtains among the scanning step S7 is compared with the corresponding stored value in the data-base recording that hits.If corresponding intersection-related coefficient is inconsistent in the predefine scope, then from further processing, get rid of ' hitting '.Refuse article then as not-(that is, jump to verification step V6, and send failure result) confirmed.
The another kind inspection that can use intersection-related coefficient to carry out in verification step V4 is to check at intersection-related function medium wave peak width, wherein assesses intersection-related function by comparing the value and the value of rescaning of storing from original scanning among the scanning step S7:
Γ k , l ( j ) = Σ i = 1 N a k ( i ) a l ( i + j ) ( Σ i = 1 N a k ( i ) 2 ) ( Σ i = 1 N a l ( i ) 2 )
If the width that rescans crest is significantly higher than the width of original scanning, this can be used as and rescans article and altered (or suspicion is arranged) designator.For example, this inspection should be hit and attempt to have the bar code of same intensity variation or the tricker that other pattern is deceived system by printing, and this same intensity changes by photodetector desired from being scanned the surface.
Verification step V5 is the main comparison between the corresponding stored value in scanning digital signature that obtains among the scanning step S5 and the data-base recording that hits.Full storage digitized signature d k Db(i) be dividing in n piece of k the adjacent bit of the q on the probe access, promptly every has qk bit.Representative value for q is 4, and is 4 for the representative value of k, typically forms every 16 bit.Qk bit then with storage digital signature d k Db(i+j) corresponding bit of the qk in is complementary.The quantity of the match bit in the if block is more than or equal to a certain predefine threshold value z Thresh, the number of match block increases progressively so.Be used for z ThreshRepresentative value be 13.This repeats for all n pieces.This whole process repeats for the different off-set values of j, with the error of compensation in placing scanning area, up to the match block that finds maximum quantity.M is defined as the maximum quantity of match block, and the probability of accidental coupling is by following evaluates calculation:
p ( M ) = Σ w = n - M n s w ( 1 - s ) n - w w n C
Wherein s is that (it depends on z again for the probability of the accidental coupling between any two pieces ThreshSelective value), M is the quantity of match block, and p (M) is the M or the probability of the accidental coupling of polylith more.From the piece in the database of the scanning of the different objects of similar material (for example the repeatedly scanning of paper document etc.), determine the value of s by relatively.For q=4, k=4 and z Thresh=13 situation, the representative value of s is 0.1.If qk bit is fully independently, so for z Thresh=13 probability theories can provide s=0.01.Find high value to be on the experience because because limited LASER SPECKLE width relevant between k probe access and also have being correlated with between the adjacent bit in the piece.When comparing with the data base entries that is used for a piece of paper, the typical scan of a piece of paper produces about 314 match block in 510 pieces of sum.For above formula M=314, n=510 are set, s=0.1 provides 10 -177Accidental matching probability.
Verification step V6 sends the result of proof procedure.The probability results that obtains among the verification step V5 can be used in by in/the failure detection, and its benchmark is predefined probability threshold value.In this case, probability threshold value can be arranged on a level by system, perhaps can be the horizontally disposed variable element of being selected by the user.Alternatively, probability results can output to the user as credit level, perhaps with the primitive form of probability itself, and perhaps modification (for example, not having coupling/bad coupling/matched well/good fitting) or other classification to use relative terms.
To recognize that multiple variation is possible.For example, replace intersections-related coefficient dispose for pre--screen out component, they can dispose the part of signing into mainly with digitized intensity data.For example, intersection-related coefficient can be digitized, and adds on the digitizing intensity data.Intersection-related coefficient is digitizing alone also, and is used for producing Bit String etc., can hit so that find with the thumbnail of above description same way as search digitizing intensity data then.
Thereby described now and be used for a plurality of demonstration plants of scan articles to obtain signing based on this article inherent attribute.Also described the data that can how collect by scan period produce signature, and how signature with compare from the follow up scan of identical or different article to be provided at the example that the possibility that scanned same article in the described follow up scan is measured.
Such system serves many purposes, and especially reliably screening out to be used for deception of safety and object prevents and the object trackability.
In some example, be used for extracting the method for signing and be optimized to provide the reliable recognition of article, and ignore by for example stretching or shrinking the distortion that causes for these article from scan articles.Such stretching of article or shrink may be by water for example to causing based on the damage of the article of paper or cardboard.
And if article are non-linear with respect to the relative velocity of sensor in the scanner, then article may seem for scanner and are stretched or shrink.If for example article are moved along transfer system, if perhaps article are held article by the people and are moved through scanner, then this may take place.The contingent example of this kind sight is that the people uses scanner (as above scanner with reference to Fig. 6 A, 6B and 6C description) to scan for example bank card.
Such as described above, scanner is based on scanner head, and it moves with respect to article in scanner unit, article relative scanning device or keep static therein, can provide linearization guiding by optional range mark 28 so, to eliminate any non-linear in the scanner head motion.When article are moved by the people, these non-linear can aggravations widely.
In order to solve the identification problem that may cause by these non-linear effects, may adjust the analysis phase place of item scan.Thereby a kind of modification proof procedure will be described referring now to Figure 12.It is non-linear to eliminate that the process of implementing is used the bulk analysis of data in this example.
Some or all that the process of finishing according to Figure 12 can comprise the steps: level and smooth and differential data, calculate and deduct mean value, and signed and the digitizing of thumbnail with reference to Figure 10 being used to of describing, but be not presented among Figure 12 so that the content of figure is blured.
As shown in fig. 1, use block being used to of analyzing to verify that the scanning process of scanning begins with the data that obtain description article inherent attribute by carrying out item scan at step S21.This scan-data then step S22 be divided into continuous blocks (this can digitizing and any level and smooth/carry out before or after the difference etc.).In an example, the sweep length of 54mm is divided into eight equal length pieces.Therefore each piece represents the subdivision of the scanning area of scan articles.
For each piece, at step S23, to article intentions by comparison each storage signature equivalent block is intersected-is correlated with.This can use the thumbnail means to carry out, thumbnail of each piece.The result of these intersection-correlation computations is analyzed then, with the position of identification intersection-relevant crest.Then at step S24, intersect-exist crest location desired under the situation of perfect linear relationship to compare between the position of relevant crest and the original and follow up scan of article.
The available figure representative of this relation is shown in Figure 13 A, 13B and 13C.In the example of Figure 13 A, intersect-relevant crest is exactly in desired part, thereby scanner head has been perfect linear with respect to the motion of article, and article do not experience and stretch or shrink.Thereby actual crest location expects that relatively the curve of crest generates by initial point and has the straight line of slope 1.
In the example of Figure 13 B, intersect-relevant crest is than desired more closely being crowded together, thus the slope of best-fitting straight line is less than one.Thereby the physical characteristics of article during with respect to its preliminary sweep shunk.And best-fitting straight line is the initial point by figure not.Thereby the position of article during with its preliminary sweep compare, and is moved with respect to scanner head.
In the example of Figure 13 C, the crest that intersects-be correlated with does not form straight line.In this example, their approximate being fitted to are represented y 2On the curve of function.Thereby article slow down in scan period with respect to the motion of scanner head.And because optimum fit curve do not pass initial point, obviously, the position of article during with respect to its preliminary sweep is moved.
Various functions can detect-be fitted on the curve of intersection-relevant wave crest point to find the best-fitting function.Thereby can use the curve of considering stretching, contraction, mis-alignment, acceleration, deceleration and combination thereof.
In case discerned the best-fitting function at step S25 place, just can determine to represent each intersection-relevant crest to move what running parameter collection from its desired locations at step S26.These compensating parameters can be applied to the scan-data that next comfortable step S21 obtains at step S27 then, so that offset contraction, stretching, mis-alignment, acceleration or deceleration substantially to the influence from scan-data.As will be recognized, the best-fitting function match scan-data that obtains at step S25 is good more, and compensation effect will be good more.
The compensated scanning data are dispersed as continuous blocks at step S28 then as step S22.Described individually intersect with relevant block at step S29 then from the data of storage signature-relevant, to obtain intersection-related coefficient.At this moment analyze the numerical value of intersection-relevant crest, to determine the uniqueness factor at step S29.Thereby can determine to be scanned article whether when creating the storage signature article of scanning identical.
Correspondingly, described now a kind of be used for compensating the physical deformation that is scanned article, and the compensation article with respect to the example of the non-linear method of the motion of scanner.Make in this way, being scanned article can be examined with respect to this article storage signature that obtains from article scanning early, so that determine with the higher reliability level whether same article are presented on follow up scan.Thus, the article of being built by easy distortion material can be discerned reliably.And can use scanner can be non-linear scanner with respect to the motion of article, allows not have the use of the low-cost scanner of movement control elements thus.
In some scanner equipment, may be difficult to also determine that scanning area begins wherein and finishes.In above discussion example, this example for Fig. 6 B is the most debatable, and wherein the article that will scan pass through groove, thereby the article that scanner head can " be seen " are than planning the greatly regional of scanning.A kind of means of eliminating this difficulty are scanning area to be defined as in article edge begin.Since when article when being the space of free space in the past, the data that receive at scanner head will experience clearly that step changes, and begin wherein so the data that obtain at scanner head can be used to definite scanning.
In this example, before being put on scanner, article can operate scanner head.Thereby the preliminary sweep head receives and the corresponding data that do not take up space of scanner head front.When article passed through in the scanner head front, the data instant that scanner head receives became the data of describing article.Thereby but monitoring data begins wherein to determine article, and discardable before this all data.Can determine position and the length of scanning area in many ways with respect to the article leading edge.The simplest is that to make scanning area be whole article, may detect end thereby pick up once more with the corresponding data of free space by scanner head.Another kind method is the scanning reading that begins and/or stop the record data predetermined quantity from leading edge.Suppose article always with approximately uniform speed motion overscanning head, this can cause consistent scanning area.Another can select example to be to use real marking on the article with beginning with stop scanning area, and is although this may require more work aspect data processing, corresponding with scanning area discardable with which data to determine which catches data.
Thereby described now multiple technologies be used for scanned object with collect based on the article inherent attribute data, (if necessary) compensation to the damage of article or in scanning process non-linear, and article are signed to compare whether present same article with definite for twice scanning with the storage based on the previous scanning of article.
The another kind of characteristic that the bulk of the signature that use produces based on the article inherent attribute is analyzed detectable article is the detection to the article local damage.For example, a kind of like this technology can be used to survey the modification of carrying out for article after original records scanning.
For example, multiple document as passport, I.D. and driver's license, comprises possessor's photo.If the scanning of the authenticity of article comprises the part of photo like this, will detect any change that this photo is carried out so.Signature is split into 10 as arbitrary examples, three photos that can cover on the document of these pieces, and other seven another part that cover document are as background material.If photo is replaced, can expects that so later the rescaning of document provides good coupling to wherein revising nonevent seven, but replace the coupling that photo will provide non-constant.Corresponding with photo by knowing these three pieces, all three provide the fact of non-constant coupling to can be used to automatically make document to confirm failure, and ignore the average mark of whole signature.
And multiple document comprises one or more people's the indication of writing, for example by the individual's of passport, driver's license or I.D. identification name or bankbook possessor's name.Multiple document also comprises the place of writing signature that wherein applies possessor or reference.Use the bulk of the signature that is used to verify obtain thus to analyze detectable change printing or write name or other important literal or digital modifications on the document.Can expect to provide quality much lower coupling with corresponding of the position that changes printing or write than the piece that does not take place to revise.Thereby may detect the name of modification or write signature, even and the whole matching height of document must be enough to obtain by the result, document is also failure in confirm detecting.
The example of I.D. 300 is illustrated among Figure 30 0.I.D. 300 comprises possessor's name 302, the possessor's of printing photo 304, possessor's signature 306 (it may be write on the card, or by the scanning printing of the signature of writing signature or electron capture), and the card number 308 of printing.In order to prevent to change, be used for producing the scanning area of signing and comprise the one or more of these elements based on the card inherent attribute for the deception of I.D..Various demonstration scanning areas are marked among Figure 14 so that various possibilities to be described.Demonstration scanning area 321 comprises printing name 302 parts and photo 304 parts.Demonstration scanning area 322 comprises printing name part.Demonstration scanning area 323 comprises signature 306 parts.Demonstration scanning area 324 comprises card number 308 parts.
Zone and the element selected for scanning area can be depending on a plurality of factors, comprise the document elements that tricker's most probable is attempted to change.For example, for any document that comprises photo, most probable change target is photo normally, because this is with visually discerning the possessor.Thereby the scanning area that is used for this document may be chosen to comprise the part of photo valuably.Another element that may stand to cheat modification is possessor's a signature, because people pretend to have the name except that themselves easily, but copy another person's signature difficulty.Therefore may comprise the part of the signature on the document valuably for signature document (particularly do not comprise photo those) scanning area.
Therefore in the ordinary course of things, can see detection to the article authenticity can comprise certifying signature with the record signature that is used to sign whole between the detection and enough high coupling on the selected at least piece of signature of enough high-quality couplings.Thereby overstate the district that wants for estimating the article authenticity can be selected, this is the key that realizes sure legitimate reading.
In some example, the piece except that being selected as key blocks can allow to present bad matching result.Although thereby document wearing and tearing or otherwise part damage, can be accepted as really, as long as key blocks provides good coupling, and signature is whole that good coupling is provided.
Thereby described now and be used for discerning to the local damage of article and be used for refusing to have in the fate a plurality of examples of the article of local damage or change as false system, method and apparatus.Can ignore damage or change in other district, it is real allowing document recognition thus.
In some scanner equipment, may be difficult to also determine that scanning area begins wherein and finishes.In example discussed above, be the most debatable for the example of Fig. 6 B, wherein the article that will scan are by groove, thus the article that scanner head may " seeing " are bigger than planning the zone of scanning.A kind of means of eliminating this difficulty are that the edge that scanning area is defined as at article is begun.Since when article when being the space of free space in the past, the data that receive at scanner head will experience clearly that step changes, and begin wherein so the data that obtain at scanner head can be used to definite scanning.
In this example, before being put on scanner, article can operate scanner head.Thereby the preliminary sweep head receives and the corresponding data that do not take up space of scanner head front.When article passed through in the scanner head front, the data instant that is received by scanner head became the data of describing article.Thereby but monitoring data begins wherein to determine article, and discardable before this all data.Can determine position and the length of scanning area in many ways with respect to the article leading edge.The simplest is that to make scanning area be whole article, may detect end thereby pick up once more with the corresponding data of free space by scanner head.Another kind method is the scanning reading that begins and/or stop the record data predetermined quantity from leading edge.Suppose that article always move through scanner head with approximately uniform speed, this can cause consistent scanning area.Another can select example to be to use real marking on the article with beginning with stop scanning area, and is although this may require more work aspect data processing, corresponding with scanning area discardable with which data to determine which catches data.
Thereby described now multiple technologies be used for scanned object with collect based on the article inherent attribute data, (if necessary) compensation to the damage of article or in scanning process non-linear, and article with sign to compare whether present same article for twice scanning based on the storage of the previous scanning of article with definite.
When using the above bio-measurement technology such as the identity technology to be used for article authenticity or authentication, may produce difficulty based on the reproducibility of the signature of biometric characteristic referring to figs. 1 through 14 descriptions.Especially, the inherent trend of bio-measurement signature generation system is to return slightly different result in each signature that is produced by article, in addition, at article at difference signature generation equipment be subjected to signature at different time and produce when handling, might present the slightly different part of article at every turn, make reliable authentication more difficult.
Now description is used for eliminating the example of these difficult systems, method and apparatus.At first, with reference to Figure 15, use description to many scanner head signature generation equipment of database initialize.
As shown in figure 15, reader unit 100 can comprise two optical sub-assemblies 20, and each can be operated with the article that reading of reader unit presented in the space 102 and create signature.Thereby present object and be used for scanning creating signature, with artifact record (later on can with respect to the database authentication object) in the object database, described object can be scanned twice to create two signatures, and it is possible alignment error amount of spatial deviation each other.Thereby be used to discern or the follow up scan of the object of authenticity verification can all be complementary with two storage signatures.In some example, can be used as successfully coupling with two couplings of storing one of signature.
In some example, can use extra read head, thereby each object is created three, four or more a plurality of signature.Each scanner head can depart from other scanner head, so that from providing signature with desire scanning position position adjacent.Thereby can be provided at when scanning checking bigger endurance for the article mis-alignment.
Skew between the scanner head can according to the width that is scanned part such as article, the mis-alignment amount possible with respect to the scanning area size of total item sizes, checking scan period, and the article material factor and select.
Thereby a kind of scan articles that is used for has been described now to create the system of signature database, can check that with respect to this signature database article are with checking article identity and/or authenticity.
Referring now to Figure 16, description is used for providing the example of the another kind of system of a plurality of signatures in item database.
As shown in Figure 16, the single optical sub-assembly 20 of reader unit 100 ' can have and aim at adjustment unit 104.In use, aim at adjustment unit 104 and can change the aligning that read space 102 of optical sub-assembly 20 with respect to reader unit.Thereby the article of placing in reading the space can be by optical sub-assembly 20 scanning of diverse location repeatedly, thereby create a plurality of signatures of article.In this example, aim at adjustment unit 104 adjustable lay the grain scholar assemblies to read from two diverse locations.Thereby be used to discern or the follow up scan of the object of authenticity verification can be complementary with two storage signatures.In some example, can be used as successfully coupling with two couplings of storing one of signature.
In some example, can use extra read head position, thereby each object is created three, four or more a plurality of signature.Other scanner head can be departed from each scanner head position, so that from providing signature with desire scanning position position adjacent.Thereby can be provided at when scanning checking bigger endurance for the article mis-alignment.
Skew between the scanner head position can according to the width that is scanned part such as article, with respect to the scanning area size of total item sizes, checking scan period possible mis-alignment amount, and the article material factor and select.
Thereby a kind of scan articles that is used for has been described now with another example of the system of creating signature database, but with respect to this signature database checking article to confirm article identity and/or authenticity.
Although below be described to, for writing scan (promptly, scan articles is to create signature, later on can be with respect to this reference signature checking article) scanner that uses can use a plurality of scanner heads and/or scanner head position creating a plurality of signatures of article, but scanning also can be used similar system for subsequent authentication.
For example, be used to verify that the scanner of scanning can have a plurality of read heads so that can produce a plurality of checking scan signatures.Each of these a plurality of signatures can be compared with the database of record signature, and this database itself can comprise a plurality of signatures of each record object.Although being used for the difference signature of each object may change, therefore but these signatures all will be far from it with any signature of any other object, and the coupling between arbitrary writing scan signature and arbitrary checking scan signature should provide enough credit ratings aspect the identity of object and/or the authenticity.
Many read heads checking scanners can with the above layout of describing with reference to Figure 15 about the same.Equally, many read heads location verification scanner can with the above layout of describing with reference to Figure 16 about the same.And for record and checking scanner, many scanner heads of combination and the system of every many scanner heads of scanner head position be capable of being combined to become single assembly.
In e-commerce system and similar system, the time and/or the position transfer that can shift in actual possession about the mandate of value, commodity or service away from value, commodity or service.Thereby the bona fide holder that seller or businessman may wish to guarantee payment at shipping goods or before sending the token of indication to authorization of service really by bank or credit card carries out.In this respect, merit attention, under some rules and regulations about credit card, the debt that is used for concluding the business may be seller's responsibility rather than credit card issue person's responsibility with cheating.For example, under British Commonwealth's law, in fact do not present to any transaction that the occasion of selling master authentication carries out at card and be classified as " the card possessor does not occur " or " card occurs " transaction.In such cases, can't will be payment funding through this individual by the bank of issue to the personal guarantee bank that pays from the clamping revenue and expenditure for card account " authentication " carried out.A kind of like this " authentication " only mean, card also report lose or be stolen, and the card possessor has enough funds and is applicable to payment transaction in their account.If do not occur concluding the business to deception under the situation, and block the possessor and subsequently transaction validity is raised an objection, may and usually collect trading value to accepting to cheat the seller who pays by the bank of issue at card.Thereby the seller may wish following higher-security level: the individual fact of carrying out " card does not occur " transaction is the account possessor, and the card that is being used for paying is had by account possessor.
Thereby, a kind of system, Apparatus and method for that is used for increasing the deception resistance in the successful operation of such system proposed in this example.According to this system, Apparatus and method for, the real credit card can be confirmed independently, has card to guarantee to use the purchaser who sticks into the row purchase when buying.
Be used for realizing thisly providing the suitable system of security in following example, to describe, with reference to wherein using the various real world purposes that security is provided.
An example is that the individual uses the on-line purchase facility to use the conventional credit card purchase to be used to the ticket of watching incident or being used to travel.In this example, the user uses by the ticket seller or supplies with the agency and order ticket for the online inlet that this purpose provides.During purchasing process, require the purchaser that the scanning of the credit card of the payment that they are used for ticket is provided.The requirement for any other safety information that this also has the seller to require is as card possessor's name and address, card number, date of expiration etc. and/or password or personal identification number or the inquisitive purchaser's account of seller that is associated with card.The data of collecting from the scanning of credit card can be used to create signature based on the credit card inherent attribute, and the neocaine that has an outward appearance identical with original cards by establishment is this inherent attribute of reproducible not.Signature can send to the card certification entity then, compares with the signature that the previous scanning with the user credit card of storing from the card certification entity produces.The previous scanning that is used for creating the database signature can created card when delivering to the account possessor or after the card possessor accepts card by card issuing, when occurring, mandate place obtains with their being stuck in the card possessor, in this mandate place, before creating the database signature, can check card possessor's identity.Thereby the seller is accepting can to confirm that actual card is occupied by the individual who concludes the business before the transaction.The seller can more be sure of to accept transaction thus, checks and has confirmed that card is also reported and lose or stolen if particularly carried out " tradition ".The connotation of knowing from the positive result of these two kinds of inspections is, account possessor occupies card (do not lose or stolen) and presents this card with conclude the business (signature match), so account possessor must be the individual who sends order, and thereby with only know that card report is lost or stolen comparing, significantly reducing concludes the business is the deception chance.
This process shows at Figure 17.As shown in figure 17, e-commerce environment 201 comprises user terminal 208, by means of this user terminal 208 users through 206 addressable being used for of network such as the internet from seller 205 the commodity or the purchase mechanism of service.This mechanism that buys can be used for allowing the long-distance user to buy any conventional system of commodity or service by buying or order inlet.Online remote ordering system is like this used by multiple industry, group and government.See that the user he is an occasion of buying selectable one or more objects, buys the process of commodity or service and for example can use the online shopping truck system to carry out.
In case one or more objects are selected by the user, just can buy operation, the details of the transaction of the purchase of user's entry approval selection commodity or service wherein.This can comprise input user wish the to conclude the business details of employed credit card or debt-credit card and such as for the request transmission time of object and the details the place.The transaction processing of this example with the data communication of terminal in comprise that also the user uses scanners 210 their credits of scanning or debt-credit card at user terminal 208.Scanner 210 is to operate the separative element of communicating by letter with user terminal 208 with through wired or wireless connection, is whole with user terminal 208 perhaps.
The scanning of user's credit or debt-credit card is used for producing signature based on the card inherent attribute.Scanner 210 can be above referring to figs. 1 through 15 scanners of describing.Thereby in this example, signature is based on the physical surface of the card of measuring with microscopic scale.This signature thereby be unique for this card, and if the duplicate of card scan in the same manner and will have different signatures, as above referring to figs. 1 through 16 discussion.This signature is transferred to supplier 203 from user terminal 208 then, passes through seller 205 in some example.This transmission signature can be encrypted to prevent that the third party copies signature during the transmission.This encryption can use the routine data encryption technology such as public-key encryption to realize, and under the situation of internet business, can socket infill layer scheme safe in utilization.Supplier 203 can be the provide with funds bank or the entities of clearance service of the one or more banks of authorised representative, and supplier 203 can have the signature database of obtaining from distribution credit and debt-credit card 204.With respect to database 204, can check the signature that receives by the supplier as an online transaction part.If in database, find coupling, can determine to issue credit or debt-credit card so and be used for transaction.And database can comprise the information of describing the card possessor, thereby can carry out cross-check, is complementary from user's supply card details and the card possessor details in the database with assurance.Provide the people can be under positive match result's situation be genuine to seller's 205 indicating cards, thereby whether the seller can allow transaction continue based on this information decision.
Thereby credit that susceptible of proof is supplied with for payment in remote transaction or debt-credit card are not lost or are stolen, and enough funds are suitable for payment, and the user who starts transaction has actual card (having carried out other inspection for this card).Can realize the determinacy of huge degree thus: trading time period do not occur at card and deceptive practices can not take place.
Owing to respect to the signature authentication card that produces from same card in the previous time, detect, because they use the inherent attribute material sheet different with the sheet material that is verified card to make so the duplicate of card can not pass through checking.Thus, can prevent to use the deception of details that others' account obtains card with the individual side that obtains commodity or service.
Thereby the present example of having described a kind of system, this system uses the place that is stuck in the purchaser who is convenient to commodity or service, and when being stuck in card when not occurring using in the type transaction, the businessman depends on and is used for the authenticity mass-energy of card of payment for merchandise or service and enough confirms the card that is used to authenticate.The deception that can prevent credit or debt-credit card is thus duplicated, and does not make the purchaser need travel to inconvenient place in order to buy.
Hereinbefore, having described the database 204 that is used for issuing card is pre-existing at supplier 203 places.These signatures can be obtained when card is issued to the user by card issuing.Thereby when cartoon was crossed the distribution of mailing means, signature can be obtained by the publisher before card is transported to the card possessor.For the auxiliary security layer is provided, can require to hold signature transmission that the people produces in user terminal place scanning card and scanning to supplier 203 so that confirm to block in order to use.In such example,, just activate card and use for blocking the possessor if confirm to be complementary from the signature of user terminal transmission and the signature the database.A kind of like this measure meeting prevents following deception: the office worker by the publisher sends out the card different with the card that has scanned, thereby make the office worker can keep scanning card for themselves use or be sold to the third party, there is not holder's permission when concluding the business, cardholder account used.
In another example, create the card scanning of the signature that is used for database 204 and can under publisher and Ka possessor's representative situation all on the scene, carry out.In this case, the scanning area of card can be included in the card possessor write they the signature card on signature space.Thereby the card of remote transaction after being used for scanning comprises and checks that card also do not alter with change or replace signature.
In above arbitrary example of initial " checking " scanning that is used for obtaining card, scanning area can comprise the different piece of card.This example is illustrated in Figure 18 A, 18B and 18C, wherein describes the various examples of card 220.In these figure, scanning area 221 makes with dashed lines scanning, because do not require mark or the indication by any way on card of this zone.Shown in Figure 18 A, scanning area 221 can comprise a part that does not have the card of coating or printed article surface 222 and block and go up to using conventional magnetic tape reader that the part of the magnetic tape 223 that provides is provided.Shown in Figure 18 B, scanning area 221 can comprise that the part of signature area 224 as discussed above and mint-mark are on card or the part of one or more numerals, letter, image or daily record 225,226 in the card.Shown in Figure 18 C, scanning area 221 can comprise that memory chip 227 embedding or the part of card wherein (as in so-called " smart card ") thereon.
Except that more than the example of the credit that provides and debt-credit card, various other payment approval tokens or value token can be used for remote transaction.The example of other token type comprise member card (wherein block the possessor receive can be used to require to give a discount, special " counting " or other value designator that provides or select product), certificate, ticket or the like, they all can be used for buying commodity and/or service under a stable condition, perhaps the purchase from commodity and/or service obtains giving a discount.
Thereby present a plurality of examples of having described the system of the signature that can use payment approval article, this signature so that further security and/or credit rating to be provided to transaction system, wherein provides remote access to the authentication payment of using article based on the inherent attribute of these article.
Although described above example in the scope of the scheme that produces based on the signature of coherent light of above detailed description, that for example uses that signature based on the magnetic field analysis of article produces scheme also can implement this system.
Although in the scope of payment approval article that is plastic credit or debt-credit card, described above example.Yet any article of finishing the function of payment approval article can be used in all those similar systems as described above.For example, payment approval article can be made by the optional substrate such as cardboard or metal.And also commonly, plastic clip is stacked with ply of paper at least in part, so that easier for the card issuer to the printing of card.Thereby can comprise signature section from plastics and/or paper material from the signature of " plastics " card.Because paper or cardboard surface is big in most cases than the rough surface (providing corresponding bigger uniqueness measures) of plastic article, so, may wish to adopt to have the paper or the card portion that can produce signature at least from it in the occasion of the strong anti-deception of hope.In other example, may wish to use plastics token with unglazed thick surface have on the plastic article of glossy surface or above.A kind of so rough surface can only be created to the part of token or for whole token.For example chemistry or mechanically roughened being created on the gloss plastics token can be used in rough surface.
In some example, payment approval article can " print " signature of determining from scan articles is arranged.This can carry out with the form that plastic clip (as the common plastic clip that is used for bank card and credit card, magnetic tape or embedding chip) is write token data.This can use such as above those similar scanners with reference to Fig. 6 B and 6C discussion and carry out, and this scanner is equipped with write head alternatively in addition, can be with setting out life in same device thereby write and scan.Plastic clip can be scanned, and comprises at least one surface portion alternatively, and this surface portion comprises magnetic tape discussed above or embeds chip, is used for the signature of the checking of this card with establishment.
Although described in detail above embodiment, in case fully understand above open, for those skilled in the art's numerous variations with to revise will be obvious.Planning following claims is construed to and contains all such changes and modification and their equivalent.

Claims (32)

1. method that is used for authenticity verification, this method comprises:
Conclude the business between first and second sides, both sides lay respectively at first and second positions away from each other, and the result of transaction is that the right of commodity and/or service is transferred to second party from first party;
The data of catching the value authorization token of describing second party are used to be worth the signature of authorization token with establishment, and signature is created by following operation: comprising that from the signal collection that obtains the set-wherein different group of data points of group of data points relates to from the scattering of the corresponding different piece of value authorization token, reaches the described set of deal with data point group during from the scattering of value authorization token on the coherent light beam sensing value authorization token, when coherent light beam;
Signature is transferred to the third party from second party;
The third party described signature is compared with the database of storage signature; And
The described value authorization token of indication whether with database in the value authorization token corresponding checking result that signs be transferred to first party from the third party.
2. method according to claim 1, wherein first and the third party be in same place.
3. method according to claim 1 and 2, wherein Jiao Yi result depends on the checking result.
4. according to the described method of above arbitrary claim, its intermediate value authorization token is at least a of credit card, debt-credit card, member card, voucher, certificate and token.
5. according to the described method of above arbitrary claim, wherein the third party is payment clearance side.
6. according to the described method of above arbitrary claim, also comprise description value authorization token and/or its user's data are transferred to first party from second party.
7. method according to claim 6 also comprises description value authorization token and/or its user's data is compared with describing invalid value authorization token and/or user's data storehouse, to create authentication result.
8. method according to claim 7, wherein Jiao Yi result depends on the combination of checking result and authentication result.
9. according to the described method of above arbitrary claim, wherein relatively comprise: signature is split into some of continuous data, and between each piece and relevant block, compare operation from the storage signature of storing signature database.
10. according to the described method of above arbitrary claim, wherein indicate under the situation identical substantially between described signature and the attribute from the signature of storage signature database in comparison step, return sure checking result.
11. according to the described method of above arbitrary claim, wherein comparison step do not indicate described signature and from the attribute of signature of storage signature database between under the identical substantially situation, return negative checking result.
12., wherein store the signature that signature in the signature database is included in the value authorization token of being made by the scanning of value authorization token before the transaction beginning according to the described method of above arbitrary claim.
13. according to the described method of above arbitrary claim, wherein primary importance comprises e-commerce server or terminal.
14. according to the described method of above arbitrary claim, wherein the second place comprises terminal.
15. a system that is used for authenticity verification, this system comprises:
First and second computer systems, away from each other, and can operate between them, to communicate by letter through data communication channel, wherein first computer system can be operated so that the user of second computer systems division and first computer system are concluded the business, and the result of transaction offers the user to the mandate of commodity and/or service by first computer system;
The signature maker, be in same place with second computer system, and can operate the signature that is used for user's value authorization token with establishment, the signature maker can be operated with by the group of data points that comprises the set of group of data points-wherein different from the signal collection that obtains during from the scattering of value authorization token on the coherent light beam sensing value authorization token, when coherent light beam is created signature with the scattering described set relevant, that reach deal with data point group from the corresponding different piece of value authorization token, and second computer system energy can be operated with signature transmission to the three computer systems;
The 3rd computer system can be operated so that described signature is compared with the database of storage signature, with produce the indicated value authorization token whether with database in the value authorization token corresponding checking result that signs, and the 3rd computer system further can operate with the checking result transmission to first computer system.
16. system according to claim 15, wherein single computer systems comprises the first and the 3rd computer system.
17. according to claim 15 or 16 described systems, wherein Jiao Yi result depends on the checking result.
18. according to each described system of claim 15 to 17, its intermediate value authorization token is at least a of credit card, debt-credit card, member card, voucher, certificate and token.
19. according to each described system of claim 15 to 18, wherein the 3rd computer system is represented payment clearance side.
20. according to each described system of claim 15 to 19, wherein second computer system further can be operated with the data of description value authorization token and/or describe its user's data and be transferred to first computer system.
Description value authorization token and/or user's data are to describing invalid value authorization token and/or user's data storehouse to create authentication result 21. system according to claim 20, first computer system further can operate.
22. system according to claim 21, wherein Jiao Yi result depends on checking result and authentication result.
23. according to each described system of claim 15 to 22, wherein the 3rd computer system can be operated with some of signature being split into continuous data, and compares operation between each piece and the relevant block from the storage signature of storage signature database.
24.,, verify that then the result is sure if wherein determine between described signature and the signature it is identical substantially from the storage signature database according to each described system of claim 15 to 23.
25., wherein,, verify that then the result negates if determine between described signature and the signature it is not identical substantially from the storage signature database according to each described system of claim 15 to 24.
26. one kind is used for authentication value and shifts the method for token, this method comprises:
Value that scanning is selected from the group that comprises credit card, bank card, member card, voucher, certificate and token shifts token, with by coherent light beam sensing value is shifted on the token, when coherent light beam obtain during from the scattering of value authorization token from the signal collection group of data points that comprises the set of group of data points-wherein different create signature with scattering described set relevant, that reach deal with data point group from the corresponding different piece of value authorization token;
To comparing entity, this comparison entity can be operated so that the database of described signature and storage signature is compared described signature transmission; And
Result based on the comparison creates authentication result.
27. method according to claim 26 also comprises:
The data transmission of describing token and/or token possessor is arrived the checking entity;
Described data are compared with invalid token and/or token possessor's database; And
Result based on the comparison creates the checking result.
28. method according to claim 27, the database of wherein said storage signature and described invalid token and/or token possessor's database are the individual data storehouses.
29., also comprise and use authentication result and checking result to determine whether token is accepted as payment according to claim 27 or 28 described methods.
30. a cardinal principle is as former systems with reference to Figure 14 or 15 descriptions.
31. substantially as the former equipment of describing.
32. the method for a cardinal principle such as former description.
CNA2006800330749A 2005-07-27 2006-07-19 Authenticity verification Pending CN101263533A (en)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
US60/702,946 2005-07-27
GB0515461.2 2005-07-27
GB0515461A GB2429096B (en) 2005-07-27 2005-07-27 Authenticity verification

Publications (1)

Publication Number Publication Date
CN101263533A true CN101263533A (en) 2008-09-10

Family

ID=34976723

Family Applications (1)

Application Number Title Priority Date Filing Date
CNA2006800330749A Pending CN101263533A (en) 2005-07-27 2006-07-19 Authenticity verification

Country Status (2)

Country Link
CN (1) CN101263533A (en)
GB (1) GB2429096B (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106470184A (en) * 2015-08-14 2017-03-01 阿里巴巴集团控股有限公司 Safety certifying method, apparatus and system
CN107077546A (en) * 2014-09-22 2017-08-18 赛门铁克公司 Hold the system and method for factor authority for updating
CN109377247A (en) * 2018-10-29 2019-02-22 中钢银通电子商务股份有限公司 Commodity authenticity verification methods and system applied to large spot exchange platform

Families Citing this family (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8171567B1 (en) 2002-09-04 2012-05-01 Tracer Detection Technology Corp. Authentication method and system
EP2131310A3 (en) 2004-03-12 2011-01-26 Ingenia Technology Limited Authenticity of security articles
WO2005088517A1 (en) 2004-03-12 2005-09-22 Ingenia Technology Limited Methods and apparatuses for creating authenticatable printed articles and subsequently verifying them
GB2450131B (en) 2007-06-13 2009-05-06 Ingenia Holdings Fuzzy Keys
GB2461253B (en) 2008-05-23 2012-11-21 Ingenia Holdings Ltd Linearisation of scanned data
GB2466465B (en) 2008-12-19 2011-02-16 Ingenia Holdings Authentication
GB2476226B (en) 2009-11-10 2012-03-28 Ingenia Holdings Ltd Optimisation

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0875866B2 (en) * 1994-03-08 2008-10-22 Cummins-Allison Corporation Method and apparatus for discriminating and counting documents
GB9513361D0 (en) * 1995-06-30 1995-09-06 Farrall Andrew J A security device
AU2002222194A1 (en) * 2000-12-14 2002-06-24 Assendon Limited An authentication system
US20030018587A1 (en) * 2001-07-20 2003-01-23 Althoff Oliver T. Checkout system for on-line, card present equivalent interchanges
EP1388797A3 (en) * 2002-08-08 2004-10-13 Fujitsu Limited Methods, apparatus and framework for purchasing of goods and services
GB2426100B (en) * 2005-05-11 2007-08-22 Ingenia Technology Ltd Authenticity vertification

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107077546A (en) * 2014-09-22 2017-08-18 赛门铁克公司 Hold the system and method for factor authority for updating
CN107077546B (en) * 2014-09-22 2020-03-10 赛门铁克公司 System and method for updating possession factor credentials
CN106470184A (en) * 2015-08-14 2017-03-01 阿里巴巴集团控股有限公司 Safety certifying method, apparatus and system
CN106470184B (en) * 2015-08-14 2020-06-26 阿里巴巴集团控股有限公司 Security authentication method, device and system
CN109377247A (en) * 2018-10-29 2019-02-22 中钢银通电子商务股份有限公司 Commodity authenticity verification methods and system applied to large spot exchange platform

Also Published As

Publication number Publication date
GB2429096B (en) 2008-11-05
GB2429096A (en) 2007-02-14
GB0515461D0 (en) 2005-08-31

Similar Documents

Publication Publication Date Title
US20070027819A1 (en) Authenticity Verification
CN101263533A (en) Authenticity verification
CN100555319C (en) Authenticity verification methods, product and device
CN101263530B (en) Verification of the an article
US20060294583A1 (en) Authenticity Verification
US8497983B2 (en) Optical authentication
CN101645133B (en) Methods and apparatuses for verifying and creating safe articles
CN100527152C (en) Methods and apparatuses for authenticatable printed articles and subsequently verifying them
AU2006245550A1 (en) Authenticity verification by means of optical scattering
CN101297306A (en) Copying
JP5253463B2 (en) Optical authentication
CN101258511A (en) Signature for access tokens
CN101258528B (en) Authenticity verification
CN101385037A (en) Optical authentication

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
ASS Succession or assignment of patent right

Owner name: ENGENYA HOLDINGS CO., LTD.

Free format text: FORMER OWNER: ENGENYA TECHNOLOGY CO., LTD.

Effective date: 20100413

C41 Transfer of patent application or patent right or utility model
COR Change of bibliographic data

Free format text: CORRECT: ADDRESS; FROM: LONDON, UNITED KINGDOM TO: TOTORA ISLAND, BRITISH VIRGIN ISLANDS

TA01 Transfer of patent application right

Effective date of registration: 20100413

Address after: The British Virgin Islands of Tortola

Applicant after: Ingenia Holdings UK. Ltd.

Address before: London, England

Applicant before: Ingenia Technology Ltd.

C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication

Open date: 20080910