CN101405753A - Card capable of performing true/false judgment by a fluorescent particle chip - Google Patents

Card capable of performing true/false judgment by a fluorescent particle chip Download PDF

Info

Publication number
CN101405753A
CN101405753A CNA2006800476488A CN200680047648A CN101405753A CN 101405753 A CN101405753 A CN 101405753A CN A2006800476488 A CNA2006800476488 A CN A2006800476488A CN 200680047648 A CN200680047648 A CN 200680047648A CN 101405753 A CN101405753 A CN 101405753A
Authority
CN
China
Prior art keywords
card
true
chip
hologram
light
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CNA2006800476488A
Other languages
Chinese (zh)
Other versions
CN101405753B (en
Inventor
南条真一郎
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
International Frontier Technology Laboratory Inc
Original Assignee
International Frontier Technology Laboratory Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by International Frontier Technology Laboratory Inc filed Critical International Frontier Technology Laboratory Inc
Priority claimed from PCT/JP2006/325225 external-priority patent/WO2007072794A1/en
Publication of CN101405753A publication Critical patent/CN101405753A/en
Application granted granted Critical
Publication of CN101405753B publication Critical patent/CN101405753B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Credit Cards Or The Like (AREA)
  • Holo Graphy (AREA)

Abstract

The present invention relates to a card capable of performing autentication by radio-active materail chip. A card authentication is performed. An authentication chip for performing authentication by a copy-disabled hologram chip is attached to a card and when or after the card is introduced into a handling device, the authentication chip information is read to perform authentication. Read may be performed in a planar shape but a linear shape can reduce the processing load. An arbitrary straight line or a curved line may be used as a read line shape by modifying the read position in association with the card movement when the card is placed to be read. When the card introduced to a terminal device is an unauthorized one, the card is ejected or an alarm is issued when the card is introduced inside.

Description

Can carry out the card of genuine/counterfeit discriminating by the hologram chip
Technical field
The present invention relates to card, bank note, security etc. is forged easily and needs the structure of article of true and false authentication and the method that the true and false of these article is authenticated.
Background technology
In the today that is called as card society, the card that One's name is legion occurs, the card that the cash card of bank, the credit card of trust company etc. are relevant with owner's property, relevant card is used with proof of identification as the prepaid card of securities and driving license, health insurance cards, passport etc.
The card relevant with property and write information needed mostly in the magnetic stripe that is arranged at the surface or the back side as the card of securities uses ATM (Automatic Teller ' s Machine: Automatic Teller Machine) wait automatic equipment or manual reading device to read magnetic information and carry out various processing from magnetic stripe.
The example of present cash card treatment scheme that shown in Figure 1 is.
When (1) everyone was inserted into cash card in the card insert opening of end device such as ATM when card, the sensor of card insert opening detected it, and card is taken in the auto levelizer.
(2) when being taken into card, end device reads card information from the magnetic recording portion of card.Under the situation of cash card, read in card informations such as bank's sign indicating number, branch's sign indicating number, account classification, account number.And under the situation of credit card, card identifier, valid period, account classification, account number are recorded in the magnetic recording portion as card information.In addition, exist in the situation that records password in cash card or the credit card, in the case, password also is read out.
(3) end device judges whether the card that is inserted is the card that can handle in this end device.
(4) be under the situation of the information that can handle of expression not being identified according to the card information that is read in, perhaps, even if regular card and because breakage or dirt etc. and can not read under the situation of card information, end device will block inappropriate card that conduct can not handle and spue.
(5) be that beginning communicates with main frame under the information of regular card and the magnetic recording portion situation about correctly being read at card.
(6) host requests input password.
(7) corresponding to the request from main frame, the card user inputs password.
(8) when the card user when inputing password from the request of main frame, main frame compares password of being inputed and the password of storing corresponding to the card information that is read in main frame.
(9) under inconsistent situation, in the magnetic recording portion of card, this is write down and asks to input once more password, when the password of input once more is correct, and the formality after carrying out, under inconsistent situation, similarly, password is inputed in request again, when password input error accumulative total becomes three times, the invalid punishment that the invalid and execution of card is taken in the end device etc.
(10) under the situation of unanimity, main frame judge the card user be correct card everyone, request input Withdrawal Amount.
(11) user imports the amount of money that requires drawing.
(12) if require the amount of money of drawing suitable, then send the cash of this amount of money, cash card is withdrawed from from end device, and carry out at the book keeping operation or the distribution of bankbook and handle detailed book, closing the transaction.And under password was recorded in situation in the cash card, this password was concluded the business as correct password, still, wipes this password afterwards from magnetic recording portion.
Shown in Fig. 2 (a) is the example of employed cash card in the current cash card treatment scheme shown in Fig. 1.In the figure, the 1st, the cash card main body by plastic cement etc. constitutes is formed with the magnetic stripe 2 of the information that write down and the arrow 3 of expression cash card direction of insertion in its face side.And, omitted diagram, still, required item is published is the embossing literal.
Use is called as the device that brush reads device (skimmer) can easily read the information that is written in the magnetic stripe, so, produce to make and forge card and use the loss of forging card time and again.
As its countermeasure, use the IC-card that is built-in with semiconductor memory to replace magnetic card, banks etc. are planning to popularize.
But even this IC-card also can read in the information of preserving in the storer, under the situation that cost is forged time, can not say so is perfectly safe.In addition, it is very expensive that IC-card is compared with magnetic card, can not expect to popularize rapidly.
Under the situation of bank cash card, only can use just, still in a country, under the situation of credit card, need also can use in foreign country, whole magnetic cards that will use in the whole world are the IC-card that credit card is replaced into uniform specification, and this in fact also is being impossible.
And, on cash card and credit card, to carry out embossing and process and be provided with information such as owner's name, these information also are used in magnetic information, so embossing information becomes forges the clue that blocking is done.
Meet with that these magnetic cards or IC-card are lost or stolen situation under, the owner notices this fact easily, still, returns after stolen under the situation in one's hands, particularly under the situation about returning, take place easily to use and forge the loss that card causes not noticing.
Not to prevent improper use by the forgery that prevents card but be used to the means of judging that whether suitable the card user is, used the password that constitutes by 4-digit number in the past.This password uses the number that can analogize time and again, and a lot of losses have taken place in the past.Recently, not only use to analogize but also to use and means supervision password such as take the photograph steathily and steal, utilize password to prevent improper use, this becomes extremely difficult.
Owing to forge the loss that card causes, a part has adopted bio-identification (biologicall test) technology of utilizing pattern recognition technique in order to prevent.The representative of biological identification technology has iris recognition, fingerprint recognition, palmmprint identification, refers to vein identification, palm vein identification, the identification of nail vein, among these, identification except iris recognition, contact-type and non-contact type are arranged, no matter be any, all need typing figure in advance, because the figure typing needs labour and time, authentication also to need the time, so use cost is very big.
Under the situation of contact-type, need directly contact with pick-up unit, so, exist on the health or physiological unplessantness displeasure.In addition, lose, in other cases, can not carry out biological identification in authentication section under the situation of authentication section damage or under the worst situation.In addition, in verification process, only carry out the part authentication, so this neither completely safe plan.
In addition,, use time of card or card processing unit not at one's side for the biological authentification system that can only use by the card owner, so, the entrusted agent block processing can not, this point is very inconvenient concerning the user.
As preventing one of means of forging, on credit card, bank note, security etc., on plastics, be equipped with and form irregular embossing hologram.This embossing hologram replication is very difficult, so, in fact can not forge the card that has the embossing hologram, but under current use-pattern, people are by visual these information that reads, so, can use similar embossing hologram to forge and use card etc.
Shown in Fig. 2 (b) is to have the example of cash card of carrying out the hologram of true and false authentication with sense organ.In the figure, the 1st, with the credit card main body of formations such as plastic cement, be formed with the magnetic stripe 2 of the information that write down and the arrow 3 of expression cash card direction of insertion in its face side.In addition, though the diagram of omission,, required item is published with the embossing literal.
For this cash card 1, be that front end inserts end device with the part that records arrow 3, be attached with the true and false trusted authentication chip 4 that for example constitutes by the embossing hologram at its leading section.
Under the situation of credit card, different with cash card, magnetic stripe is arranged on the back side of card, still, blocks identically to the direction of insertion of end device, and consequently, the read direction of the magnetic information of credit card is opposite with cash card.
For true and false trusted authentication chip 4, the operator who card is inserted end device with visual be that sense organ is confirmed illustrated figure " A ", rather than read by card terminal apparatus.
Because the individual's who differentiates ability has difference, even and same individual, also can create a difference owing to differentiate environment and psychological condition, physical qualification etc., so once bringing into play very big effect in the screening though carry out real and fake discrimination by sense organ, reliability is low.
For utilizing sense organ to carry out the true and false seriously, on the individual's who authenticates ability, there is deviation, even same individual also can there are differences owing to authenticating environment and psychological condition, physical qualification etc., thus, the bigger effect of performance in the primary screening, but reliability is lower.
Opening flat 6-124866 communique, spy the spy opens flat 6-318282 communique, spy and opens flat 7-220077 communique, spy and open flat 9-319849 communique, spy and open flat 11-180079 communique, spy and open flat 10-143621 communique, spy and open that 2000-47557 communique, spy are opened flat 2000-48146 communique, the spy opens the structure that wire ground reading of data has been shown in the 2002-74283 communique.
In the method that these known documents are put down in writing, anyly all read the embossing hologram with straight line along the long side direction of the card of the rectangular shape that has formed embossing hologram or diffraction grating (grating).Therefore, have device fairly simple, handle also simple such advantage, but the anti-forgery of itself is low.
In addition, open the authentication technique that has used diffraction grating shown in the flat 11-272836 communique the spy, open the authentication technique of the interference of having used embossing hologram and figure shown in the 2002-279480 communique the spy, open the authentication technique that has used embossing hologram and sub-image shown in the 2002-341733 communique the spy.
Opening flat 6-124866 communique, spy the spy opens flat 6-318282 communique, spy and opens flat 7-220077 communique, spy and open flat 9-319849 communique, spy and open flat 11-180079 communique, spy and open flat 10-143621 communique, spy and open 2000-47557 communique, spy and open the structure that flat 2000-48146 communique, spy are opened the ground of wire shown in 2002-74283 communique reading of data.
In the method that these known documents are put down in writing, anyly all read the embossing hologram with straight line along the long side direction of the card of the rectangular shape that has formed embossing hologram or diffraction grating (grid).Therefore, have device fairly simple, handle also such advantage easily, but the anti-forgery of itself is low.
In addition, open the authentication technique that has used diffraction grating shown in the flat 11-272836 communique the spy, open the authentication technique that has used embossing hologram and optical interference shown in the 2002-279480 communique the spy, open the authentication technique that has used embossing hologram and sub-image shown in the 2002-341733 communique the spy.
Utilize auxiliary implement to carry out in the real and fake discrimination, using the aperture plate etc., magnifier etc. of fine line, special line, miniature literal, special shape to amplify utensil, perhaps using the special filter that optical interference takes place to carry out real and fake discrimination.
Specifically, the material of performance special optical characteristics such as luminous base material, luminescent layer press mold, luminous printing ink, thermochromism printing ink, photochromic ink is sneaked among base material, luminescent layer press mold, the printing ink etc., use auxiliary implements such as particular filter, UV-lamp, but, these final authentications depend on people's sense organ, so reliability is lower.
Utilizing mechanical treatment to carry out in the true and false authentication, mechanically the characteristic that material is had detects and carries out true and false authentication, as detected object, has the detection of magnetic, light characteristic etc.
Specifically, exist: luminescent material, magnetic material are blended among base material, luminescent layer press mold, the printing ink etc., use checkout equipment to detect; Utilize OCR literal, magnetic stripe font code, magnetically or optically enclose the customizing messages of encode, use magnetic, optical detection apparatus to detect.
As utilizing mechanical treatment to carry out true and false authentication techniques; Shown in " financial circles Service と artifact メ ト リ Network ス " the capable financial research institute of this Silver of Ri (http://www.imes.boj.or.jp/japanese/jdps/2004/04-J-12.pdf) and " the 6th time feelings Reported セ キ ユ テ イ シ Application Port ジ ウ system " financial dividing line To け Ru artifact メ ト リ Network ス " mould Specifications " (http://www.imes.boj.or.jp/japanese/kinyu/2004/kk23-2-6.pdf): replace the intrinsic information of organism, the artifact character recognition system (artifact-metric system) of the artifact that does not have repeatability of random arrangement in medium.
In the artifact character recognition, utilize the magnetic figure of the quantity of electric charge at random, the resonance figure of electric conductivity optical fiber, the accidental formed figures such as sympathetic response figure of vibration sealing of magnetic chart shape, storage unit at random of magnetic chart shape, the magnetic stripe of magnetic chart shape, the recorded at random of image graphics, the magnetic optical fiber of anaglyph figure, the optical fiber of transparent figure, the polymer optical fiber of light reflective graphics, the optical fiber of shot-like particle.
Become and have " the card main information " that is added in " the card information-recording " that add when card issued the user, the manufacturing process that blocks in the item of the improper use of card or forgery.(take IC カ one De certificate face Pseudo-with reference to “ Even and make Fang Zhi Ji Intraoperative Ha Application De Block Star Network " Choi Service province printing office (http://www.npb.go.jp/ja/info/ichb.pdf))
The card information-recording is for printed when the hair fastener, the additional information of card main body, is equivalent to possessor's information, valid period etc. and issues relevant information.
Distorting of representational mode as improper use is the behavior of rewriting whole or a part of information-recording of card information-recording, wipes regular information and adds the wrongful information that writes.
The card main information is to remove the information that the card after the card information-recording self is had from the card of being issued, be with the physical form of card, main preprinted operation in the printed layers of the background style substrate of being enclosed and protection laminate layers etc. accompany the information of card matrix.
Forgery is the sharp practice that the card main body is carried out, by being that pattern or style etc. duplicate or imitate, and make approximate in appearance card and carry out to the information that accompany the card main body, specifically, utilize scanner etc. to read in pattern appended on the real card certificate face or style etc., add processing, revise, use printer to wait and carry out.
Forgery countermeasure technology at card itself only limits to printing technology, utilizes the combination of mode of printing, printing ink, printing style, though the technology that does not also play a decisive role is at present arranged a lot.
The true and false authentication method that authentication is forged is distinguished useful sense organ authentication substantially, is authenticated, authenticates with mechanical treatment with auxiliary implement.
Utilizing true and false authentication that sense organ carries out is that sense organ with mankind such as vision, senses of touch authenticates the true and false, the holograms that the color, watermark of main body arranged, appended style or color etc. change by changing the angle of observing in the authentication of the true and false of utilizing vision to carry out etc. have in the true and false authentication that utilizes sense of touch to carry out and detect appended concaveconvex shape, the texture of test card main body etc.Specifically, logo mark (logo-mark), sytlized font, anti-copying and scanning line, characteristic printing ink, hologram, optical change material, sub-image style etc. duplicate and duplicate is difficult, in addition, existing finger senses such as visually can easily carrying out the true and false authenticates, embossing is processed, it is concavo-convex to add, perforation to go up, visually carry out the true and false authenticates.
Fig. 3 illustrates the spy and opens the disclosed existing example that is equipped with by the card of the artifact feature identification chip of clipped wire in the flat 10-44650 communique, in the figure, (a) is overall diagram, (b) is sectional view, (c) is the enlarged drawing of card.
For this card 1, on the lighttight card matrix 7 that is formed with the opening 8 that true and false trusted authentication chip uses, be laminated with the lamellar artifact feature identification chip (artifact-metrics chip) 4 of the light-transmissive resin of having sneaked into clipped wire 5, stacked thereon card surface plate 6, this card surface plate 6 is formed with opening and is formed with magnetic stripe 2 and arrow 3 in the position identical with formed opening on the card matrix 7.
For clipped wire 5, do not have any systematicness ground and be not blended in the light-transmissive resin three-dimensionally, so, be that each artifact feature identification chip 4 is intrinsic via the configuration figure of the clipped wire 5 that opening observed.This is utilized, the light that sees through artifact feature identification chip 4 is photographed, thereby the configuration figure of observation clipped wire 5 can be discerned each artifact feature identification chip 4 and promptly block via opening.
The spy opens disclosed another existing example that the card of the artifact feature identification chip that is made of fiber is installed in the 2003-29636 communique shown in Fig. 4.In the figure, (a) being overall diagram, (b) is sectional view, (c) is the enlarged drawing of artifact feature identification chip.
For this card, in the opening of lighttight card matrix 1, embed artifact feature identification chip 8, and being formed with magnetic stripe 2 and arrow 3 on the surface of card matrix 1, this artifact feature identification chip 8 is sneaked into grid component 9 and short and small fiber 10 three-dimensionally and is constituted in transparent resin.In artifact feature identification chip 8, owing to the figure and the short and small fiber 10 of grid component 9 produces conoscope image.
It is intrinsic that this conoscope image is that each artifact feature identification chip 8 promptly blocks, and this is utilized, and takes the identification figure of the artifact feature identification chip 8 of true and false trusted authentication chip according to transmitted light or reflected light, to sticking into the row authentication.
Machinery for the such figure of living things feature recognition or artifact feature identification reads, and generally reads with camera head and carries out according to the pattern recognition technology.Therefore, there is the possibility of forging with reproduction technology.
Opening flat 6-124866 communique, spy the spy opens flat 6-318282 communique, spy and opens flat 7-220077 communique, spy and open flat 9-319849 communique, spy and open flat 11-180079 communique, spy and open flat 10-143621 communique, spy and open that 2000-47557 communique, spy are opened flat 2000-48146 communique, the spy opens the structure that wire ground reading of data has been shown in the 2002-74283 communique.
In the method that these known documents are put down in writing, anyly all read the embossing hologram with straight line along the long side direction of the card of the rectangular shape that has formed embossing hologram or diffraction grating (grating).Therefore, have device fairly simple, handle also simple such advantage, but the anti-forgery of itself is low.
In addition, open the recognition technology of having used diffraction grating shown in the flat 11-272836 communique the spy, open the recognition technology of having used embossing hologram and striped shown in the 2002-279480 communique the spy, open the recognition technology of having used embossing hologram and sub-image shown in the 2002-341733 communique the spy.
Like this, do not establish the technology of the true and false of judging card self, just can not realize the card that to forge.
Thereby, be unrealized and can not forge the technology of card.
Patent documentation 1: the spy opens flat 10-44650 communique
Patent documentation 2: the spy opens the 2003-29636 communique
Patent documentation 3: the spy opens flat 6-124866 communique
Patent documentation 4: the spy opens flat 6-318282 communique
Patent documentation 5: the spy opens flat 7-220077 communique
Patent documentation 6: the spy opens flat 9-319849 communique
Patent documentation 7: the spy opens flat 11-180079 communique
Patent documentation 8: the spy opens flat 11-272836 communique
Patent documentation 9: the spy opens flat 10-143621 communique
Patent documentation 10: the spy opens the 2000-47557 communique
Patent documentation 11: the spy opens the 2000-48146 communique
Patent documentation 12: the spy opens the 2000-66567 communique
Patent documentation 13: the spy opens the 2000-298880 communique
Patent documentation 14: the spy opens the 2002-74283 communique
Patent documentation 15: the spy opens the 2002-279480 communique
Patent documentation 16: the spy opens the 2002-341733 communique
Patent documentation 17: the spy opens the 2005-205897 communique
Non-patent literature 1: " financial circles Service と artifact メ ト リ Network ス " the capable financial research institute of this Silver of Ri (http://www.imes.boj.or.jp/japanese/jdps/2004/04-J-12.pdf)
Non-patent literature 2: " the 6th time feelings Reported セ キ ユ テ イ シ Application Port ジ ウ system " financial dividing line To け Ru artifact メ ト リ Network ス " mould Specifications " (http://www.imes.boj.or.jp/japanese/kinyu/2004/kk23-2-6.pdf)
Non-patent literature 3: “ Even take IC カ one De certificate face Pseudo-and make Fang Zhi Ji Intraoperative Ha Application De Block Star Network " Choi Service province printing office (http://www.npb.go.jp/ja/info/ichb.pdf)
Non-patent literature 4: Ri Longitude エ レ Network ト ロ ニ Network ス, No. 883
Summary of the invention
Provide the invention of structure, card disposal route and the card processing unit of following card in this application: can be general in the past cash card or credit card be increased basic change ground and improve security.
Therefore, will be fixed on the card indissociably by the true and false trusted authentication chip that embossing hologram or diffraction grating form.
To sticking into additional card true and false authenticate device in the device that row handles, in the detection of the information of true and false trusted authentication chip, except fixing card carries out, utilize the line scanning that moves forward into that is taken into the caused true and false trusted authentication chip of action by card.
Utilize the embossing hologram or the diffraction grating of interference of light to have spatial structure, so, except directly making the duplicate, can not duplicate according to prototype.So,, also can not use and forge card even as in the past, duplicated magnetic recording data or the interior data of IC chip.
And refusal uses under the situation that will carry out improper use, can avoid damage in possible trouble, perhaps tolerates the use of wrongful card to a certain extent, finally controls wrongful card, thereby determines improper user easily.Improper card use is prevented trouble before it happens or definite easily improper card user, thus, suppress improper use.
Description of drawings
Fig. 1 is the processing flow chart of current cash card.
Fig. 2 is the current cash card and the key diagram of credit card.
Fig. 3 is to use the example of the existing card of the artifact feature identification that is formed by metallics.
Fig. 4 is to use the example of the existing card of the artifact measurement that is formed by fibre plate.
Fig. 5 is to use the explanation of card of the present application of embossing hologram.
Fig. 6 be to use the embossing hologram true and false authentication information write example.
Fig. 7 is the explanation of true and false trusted authentication chip installation site.
Fig. 8 is the example by the true and false authentication information of the present invention of computer manufacture.
Fig. 9 is the example of the random number used in the truth identification chip of the present invention.
Figure 10 is the example arrangement of the random number used in truth identification chip of the present invention.
Figure 11 makes the random number used in the truth identification chip of the present invention example as binary number.
Figure 12 is the example that the random number used in the truth identification chip of the present invention is arranged as binary number.
Figure 13 is the increase example of the random number used in the truth identification chip of the present invention.
Figure 14 makes the increase random number used in the truth identification chip of the present invention example as binary number.
Figure 15 makes the increase random number used in the truth identification chip of the present invention example as quaternary number.
Figure 16 is the example that the random number used in the truth identification chip of the present invention is arranged as quaternary number.
Figure 17 is the explanation that is obtained the method for a plurality of true and false trusted authentication chips by a random number series.
Figure 18 is to use the explanation of the true and false trusted authentication chip reading device of camera head.
Figure 19 is to use the explanation of true and false trusted authentication chip reading device of the read element of arranged.
Figure 20 is to use the explanation of true and false trusted authentication chip reading device of the monochromatic reading device of arrayed.
Figure 21 is the structure of the monochromatic pick-up unit of arrayed.
Figure 22 is to use the explanation of real and fake discrimination chip reader of the polychrome reading unit of arrayed.
Figure 23 is the structure of the polychrome pick-up unit of arrayed.
Figure 24 is combination paraboloidal mirror and polygonal mirror and the explanation of the true and false trusted authentication chip reading device that constitutes.
Figure 25 is the explanation that utilizes the true and false trusted authentication chip reading device of the present invention of single read element.
Figure 26 is the explanation that utilizes the true and false trusted authentication chip reading device of the present invention of two read elements.
Figure 27 is the explanation of read path.
Figure 28 is the explanation of other read paths.
Figure 29 is the example of read path of the true and false trusted authentication chip of scale-of-two random number.
Figure 30 is the example that the unique point of the true and false trusted authentication chip of scale-of-two random number is extracted out.
Figure 31 is the example that the unique point of the true and false trusted authentication chip of quaternary random number is extracted out.
Figure 32 is the example of the true and false trusted authentication chip of scale-of-two random number being handled by simulation process.
Figure 33 is contraposition with mark, reads beginning end lines, the synchronizing signal example with mark.
Figure 34 is the example that the card true and false is distinguished treatment scheme.
Figure 35 is other examples that the card true and false is distinguished treatment scheme.
Figure 36 is another example that the card true and false is distinguished treatment scheme.
Description of symbols
1,11 card
2 magnetic stripes
3 arrows
4,8,11,12,15,18,21,46,78,124,126,128 true and false trusted authentication chips
5 metallicss
6,14 surface plate
7,13 substrates
9 grid
10 fibre plates
16,19,22,23,25,101,104,106,107,108 pits
17,20,24,103 do not form the part of pit
48 contraposition marks
49 moving directions read initial
50 moving directions read end lines
51,52 end index lines
111 read element matrixes
112,123,131,133 read elements
113,114 read element array shells
The red read element array of 115R
The green read element array of 115G
The blue read element array of 115B
119 camera heads
120 half tubular parabolic mirrors
121 light pass through the hole
122 polygonal mirrors
125,127 half tubular half-parabola reflector
130,132 housings
132,120 straight line paths
133 multi-thread paths
Embodiment
Below, with reference to accompanying drawing the optimal way that carries out an invention is described.
Fig. 5 illustrates the basic structure of the card that embossing hologram chip has been installed.In the figure, (a) being overall diagram, (b) is sectional view, (c)~(e) is the enlarged drawing of embossing hologram chip.
For this card 11, the surface plate 14 that is formed with opening has been installed on the card matrix 13 of opaqueness, in this opening, embed embossing hologram chip 12.In addition, on surface plate 14, be formed with magnetic stripe 2 and arrow 3.
Embossing hologram chip is made of the pit of the degree of depth of 1/4 wavelength of employed laser and the part that do not form pit, there is the part of pit, shoot laser is offset by incident laser, thus, detection is less than shoot laser, in the part that does not have pit, shoot laser is not offset by incident laser, and shoot laser is detected.
Under the situation of CD, employed laser is the infrared laser of λ=780nm, λ/4=195nm.Under the situation of DVD, use the red laser of λ=650nm, λ/4=151.25nm.Under the situation of DVD of future generation, the bluish violet color laser of λ=405nm, the Ultra-Violet Laser of λ=351nm, the extreme ultraviolet laser of λ=266nm are used in research, and λ/4 are that the degree of depth of pit is respectively 101.25nm, 87.75nm, 66.5nm.
The most basic structure has been shown (c), on hologram chip 15, has disposed the pit 16 of the 1/4 wavelength degree of depth of using laser and do not form the part 17 of pit with proper spacing.Under the situation of example shown in this figure, the solid line shown in the four-headed arrow represents that incident light and emergent light all exist, and the dotted line shown in the unidirectional arrow is represented incident light is arranged and do not had emergent light.
(d) show the example that the direction that makes laser tilts,, then can not read the data that write if there is not the information at pitch angle.In this embodiment, on hologram chip 18, dispose with proper spacing the 1/4 wavelength degree of depth of using laser inclination pit 19 and do not form the part 20 of the inclination of pit.
Under the situation of the example shown in this figure, the solid line shown in the four-headed arrow represents that incident light and emergent light all exist, and the dotted line shown in the unidirectional arrow is represented to have incident light and do not had emergent light.It is impossible that the embossing hologram chip that duplicates this structure is close to.In addition, the structure shown in (c) also can coexist with the structure (d).
(e) show the example of the laser that utilizes the multi-wavelength, if there is not the whole wavelength information of employed laser, then reading of the data that write is difficult.In this embodiment, on embossing hologram chip 21, dispose pit 25 of the 1/4 wavelength degree of depth of the pit 23 of the 1/4 wavelength degree of depth of the pit 22 of the 1/4 wavelength degree of depth of redness (R) laser, green (G) laser, blue (B) laser and the part 24 that does not form pit with proper spacing.
Under the situation of the example shown in this figure, the solid line shown in the four-headed arrow represents that incident light and emergent light all exist, and the dotted line shown in the unidirectional arrow is represented to have incident light and do not had emergent light.It is impossible that the embossing hologram chip that duplicates this structure is close to.And (d) structure shown in also can coexist with the structure (e).
True and false trusted authentication chip embodiment 1
The true and false authentication information that writes in pit is described by Fig. 6.In order to read in reliably, dispose the pit of expression information regularly.What represent with dot-and-dash line in the figure, is the configuration rule of pit.In the figure, be the example that utilizes single wavelength laser (a) and (b), write down identical information.(c) utilize multi-wavelength (being three-wavelength in this case) laser.
In Fig. 6 (a) and (b), (c), the pit of configuration record information at regular intervals.(a) corresponding with Fig. 5 (c), on the position of 101010110 information that write down embossing hologram chip basal body 15, form pit 101, protective seam 100 is set thereon.
True and false trusted authentication chip embodiment 2
(b) corresponding with Fig. 5 (d), in order to write down 101010110 information of embossing hologram chip basal body 18, on the position of information 1, form pit 104 with dip plane, on the position of information 0, form dip plane 103, protective seam 102 is set thereon.Also can form the dip plane and the pit at the pitch angle different, make that the information of carrying out detects on the direction different with these dip plane 103 and pit 104 with these angle of inclination.
True and false trusted authentication chip embodiment 3
(c) corresponding with Fig. 5 (e); in embossing hologram chip basal body 21, form: the pit 108 that " 00101010 " information that is formed by the 780nm infrared laser is used; the pit 107 that " 01000100 " information that is formed by 650nm red light laser is used; the pit 105 that " 10010001 " information that is formed by 405nm blue light laser is used forms protective seam 105 thereon.
True and false trusted authentication chip embodiment 4
In the true and false trusted authentication chip that utilizes machinery to read, do not need to put down in writing the figure that people such as literal or pattern can authenticate.In Fig. 8, the embodiment by the pit that is suitable for the true and false trusted authentication chip that two-value data that machinery reads constitutes that is made by computing machine is shown.
For this true and false authentication embossing hologram chip, 1024 two-value datas that are made of the embossing hologram are configured to 32 * 32 matrix, in the figure, the place that has write two-value data " 0 " represents that with blank the place that has write two-value data " 1 " is represented with " * ".
The method that obtains this two-value data is described.The radioactive ray that nuclear fission to utilizing radiomaterial shown in Figure 9 is radiated detect and obtain, the example of the true random number of sexadecimal 256 (digit) (truerandom number), for encryption key employed random numbers such as (crypt key), provide as such sexadecimal number usually.
In Figure 10, the matrix that the sexadecimal random number shown in Fig. 9 is arranged in 8 row, 32 row is shown.This sexadecimal number can be replaced into 4 bits and represent.
Promptly, " 0 " of sexadecimal number shows with " 0000 " of binary number, similarly, " 1 " usefulness " 0001 " performance, " 2 " usefulness " 0010 " performance, " 3 " usefulness " 0011 " performance, " 4 " usefulness " 0100 " performance, " 5 " usefulness " 0101 " performance, " 6 " usefulness " 0110 " performance, " 7 " usefulness " 0111 " performance, " 8 " usefulness " 1000 " performance, " 9 " usefulness " 1001 " performance, " A " usefulness " 1010 " performance, " B " usefulness " 1011 " performance, " C " usefulness " 1100 " performance, " D " usefulness " 1101 " performance, " E " usefulness " 1110 " performance, " F " usefulness " 1111 " performance.
Based on this, 256 sexadecimal random number shown in Figure 9 is replaced into after the scale-of-two random number as shown in figure 11.One sexadecimal number replaces with tetrad, so 256 sexadecimal number becomes 256 * 4=1024 binary number.These binary numbers directly obtain at random number generator, so, in this case, do not need this replacement operator.
It is arranged in the matrix of 8 row, 32 row shown in Figure 10, and the position with binary number shown in Figure 12 is the matrix that unit is arranged in 32 row, 32 row.
At last, the place that is equivalent to binary number 0 in the matrix of Figure 12 not writing information and keep intact, at the local writing information that is equivalent to 1 " * " expression, thereby obtain true and false trusted authentication chip shown in Figure 8.
The true and false trusted authentication chip of Xing Chenging has the true and false authentication information of 32 row * 32 row * 1 bit (bit)=1024 bits, the i.e. true and false authenticate key of 1024 bits like this.
Embossing hologram chip shown in Fig. 6 (c) can use the light of a plurality of wavelength.Therefore, next illustrate as two-value data be suitable for that machinery reads and by the bowl configurations example of the card true and false trusted authentication chip of the light of the general redness of the utilization of computer manufacture (R), green (G) and blue (B).
For these " R ", " G ", " B ", also comprise " 0 " of the state that does not write data, can show one of four states altogether.In other words, they can be handled as quaternary number, promptly " 00 ", " 01 ", " 10 ", " 11 " show enough four 2 bit numbers of quaternary number energy.
Figure 13 illustrates 256 sexadecimal random number shown in Figure 9 with the figure shown in 256 the sexadecimal random number before.At this, " sexadecimal random number series a " is random number series same as shown in Figure 9, and " sexadecimal random number series b " is the random number series of " sexadecimal random number series a " front.
In Figure 14, illustrate this sexadecimal random number series is transformed into the scale-of-two random number series and show as 0 in order to be transformed into, the quaternary number of R, G, B and random number series after dividing by per 2 bits.
And, as shown in figure 15, binary number " 00 " is transformed into quaternary number " 0 ", binary number " 01 " is transformed into quaternary number " R ", binary number " 10 " is transformed into quaternary number " G ", binary number " 11 " is transformed into quaternary number " B ".
As shown in figure 16, with Fig. 8 or binary number shown in Figure 12 in the same manner, the quaternary number that obtains like this is arranged in the matrixes of 32 row * 32 row.The true and false trusted authentication chip of Xing Chenging has the true and false authentication information of 32 row * 32 row * 2 bits=2048 bits, in other words has a true and false authenticate key of 2048 bits like this.
Real and fake discrimination chip embodiment 5
Obtain the method for a plurality of true and false trusted authentication chips by a random number series according to Figure 17 explanation.In the figure, (a) and (b), (c), (d) are respectively 16 * 16 the matrix figures that the matrix figure according to 32 * 32 shown in Fig. 8 obtains, (a) with coordinate (0,0) being initial point, is initial point with coordinate (1,0) (b), (c) with coordinate (0,1) being initial point, is starting point with coordinate (1,1) (d).Like this, can obtain a plurality of matrix figures by a matrix figure that obtains from random number series shown in Figure 6.
In order to obtain a plurality of matrix figures, in addition, can utilize use starting position that changes random number series shown in Figure 6 or the whole bag of tricks such as making starting position that change matrix figure shown in Figure 7 from a random number series.
Thus, the card issuer can carry out the secret keeping as main random number series with a random number series, and can obtain a plurality of matrix figures based on this main random number series.In addition, a plurality of matrix figures can automatically manage according to former dot information.
Embodiment utilization shown in Fig. 8, Figure 12 and Figure 17 is with the binary number record true and false authentication information of 1 bit performance, and the embodiment utilization shown in Figure 16 is with the quaternary number record true and false authentication information of 2 bits performance.As these prolongation, also can use with the existing octal numeral of 3 bit tables, with the existing sexadecimal number of 4 bit tables.
True and false trusted authentication chip installation site
Fig. 7 illustrates the installation site of the true and false trusted authentication chip with these structures.Installation site for true and false trusted authentication chip 46, except the position of card main body substantial middle shown in Figure 5, also can be the lower rear position shown in the bottom center position shown in the lower front end position shown in the rear positions placed in the middle shown in the middle position placed in the middle shown in the front position placed in the middle shown in Fig. 7 (a), (b), (c), (d), (e), (f).Though the top position also can,, under the situation of the possibility that the information that exists influence from magnetic stripe reads, preferably avoid being configured in the top position.
Reading device embodiment 1
To the hologram chip is that reading of true and false trusted authentication chip describes.In read method, have: the method that the hologram chip is directly read as face, the method that face is read as the set of line and the method that face is read as the set of point.
The example of the camera head of the basic structure of use of the method that shown in Figure 18 is directly reads the hologram chip as face.From the card main body 11 that constitutes by card substrate 13, card upper surface panel 14, hologram chip 15, read hologram chip 15 with camera head 110, use pattern recognition technique to authenticate.
When card 11 was taken in the reading device and stops, the hologram chip 15 of 110 pairs of never illustrated laser beam source irradiations of camera head was photographed, and according to the image after the photography hologram chip 15 is authenticated, and consequently, the true and false of card 11 is certified.
Reading device embodiment 2
In Figure 19, the detecting element by matrix configuration is constituted and the structure example of planar the reading device that reads describes.In the figure, (a) being the figure of the summary structure of expression reading device, (b) is the figure of the corresponding relation of expression card and reading device.In the figure, the 11st, the card main body, the 13rd, substrate, the 14th, upper surface panel, the 15th, as the true and false trusted authentication chip of hologram chip.The 111st, to cover the big or small read element matrix that disposes small-sized read element 112 of hiding true and false trusted authentication chip 15 planarly, each read element is made of light source and photo detector, this light source is made of semiconductor laser etc., and this photo detector is made of light emitting diode etc.
When card 11 was taken in the reading device and stops, true and false trusted authentication chip 15 was positioned under the planar read element matrix 111, and read element matrix 111 reads the true and false authentication information of true and false trusted authentication chip 15.
Reading device embodiment 3
The device that the surface of true and false trusted authentication chip is read as the set of line is described.
Shown in Figure 20 is the example of read element array-like ground configuration.In the figure, (a) being the figure of summary structure of the test section of expression reading device, (b) is the expression card and the figure of the corresponding relation of the read element of array-like.Card 11 among this figure is identical with the card shown in Figure 19, so omit the explanation to card.
In the figure, the 113rd, the housing with length of growing slightly than the moving direction width of true and false trusted authentication chip 15, wherein, a plurality of read elements 112 are configured to wire, constitute the read element array, each read element is made of light source and photo detector, and this light source is made of semiconductor laser etc., and this photo detector is made of light emitting diode etc.
In this reading device, when card 11 is taken in the card reading device, under the read element array.At this moment, the read element 112 of array-like configuration reads the true and false authentication information in the true and false trusted authentication chip 15.
Figure 21 represents the example arrangement of the read element of reading device shown in Figure 20.Shown in (a), on base station, 32 read elements that will from " D00 " to " D31 " are arranged to row.And as arrangement, shown in (b), it is also passable that reading unit " D00 " to " D31 " is made zigzag arrangement.
Reading device embodiment 4
It is shown in Figure 22 that to utilize quaternary number shown in Figure 16 be the structure example of the card identification apparatus under the situation of different multiple color.In this example,, in housing 114, accommodate red read element array 115R, green read element array 115G, blue read element array 115B based on the read element array shown in Figure 20.
These red read element array 115R, green read element array 115G, blue read element array 115B are illustrations, and other any color combination can certainly.
In Figure 23, the structure example of the read element array when use laser R, laser G shown in Figure 22, laser B are shown.Concerning this read element array, respectively 32 laser R read element arrays " R00 "~" R31 ", laser G read element array " G00 "~" G31 ", laser B read element array " B00 "~" B31 " are arranged in three row.
Reading device embodiment 5
In the exploitation of DVD of future generation, use optical head or three-wavelength laser instrument have been studied, and use and the corresponding photodetector of three-wavelength detect, this shaven head uses optical system to use the laser of laser instrument integrated with laser instrument, DVD with laser instrument, DVD of future generation from CD, and this three-wavelength laser instrument can be by three kinds of laser of an element emission.(with reference to Nikkei electron, No. 883 the 119th page, 2004.9.27 distribution) if this photodetector is arranged in row to be used, then utilize the structure identical with Figure 20, can constitute the read element array of laser R, laser G, laser B.
Reading device embodiment 6
The reading device of new construction shown in Figure 24.The light scanning unit that polygon prismatic mirror (polygonal mirror) reflection lasering beam that utilization is rotated uses uses in laser beam printer etc.For this scanning element, can only utilize rotatablely moving of polygonal mirror to carry out photoscanning, still, the folded light beam that obtains becomes radial and is reflected, so, incide to the light beam out of plumb object portion.Therefore, for the photoscanning that utilizes polygonal mirror to carry out, can not say so is suitable for reading the mode of using in the detecting unit of hologram chip of information in the degree of depth of utilizing pit and incident light wavelength.
As the mode that obtains parallel beam, in reflecting telescope and parabola antenna, utilize parabolic.The relation of parabolic and parallel rays has been shown among Figure 24 (a).In the figure, what be designated as X is X-axis, and what be designated as Y is and the Y-axis of X-axis quadrature that O is an initial point.P shows as Y=-X 2Para-curve.In this para-curve, focal point F is positioned at the position of X=0, Y=-1/4, is parallel to the straight line polished object line P reflex time of Y-axis, all focuses on focal point F.On the contrary, be straight line polished object line 100 reflex times of basic point with the focal point F, become parallel with Y-axis.
In Figure 24 (b), show and use the basic structure that this principle reads the device of embossing hologram.In the figure, the 120th, have paraboloidal catoptron, form half tubular that on direction, has length perpendicular to paper.And, on the position of the initial point that is equivalent to Figure 24 (a), form the light that light is passed through and pass through hole 121.And, have the parallel rotation axis of extending direction axle with half tubular parabolic mirror 120 at the focus place of half tubular parabolic mirror 120, and configuration has the polygon mirror (polygonal mirror) 122 of polygon reflecting surface.In addition, the 124th, the hologram chip.
By incided on the polygonal mirror 122 by hole 121 by light at emitted laser Shu Guang on the Y direction of Figure 24 (a) by light light-emitting component 123.The laser beam light that incides on the polygonal mirror is reflected, and reflection on half tubular parabolic mirror 120, incides on the hologram chip 124.
Because polygonal mirror 122 is configured in the focus place of half tubular parabolic mirror 120, so, reflected by polygonal mirror 122 and incide laser beam light on the half tubular parabolic mirror 120 by secondary reflection again, reflex to on the parallel direction of the direct of travel that is subjected to 123 emitted laser Shu Guang of light light-emitting component, incide on the hologram chip 124.Incide that laser beam light on the pit of hologram chip 124 is not cancelled and when being reflected,, reflection lasering beam light being incided be subjected on the light light-emitting component 123 oppositely along the path identical with incoming laser beam light.As can understanding from this explanation, from be subjected to light light-emitting component 123 emitted laser bundle light all with hologram chip 124 incident vertically.
Reading device embodiment 7
In the hologram chip reader shown in Figure 24 (b), to observe from being subjected to light light-emitting component 123, the information of hologram chip 124 of part that is equivalent to the rear side of polygonal mirror 122 can not read.Though can in this part, not write required information or write unwanted information, but, according to the structure shown in Figure 24 (c), be not equivalent to the part of the rear side of polygonal mirror 122, can read the full detail that is written in the hologram chip 124.
Shown in Figure 24 (c) is the basic structure that is used for above-mentioned purpose, uses half of half tubular parabolic mirror.In the figure, the 125th, have paraboloidal catoptron, but only utilize the X of Figure 24 (a) to form half tubular that on direction, has length perpendicular to paper for negative part.In addition, because do not need, do not pass through hole 121 so do not form the light that forms among Figure 24 (b).And at the focus place of half tubular half-parabola reflector 125, configuration has the turning axle parallel with the extending direction axle of half tubular half-parabola reflector 125 and has the polygon mirror (polygonal mirror) 122 of polygon reflecting surface.In addition, the 126th, embossing hologram chip.
By reflected by polygonal mirror 122 to polygonal mirror 122 emitted laser Shu Guang by light light-emitting component 123, incide on the half tubular half-parabola reflector 125 and be reflected, impinge perpendicularly on the hologram chip 126.In this holographic read-out device, to observe from being subjected to light light-emitting component 123, the hologram chip 124 of part that is equivalent to the rear side of polygonal mirror 122 only is the end, so the influence that the part that can not read is brought is little.
Reading device embodiment 8
And, shown in Figure 24 (d), employing make the littler and polygonal mirror 122 of the central part of half barrel parabolic mirror 127 not with half barrel parabolic mirror, 127 opposed off-set constructions, thus, make the part complete obiteration that to read, can read the information that is written in embossing hologram chip 128 all parts.
Reading device embodiment 9
With a plurality of wavelength the reading device of a plurality of Figure 24 (b), (c), (d) is set accordingly, thereby can reads a plurality of wavelength.
Reading device embodiment 10
Explanation is read the face of true and false trusted authentication chip as the set of point reading device.In Figure 25, show the reading device that uses single read element.In Figure 25, (a) be the summary structure of the relation of card and reading device, (b) be the key diagram of Data Detection method.In the figure, the 11st, the card main body, the 13rd, substrate, the 14th, the card upper surface panel, the 15th, true and false trusted authentication chip, the 131st, read element, the 130th, the housing of harvesting read element 131, this read element 131 with card 11 the direction that is taken into the direction quadrature on move.
To with the moving of card 11 the direction that is taken into the direction quadrature, can utilize some the simulation rectilinear motion that causes as rotatablely moving of fulcrum, the rectilinear motion that causes to the rectilinear motion conversion from rotatablely moving or the suitable motions such as rectilinear motion that cause by linear motor etc.At the typical example of mobile route shown in (b), in this example,, move on the direction of in (b), representing with arrow with even velocity, the straight line path 132 after synthetic with the moving direction of card itself moves.Read element 131 might not move, also can move to the optional position of blocking on 11 the direction that is taken into the direction quadrature on use regularly.
Reading device embodiment 11
Reading device shown in Figure 25 uses single read element, but, as shown in figure 26, it is a plurality of making this read element, thereby can read by a plurality of paths, can improve reliability of reading, still, because the information that should handle is the information of wire, so the burden of handling can not become big.
In Figure 26, (a) be the summary structure of the relation of card and reading device, (b) be the key diagram of detection method.Card 11 among this figure is identical with the card 11 shown in Figure 25, so omit the explanation to card.
For this embodiment, except first reading device that constitutes by read element 131 and housing 130 of embodiment shown in Figure 25, also has second reading device that constitutes by read element 132 and housing 133.
Second reading device that is made of read element 132 and housing 133 shown in this figure moves on the direction opposite with the moving direction of first reading device that is made of read element 131 and housing 130, and still, moving direction also can be identical.
The typical example in path has been shown (b), in this embodiment, has moved on the direction that first reading device and second reading device are represented with arrow respectively in (b) with even velocity, move in the path 132,120 after synthesizing along the moving direction with card itself.
Read path
Exist because the possibility of error is read in the generation such as bad of tracking error or reading device.Under these circumstances, in Figure 27, shown in 134, read by a plurality of read elements simultaneously, utilize its mean value or most decision, determine the final information that reads.
Reading device embodiment 12
The situation that is applied to Figure 12 and true and false trusted authentication chip shown in Figure 16 is described.
For the convenience that illustrates, use Figure 29 that the example that has used binary number shown in Figure 12 is described.This also can similarly be applied to use the example of quaternary number shown in Figure 16.
In Figure 29, the true and false verify data that detects on the path from the linearity of coordinate (0,0) towards (31,31) is 11000101001001101010101101110111.In addition, the true and false verify data that detects on the path from the linearity of coordinate (0,31) towards (31,0) is 11100101001010000000110000010011.
This detection path is not limited to the path shown in Figure 29, for example, can adopt free routing shown in Figure 28, and, also can read middle change each the execution.
In addition, also can after reading, in machinery, carry out coordinate transform.
For the combination in such Data Detection path,, also be the so abundant big numerals of 3232 ≈ 1048 even do not return under such condition in the Data Detection path.Although like this, in order to compare, the information of the figure of preserving in advance in reading device also only is 1024 bits.
In addition, for the example of quaternary number shown in Figure 16, compare with the example of quaternary number, the different quantity of information of the figure that compares for detection information that only are are increased to 2048 bits, so omit explanation.
Read path
Several examples of read path shown in Figure 28.(a)~(d) be to use the example of single information read path, (e)~(f) be to use the example of two read paths.In addition, also can make read path is more than three.
For these read paths, also can realize by the read element of selecting, switch Figure 21 and detection arrays shown in Figure 23.For example, in detection arrays shown in Figure 21, the detecting element that calls over D00, D01, D02, D03...D28, D29, D30, D31 obtains path shown in Figure 25 132.Read path is not limited to these examples, can adopt path arbitrarily.And, also can carry out electrical readout with irregular order.
The method that the unique point extracting method used in the living things feature recognition is differentiated the true and false of Figure 12 and true and false trusted authentication chip shown in Figure 16 that is applied in is described.According to Figure 30, the method that the true and false of the true and false trusted authentication chip that the binary number information by 0,1 shown in Figure 12 is formed authenticates is described.In the figure, continuous " 0 " represents that with the white black mark of putting upside down in the same manner, " 1 " continuous more than four is represented with the encirclement mark more than four.
For example, " 0000 " has from coordinate (16,1) ... the beginning 13.
" 00000 " has from coordinate (15,5) ... the beginning 7.
" 000000 " has from 1 of coordinate (13,31) beginning.
" 0000000 " has from 3 of coordinate (24,2) beginning.
" 000000000000 " has from 1 of coordinate (6,12) beginning.
" 00000000000000 " has from 1 of coordinate (7,15) beginning.
" 1111 " have from coordinate (14,4) ... the beginning 12.
" 11111 " have from coordinate (0,7) ... the beginning 8.
" 111111 " have from 1 of coordinate (19,1) beginning.
" 1111111 " have from 1 of coordinate (12,19) beginning.
" 11111111 " have from coordinate (17,6) ... the beginning 2.
" 1111111111 " have from 1 of coordinate (14,3) beginning.
Detect these unique points respectively, detect their starting position coordinate, thus, can the true and false of true and false trusted authentication chip be authenticated.
Reading device embodiment 13
Utilize Figure 31, the method that the true and false of using the true and false trusted authentication chip that quaternary number shown in Figure 16 forms is authenticated is described.As shown in figure 16, in this matrix, as unique point, 5 " 000 ", 3 " 0000 ", 0 " 00000 ", 2 " 000000 " are transversely arranged.
In addition, at transversely arranged 9 " RRR ", 4 " RRRR ", 0 " RRRRR ".
In addition, at transversely arranged 5 " GGG ", 4 " GGGG ", 1 " GGGGG ".
In addition, at transversely arranged 8 " BBB ", 0 " BBBB ", 3 " BBBBB ".
Detect these unique points respectively, detect their starting position coordinate, thus, can the true and false of true and false trusted authentication chip be authenticated.For the unique point of being extracted out, except transversely arranged be one row same authenticated information, also can utilize the identical authentication information that vertically is arranged as row, the identical authentication information that becomes hook to arrange, and, also can utilize the particular arrangement of determining by different authentication informations such as " 0RGB ".
And, using under the situation of two value informations, use the authentication information in interstage, the grey of the two-stage of the centre of black two value informations in vain for example, thus, make quaternary number.For such structure, not only more difficult forgery, and if utilize medium tone in the binary message to be 0 severally use as puppet, the puzzled of adulterator becomes big.
For the utilization of medium tone, under the situation of quaternary information such as use 0, R, G, B, also be same, also can utilize 3 octal numeral, 4 sexadecimal number etc.
Illustrated true and false authentication method so far is the method for the true and false authentication information of digitized record being carried out digitized processing, still, in Figure 32, the structure of the true and false authentication information of digitized record being carried out simulation process is shown.
In the figure, for example use Figure 25 or true and false trusted authentication chip reading device shown in Figure 26, scan with the figure of 132 and 120 paths of representing the true and false trusted authentication chip shown in (a), thus, obtain (b) and (c) shown in electric signal, these electric signal figures and the regular electric signal figure of being stored are compared, thereby the true and false of card true and false authentication body and card itself is authenticated.
Reading device embodiment 14
From the viewpoint strict regulations cash card of versatility and the physical specification of credit card, so the physical specification of the parts of She Zhiing is also very strict certainly thereon.But, can not negate the possibility that produces distortion owing to excessive use.
In order to tackle such situation, the preferred contraposition shown in Figure 33 mark 48 that in true and false trusted authentication chip, forms in advance.With mark, can be one for contraposition the most simply, still,, be provided with a plurality of in order to carry out contraposition more reliably.
In addition, contraposition is not only useful in wire reads with mark, and also is useful in planar the reading of using camera head.
In order to read more reliably, be also used as the contraposition mark, the reading the starting position and read end position of card identification body, be provided with arbitrarily that mark, for example moving direction read initial 49 and moving direction reads end lines 50 and end index line 51,52 further is set.
Relative motion by card identification body and reading device blocks reading of information on the identification body, so, in order to read reliably, need make card discern the synchronized movement of body and reading device.Therefore, if on card identification body, form the mark 53 that synchronizing signal is used in advance, just can make the motion of reading device and reading synchronously of mark.
In addition, also can utilize in the signal normalization when signal Processing (normalization) and read the mark that beginning, end lines and/or synchronizing signal are used.
These contrapositions with mark, read the mark that beginning, end lines and/or synchronizing signal use and all constitute by the fluorescent material particle, for example, form by the suitable printing element as ink-jet printer.
Treatment scheme embodiment 1
Embodiment in the true and false of card shown in Figure 34~Figure 36 authentication processing flow process.That shown in Figure 34 is the embodiment 1 of basic structure.
(1) the card user is front end when being inserted into the card insert opening of end device such as ATM with cash card with arrow portion, and the sensor of card insert opening detects this, and card is taken in the auto levelizer.
When (2) being taken into card, end device reads in card information from the magnetic recording portion of card.
(3) end device judges whether the card that is inserted is the card that enough this end devices of energy are handled.
(4) can not be confirmed to be according to the card information that is read under the situation that expression can handle, perhaps, even if regular card and because damaged or stained etc. and can not read under the situation of card information, end device will block inappropriate card that conduct can not handle and withdraw from.
(5), under the mechanical scanning of moving of the card when being taken into or the state that after card is taken into, stops, reading in the true and false authentication information that is write in the true and false trusted authentication chip with the utilization card for end device.
(6) end device judges whether the true and false authentication information that is read in is proper.
(7) be judged as the true and false authentication information when incorrect when end device, the card that is inserted is judged as the card that is not regular, from end device, card is withdrawed from, and end process.
And, the judgement of the legitimacy of true and false authentication information with and subsequent the processing of card also can handle parallel carrying out with other.
(8) it is in the right season being judged as true and false authentication information at end device, the withdraw the money further input operation of the amount of money etc. of request user.
(9) user is according to the withdraw the money input operation of amount of money etc. of request.
(10) main frame judges whether the content of input operation of the amount of money of withdrawing the money etc. is suitable.
(11) be judged as because the content of the input operation of the former thereby amount of money that causes withdrawing the money such as Sorry, your ticket has not enough value etc. when improper, will be blocked and withdraw from from end device at main frame, and end process.
(12) be judged as the content of input operation of the amount of money of withdrawing the money etc. when suitable when main frame, export, will block and from end device, withdraw from according to withdrawing the money etc., and end process.
Treatment scheme embodiment 2
The embodiment 2 of card true and false authentication processing flow process shown in Figure 35.In the example shown in Figure 34, when card true and false authentication information is incorrect, will blocks from end device and withdraw from, relative therewith, for this card true and false authentication processing flow process, when the card authentication information is incorrect, card is taken in the end device, give the alarm.The easy like this exposure of carrying out wrongful card.
(1) the card user is front end when being inserted into the card insert opening of end device such as ATM with cash card with arrow portion, and the sensor of card insert opening detects this, and card is taken in the auto levelizer.
(2) when being taken into card, end device reads in card information from the magnetic recording portion of card.
(3) end device judges whether the card that inserts is the card that enough this end devices of energy are handled.
(4) under the situation of the information that can not confirm according to the card information that is read in to represent to handle, perhaps, even if regular card and because damaged or stained etc. and can not read under the situation of card information, end device will block inappropriate card that conduct can not handle and withdraw from.
(5), under the mechanical scanning of moving of the card when being taken into or the state that after card is taken into, stops the true and false authentication information that is write in true and false trusted authentication chip is read in the utilization card for end device.
(6) end device judges whether the true and false authentication information that is read in is correct.
(7) be judged as the true and false authentication information when improper at end device, the card that is inserted is judged as the card that is not regular, card is stored in the end device, and, give the alarm.
If this alarm only sending away from the place of terminating machine and carry out the fault demonstration in terminating machine, is then controlled irregular card user easily.
In addition, the judgement of the legitimacy of true and false authentication information with and subsequent the processing of card also can handle parallel carrying out with other.
(8) end device is when to be judged as true and false authentication information be regular information, the withdraw the money further input operation of the amount of money etc. of request user.
(9) user is according to request, the input operation of the amount of money of withdrawing the money etc.
(10) main frame judges whether the content of input operation of the amount of money of withdrawing the money etc. is suitable.
(11) content of input operation that is judged as the amount of money of withdrawing the money etc. at main frame will be blocked and withdraw from from end device because Sorry, your ticket has not enough value etc. when former thereby improper, and end process.
(12) be judged as the content of input operation of the amount of money of withdrawing the money etc. when suitable at main frame, export, will block and from end device, withdraw from according to withdrawing the money etc., and end process.
Treatment scheme embodiment 3
The embodiment 3 of card true and false authentication processing flow process shown in Figure 36.Among the embodiment 2 of card true and false authentication processing flow process shown in Figure 35, when true and false authentication information is incorrect, directly card is taken in the end device and only and gives the alarm, with respect to this, for this card true and false authentication processing flow process, the card user is operated.Thus, can carry out the exposure of improper card reliably.
When (1) the card user was the card insert opening of the front end end device that is inserted into ATM etc. with cash card with arrow portion, the sensor of card insert opening detected this, and card is taken in the auto levelizer.
(2) when being taken into card, end device reads in card information from the magnetic recording portion of card.
(3) end device judges whether the card that is inserted is the card that enough this end devices of energy are handled.
(4) under the situation of the information that can not confirm according to the card information that is read in to represent to handle, perhaps, even if regular card and because breakage or dirt etc. and can not read under the situation of card information, end device will block inappropriate card that conduct can not handle and withdraw from.
Under the mechanical scanning of moving of the card when (5) end device is taken into to utilize card or the state that after card is taken into, stops, the true and false authentication information that is write in true and false trusted authentication chip is read in.
(6) end device judges whether the card true and false authentication information that is read in is correct.
(7) end device is judged as the true and false authentication information when incorrect, the withdraw the money further input operation of the amount of money etc. of request user.
In addition, the judgement of the legitimacy of true and false authentication information with and subsequent the card processing also can carry out concurrently with other processing.
(8) user is according to request, the further input operation of the amount of money of withdrawing the money etc.
(9) will block and receive and keep in the end device, and give the alarm.
If this alarm only sending away from the place of terminating machine and carry out the fault demonstration in terminating machine, is then controlled irregular card user easily.
(10) it is in the right season being judged as card true and false authentication information at end device, the withdraw the money further input operation of the amount of money etc. of request user.
(11) user is according to the withdraw the money input operation of amount of money etc. of request.
(12) main frame judges whether the content of input operation of the amount of money of withdrawing the money etc. is suitable.
(14) content of input operation that is judged as the amount of money of withdrawing the money etc. at main frame will be blocked and withdraw from from end device because Sorry, your ticket has not enough value etc. when former thereby inappropriate, and end process.
Make such structure, thus, not only wrongful card user uses the time of end device elongated, be used for its time of controlling elongated, and it is operated, thus, can gather evidences such as fingerprint.At this moment, when adopting the contact-making switch of contact-type, the collection of fingerprint becomes more reliable.
From the viewpoint of versatility, the physical specification of cash card and credit card is by strict regulations, so the physical specification of the parts of She Zhiing is also strict certainly thereon.But, can not negate owing to excessively using the possibility that produces distortion.
Utilizability on the industry
True and false trusted authentication chip discussed above, the card with true and false trusted authentication chip can be applied to cash in bank Card, credit card, prepaid card, some card, security, ID card, mechanism's pass, certificate etc.
In addition, also can replace embossing hologram chip, use by the incident light identical with the embossing hologram and anti-Penetrating interference of light produces optical figuring, namely sends pearly luster (nacreous) or have iris (iridescent) natural material or the chip of artificial material.
Claims (according to the modification of the 19th of treaty)
1. (after revising) a kind of card is made of substrate and true and false trusted authentication chip, wherein,
Described true and false trusted authentication chip is layered on the described substrate, is formed with the embossing hologram in described true and false trusted authentication chip, and this embossing hologram is that the pit of 1/4 wavelength of incident light and the part that does not form described pit constitute by the degree of depth.
2. (revise afterwards) card as claimed in claim 1, wherein,
Also be laminated with surface plate on described true and false trusted authentication chip, described surface plate is by constituting at the high material of the permeability of described incident light.
3. (revise afterwards) card as claim 1 or claim 2, wherein,
Described pit is the pit of the vertical same depth that forms in described chip.
4. as the card of claim 1 or claim 2, wherein,
Described embossing hologram is made of the pit of the different depth that vertically forms in described chip.
5. as the card of claim 1 or claim 2, wherein,
Described embossing hologram is made of the pit of the same depth that forms in described chip medium dip.
6. as the card of claim 1 or claim 2, wherein,
Described embossing hologram is made of the pit of the different depth that forms in described chip medium dip.
7. as claim 1,2,3,4,5 or 6 card, wherein,
Described pit is configured to rectangular.
8. card as claimed in claim 7, wherein,
Described pit utilizes the configuration of scale-of-two random number.
9. card as claimed in claim 8, wherein,
Described pit is a part of utilizing the pit of scale-of-two random number configuration.
10. card as claimed in claim 7, wherein,
Described pit utilizes the configuration of quaternary random number.
11. as the card of claim 10, wherein,
Described pit is a part of utilizing the pit of quaternary random number configuration.
12. (revise back) a kind of embossing hologram chip reader reads the embossing hologram of the true and false trusted authentication chip that is installed on the card, this embossing hologram is that the pit of 1/4 wavelength of incident light and the part that does not form described pit constitute by the degree of depth, wherein,
Described reading device has with described true and false trusted authentication chip incident light of the same area and is subjected to the light light-emitting element matrix.
13. (revise back) a kind of embossing hologram chip reader reads the embossing hologram of the true and false trusted authentication chip that is installed on the card, this embossing hologram is that the pit of 1/4 wavelength of incident light and the part that does not form described pit constitute by the degree of depth, wherein,
The incident light that described reading device has with described true and false trusted authentication chip same widths is subjected to the light light-emitting device array.
14. (revise back) a kind of embossing hologram chip reader reads the embossing hologram of the true and false trusted authentication chip that is installed on the card, this embossing hologram is that the pit of 1/4 wavelength of incident light and the part that does not form described pit constitute by the degree of depth, wherein,
Catoptron, polygonal mirror, incident light that described embossing hologram chip reader possesses parabolic tubular are subjected to the light light-emitting component, the turning axle of described polygonal mirror is configured in the focus of described catoptron, and incident light is subjected to the light light-emitting component to be configured in the behind of described catoptron.
(15. revise back) as the embossing hologram chip reader of claim 14, wherein,
Described parabola is whole parabolic, is formed with light by the hole in the central authorities of described catoptron, and described incident light is subjected to the light light-emitting component to be configured in the behind of described catoptron.
(16. revise back) as the embossing hologram chip reader of claim 14, wherein,
Described parabola is a half paraboloid.
(17. revise back) as the embossing hologram chip reader of claim 14, wherein,
Described parabola is the parabola littler than half paraboloid, described polygonal mirror offset configuration.
18. (revise back) a kind of embossing hologram chip reader reads the embossing hologram of the true and false trusted authentication chip that is installed on the card, this embossing hologram is that the pit of 1/4 wavelength of incident light and the part that does not form described pit constitute by the degree of depth, wherein,
Described embossing hologram chip reader has the incident light that can move at the Width of described true and false trusted authentication chip and is subjected to the light light-emitting component, and described incident light is subjected to the light light-emitting component to read the embossing hologram of the true and false trusted authentication chip in moving.
(19. revise back) as the embossing hologram chip reader of claim 18, wherein,
Also have another incident light and be subjected to the light light-emitting component.

Claims (19)

1. a card is made of substrate and true and false trusted authentication chip, wherein,
Described true and false trusted authentication chip is layered on the described substrate, is formed with the embossing hologram in described true and false trusted authentication chip.
2. card as claimed in claim 1, wherein,
Also be laminated with surface plate on described true and false trusted authentication chip, described surface plate is by constituting at the high synthetic resin of the permeability of light.
3. as the card of claim 1 or claim 2, wherein,
Described embossing hologram is made of the pit of the same depth that vertically forms in described chip.
4. as the card of claim 1 or claim 2, wherein,
Described embossing hologram is made of the pit of the different depth that vertically forms in described chip.
5. as the card of claim 1 or claim 2, wherein,
Described embossing hologram is made of the pit of the same depth that forms in described chip medium dip.
6. as the card of claim 1 or claim 2, wherein,
Described embossing hologram is made of the pit of the different depth that forms in described chip medium dip.
7. as claim 1,2,3,4,5 or 6 card, wherein,
Described pit is configured to rectangular.
8. card as claimed in claim 7, wherein,
Described pit utilizes the configuration of scale-of-two random number.
9. card as claimed in claim 8, wherein,
Described pit is a part of utilizing the pit of scale-of-two random number configuration.
10. card as claimed in claim 7, wherein,
Described pit utilizes the configuration of quaternary random number.
11. as the card of claim 10, wherein,
Described pit is a part of utilizing the pit of quaternary random number configuration.
12. a hologram chip reader reads the hologram of the true and false trusted authentication chip that is installed on the card, wherein,
Described reading device has and the described true and false trusted authentication chip light light-emitting element matrix that is subjected to of the same area.
13. a hologram chip reader reads the hologram of the true and false trusted authentication chip that is installed on the card, wherein,
Described reading device have with described true and false trusted authentication chip same widths be subjected to the light light-emitting device array.
14. a hologram chip reader reads the hologram of the true and false trusted authentication chip that is installed on the card, wherein,
Described hologram chip reader possess parabolic tubular catoptron, polygonal mirror, be subjected to the light light-emitting component, the turning axle of described polygonal mirror is configured in the focus of described catoptron, is subjected to the light light-emitting component to be configured in the behind of described catoptron.
15. as the hologram chip reader of claim 14, wherein,
Described parabola is whole parabolic, is formed with light by the hole in the central authorities of described catoptron, disposes described photodetector at described light by the behind in hole and in the behind of described catoptron.
16. as the hologram chip reader of claim 14, wherein,
Described parabola is a half paraboloid.
17. as the hologram chip reader of claim 14, wherein,
Described parabola is the parabola littler than half paraboloid, described polygonal mirror offset configuration.
18. a hologram chip reader reads the hologram of the true and false trusted authentication chip that is installed on the card, wherein,
Described hologram chip reader have can move at the Width of described true and false trusted authentication chip be subjected to the light light-emitting component, the described hologram that is subjected to the light light-emitting component to read the true and false trusted authentication chip in moving.
19. as the hologram chip reader of claim 18, wherein,
Also have another and be subjected to the light light-emitting component.
CN2006800476488A 2005-12-19 2006-12-19 Card capable of performing true/false judgment by a fluorescent particle chip Expired - Fee Related CN101405753B (en)

Applications Claiming Priority (5)

Application Number Priority Date Filing Date Title
JP365416/2005 2005-12-19
JP2005365416 2005-12-19
JP200823/2006 2006-07-24
JP2006200823 2006-07-24
PCT/JP2006/325225 WO2007072794A1 (en) 2005-12-19 2006-12-19 Card which can be authenticated by hologram chip

Publications (2)

Publication Number Publication Date
CN101405753A true CN101405753A (en) 2009-04-08
CN101405753B CN101405753B (en) 2012-07-11

Family

ID=40494865

Family Applications (2)

Application Number Title Priority Date Filing Date
CN2006800476488A Expired - Fee Related CN101405753B (en) 2005-12-19 2006-12-19 Card capable of performing true/false judgment by a fluorescent particle chip
CNA2006800476473A Pending CN101395619A (en) 2005-12-19 2006-12-19 Card capable of authentication

Family Applications After (1)

Application Number Title Priority Date Filing Date
CNA2006800476473A Pending CN101395619A (en) 2005-12-19 2006-12-19 Card capable of authentication

Country Status (1)

Country Link
CN (2) CN101405753B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106575374A (en) * 2014-04-04 2017-04-19 维萨国际服务协会 Payment device with holographic security element

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
RU2011154079A (en) * 2009-05-29 2013-07-10 Интернэшнл Фронтьер Текнолоджи Лэборетери, Инк. KEY CARD AND LOCK KEY CARD
CN104487986B (en) * 2012-07-23 2017-07-07 昌荣印刷株式会社 IC-card identification system and the IC-card for using within the system
US9590983B2 (en) * 2014-04-09 2017-03-07 Cardex Systems Inc. Self-authenticating chips
CN111461275A (en) * 2020-04-26 2020-07-28 厦门浩邈科技有限公司 Method for detecting copy IC card

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2000123109A (en) * 1998-10-09 2000-04-28 Victor Co Of Japan Ltd Optical recording medium and optical recording medium writer/reader
JP2002040219A (en) * 2000-07-19 2002-02-06 Dainippon Printing Co Ltd Computer hologram, reflection plate using computer hologram, reflection type liquid crystal display device using computer hologram

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106575374A (en) * 2014-04-04 2017-04-19 维萨国际服务协会 Payment device with holographic security element
CN106575374B (en) * 2014-04-04 2020-06-09 维萨国际服务协会 Payment device with holographic security element

Also Published As

Publication number Publication date
CN101405753B (en) 2012-07-11
CN101395619A (en) 2009-03-25

Similar Documents

Publication Publication Date Title
US8397987B2 (en) Card which can be authenticated by hologram chip
US8408470B2 (en) Object for authentication verification, authentication verifying chip reading device and authentication judging method
US9058535B2 (en) Security barcode
CA2357002C (en) Validation method for electronic cash cards and digital identity cards utilizing optical data storage
US8235286B2 (en) Card capable of authentication
US7353994B2 (en) Security, identification and verification systems
CA1080354A (en) System and method for providing a security check on a credit card
JPH10207328A (en) Hologram-card and card reader
US20090242646A1 (en) Personal identification card comprising a two-dimensional image of the user
CN101405753B (en) Card capable of performing true/false judgment by a fluorescent particle chip
JPWO2007072795A1 (en) A card that can be identified with a phosphor particle chip
US5932865A (en) Anti-counterfeit validation method for electronic cash cards employing an optical memory stripe
US20050024955A1 (en) Non-falsifiable information carrier material, information carrier produced therefrom and test device therefor
JP2000194794A (en) Optical information reader and optical recording medium
WO2007072796A1 (en) Card capable of performing authentication by radio-active material chip
JP2001118123A (en) Optical information reader and optical recording medium
JPH11353705A (en) Optical information recording medium
JPH04176696A (en) Forgery preventing card and discrimination thereof

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
REG Reference to a national code

Ref country code: HK

Ref legal event code: DE

Ref document number: 1132351

Country of ref document: HK

C14 Grant of patent or utility model
GR01 Patent grant
REG Reference to a national code

Ref country code: HK

Ref legal event code: GR

Ref document number: 1132351

Country of ref document: HK

C17 Cessation of patent right
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20120711

Termination date: 20131219