EP0172765B1 - Access-control method and system involving the sensing of the texture of a surface - Google Patents
Access-control method and system involving the sensing of the texture of a surface Download PDFInfo
- Publication number
- EP0172765B1 EP0172765B1 EP85401498A EP85401498A EP0172765B1 EP 0172765 B1 EP0172765 B1 EP 0172765B1 EP 85401498 A EP85401498 A EP 85401498A EP 85401498 A EP85401498 A EP 85401498A EP 0172765 B1 EP0172765 B1 EP 0172765B1
- Authority
- EP
- European Patent Office
- Prior art keywords
- support object
- information
- support
- reader
- texture
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired
Links
Images
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00658—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by passive electrical keys
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F7/00—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
- G07F7/08—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
- G07F7/086—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means by passive credit-cards adapted therefor, e.g. constructive particularities to avoid counterfeiting, e.g. by inclusion of a physical or chemical security-layer
Definitions
- the subject of the present invention is an access control system, that is to say a system making it possible to trigger an action equivalent to an authorization after checking the identity of an object introduced into this system.
- the system of the invention constitutes a “key-lock” assembly provided that these terms are given a broad meaning: the word “key” must be understood as designating a support object provided with a single identity and the word “lock”, an organ capable of recognizing this identity and ordering an action. But the object-support of the invention does not necessarily take the traditional form of a key. It can be in any form, including a card. As for the function of the "control member”, it is not necessarily limited to action on the door bolt, but may correspond to an authorization to access any system, computer, telematics, banking, etc ...
- the very principle of locksmithing is to give an portable object (the key) an identity (a profile for example) and to make an organ (the lock) capable of recognizing this identity and triggering an action.
- the key is a reproducible object, for obvious reasons which are due to the fact that several people will have to have the same key (members of the same family, of the same society, etc.).
- the lock being linked to a particular shape given to a key, it can only cooperate with one type of key.
- the object of the invention is to remedy this drawback.
- This goal is achieved by the use of a key which, by nature, is not reproducible.
- This characteristic is obtained by choosing, as information capable of defining the identity of a key, no longer artificially manufactured information (such as a toothing or a magnetic or optical property of a band), but natural information which is the texture of the surface of a room. This information is so complex that it cannot be reproduced.
- this information is unique, because two objects, even identical in the macroscopic sense, are actually different if we go down to their surface texture. It goes without saying that nothing prevents adding an artificial texture to the natural texture (scratches, streaks, marks, etc.).
- the present invention takes up this idea by applying it to the field of access control systems.
- the choice of surface texture as a means of identification means that the procedure for loading authorized information must be modified, in such a way that it is impossible to counterfeit it.
- the lock of the invention which is provided, like electronic locks, with different memory locations is such that these locations can only receive the setpoint information by reading the keys authorized to open the lock. In other words, we no longer write information in the lock's memory that we have written on a medium.
- the procedure is the opposite: keys are first manufactured with any texture and the locks are then conditioned, a posteriori, according to said keys.
- the quantity used for identifying the key is a continuous analog quantity and not a digital value. It may therefore be possible to proceed analogically for the comparison operation between the setpoint quantity and the quantity read. But of course, it will often be better to convert the analog signal to digital and then proceed with digital processing.
- Another originality of the lock of the invention is that the means responsible for reading the information contained in the support which is presented to it is a texture reader and no longer a magnetic reader.
- documents US-A 4218674 and GB-A 2072390 describe authentication techniques which use random imperfections introduced into a support (magnetic elements, lines, color spots, etc.).
- a reader capable of detecting these imperfections delivers a logical signal (the imperfection is or is not present) and the set of logical signals corresponding to a segment of the object forms a logical code which constitutes the identity of the document.
- a bit-by-bit comparison between the code read and a code previously recorded makes it possible to ensure the authenticity of the document examined.
- the use of the surface texture makes such fraud impossible, since it would be necessary to reproduce analog information (the topography of a surface is information which varies continuously as a function of space, whereas, in the prior art cited, the information is of the all or nothing type).
- each support object has the form of a key with a head capable of being grasped manually and a body having at least one flat part from which the surface portion whose texture is read is taken.
- the body of the key is metallic and preferably made of an alloy, which gives the texture a particular complexity.
- each support object has the form of a map, part of the surface of which is used for reading the texture.
- This card can be made of flexible plastic.
- the key can have a cylindrical shape with a reading either rotatable along the circumference, or rectilinear according to a generator.
- the key may have a tubular appearance, the reading taking place outside or inside the tube.
- the key can consist of a usual object such as a pen.
- the reader comprises a block for receiving the support object, a transducer capable of translating the relief of the key into an electrical signal (for example a piezoelectric tip), this transducer being arranged on an arm and a means of movement. relative of the arm and of the support object along a surface portion thereof.
- the arm is connected to a displacement means which is set in motion when the support is immobilized in the receiving block.
- This means of moving the arm can be a clockwork movement connected to an arming arm, one end of which is moved by the introduction of the support object into the receiving block.
- this means of moving the arm can also be an electric motor.
- the read tip is stationary and the texture of the support object is read during the introduction of the latter into the receiving block.
- the reading can be carried out during the withdrawal of the key from the reception block.
- the comparison circuit preferably consists of a correlator followed by a threshold circuit.
- a correlator is particularly useful here because the measurement signal is of analog character and that it is sampled at a large number of points, for example 512 or 1024 or more.
- the comparison between the signal read and the reference signal can therefore call upon the technique of correlation, whereas in the prior art of electronic locks, words of a few bytes are compared bit by bit. Other more or less complex digital processing methods can be used.
- the device shown in FIGS. 1, 2 and 3 comprises a block 10 for receiving a key 12 with a trapezoidal section, a stop 14, a first arm 16 moved by the end of the key and movable about an axis 18 , this arm being articulated on a second arm 20 which cooperates with a toothed wheel 22 arming a spiral spring 24.
- the arm 16 is in position 16 ′, the arm 18 in position 18 'and the wheel 22 escapes.
- the spring 24 then controls the movement of a third arm 25 articulated on a fourth arm 26, pivoting about an axis 28 and the end of which carries a sensor 30 provided with a read tip 32.
- the reassembly of the system corresponds at the angular displacement marked 31 in FIG. 2 and the reading phase at the displacement marked 33.
- the latter corresponds to a reading range 34 located on the upper side of the key, and in the shape of an arc of a circle. But we can provide a system where the reading range would be straight.
- the sensor 30 delivers an analog electrical signal which is applied to an electronic circuit 40. This circuit includes all or part of the processing means, which are illustrated in FIGS. 4 to 6.
- FIG. 4 first of all, there is shown the general diagram of an installation implementing the invention.
- a reader block 50 connected to a microprocessor 52 by a link bus 54.
- the block 50 is connected to an autorelay 56, which is connected to a relay 58 which is the control relay of the member 60, which is either an electric strike or a lock.
- the assembly is connected to a general power supply 62.
- the block 50 can also be connected to an alarm circuit 64, and to an interface 66 allowing possible connection with another lock of the same type.
- FIG. 5 Such a card is represented functionally in FIG. 5. It comprises a microprocessor 70 (for example of the 6800 or 6809 type), a clock 72, a random access memory 74 (of the RAM type) comprising several memory locations, an address decoder 75 , an analog-digital converter 76 connected to the sensor 30 of the reader.
- the data circulates on a bus 80, the addresses on a bus 82 and the control orders (write-read in memory and sampling-conversion) on a bus 84.
- the microprocessor 70 is connected to an input-output circuit 90 which is connected by a connection 91 to the electric strike to be controlled (through relays - see Figure 4) by the connection 92 to a switch and by the connection 93 to other locks or various bodies.
- the operation of this system is as follows.
- the analog signal delivered by the sensor 30 is sampled and each sample is converted to digital by the converter 76.
- the microprocessor 70 receives all of the digital signals read and has access to the various reference signals stored in 74. With the aid of these two data, it performs a correlation and compares the result obtained with a degree of correlation fixed in advance.
- this diagram can give rise to various embodiments depending on the applications.
- a version with autonomous power supply and a standby of the microprocessor can be provided.
- the memory contained in each reader then serves as a buffer, pending availability of the central unit.
- the overall time for opening a lock after inserting a key is less than 3 s. for 10 keys and less than 9 s. for a number greater than and ten keys.
- the card which has just been described is suitable for communicating with any computer peripheral: printer, keyboard, video screen, mass memory, etc.
Landscapes
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Lock And Its Accessories (AREA)
- Radar Systems Or Details Thereof (AREA)
- Control Of Position, Course, Altitude, Or Attitude Of Moving Bodies (AREA)
- Vehicle Body Suspensions (AREA)
- Testing Of Coins (AREA)
Abstract
Description
La présente invention a pour objet un système de contrôle d'accès, c'est-à-dire un système permettant de déclencher une action équivalente à une autorisation après contrôle de l'identité d'un objet introduit dans ce système.The subject of the present invention is an access control system, that is to say a system making it possible to trigger an action equivalent to an authorization after checking the identity of an object introduced into this system.
D'une certaine manière, le système de l'invention constitue un ensemble «clé-serrure» à condition de donner à ces termes un sens large: le mot «clé» doit être entendu comme désignant un objet-support muni d'uni identité et le mot «serrure», un organe capable de reconnaître cette identité et de commander une action. Mais l'objet-support de l'invention ne prend pas nécessairement la forme traditionnelle d'une clé. Il peut se présenter sous une forme quelconque, notamment de carte. Quant à la fonction de «l'organe de commande», elle n'est pas nécessairement limitée à l'action sur le pène d'une porte, mais peut correspondre à une autorisation d'accès à un système quelconque, informatique, télématique, bancaire, etc....In a way, the system of the invention constitutes a “key-lock” assembly provided that these terms are given a broad meaning: the word “key” must be understood as designating a support object provided with a single identity and the word "lock", an organ capable of recognizing this identity and ordering an action. But the object-support of the invention does not necessarily take the traditional form of a key. It can be in any form, including a card. As for the function of the "control member", it is not necessarily limited to action on the door bolt, but may correspond to an authorization to access any system, computer, telematics, banking, etc ...
Quoi qu'il en soit, pour présenter l'originalité et les caractéristiques essentielles de l'invention, on s'appuiera sur la variante du système qui prend la forme d'un ensemble «clé-serrure» traditionnel, sans que cet exemple n'ait de caractère limitatif.Anyway, to present the originality and the essential characteristics of the invention, we will rely on the variant of the system which takes the form of a traditional "key-lock" assembly, without this example n 'is of a limiting nature.
Le principe même de la serrurerie est de conférer à un objet portatif (la clé) une identité (un profil par exemple) et de réaliser un organe (la serrure) capable de reconnaître cette identité et de déclencher une action. Selon ce principe connu, la clé est un objet reproductible, pour des raisons évidentes qui tiennent à ce que plusieurs personnes devront posséder la même clé (les membres d'une même famille, d'une même société, etc....). Quand à la serrure, étant liée à une forme particulière donnée à une clé, elle ne peut coopérer qu'avec un seul type de clé.The very principle of locksmithing is to give an portable object (the key) an identity (a profile for example) and to make an organ (the lock) capable of recognizing this identity and triggering an action. According to this known principle, the key is a reproducible object, for obvious reasons which are due to the fact that several people will have to have the same key (members of the same family, of the same society, etc.). When the lock, being linked to a particular shape given to a key, it can only cooperate with one type of key.
Récemment sont apparus des systèmes plus sophistiqués qu'on peut désigner par le terme générique de «serrures électroniques». Dans ces systèmes, l'idéntité est traduite en un code écrit sur une piste magnétique ou optique, cette piste étant fixée sur une carte genre «carte de crédit». Mais la philosophie du système reste la même: chaque clé (en l'occurrence chaque carte) est reproductible. Cependant, comme dans ces systèmes perfectionnés, l'information d'identité est de nature numérique et non plus mécanique, il est possible d'enregistrer plusieurs identités différentes dans une mémoire électronique. Plusieurs clés différentes sont alors capables d'ouvrir une même serrure. Ces clés peuvent être attribuées à différentes personnes habilitées. Mais elles peuvent aussi être utilisées par des services de maintenance ou de sécurité.Recently, more sophisticated systems have appeared which can be designated by the generic term of “electronic locks”. In these systems, the identity is translated into a code written on a magnetic or optical track, this track being fixed on a card like “credit card”. But the philosophy of the system remains the same: each key (in this case each card) is reproducible. However, as in these advanced systems, identity information is digital in nature and no longer mechanical, it is possible to store several different identities in an electronic memory. Several different keys are then able to open the same lock. These keys can be assigned to different authorized persons. But they can also be used by maintenance or security services.
Dans de tels systèmes, on écrit, dans une mémoire vive, plusieurs mots numériques qui servent en quelque sorte de référence ou de consigne et on écrit ces mêmes mots sur plusieurs cartes. Lorsque l'une de ces cartes est introduite dans un lecteur de carte, le code écrit sur la carte est détecté et le signal numérique qui en résulte est comparé aux divers mots de consigne écrits dans la mémoire. Un comparateur détermine s'il y a coïncidence ou non entre le mot lu et l'un des mots mémorisés. Dans l'affirmative, un signal est émis pour la commande d'une action quelconque, par exemple l'ouverture d'une gâche.In such systems, several digital words are written into a random access memory which serve as a sort of reference or instruction and these same words are written on several cards. When one of these cards is inserted into a card reader, the code written on the card is detected and the resulting digital signal is compared with the various reference words written in the memory. A comparator determines whether there is a coincidence or not between the word read and one of the stored words. If so, a signal is sent to command any action, for example opening a door release.
Un tel système est décrit par exemple dans les documents de brevets français FR-A 2107529, FR-A 2 325 992, FR-A 2 457 524 et FR-A 2 533 340.Such a system is described for example in the French patent documents FR-A 2107529, FR-A 2 325 992, FR-A 2 457 524 and FR-A 2 533 340.
Bien que satisfaisants à certains égards, ces systèmes présentent un inconvénient majeur lié à l'absence de confidentialité du code porté par la carte. Il est en effet facile, pour un fraudeur un tant soit peut averti, de lire le code inscrit sur une carte dérobée et de réécrire ce code sur une carte vierge. En d'autres termes, la duplication frauduleuse du support est un risque réel.Although satisfactory in certain respects, these systems have a major drawback linked to the lack of confidentiality of the code carried by the card. It is indeed easy, for a fraudster as much as can be warned, to read the code written on a stolen card and to rewrite this code on a blank card. In other words, fraudulent duplication of the medium is a real risk.
Le but de l'invention est de remédier à cet inconvénient. Ce but est atteint par l'utilisation d'une clé qui, par nature, n'est pas reproductible. Cette caractéristique est obtenue en choisissant, comme information capable de définir l'identité d'une clé, non plus information fabriqué artificiellement (comme une denture ou une propriété magnétique ou optique d'une bande), mais une information naturelle qui est la texture de la surface d'une pièce. Cette information est d'une complexité telle qu'elle n'est pas reproductible. En outre, cette information est unique, car deux objets, même identiques au sens macroscopique, sont en réalité différents si l'on descend au niveau de leur texture de surface. Il va de soi que rien n'empêche d'ajouter à la texture naturelle une texture artificielle (rayures, stries, marques, etc....).The object of the invention is to remedy this drawback. This goal is achieved by the use of a key which, by nature, is not reproducible. This characteristic is obtained by choosing, as information capable of defining the identity of a key, no longer artificially manufactured information (such as a toothing or a magnetic or optical property of a band), but natural information which is the texture of the surface of a room. This information is so complex that it cannot be reproduced. In addition, this information is unique, because two objects, even identical in the macroscopic sense, are actually different if we go down to their surface texture. It goes without saying that nothing prevents adding an artificial texture to the natural texture (scratches, streaks, marks, etc.).
L'idée d'utiliser la texture d'une surface, comme moyen d'identification de certains objets, n'est pas nouvelle. L'article de B.C. D'Agraives et al. intitulé «Surface Topography, a remarkable method for the identification of seals or structure in general», publié dans «Proceedings of the 3rd Esarda Symposium on Safeguards and Nuclear Material Management», Karlsruhe, F.R. Germa- ny», 6-8 May 1981, décrit déjà les propriétés et l'intérêt des textures des surfaces. Cet enseignement est par ailleurs repris dans la demande de brevet britannique no 2097979 publiée le 10 Novembre 1982, au nom de «European Atomic Ener- gy Community (EURATOM)» et intitulée «Utiliza- tion of surface textures as a random marking or unique identity».The idea of using the texture of a surface as a means of identifying certain objects is not new. The article by B.C. D'Agraives et al. entitled "Surface Topography, a remarkable method for the identification of seals or structure in general", published in "Proceedings of the 3rd Esarda Symposium on Safeguards and Nuclear Material Management", Karlsruhe, FR Germany ", 6-8 May 1981, already describes the properties and value of surface textures. This teaching is also reproduced in British patent application No. 2097979 published on November 10, 1982, in the name of “European Atomic Energy Community (EURATOM)” and entitled “Use of surface textures as a random marking or unique identity "
La présente invention reprend cette idée en l'appliquant au domaine des systèmes de contrôle d'accès.The present invention takes up this idea by applying it to the field of access control systems.
Le choix de la texture de surface comme source d'information pour le marquage d'une clé va à l'encontre de tous les principes connus rappelés plus haut puisque, par nature, cette information n'est pas reproductible. Dès lors, la serrure ne peut plus, comme par le passé, être conçue pour reconnaître une information définie à l'avance, puisqu'une texture est une grandeur quasiment aléatoire et, à ce titre, imprévisible. On ne peut donc plus charger la mémoire de la serrure avec une information prévue à l'avance comme pour les systèmes antérieurs. Il faut rappeler, à ce sujet, que dans les serrures électroniques classiques, et comme décrit en particulier dans le document FR-A 2325992 cité plus haut, le chargement s'effectue à l'aide d'une carte spéciale qui comprend des informations de programmation de la serrure. Ces informtions consistent en des listes de codes devant être admis et des listes de codes devant être refusés. Cette carte de programmation est introduite dans le lecteur, qui l'identifie comme telle, et elle est conçue pour modifier la liste des codes mémorisés.The choice of the surface texture as a source of information for marking a key goes against all the known principles mentioned above since, by nature, this information is not reproducible. Consequently, the lock can no longer, as in the past, be designed to recognize information defined in advance, since a texture is an almost random size and, as such, unpredictable. We can no longer load the memory of the lock with information planned in advance as for previous systems. It should be remembered, in this regard, that in conventional electronic locks, and as described in particular in the document FR-A 2325992 cited above, the loading is carried out using a special card which includes information of programming the lock. This information consists of lists of codes to be accepted and lists of codes to be refused. This programming card is inserted in the reader, which identifies it as such, and it is designed to modify the list of memorized codes.
Ce système connu présente encore un risque de fraude, car il est possible de falsifier une carte de programmation en lui conférant des codes contrefaits. Dès lors la serrure pourrait être commandée par des cartes portant ces codes contrefaits.This known system still presents a risk of fraud, since it is possible to falsify a programming card by giving it counterfeit codes. Therefore the lock could be ordered by cards bearing these counterfeit codes.
Le choix de la texture de surface comme moyen d'identification oblige à modifier la procédure de chargement des informations autorisées, de manière telle qu'il est impossible de contrefaire celles-ci. A cette fin, la serrure de l'invention, qui est munie, comme les serrures électroniques, de différents emplacements mémoire est telle que ces emplacements ne peuvent recevoir l'information de consigne que par lecture des clés habilitées à ouvrir la serrure. Autrement dit, on n'écrit plus dans la mémoire de la serrure une information qu'on a écrit sur un support. Selon l'invention on procède de manière inverse: des clés sont d'abord fabriquées avec une texture quelconque et les serrures sont ensuite conditionnées, a posteriori, en fonction desdites clés.The choice of surface texture as a means of identification means that the procedure for loading authorized information must be modified, in such a way that it is impossible to counterfeit it. To this end, the lock of the invention, which is provided, like electronic locks, with different memory locations is such that these locations can only receive the setpoint information by reading the keys authorized to open the lock. In other words, we no longer write information in the lock's memory that we have written on a medium. According to the invention, the procedure is the opposite: keys are first manufactured with any texture and the locks are then conditioned, a posteriori, according to said keys.
On observera accessoirement que, dans l'invention, la grandeur servant à l'identification de la clé est une grandeur analogique continue et non une valeur numérique. On pourra donc éventuellement procéder en analogique pour l'opération de comparaison entre la grandeur de consigne et la grandeur lue. Mais naturellement, il sera souvent préférable de convertir le signal analogique en numérique et de procéder ensuite par traitement numérique.It will be observed incidentally that, in the invention, the quantity used for identifying the key is a continuous analog quantity and not a digital value. It may therefore be possible to proceed analogically for the comparison operation between the setpoint quantity and the quantity read. But of course, it will often be better to convert the analog signal to digital and then proceed with digital processing.
Une autre originalité de la serrure de l'invention est que le moyen chargé de lire l'information contenue dans le support qui lui est présenté est un lecteur de texture et non plus un lecteur magnétique.Another originality of the lock of the invention is that the means responsible for reading the information contained in the support which is presented to it is a texture reader and no longer a magnetic reader.
Il faut observer que ces avantages du système de l'invention ne sont pas acquis au détriment des possibilités des systèmes électroniques classiques qui sont entièrement conservées: validation temporaire d'une clé, gestion centralisée d'un ensemble de serrures, comptabilisation du nombre d'interventions d'une clé particulière, etc....It should be noted that these advantages of the system of the invention are not acquired at the expense of the possibilities of conventional electronic systems which are entirely preserved: temporary validation of a key, centralized management of a set of locks, accounting for the number of interventions of a particular key, etc ...
Il faut noter également que les documents US-A 4218674 et GB-A 2072390 décrivent des techniques d'authentification qui utilisent des imperfections aléatoires introduites dans un support (éléments magnétiques, traits, taches de couleurs, etc....). Un lecteur apte à détecter ces imperfections délivre un signal logique (l'imperfection est ou n'est pas présente) et l'ensemble des signaux logiques correspondant à un segment de l'objet forme un code logique qui constitue l'identité du document. Une comparaison bit à bit entre le code lu et un code préalablement enregistré permet de s'assurer de l'authenticité du document examiné.It should also be noted that documents US-A 4218674 and GB-A 2072390 describe authentication techniques which use random imperfections introduced into a support (magnetic elements, lines, color spots, etc.). A reader capable of detecting these imperfections delivers a logical signal (the imperfection is or is not present) and the set of logical signals corresponding to a segment of the object forms a logical code which constitutes the identity of the document. A bit-by-bit comparison between the code read and a code previously recorded makes it possible to ensure the authenticity of the document examined.
Même si la fraude est difficile avec de telles techniques, elle reste cependant possible car, ayant lu un document authentique et connaissant son code numérique, on peut toujours reproduire ce code sur une partie limitée d'un contrefait, puisqu'il s'agit d'une information binaire.Even if fraud is difficult with such techniques, it remains possible because, having read an authentic document and knowing its digital code, one can always reproduce this code on a limited part of a counterfeit, since it involves 'binary information.
L'utilisation de la texture de surface rend une telle fraude impossible, puisqu'il faudrait reproduire une information analogique (la topographie d'une surface est une information qui varie de manière continue en fonction de l'espace, alors que, dans l'art antérieur cité, l'information est du type tout ou rien).The use of the surface texture makes such fraud impossible, since it would be necessary to reproduce analog information (the topography of a surface is information which varies continuously as a function of space, whereas, in the prior art cited, the information is of the all or nothing type).
De façon générale, la présente invention a donc pour objet un procédé de contrôle d'accès consistant à:
- - constituer des objets-supports munis d'une information d'identification,
- - mémoriser dans un organe de mémorisation comprenant plusieurs emplacements mémoire des informations de consigne correspondant à un ensemble d'objets-support habilités,
- - lire l'information propre à un objet-support,
- - comparer l'information lue et chacune des informations mémorisées dans les emplacements mémoire,
- - déterminer le degré de coïncidence entre l'information lue et l'une des informations contenues dans les emplacements mémoire de l'organe de mémorisation, et
- - délivrer, lorsque le degré de coïncidence est suffisante, un signal qui constitue un signal de déclenchement d'une action, ce procédé étant caractérisé par le fait qu'on choisit comme information d'identification de chaque objet-support la texture d'une portion de surface de cet objet-support, et en ce que les informations de consigne sont obtenues en lisant préalablement les informations des objet-support habilités et en mémorisant ces informations dans l'organe de mémorisation.
- - constitute support objects provided with identification information,
- - store in a storage unit comprising several memory locations setpoint information corresponding to a set of authorized support objects,
- - read the information specific to a support object,
- - compare the information read and each of the information stored in the memory locations,
- determining the degree of coincidence between the information read and one of the information contained in the memory locations of the storage unit, and
- - deliver, when the degree of coincidence is sufficient, a signal which constitutes a signal for triggering an action, this method being characterized by the fact that as the identification information of each support object is chosen the texture of a surface portion of this support object, and in that the setpoint information is obtained by first reading the information from the authorized support object and by storing this information in the storage device.
La présente invention a également pour objet un système mettant en oeuvre ce procédé. Ce système comprend:
- - un lecteur apte à recevoir un tel objet-support et à lire l'information propre à cet objet-support,
- - un organe de mémorisation comprenant plusieurs emplacements mémoire chargés par des informations de consigne correspondant à un ensemble d'objet-support habilités,
- - un moyen de comparaison entre, d'une part, le signal délivré par le lecteur lorsqu'un objet-support quelconque est introduit dans le poste et, d'autre part, chacune des informations mémorisées dans les emplacements mémoire, ce moyen de comparaison déterminant le degré de coïncidence entre l'information correspondant à l'objet-support introduit dans le lecteur et l'une des informations contenues dans les emplacements mémoire de l'organe de mémorisation, et
- - un circuit relié au circuit de comparaison et délivrant, lorsque le degré de coïncidence est suffisant, un signal qui constitue un signal de déclenchement d'une action, ce système étant caractérisé par le fait que l'information d'identification attachée à chaque objet-support est constituée par la texture d'une portion de surface de cet objet-support, le lecteur étant alors un lecteur de texture de surface, le chargement d'une information de consigne s'effectuant par introduction d'un objet-support habilité dans le lecteur, lecture de cet objet-support et mémorisation du signal lu dans un des emplacements en question.
- - a reader capable of receiving such a support object and of reading the information specific to this support object,
- a storage unit comprising several memory locations loaded with setpoint information corresponding to a set of authorized support objects,
- a means of comparison between, on the one hand, the signal delivered by the reader when any support object is introduced into the station and, on the other hand, each of the information stored in the memory locations, this means of comparison determining the degree of coincidence between the information corresponding to the ob jet-support introduced into the reader and one of the information contained in the memory locations of the storage device, and
- a circuit connected to the comparison circuit and delivering, when the degree of coincidence is sufficient, a signal which constitutes a signal for triggering an action, this system being characterized by the fact that the identification information attached to each object -support consists of the texture of a surface portion of this support object, the reader then being a surface texture reader, the loading of instruction information being effected by introduction of an authorized support object in the reader, reading of this support object and memorization of the signal read in one of the locations in question.
Selon un premier mode de réalisation, chaque objet-support présente la forme d'une clé avec une tête apte à être saisie manuellement et un corps présentant au moins une partie plane où est prise la portion de surface dont la texture est lue.According to a first embodiment, each support object has the form of a key with a head capable of being grasped manually and a body having at least one flat part from which the surface portion whose texture is read is taken.
Selon une variante avantageuse, le corps de la clé est métallique et de préférence en alliage, ce qui confère à la texture une complexité particulière.According to an advantageous variant, the body of the key is metallic and preferably made of an alloy, which gives the texture a particular complexity.
Selon un autre mode de réalisation, chaque objet-support présente la forme d'une carte dont une partie de la surface est utilisée pour une lecture de texture. Cette carte peut être en matière plastique souple.According to another embodiment, each support object has the form of a map, part of the surface of which is used for reading the texture. This card can be made of flexible plastic.
Selon encore un autre mode de réalisation, la clé peut présenter une forme cylindrique avec une lecture soit rotative le long de la circonférence, soit rectiligne selon une génératrice. La clé peut présenter un aspect tubulaire, la lecture s'effectuant à l'extérieur ou à l'intérieur du tube.According to yet another embodiment, the key can have a cylindrical shape with a reading either rotatable along the circumference, or rectilinear according to a generator. The key may have a tubular appearance, the reading taking place outside or inside the tube.
Selon encore un autre mode de réalisation, la clé peut consister en un objet usuel comme un stylo.According to yet another embodiment, the key can consist of a usual object such as a pen.
Quant au lecteur, il comprend un bloc de réception de l'objet-support, un transducteur apte à traduire le relief de la clé en signal électrique (par exemple une pointe piézoélectrique), ce transducteur étant disposé sur un bras et un moyen de déplacement relatif du bras et de l'objet-support le long d'une portion de surface de celui-ci. Dans une variante avantageuse, le bras est relié à un moyen de déplacement qui est mis en mouvement lorsque le support est immobilisé dans le bloc de réception. Ce moyen de déplacement du bras peut être un mouvement d'horlogerie relié à un bras d'armement dont une extrémité est déplacée par l'introduction de l'objet support dans le bloc de réception. Mais ce moyen de déplacement du bras peut être également un moteur électrique.As for the reader, it comprises a block for receiving the support object, a transducer capable of translating the relief of the key into an electrical signal (for example a piezoelectric tip), this transducer being arranged on an arm and a means of movement. relative of the arm and of the support object along a surface portion thereof. In an advantageous variant, the arm is connected to a displacement means which is set in motion when the support is immobilized in the receiving block. This means of moving the arm can be a clockwork movement connected to an arming arm, one end of which is moved by the introduction of the support object into the receiving block. However, this means of moving the arm can also be an electric motor.
Selon un autre mode de réalisation, la pointe de lecture est immobile et la lecture de la texture de l'objet-support s'effectue pendant l'introduction de celui-ci dans le bloc de réception.According to another embodiment, the read tip is stationary and the texture of the support object is read during the introduction of the latter into the receiving block.
Mais dans un autre mode de réalisation, la lecture peut s'effectuer pendant le retrait de la clé du bloc de réception.However, in another embodiment, the reading can be carried out during the withdrawal of the key from the reception block.
En ce qui concerne le circuit de comparaison, il est constitué de préférence par un corrélateur suivi d'un circuit à seuil. L'utilisation d'un corrélateur est ici particulièrement utile du fait que le signal de mesure est de caractère analogique et qu'il est échantillonné en un grand nombre de points, par exemple 512 ou 1024 ou plus. La comparaison entre le signal lu et le signal de consigne peut donc faire appel à la technique de la corrélation, alors que dans l'art antérieur des serrures électroniques, on compare bit à bit des mots de quelques octets. D'autres méthodes de traitement numériques plus ou moins complexes peuvent être utilisées.As regards the comparison circuit, it preferably consists of a correlator followed by a threshold circuit. The use of a correlator is particularly useful here because the measurement signal is of analog character and that it is sampled at a large number of points, for example 512 or 1024 or more. The comparison between the signal read and the reference signal can therefore call upon the technique of correlation, whereas in the prior art of electronic locks, words of a few bytes are compared bit by bit. Other more or less complex digital processing methods can be used.
De tout façon les caractéristiques de l'invention apparaîtront mieux après la description qui suit, d'un exemple de réalisation donné à titre explicatif et nullement limitatif. Cette description se réfère à des dessins annexés sur lesquels:
- - la figure 1 est un schéma du bloc de lecture de la clé,
- - la figure 2 montre un détail du mécanisme d'armement du système d'horloge,
- - la figure 3 est une coupe schématique au niveau de la pointe de lecture,
- - la figure 4 est un schéma synoptique d'une installation conforme à l'invention,
- - la figure 5 est un schéma d'une carte électronique,
- - la figure 6 est un organigramme simplifié illustrant le programme de base mis en œuvre.
- FIG. 1 is a diagram of the key reading block,
- FIG. 2 shows a detail of the arming mechanism of the clock system,
- FIG. 3 is a diagrammatic section at the level of the reading tip,
- FIG. 4 is a block diagram of an installation according to the invention,
- FIG. 5 is a diagram of an electronic card,
- - Figure 6 is a simplified flowchart illustrating the basic program implemented.
La description qui suit, et notamment celle qui se réfère aux figures 1 à 3, se place dans le cas particulier d'un objet-support en forme de barreau métallique lu par une pointe piézoélectrique disposée à l'extrémité d'un bras animé par un mouvement d'horlogerie. Mais, comme indiqué plus haut, d'autres modes de réalisation sont possibles.The description which follows, and in particular that which refers to FIGS. 1 to 3, takes place in the particular case of a support object in the form of a metal bar read by a piezoelectric point arranged at the end of an arm driven by a watch movement. However, as indicated above, other embodiments are possible.
D'une façon générale, le lecteur peut utiliser tous les capteurs de texture connus, lesquels ont fait l'objet de normes, notamment la norme française NF-E 05050 de décembre 1970, intitulée «Etat de surface des produits - Généralités sur les appareils électroniques à capteur».In general, the reader can use all known texture sensors, which have been the subject of standards, in particular the French standard NF-E 05050 of December 1970, entitled "Surface condition of products - General information on devices sensor electronics ”.
Le dispositif représenté sur les figures 1, 2 et 3 comprend un bloc de réception 10 d'une clé 12 à section trapézoïdale, une butée 14, un premier bras 16 déplacé par l'extrémité de la clé et mobile autour d'un axe 18, ce bras étant articulé sur un second bras 20 lequel coopère avec une roue dentée 22 armant un ressort spirale 24. Lorsque la clé 12 vient en butée sur 14 (voir figure 2), le bras 16 est en position 16', le bras 18 en position 18' et la roue 22 échappe. Le ressort 24 commande alors le déplacement d'un troisième bras 25 articulé sur un quatrième bras 26, pivotant autour d'un axe 28 et dont l'extrémité porte un capteur 30 muni d'une pointe de lecture 32. Le remontage du système correspond au déplacement angulaire marqué 31 sur la figure 2 et la phase de lecture au déplacement marqué 33. Cette dernière correspond à une plage de lecture 34 située sur la face supérieure de la clé, et en forme d'arc de cercle. Mais on peut prévoir un système ou la plage de lecture serait rectiligne. Le capteur 30 délivre un signal électrique analogique qui est appliqué à un circuit électronique 40. Ce circuit comprend tout ou partie des moyens de traitement, lesquels sont illustrés sur les figures 4 à 6.The device shown in FIGS. 1, 2 and 3 comprises a
Sur la figure 4, tout d'abord, est représenté le schéma général d'une installation mettant en oeuvre l'invention. On y trouve un bloc de lecteur 50 relié à un microprocesseur 52 par un bus de liaison 54. Le bloc 50 est relié à un autorelais 56, lequel est connecté à un relais 58 qui est le relais de commande de l'organe 60, qui est soit une gâche électrique soit un verrou. L'ensemble est relié à une alimentation générale 62. Le bloc 50 peut également être relié à un circuit d'alarme 64, et à une interface 66 permettant la liaison éventuelle avec une autre serrure du même type.In FIG. 4, first of all, there is shown the general diagram of an installation implementing the invention. There is a
En pratique, l'essentiel des moyens de traitement est rassemblé sur une carte électronique, bien que, dans certaines applications, on puisse centraliser la totalité des traitements concernant une famille de serrures, dans un microcalculateur conçu à cet effet. Une telle carte est représentée fonctionnellement sur la figure 5. Elle comprend un microprocesseur 70 (par exemple de type 6800 ou 6809), une horloge 72, une mémoire vive 74 (de type RAM) comprenant plusieurs emplacements mémoire, un décodeur d'adresse 75, un convertisseur analogique-numérique 76 relié au capteur 30 du lecteur. Les données circulent sur un bus 80, les adresses sur un bus 82 et les ordres de commande (écriture-lecture en mémoire et échantillonnage-conversion) sur un bus 84. Le microprocesseur 70 est relié à un circuit d'entrée-sortie 90 lequel est relié par une connexion 91 à la gâche électrique à commander (à travers des relais - cf figure 4) par la connexion 92 à un interrupteur et par la connexion 93 à d'autres serrures ou organes divers.In practice, most of the processing means are gathered on an electronic card, although in certain applications, it is possible to centralize all the processing operations relating to a family of locks, in a microcomputer designed for this purpose. Such a card is represented functionally in FIG. 5. It comprises a microprocessor 70 (for example of the 6800 or 6809 type), a
Le fonctionnement de ce système est le suivant. Le signal analogique délivré par le capteur 30 est échantillonné et chaque échantillon est converti en numérique par le convertisseur 76. Le microprocesseur 70 reçoit la totalité des signaux numériques lus et a accès aux divers signaux de consigne mémorisés dans 74. A l'aide de ces deux données, il effectue une corrélation et compare le résultat obtenu à un degré de corrélation fixé à l'avance.The operation of this system is as follows. The analog signal delivered by the
Le microprocesseur 70 assure également d'autres fonctions:
- - déclenchement d'un signal en cas d'effraction du boîtier ou d'organes de surveillance avec effacement de toutes les mémoires, ce qui interdit la commande d'ouverture informatique et électrique,
- - gestion du calendrier, des priorités, des interdictions,
- - contrôle de présence.
- - triggering of a signal in the event of a breach of the box or of monitoring devices with erasure of all the memories, which prohibits the computer and electrical opening command,
- - management of the calendar, priorities, prohibitions,
- - presence control.
Ces fonctions peuvent être remplies soit par des circuits électroniques câblés, soit par programme informatique.These functions can be performed either by wired electronic circuits or by computer program.
Naturellement, ce schéma peut donner lieu à divers modes de réalisation selon les applications. Il peut être prévu une version avec alimentation autonome et une mise au repos du microprocesseur. On peut aussi disposer une partie de la mémoire vive dans un boîtier annexe situé à l'extérieur de la serrure ainsi qu'un microprocesseur supplémentaire faisant office de gestion centrale dans le cas d'un nombre élevé de clefs ou de lecteurs. La mémoire contenue dans chaque lecteur sert alors de tampon, en attente de disponibilité de l'unité centrale.Naturally, this diagram can give rise to various embodiments depending on the applications. A version with autonomous power supply and a standby of the microprocessor can be provided. One can also have part of the RAM in an annex box located outside the lock as well as an additional microprocessor acting as central management in the case of a high number of keys or readers. The memory contained in each reader then serves as a buffer, pending availability of the central unit.
Selon les mesures effectuées par les inventeurs, le temps global d'ouverture d'une serrure après introduction d'une clé est inférieur à 3 s. pour 10 clés et inférieur à 9 s. pour un nombre supérieur à und dizaine de clés.According to the measurements made by the inventors, the overall time for opening a lock after inserting a key is less than 3 s. for 10 keys and less than 9 s. for a number greater than and ten keys.
La carte qui vient d'être décrite est apte à communiquer avec tout périphérique informatique: imprimante, clavier, écran vidéo, mémoire de masse, etc....The card which has just been described is suitable for communicating with any computer peripheral: printer, keyboard, video screen, mass memory, etc.
L'organigramme simplifié d'un programme de base pour la mise en oeuvre de ces moyens de traitement, est illustré sur la figure 6, où les différentes opérations du programme ont la signification suivante:
- 100: Début du programme.
- 101: Introduction du programme et chargement des mémoires.
- 102: Contrôle des circuits de surveillance et d'horloge.
- 103: Alarme.
- 104: Introduction de la clé.
- 105: Demande d'interruption.
- 106: Lecture de la clé.
- 107: Enregistrement et comparaison.
- 108: Traitement du résultat.
- 109: Décision d'ouverture.
- 110: Alarme.
- 111: Retour au circuit de surveillance.
- 100: Start of the program.
- 101: Program introduction and memory loading.
- 102: Control of the monitoring and clock circuits.
- 103: Alarm.
- 104: Key introduction.
- 105: Request for interruption.
- 106: Reading the key.
- 107: Registration and comparison.
- 108: Processing of the result.
- 109: Opening decision.
- 110: Alarm.
- 111: Return to the monitoring circuit.
Claims (14)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
AT85401498T ATE47458T1 (en) | 1984-07-23 | 1985-07-19 | ACCESS CONTROL METHOD AND SYSTEM BASED ON THE FEATURE OF A SURFACE STRUCTURE. |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
FR8411643A FR2567947B1 (en) | 1984-07-23 | 1984-07-23 | SURFACE TEXTURE READING ACCESS CONTROL SYSTEM |
FR8411643 | 1984-07-23 |
Publications (2)
Publication Number | Publication Date |
---|---|
EP0172765A1 EP0172765A1 (en) | 1986-02-26 |
EP0172765B1 true EP0172765B1 (en) | 1989-10-18 |
Family
ID=9306384
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
EP85401498A Expired EP0172765B1 (en) | 1984-07-23 | 1985-07-19 | Access-control method and system involving the sensing of the texture of a surface |
Country Status (6)
Country | Link |
---|---|
US (2) | US4677435A (en) |
EP (1) | EP0172765B1 (en) |
AT (1) | ATE47458T1 (en) |
CA (1) | CA1235779A (en) |
DE (1) | DE3573819D1 (en) |
FR (1) | FR2567947B1 (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7667570B1 (en) | 2004-05-19 | 2010-02-23 | Lockheed Martin Corporation | Nanostructured combination key-lock |
Families Citing this family (106)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
GB8612467D0 (en) * | 1986-05-22 | 1986-07-02 | Unisafe Ltd | Electronic locking devices |
US5218528A (en) * | 1990-11-06 | 1993-06-08 | Advanced Technological Systems, Inc. | Automated voting system |
US5721788A (en) | 1992-07-31 | 1998-02-24 | Corbis Corporation | Method and system for digital image signatures |
US6449377B1 (en) * | 1995-05-08 | 2002-09-10 | Digimarc Corporation | Methods and systems for watermark processing of line art images |
US6345104B1 (en) * | 1994-03-17 | 2002-02-05 | Digimarc Corporation | Digital watermarks and methods for security documents |
US5768426A (en) | 1993-11-18 | 1998-06-16 | Digimarc Corporation | Graphics processing system employing embedded code signals |
US6614914B1 (en) | 1995-05-08 | 2003-09-02 | Digimarc Corporation | Watermark embedder and reader |
US5748783A (en) * | 1995-05-08 | 1998-05-05 | Digimarc Corporation | Method and apparatus for robust information coding |
US5636292C1 (en) * | 1995-05-08 | 2002-06-18 | Digimarc Corp | Steganography methods employing embedded calibration data |
US5822436A (en) | 1996-04-25 | 1998-10-13 | Digimarc Corporation | Photographic products and methods employing embedded information |
US5832119C1 (en) * | 1993-11-18 | 2002-03-05 | Digimarc Corp | Methods for controlling systems using control signals embedded in empirical data |
US5841886A (en) * | 1993-11-18 | 1998-11-24 | Digimarc Corporation | Security system for photographic identification |
US6408082B1 (en) | 1996-04-25 | 2002-06-18 | Digimarc Corporation | Watermark detection using a fourier mellin transform |
US5841978A (en) | 1993-11-18 | 1998-11-24 | Digimarc Corporation | Network linking method using steganographically embedded data objects |
US6983051B1 (en) | 1993-11-18 | 2006-01-03 | Digimarc Corporation | Methods for audio watermarking and decoding |
USRE40919E1 (en) * | 1993-11-18 | 2009-09-22 | Digimarc Corporation | Methods for surveying dissemination of proprietary empirical data |
US7044395B1 (en) | 1993-11-18 | 2006-05-16 | Digimarc Corporation | Embedding and reading imperceptible codes on objects |
US5710834A (en) * | 1995-05-08 | 1998-01-20 | Digimarc Corporation | Method and apparatus responsive to a code signal conveyed through a graphic image |
US6611607B1 (en) | 1993-11-18 | 2003-08-26 | Digimarc Corporation | Integrating digital watermarks in multimedia content |
US6944298B1 (en) | 1993-11-18 | 2005-09-13 | Digimare Corporation | Steganographic encoding and decoding of auxiliary codes in media signals |
US5862260A (en) * | 1993-11-18 | 1999-01-19 | Digimarc Corporation | Methods for surveying dissemination of proprietary empirical data |
US5748763A (en) | 1993-11-18 | 1998-05-05 | Digimarc Corporation | Image steganography system featuring perceptually adaptive and globally scalable signal embedding |
US6122403A (en) * | 1995-07-27 | 2000-09-19 | Digimarc Corporation | Computer system linked by using information in data objects |
US7171016B1 (en) * | 1993-11-18 | 2007-01-30 | Digimarc Corporation | Method for monitoring internet dissemination of image, video and/or audio files |
US6424725B1 (en) | 1996-05-16 | 2002-07-23 | Digimarc Corporation | Determining transformations of media signals with embedded code signals |
EP0959621B1 (en) * | 1993-11-18 | 2001-02-28 | Digimarc Corporation | Video copy control with plural embedded signals |
US6516079B1 (en) | 2000-02-14 | 2003-02-04 | Digimarc Corporation | Digital watermark screening and detecting strategies |
US6580819B1 (en) | 1993-11-18 | 2003-06-17 | Digimarc Corporation | Methods of producing security documents having digitally encoded data and documents employing same |
US6522770B1 (en) | 1999-05-19 | 2003-02-18 | Digimarc Corporation | Management of documents and other objects using optical devices |
US7039214B2 (en) | 1999-11-05 | 2006-05-02 | Digimarc Corporation | Embedding watermark components during separate printing stages |
US6968057B2 (en) * | 1994-03-17 | 2005-11-22 | Digimarc Corporation | Emulsion products and imagery employing steganography |
US6869023B2 (en) | 2002-02-12 | 2005-03-22 | Digimarc Corporation | Linking documents through digital watermarking |
DE4422016C2 (en) * | 1994-06-16 | 1996-08-01 | Foerderung Angewandter Informa | Procedure for the automatic verification of magnetic cards |
EP0803846B1 (en) * | 1994-10-19 | 2003-10-01 | Hitachi, Ltd. | Transaction-oriented electronic accommodation system |
US6560349B1 (en) * | 1994-10-21 | 2003-05-06 | Digimarc Corporation | Audio monitoring using steganographic information |
US7486799B2 (en) | 1995-05-08 | 2009-02-03 | Digimarc Corporation | Methods for monitoring audio and images on the internet |
US6760463B2 (en) | 1995-05-08 | 2004-07-06 | Digimarc Corporation | Watermarking methods and media |
US6721440B2 (en) | 1995-05-08 | 2004-04-13 | Digimarc Corporation | Low visibility watermarks using an out-of-phase color |
US6728390B2 (en) | 1995-05-08 | 2004-04-27 | Digimarc Corporation | Methods and systems using multiple watermarks |
US6577746B1 (en) | 1999-12-28 | 2003-06-10 | Digimarc Corporation | Watermark-based object linking and embedding |
US6411725B1 (en) | 1995-07-27 | 2002-06-25 | Digimarc Corporation | Watermark enabled video objects |
US6788800B1 (en) | 2000-07-25 | 2004-09-07 | Digimarc Corporation | Authenticating objects using embedded data |
US6965682B1 (en) | 1999-05-19 | 2005-11-15 | Digimarc Corp | Data transmission by watermark proxy |
US6408331B1 (en) * | 1995-07-27 | 2002-06-18 | Digimarc Corporation | Computer linking methods using encoded graphics |
US6829368B2 (en) | 2000-01-26 | 2004-12-07 | Digimarc Corporation | Establishing and interacting with on-line media collections using identifiers in media signals |
US7006661B2 (en) * | 1995-07-27 | 2006-02-28 | Digimarc Corp | Digital watermarking systems and methods |
US6230971B1 (en) | 1996-04-29 | 2001-05-15 | Hitachi, Ltd. | Transaction-oriented electronic accommodation system |
US6381341B1 (en) | 1996-05-16 | 2002-04-30 | Digimarc Corporation | Watermark encoding method exploiting biases inherent in original signal |
US6804376B2 (en) | 1998-01-20 | 2004-10-12 | Digimarc Corporation | Equipment employing watermark-based authentication function |
US7313253B2 (en) | 1998-09-11 | 2007-12-25 | Digimarc Corporation | Methods and tangible objects employing machine readable data in photo-reactive materials |
US7035428B1 (en) | 1999-04-23 | 2006-04-25 | The Escher Group, Ltd. | Workpiece authentication based upon one or more workpiece images |
US6584214B1 (en) * | 1999-04-23 | 2003-06-24 | Massachusetts Institute Of Technology | Identification and verification using complex, three-dimensional structural features |
US7164413B2 (en) * | 1999-05-19 | 2007-01-16 | Digimarc Corporation | Enhanced input peripheral |
US6608919B1 (en) | 1999-11-10 | 2003-08-19 | Digimarc Corporation | Method and apparatus for encoding paper with information |
US6625297B1 (en) | 2000-02-10 | 2003-09-23 | Digimarc Corporation | Self-orienting watermarks |
US6804377B2 (en) | 2000-04-19 | 2004-10-12 | Digimarc Corporation | Detecting information hidden out-of-phase in color channels |
US7027614B2 (en) | 2000-04-19 | 2006-04-11 | Digimarc Corporation | Hiding information to reduce or offset perceptible artifacts |
WO2003052680A1 (en) | 2001-12-18 | 2003-06-26 | Digimarc Id System, Llc | Multiple image security features for identification documents and methods of making same |
CA2470600C (en) | 2001-12-24 | 2009-12-22 | Digimarc Id Systems, Llc | Systems, compositions, and methods for full color laser engraving of id documents |
US7728048B2 (en) | 2002-12-20 | 2010-06-01 | L-1 Secure Credentialing, Inc. | Increasing thermal conductivity of host polymer used with laser engraving methods and compositions |
US7694887B2 (en) | 2001-12-24 | 2010-04-13 | L-1 Secure Credentialing, Inc. | Optically variable personalized indicia for identification documents |
ATE552120T1 (en) | 2001-12-24 | 2012-04-15 | L 1 Secure Credentialing Inc | HIDDEN VARIABLE INFORMATION ON ID DOCUMENTS AND METHODS FOR PRODUCING THEM |
US7824029B2 (en) | 2002-05-10 | 2010-11-02 | L-1 Secure Credentialing, Inc. | Identification card printer-assembler for over the counter card issuing |
US7045763B2 (en) * | 2002-06-28 | 2006-05-16 | Hewlett-Packard Development Company, L.P. | Object-recognition lock |
WO2004049242A2 (en) | 2002-11-26 | 2004-06-10 | Digimarc Id Systems | Systems and methods for managing and detecting fraud in image databases used with identification documents |
US7712673B2 (en) | 2002-12-18 | 2010-05-11 | L-L Secure Credentialing, Inc. | Identification document with three dimensional image of bearer |
US7225991B2 (en) | 2003-04-16 | 2007-06-05 | Digimarc Corporation | Three dimensional data storage |
US7192208B2 (en) * | 2003-09-02 | 2007-03-20 | Futurelogic, Inc. | Rewritable card printer |
US7494414B2 (en) | 2003-09-12 | 2009-02-24 | Igt | Gaming device having a card management system for the management of circulating data cards |
US8057296B2 (en) | 2003-09-12 | 2011-11-15 | Igt | Gaming device including a card processing assembly having vertically-stacked card holders operable with thermally-printable data cards and portable card changeover machines |
US7744002B2 (en) | 2004-03-11 | 2010-06-29 | L-1 Secure Credentialing, Inc. | Tamper evident adhesive and identification document including same |
FR2870376B1 (en) * | 2004-05-11 | 2006-09-22 | Yann Boutant | METHOD FOR RECOGNIZING FIBROUS MEDIA, AND APPLICATIONS OF SUCH A METHOD IN THE COMPUTER FIELD, IN PARTICULAR |
KR20070092739A (en) * | 2004-12-17 | 2007-09-13 | 코닌클리케 필립스 일렉트로닉스 엔.브이. | Optical identifier comprising randomly oriented partial faces |
US7533062B2 (en) * | 2005-05-27 | 2009-05-12 | Pitney Bowes Inc. | Method for creating self-authenticating documents |
US8224018B2 (en) * | 2006-01-23 | 2012-07-17 | Digimarc Corporation | Sensing data from physical objects |
US8077905B2 (en) | 2006-01-23 | 2011-12-13 | Digimarc Corporation | Capturing physical feature data |
US8215553B2 (en) * | 2006-11-15 | 2012-07-10 | Digimarc Corporation | Physical credentials and related methods |
EP2153422B1 (en) | 2007-04-24 | 2019-01-16 | Sicpa Holding Sa | Method of marking a document or item; method and device for identifying the marked document or item; use of circular polarizing particles |
WO2008128714A1 (en) * | 2007-04-24 | 2008-10-30 | Sicpa Holding S.A. | Method of marking a document or item; method and device for identifying the marked document or item; use of circular polarizing particles |
US8197334B2 (en) | 2007-10-29 | 2012-06-12 | Igt | Circulating data card apparatus and management system |
US8526743B1 (en) | 2010-11-01 | 2013-09-03 | Raf Technology, Inc. | Defined data patterns for object handling |
US9152862B2 (en) | 2011-09-15 | 2015-10-06 | Raf Technology, Inc. | Object identification and inventory management |
US9443298B2 (en) | 2012-03-02 | 2016-09-13 | Authentect, Inc. | Digital fingerprinting object authentication and anti-counterfeiting system |
US8774455B2 (en) | 2011-03-02 | 2014-07-08 | Raf Technology, Inc. | Document fingerprinting |
DE102011110478B4 (en) | 2011-08-17 | 2018-07-26 | Gottfried Wilhelm Leibniz Universität Hannover | Method for recognizing a three-dimensional object, device and computer program therefor |
US10346852B2 (en) | 2016-02-19 | 2019-07-09 | Alitheon, Inc. | Preserving authentication under item change |
EP3236401A1 (en) | 2016-04-18 | 2017-10-25 | Alitheon, Inc. | Authentication-triggered processes |
US10614302B2 (en) | 2016-05-26 | 2020-04-07 | Alitheon, Inc. | Controlled authentication of physical objects |
US10740767B2 (en) | 2016-06-28 | 2020-08-11 | Alitheon, Inc. | Centralized databases storing digital fingerprints of objects for collaborative authentication |
US10915612B2 (en) | 2016-07-05 | 2021-02-09 | Alitheon, Inc. | Authenticated production |
US10902540B2 (en) | 2016-08-12 | 2021-01-26 | Alitheon, Inc. | Event-driven authentication of physical objects |
US10839528B2 (en) | 2016-08-19 | 2020-11-17 | Alitheon, Inc. | Authentication-based tracking |
US11062118B2 (en) | 2017-07-25 | 2021-07-13 | Alitheon, Inc. | Model-based digital fingerprinting |
US11087013B2 (en) | 2018-01-22 | 2021-08-10 | Alitheon, Inc. | Secure digital fingerprint key object database |
US10963670B2 (en) | 2019-02-06 | 2021-03-30 | Alitheon, Inc. | Object change detection and measurement using digital fingerprints |
EP3734506A1 (en) | 2019-05-02 | 2020-11-04 | Alitheon, Inc. | Automated authentication region localization and capture |
EP3736717A1 (en) | 2019-05-10 | 2020-11-11 | Alitheon, Inc. | Loop chain digital fingerprint method and system |
US11238146B2 (en) | 2019-10-17 | 2022-02-01 | Alitheon, Inc. | Securing composite objects using digital fingerprints |
EP3859603A1 (en) | 2020-01-28 | 2021-08-04 | Alitheon, Inc. | Depth-based digital fingerprinting |
EP3885984A1 (en) | 2020-03-23 | 2021-09-29 | Alitheon, Inc. | Facial biometrics system and method of using digital fingerprints |
US11341348B2 (en) | 2020-03-23 | 2022-05-24 | Alitheon, Inc. | Hand biometrics system and method using digital fingerprints |
EP3929806A3 (en) | 2020-04-06 | 2022-03-09 | Alitheon, Inc. | Local encoding of intrinsic authentication data |
US11663849B1 (en) | 2020-04-23 | 2023-05-30 | Alitheon, Inc. | Transform pyramiding for fingerprint matching system and method |
US11983957B2 (en) | 2020-05-28 | 2024-05-14 | Alitheon, Inc. | Irreversible digital fingerprints for preserving object security |
US11700123B2 (en) | 2020-06-17 | 2023-07-11 | Alitheon, Inc. | Asset-backed digital security tokens |
CN114550382B (en) * | 2022-01-26 | 2023-07-04 | 南京科融数据系统股份有限公司 | ATM cashbox management method and system |
Family Cites Families (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US3637990A (en) * | 1969-10-31 | 1972-01-25 | Jack E Bayha | Credit card validator with transducer-readout |
DE2144760A1 (en) * | 1970-09-10 | 1972-03-16 | Int Standard Electric Corp | Magnetic card security system |
US4218674A (en) * | 1975-09-09 | 1980-08-19 | Dasy Inter S.A. | Method and a system for verifying authenticity safe against forgery |
US3984658A (en) * | 1975-09-26 | 1976-10-05 | Cannon John W | Programmable card actuated lock |
IT1101623B (en) * | 1977-11-22 | 1985-10-07 | Bsg Schalttechnik | LOCK DEVICE TO AVOID UNAUTHORIZED ACCESS |
FR2457524B1 (en) * | 1979-05-23 | 1985-11-15 | Chauvat & Sofranq Reunis | CODED CARD DOOR FOR SELECTIVE DOOR OPENING |
DE3011317C2 (en) * | 1980-03-24 | 1983-07-14 | Hermann 7742 St Georgen Stockburger | Method for identifying data carriers and device for carrying out the method |
US4568936A (en) * | 1980-06-23 | 1986-02-04 | Light Signatures, Inc. | Verification system for document substance and content |
US4519228A (en) * | 1981-04-01 | 1985-05-28 | Trioving A/S | Electronic recodeable lock |
LU83333A1 (en) * | 1981-05-04 | 1983-03-24 | Euratom | USE OF SURFACE TEXTURES AS A SINGLE IDENTITY MARK |
FR2533340A1 (en) * | 1982-09-17 | 1984-03-23 | Chauvat & Sofranq Reunis | Electronic lock with control by magnetic stripe card |
US4721956A (en) * | 1983-09-12 | 1988-01-26 | Demster Stanley J | Apparatus for converting key topography into electrical signals to effect key evaluation |
FR2582129B1 (en) * | 1985-02-21 | 1987-12-31 | Despres Jean Albert | METHOD FOR IDENTIFYING A VALUABLE OBJECT AND DEVICE FOR CARRYING OUT THIS METHOD |
-
1984
- 1984-07-23 FR FR8411643A patent/FR2567947B1/en not_active Expired
-
1985
- 1985-07-16 US US06/755,582 patent/US4677435A/en not_active Ceased
- 1985-07-19 EP EP85401498A patent/EP0172765B1/en not_active Expired
- 1985-07-19 AT AT85401498T patent/ATE47458T1/en not_active IP Right Cessation
- 1985-07-19 CA CA000487136A patent/CA1235779A/en not_active Expired
- 1985-07-19 DE DE8585401498T patent/DE3573819D1/en not_active Expired
-
1988
- 1988-10-05 US US07/253,630 patent/USRE33553E/en not_active Expired - Lifetime
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7667570B1 (en) | 2004-05-19 | 2010-02-23 | Lockheed Martin Corporation | Nanostructured combination key-lock |
Also Published As
Publication number | Publication date |
---|---|
CA1235779A (en) | 1988-04-26 |
FR2567947B1 (en) | 1986-12-26 |
FR2567947A1 (en) | 1986-01-24 |
DE3573819D1 (en) | 1989-11-23 |
ATE47458T1 (en) | 1989-11-15 |
EP0172765A1 (en) | 1986-02-26 |
USRE33553E (en) | 1991-03-12 |
US4677435A (en) | 1987-06-30 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP0172765B1 (en) | Access-control method and system involving the sensing of the texture of a surface | |
CA1164565A (en) | Personalized portable object such as a credit card | |
EP0589755B1 (en) | Game terminal | |
FR2471632A1 (en) | APPARATUS AND METHOD FOR ENCODING AND DECODING A CARD DELIVERED TO AN INDIVIDUAL BY AN ENTITY | |
FR2492135A1 (en) | APPARATUS FOR DISTRIBUTING OBJECTS AND ACQUIRING SERVICES | |
WO1996002899A1 (en) | Access control system for restricting access to authorised hours and renewing it using a portable storage medium | |
OA10739A (en) | Programmable electronic closing device | |
CA2547811A1 (en) | Method and system for automatically renting bicycles | |
FR2624285A1 (en) | CAR MANAGEMENT SYSTEM FOR PAID PARKING IN VEHICLES | |
FR2654236A1 (en) | METHOD FOR PROTECTING AGAINST THE FRAUDULENT USE OF MICROPROCESSOR CARDS, AND DEVICE FOR IMPLEMENTING SAME. | |
FR2568040A1 (en) | INSTALLATION FOR CONTROLLING AND CONTROLLING THE DIFFERENT LOCKED LOCKS OF AN ASSEMBLY | |
FR2642544A1 (en) | Data processing system with a security program | |
EP1012792B1 (en) | Method and installation for producing a personalised user identification card which cannot be forged | |
FR2473755A1 (en) | Secure electronic data processing for card terminal transactions - using non-erasable memory data for identification and controlled access erasable memory for transaction recording | |
EP0536040B1 (en) | Method for recording a new coded message, instead of a previous coded one recorded on a magnetic strip on a support document, by manual displacement of said document and system for carrying out this method | |
FR2765979A1 (en) | INDIVIDUAL COMPUTER TERMINAL CAPABLE OF COMMUNICATING WITH COMPUTER EQUIPMENT IN A SECURE WAY, AS WELL AS AN AUTHENTICATION PROCESS IMPLEMENTED BY SAID TERMINAL | |
FR2657793A1 (en) | CENTRIFUGATION APPARATUS WITH REMOVABLE ROTOR AND MEANS OF IDENTIFYING ROTORS. | |
FR2766949A1 (en) | SECURE MACHINE SYSTEM | |
EP1214695A1 (en) | Electronic card comprising in storage its bearer's identification | |
CA2156791C (en) | Process for transmitting information between a computerized control centre and a plurality of electronic postage machines | |
FR2770316A1 (en) | Secure contactless communication between terminal and card | |
FR2710769A1 (en) | System for processing the data from a microcircuit card, card and reader for this system and method of implementation | |
FR2911710A1 (en) | SYSTEM FOR MANAGING A SET OF GAME MACHINES | |
EP1498841A1 (en) | Multi application transponder chip and memory managing method therefore | |
WO1996038824A1 (en) | Device for storing small objects and for managing and monitoring entry and removal of such objects |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PUAI | Public reference made under article 153(3) epc to a published international application that has entered the european phase |
Free format text: ORIGINAL CODE: 0009012 |
|
AK | Designated contracting states |
Kind code of ref document: A1 Designated state(s): AT BE CH DE GB IT LI LU NL SE |
|
17P | Request for examination filed |
Effective date: 19860728 |
|
17Q | First examination report despatched |
Effective date: 19880426 |
|
GRAA | (expected) grant |
Free format text: ORIGINAL CODE: 0009210 |
|
AK | Designated contracting states |
Kind code of ref document: B1 Designated state(s): AT BE CH DE GB IT LI LU NL SE |
|
REF | Corresponds to: |
Ref document number: 47458 Country of ref document: AT Date of ref document: 19891115 Kind code of ref document: T |
|
REF | Corresponds to: |
Ref document number: 3573819 Country of ref document: DE Date of ref document: 19891123 |
|
ITF | It: translation for a ep patent filed |
Owner name: JACOBACCI & PERANI S.P.A. |
|
GBT | Gb: translation of ep patent filed (gb section 77(6)(a)/1977) | ||
PLBE | No opposition filed within time limit |
Free format text: ORIGINAL CODE: 0009261 |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: NO OPPOSITION FILED WITHIN TIME LIMIT |
|
26N | No opposition filed | ||
ITTA | It: last paid annual fee | ||
EPTA | Lu: last paid annual fee | ||
EAL | Se: european patent in force in sweden |
Ref document number: 85401498.2 |
|
PGFP | Annual fee paid to national office [announced via postgrant information from national office to epo] |
Ref country code: SE Payment date: 19990708 Year of fee payment: 15 |
|
PGFP | Annual fee paid to national office [announced via postgrant information from national office to epo] |
Ref country code: BE Payment date: 19990713 Year of fee payment: 15 |
|
PGFP | Annual fee paid to national office [announced via postgrant information from national office to epo] |
Ref country code: AT Payment date: 19990714 Year of fee payment: 15 |
|
PGFP | Annual fee paid to national office [announced via postgrant information from national office to epo] |
Ref country code: GB Payment date: 19990715 Year of fee payment: 15 |
|
PGFP | Annual fee paid to national office [announced via postgrant information from national office to epo] |
Ref country code: LU Payment date: 19990719 Year of fee payment: 15 |
|
PGFP | Annual fee paid to national office [announced via postgrant information from national office to epo] |
Ref country code: CH Payment date: 19990720 Year of fee payment: 15 |
|
PGFP | Annual fee paid to national office [announced via postgrant information from national office to epo] |
Ref country code: DE Payment date: 19990726 Year of fee payment: 15 |
|
PGFP | Annual fee paid to national office [announced via postgrant information from national office to epo] |
Ref country code: NL Payment date: 19990728 Year of fee payment: 15 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: LU Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20000719 Ref country code: GB Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20000719 Ref country code: AT Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20000719 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: SE Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20000720 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: LI Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20000731 Ref country code: CH Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20000731 Ref country code: BE Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20000731 |
|
BERE | Be: lapsed |
Owner name: ASSOCIATION POUR LA PROMOTION DE LA TECHNOLOGIE P Effective date: 20000731 Owner name: COMMUNAUTE EUROPEENNE DE L'ENERGIE ATOMIQUE EURAT Effective date: 20000731 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: NL Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20010201 |
|
GBPC | Gb: european patent ceased through non-payment of renewal fee |
Effective date: 20000719 |
|
REG | Reference to a national code |
Ref country code: CH Ref legal event code: PL |
|
EUG | Se: european patent has lapsed |
Ref document number: 85401498.2 |
|
NLV4 | Nl: lapsed or anulled due to non-payment of the annual fee |
Effective date: 20010201 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: DE Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20010501 |