EP2705506A1 - Procede d'authentification unitaire d'un objet materiel combinant cryptographie visuelle et signature matiere - Google Patents
Procede d'authentification unitaire d'un objet materiel combinant cryptographie visuelle et signature matiereInfo
- Publication number
- EP2705506A1 EP2705506A1 EP12725079.3A EP12725079A EP2705506A1 EP 2705506 A1 EP2705506 A1 EP 2705506A1 EP 12725079 A EP12725079 A EP 12725079A EP 2705506 A1 EP2705506 A1 EP 2705506A1
- Authority
- EP
- European Patent Office
- Prior art keywords
- image
- shared
- message
- images
- authentication method
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
- 239000000463 material Substances 0.000 title claims abstract description 110
- 238000000034 method Methods 0.000 title claims abstract description 66
- 230000000007 visual effect Effects 0.000 title claims description 32
- 230000001131 transforming effect Effects 0.000 claims abstract description 10
- 238000010276 construction Methods 0.000 claims description 24
- 238000012795 verification Methods 0.000 claims description 15
- 238000011426 transformation method Methods 0.000 claims description 11
- 230000003287 optical effect Effects 0.000 claims description 9
- 238000007639 printing Methods 0.000 claims description 8
- 239000003086 colorant Substances 0.000 claims description 5
- 230000002688 persistence Effects 0.000 claims description 2
- 230000002207 retinal effect Effects 0.000 claims description 2
- 230000009466 transformation Effects 0.000 abstract description 5
- 238000000605 extraction Methods 0.000 description 12
- 239000011159 matrix material Substances 0.000 description 12
- 238000006467 substitution reaction Methods 0.000 description 7
- 230000008569 process Effects 0.000 description 6
- 230000032683 aging Effects 0.000 description 5
- 230000004075 alteration Effects 0.000 description 4
- KXDAEFPNCMNJSK-UHFFFAOYSA-N benzene carboxamide Natural products NC(=O)C1=CC=CC=C1 KXDAEFPNCMNJSK-UHFFFAOYSA-N 0.000 description 4
- 230000002490 cerebral effect Effects 0.000 description 4
- 208000010877 cognitive disease Diseases 0.000 description 4
- 230000004770 neurodegeneration Effects 0.000 description 4
- 208000015122 neurodegenerative disease Diseases 0.000 description 4
- 229940100578 Acetylcholinesterase inhibitor Drugs 0.000 description 3
- 239000000544 cholinesterase inhibitor Substances 0.000 description 3
- 238000000354 decomposition reaction Methods 0.000 description 3
- 238000009826 distribution Methods 0.000 description 3
- 238000004519 manufacturing process Methods 0.000 description 3
- 238000004806 packaging method and process Methods 0.000 description 3
- 125000002572 propoxy group Chemical group [*]OC([H])([H])C(C([H])([H])[H])([H])[H] 0.000 description 3
- KAESVJOAVNADME-UHFFFAOYSA-N Pyrrole Chemical compound C=1C=CNC=1 KAESVJOAVNADME-UHFFFAOYSA-N 0.000 description 2
- 239000002253 acid Substances 0.000 description 2
- 230000015556 catabolic process Effects 0.000 description 2
- 239000000470 constituent Substances 0.000 description 2
- 238000006731 degradation reaction Methods 0.000 description 2
- 230000001419 dependent effect Effects 0.000 description 2
- 239000012634 fragment Substances 0.000 description 2
- 239000008194 pharmaceutical composition Substances 0.000 description 2
- 238000012545 processing Methods 0.000 description 2
- 230000004044 response Effects 0.000 description 2
- 150000003839 salts Chemical class 0.000 description 2
- 230000002269 spontaneous effect Effects 0.000 description 2
- MRNMYWNBLVJWKG-GASCZTMLSA-N 4-[3-[(3ar,6as)-3,3a,4,5,6,6a-hexahydro-1h-cyclopenta[c]pyrrol-2-yl]propoxy]benzamide Chemical compound C1=CC(C(=O)N)=CC=C1OCCCN1C[C@H]2CCC[C@H]2C1 MRNMYWNBLVJWKG-GASCZTMLSA-N 0.000 description 1
- 208000024827 Alzheimer disease Diseases 0.000 description 1
- 208000028698 Cognitive impairment Diseases 0.000 description 1
- 208000026139 Memory disease Diseases 0.000 description 1
- 230000008901 benefit Effects 0.000 description 1
- 210000003169 central nervous system Anatomy 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 230000007278 cognition impairment Effects 0.000 description 1
- 238000004891 communication Methods 0.000 description 1
- 238000012790 confirmation Methods 0.000 description 1
- 238000005520 cutting process Methods 0.000 description 1
- 230000003247 decreasing effect Effects 0.000 description 1
- 230000008021 deposition Effects 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- ASXBYYWOLISCLQ-HZYVHMACSA-N dihydrostreptomycin Chemical compound CN[C@H]1[C@H](O)[C@@H](O)[C@H](CO)O[C@H]1O[C@@H]1[C@](CO)(O)[C@H](C)O[C@H]1O[C@@H]1[C@@H](NC(N)=N)[C@H](O)[C@@H](NC(N)=N)[C@H](O)[C@H]1O ASXBYYWOLISCLQ-HZYVHMACSA-N 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 230000004438 eyesight Effects 0.000 description 1
- 230000000742 histaminergic effect Effects 0.000 description 1
- 238000001727 in vivo Methods 0.000 description 1
- 239000000976 ink Substances 0.000 description 1
- 238000002156 mixing Methods 0.000 description 1
- 238000000465 moulding Methods 0.000 description 1
- 230000007935 neutral effect Effects 0.000 description 1
- 238000012856 packing Methods 0.000 description 1
- 238000002360 preparation method Methods 0.000 description 1
- 239000002994 raw material Substances 0.000 description 1
- 230000009467 reduction Effects 0.000 description 1
- 230000000717 retained effect Effects 0.000 description 1
- 238000003860 storage Methods 0.000 description 1
- 239000000126 substance Substances 0.000 description 1
- 230000001225 therapeutic effect Effects 0.000 description 1
- 230000016776 visual perception Effects 0.000 description 1
- 238000012800 visualization Methods 0.000 description 1
- 239000009891 weiqi Substances 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/389—Keeping log of transactions for guaranteeing non-repudiation of a transaction
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T1/00—General purpose image data processing
- G06T1/0021—Image watermarking
- G06T1/0028—Adaptive watermarking, e.g. Human Visual System [HVS]-based watermarking
-
- G—PHYSICS
- G09—EDUCATION; CRYPTOGRAPHY; DISPLAY; ADVERTISING; SEALS
- G09C—CIPHERING OR DECIPHERING APPARATUS FOR CRYPTOGRAPHIC OR OTHER PURPOSES INVOLVING THE NEED FOR SECRECY
- G09C5/00—Ciphering apparatus or methods not provided for in the preceding groups, e.g. involving the concealment or deformation of graphic data such as designs, written or printed messages
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N2201/00—Indexing scheme relating to scanning, transmission or reproduction of documents or the like, and to details thereof
- H04N2201/32—Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
- H04N2201/3201—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
- H04N2201/3225—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title of data relating to an image, a page or a document
- H04N2201/3233—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title of data relating to an image, a page or a document of authentication information, e.g. digital signature, watermark
- H04N2201/3236—Details of authentication information generation
Definitions
- each material signature value is different from one material element to another or from one family of hardware elements to another, and each signature value can not be predicted even in presence of the material element or object except, of course, to know the algorithm implemented and, in the case of the algorithm described by FR 2 895 543, the decomposition base used and / or the extraction parameters of the material signature such as the shape of the acquisition window and / or its reading direction. In the latter case, the decomposition base and / or the extraction parameters can each be considered as a secret key for the extraction of the material signature.
- the material signature is identical or almost identical to that used during the construction of the authenticator system. Almost identical means that there is a small variation or difference between the material signatures extracted from the same region of the same material object.
- a recording in an analog form such as, for example, in a printed form in continuous tones
- the unit authentication performed by means of the method according to the invention has a perfect security and, moreover, a very great robustness and reliability insofar as it combines visual cryptography, whose perfect security is demonstrated and recognized. at the material signature which itself has a demonstrated randomness and can be reliably recalculated even after some alteration, including aging, of the material object.
- each new extraction material signature is identical or almost identical to that used during the construction of the authenticator system.
- the interpretation of the result of the superimposed control of the shared images can be performed by a user whose human visual system is able to read or recognize the message image and to interpret it even if this message image is partially altered.
- the human visual system makes it possible to recognize, from fragments, geometric shapes, images or letters, whereas from the same fragments an artificial vision system is not able to make any recognition.
- This possibility of recognition, despite possible alterations, offered by the human visual system is also valid in case of slight alterations of one of the shared images.
- the construction phase of an authenticator system comprises a step of recording the location of the region of the object from which the material signature is generated.
- a recording or representation in alphanumeric form means a recording or representation in a directly intelligible graphic form comprising numerical and / or alphabetic characters and / or ideograms.
- the alphanumeric representation of the material signature may be a series of 0 and 1 corresponding to said binary sequence, a representation in a decimal base or other of the number corresponding to this binary sequence.
- partial graphical representation of the value of the material signature it may, for example, be retained only some of the bits of the bit sequence represented by zeros or ones or by a number in a decimal base or other corresponding to the selected bits of the material signature.
- the support image can be of any kind.
- a support image may be selected from the following image types:
- a binary image such as an image with two visual components such as two distinct colors or two components, one of which has a specular behavior and the other of which has a diffusing behavior
- the support image may be a uniform image that does not include any information and, for example, a monochrome image such as a white image or a black image or an average uniform image resulting from a random distribution of pixels. 'a color and pixels of another color.
- the support image may, on the contrary, not be uniform and comprise information elements and / or identifiable forms. Such a support image may then allow indexing or visual identification insofar as the information it conveys is visible at the level of at least one of the shared images and can be interpreted by the human visual system and / or a visual system. reading or artificial optical recognition.
- an image of the structure of a region of the material object is to be understood as a graphical representation, possibly after optical or numerical processing, of the structure of a region of the object. equipment.
- This graphical representation can then be real size or involve a change of scale such as an enlargement or a reduction.
- the implementation of an enlargement then makes it easier to read the details of the structure, while the implementation of optical processing can facilitate the recognition of characteristic elements of the structure.
- the presentation steps being conducted in such a way that the user perceives the shared images as superimposed to allow the user to read the message image.
- the presentation steps are conducted successively so as to implement a phenomenon of retinal persistence in the user or other phenomenon of visual perception.
- At least one presentation step is performed by means of at least one printed shared image. This impression can then be performed on an opaque, translucent or transparent support.
- the verification phase comprises a step of downloading a shared image from a remote server.
- the invention is also directed to a method for transforming a binary message image and a support image, comprising at least one color plane, into n shared images that share the message image without leakage of information. , reflect the support image, and are intended to reveal the message image in the view of a user by presenting at least k distinct shared images, k satisfying the relation 2 ⁇ k ⁇ n.
- the method of transforming the support and message images comprises the following steps:
- Boolean matrices implementing two collections of transformation Boolean matrices, a first collection being associated with the reference binary value and a second collection being associated with the other binary value, the Boolean matrices being such that:
- At least one shared image is independent of the message image and each other shared image depends on the message image. This characteristic corresponds to the fact that in the framework of the shared image construction algorithm, explained above, at least one shared image results from a mask image independent of the message image and the other shared images each result from a mask image dependent on the message image.
- the collections of Boolean matrices are such that for a predetermined index J and any rank i, the line number J of the i-th matrix of the first collection C 0 is equal to the J-th line of the i-th 2nd matrix of the second collection Ci, the two collections having the same number of matrices, (cf figure 6)
- the resulting shared image of a mask image independent of the message image may be either said mask image or the result of applying the mask image to the support image .
- At least one shared image is independent of the support image and results from a mask image dependent on the message image, and the other shared images are each obtained by the application of the image. a mask image, depending on the message image, to the support image.
- each random sequence used comes from a material signature extracted from at least one structural characteristic of a region of a material object.
- the message image comprises a reference to the origin of the message.
- This reference can in particular be a secret mark.
- each random sequence is recorded.
- the method comprises a selection of the support cells for which a Boolean transformation matrix is drawn.
- the selection of the support cells is carried out randomly.
- the total number of the selected support cells corresponds to at least 50% of the number of pixels of the message image so as to guarantee a possible deciphering of the message by the human visual system.
- the transformation method according to the invention may also comprise a step of recording at least one of the shared images in printed form.
- FIG. 1 is a perspective view of a product that can be authenticated by means of the method according to the invention.
- FIG. 4 shows two shared images which form a visual authenticator system and which are constructed by the implementation of the method according to the invention with the support and message images illustrated respectively in FIG. 3 and FIG. 4.
- FIG. 5 shows an example two collections of Boolean matrices implemented for the construction of shared images.
- FIG. 6 illustrates another notation of the two collections of Boolean matrices of FIG. 5.
- FIG. 7 illustrates a device for extracting a material signature, as described in application FR 2 907 923, placed on the face upper product shown in Figure 1.
- FIG. 9 is the result of the superimposition of the shared images of FIG.
- FIG. 10 illustrates the rear face of the product shown in Figure 1, one of the two shared images shown in Figure 4 is recorded by printing on this rear face.
- FIG. 11 is another support image used in the context of the method according to the invention.
- the invention proposes to implement an authenticator system that allows a user to visually perform an authentication, associated with an identification, of a material object in his possession.
- object 0 may for example be a box or a packaging case as illustrated in Figure 1.
- material object provided that the latter comprises solid-state material whose process of evolution and / or spontaneous degradation is considerably longer than the delay between the phase of construction of the authenticator system and the verification phase .
- uch longer is meant that the delay, from which the first spontaneous evolutions or degradations take place, is at least two times greater, preferably at least one or two orders of magnitude greater, than the delay between build phase of the authenticator system and the verification phase.
- the construction of the visual authenticator system may be performed in the following manner in the case of a system of two shared image authenticators intended to be superimposed for the reading of the message M.
- the message image M comprises a given number of message pixels, for the illustrated example, 18720 image pixels of 5 cm by 6.5 cm (156 pixels x 120 pixels).
- the support image is divided into cells each associated with a pixel of the message image so that there are as many support cells as there are message pixels.
- Each of the support cells comprises a given number of adjacent pixels preferably greater than or equal to two and according to the illustrated example equal to four. It should be understood that the resolution of the support image is chosen so that, an area equal to that of the message image, the support image comprises enough pixels to be divided into as many support cells as there are pixels. picture.
- the support image S will comprise 74,880 pixels, ie a resolution of 312 pixels x 120 pixels for a surface of 5 cm by 6.5 cm.
- Each collection corresponds to one of the two possible values for each pixel of the message picture M.
- a first collection C 0 of matrix can, for example, correspond to the value 0 while the second collection Ci can correspond to the value 1.
- Each collection includes a number of sub-collections that each include as many matrices as there will be shared images.
- each collection corresponds to the columns of each collection C 0 , Ci.
- each collection comprises six sub-collections respectively C 0 i to C 06 and C to Ci 6 .
- Each sub-collection comprises, according to the illustrated example, two matrices corresponding to two support cells one of the first mask image Mqi and the other of the second mask image Mq 2 .
- the first line corresponds to the possible values of the cells of the first mask image while the second line corresponds to the possible values for the cells of the second mask image.
- the masks cells corresponding to the matrices of the sub-collections In a preferred form of implementation the two collections comprise the same number of sub-collections, however this is not necessary for the implementation of the invention.
- the second collection Ci which is implemented and it is randomly selected a sub-collection among the sub-collections C, C12, C13, C13, C M , C15 , Ci 6 .
- the top matrix of the selected sub-collection is then assigned to the first mask image while the bottom matrix is assigned to the second mask image.
- the mask images can be used directly to reveal a message image to a user by superimposing the mask images.
- the invention proposes however to implement the support image to build the shared images from the mask images.
- the use of the support image makes it possible to recognize or index the shared images, which is not possible with the mask images.
- the shared images have two levels of information, a first level offered by the support image accessible directly for each image distributed alone.
- the second level of information constituted by the message image is accessible only with the meeting of the two shared images
- the support image makes it possible to confer a more aesthetic appearance to the shared images.
- Each shared image is constructed by assigning to each pixel of the shared image the value of multiplying the values of the corresponding pixels of the mask image and the support image. By corresponding pixel it is necessary to hear a pixel having the same position in the mask or support image as the pixel in the shared image.
- the device used to ensure the extraction of the material signature during the construction of the shared images and / or the verification phase may include any type of image acquisition system such as for example a flatbed scanner, a linear USB scanner, a camera.
- the invention proposes to take advantage of the fact that the hazard used to construct the shared images is a material signature which has the characteristic of being able to be extracted on demand by being at each extraction identical or almost identical to the material signature used for the generation of shared images PI and P2.
- This characteristic of the material signature is also called a replayable character.
- it is proposed to record as previously the second shared image P2 by printing it on the object 0 while the first shared image PI is reconstructed at the time of the verification by the user.
- the message image M must be known or at least be usable at the time of construction of the second shared image.
- the human intelligible portion M1 of the message image may correspond to the first 22 bits of the material signature while the portion M2 interpretable by an artificial system may correspond to the first 576 bits of the material signature.
- the user When the user is in possession of the object 0 on which the second shared image P2 is printed, he can use a communicating terminal SP adapted to extract the material signature from the region R indicated on the upper face 1 of the object 0.
- the terminal SP is further adapted to generate with this material signature the message image M and the first shared image P1.
- the communicating terminal is further adapted to produce a photo of the second shared image P2 and to superimpose this image. last with the first shared image he has rebuilt.
- the invention proposes to use the replayable character of the signature material to allow a construction of the first shared image without knowledge of the message.
- the collections C 0 and Ci have the same number of sub-collections or columns and a row of a rank i of the first collection C 0 has the same matrices as the row of the same rank i of the second collection Ci
- the mask image of rank i is independent of the message image and depends solely on the material signature used.
- the line Mqi of the first collection C 0 is identical to the line Mqi of the second collection.
- the first mask image will therefore be independent of the message image and will depend only on the hazard used during the construction of the mask images, ie, in the context of the invention, the material signature.
- An implementation scenario for this third variant is to save by printing the second image shared on the object and then during the verification to build the first image shared with the extracted material signature as explained above.
- the support image used can then be an image of a part of the object or a predefined image stored in the device ensuring the reconstruction of the first mask image. It should be emphasized that the possibility of recognizing the support image from the second shared image allows the user to determine himself the support image to be implemented.
- the support image incorporated in the second shared image can provide the user with information on the location of the region of the object from which the material signature is extracted.
Landscapes
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Business, Economics & Management (AREA)
- Accounting & Taxation (AREA)
- Finance (AREA)
- Strategic Management (AREA)
- General Business, Economics & Management (AREA)
- Image Processing (AREA)
- Editing Of Facsimile Originals (AREA)
- Collating Specific Patterns (AREA)
- Reinforced Plastic Materials (AREA)
- Treatment And Processing Of Natural Fur Or Leather (AREA)
- Credit Cards Or The Like (AREA)
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
FR1153713A FR2974652A3 (fr) | 2011-05-01 | 2011-05-01 | Procede d'authentification unitaire d'un objet materiel au moyen d'un algorithme de cryptographie visuelle et d'une signature matiere |
FR1101548A FR2974651B1 (fr) | 2011-05-01 | 2011-05-19 | Procede d'authentification unitaire d'un objet materiel au moyen d'un algorithme de cryptographie visuelle et d'une signature matiere |
PCT/FR2012/050968 WO2012150411A1 (fr) | 2011-05-01 | 2012-04-30 | Procede d'authentification unitaire d'un objet materiel combinant cryptographie visuelle et signature matiere |
Publications (1)
Publication Number | Publication Date |
---|---|
EP2705506A1 true EP2705506A1 (fr) | 2014-03-12 |
Family
ID=44863067
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
EP12725079.3A Withdrawn EP2705506A1 (fr) | 2011-05-01 | 2012-04-30 | Procede d'authentification unitaire d'un objet materiel combinant cryptographie visuelle et signature matiere |
Country Status (6)
Country | Link |
---|---|
EP (1) | EP2705506A1 (zh) |
AR (1) | AR086145A1 (zh) |
BR (1) | BR112013028302A2 (zh) |
FR (2) | FR2974652A3 (zh) |
TW (1) | TW201246084A (zh) |
WO (1) | WO2012150411A1 (zh) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
FR3035253B1 (fr) | 2015-04-17 | 2020-12-04 | Oberthur Technologies | Procede de verification d'un dispositif de securite comportant une signature |
Family Cites Families (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4586711A (en) * | 1983-05-10 | 1986-05-06 | Glenn E. Weeks | Matching card game employing randomly-coded monochromatic images |
GB2282563A (en) * | 1993-10-07 | 1995-04-12 | Central Research Lab Ltd | A composite image arrangement for documents of value |
US5488664A (en) * | 1994-04-22 | 1996-01-30 | Yeda Research And Development Co., Ltd. | Method and apparatus for protecting visual information with printed cryptographic watermarks |
EP1577847A1 (fr) * | 2004-03-17 | 2005-09-21 | Elca Informatique S.A. | Procédé d'authentification de produits |
FR2895541B3 (fr) * | 2005-12-23 | 2008-04-18 | Signoptic Technologies Sarl | Procede d'extraction de signature aleatoire d'un element materiel |
EP2199098A1 (en) * | 2008-12-19 | 2010-06-23 | Gemalto SA | Anti-counterfeiting element for identification document, method for manufacturing such element, and secure identification document |
-
2011
- 2011-05-01 FR FR1153713A patent/FR2974652A3/fr not_active Withdrawn
- 2011-05-19 FR FR1101548A patent/FR2974651B1/fr active Active
-
2012
- 2012-04-27 AR ARP120101486 patent/AR086145A1/es not_active Application Discontinuation
- 2012-04-30 EP EP12725079.3A patent/EP2705506A1/fr not_active Withdrawn
- 2012-04-30 TW TW101115345A patent/TW201246084A/zh not_active IP Right Cessation
- 2012-04-30 WO PCT/FR2012/050968 patent/WO2012150411A1/fr active Application Filing
- 2012-04-30 BR BR112013028302A patent/BR112013028302A2/pt not_active IP Right Cessation
Non-Patent Citations (1)
Title |
---|
See references of WO2012150411A1 * |
Also Published As
Publication number | Publication date |
---|---|
FR2974651A1 (fr) | 2012-11-02 |
AR086145A1 (es) | 2013-11-20 |
FR2974652A3 (fr) | 2012-11-02 |
TW201246084A (en) | 2012-11-16 |
TWI563452B (zh) | 2016-12-21 |
WO2012150411A1 (fr) | 2012-11-08 |
FR2974651B1 (fr) | 2013-05-24 |
BR112013028302A2 (pt) | 2017-01-10 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP3539058B1 (fr) | Procédé pour l'authentification d'une illustration | |
EP2695147B1 (fr) | Code-barres de sécurité | |
EP2596479B1 (fr) | Procédés et dispositifs de marquage et d'authentification d'un produit par un consommateur | |
US9092872B2 (en) | System and method for creating an animation from a plurality of latent images encoded into a visible image | |
FR2895543A1 (fr) | Procede d'extraction de signatures aleatoires d'un element materiel et procede de generation d'une base de decomposition pour la mise en oeuvre du procede d'extraction | |
FR3070079B1 (fr) | Procede de signature electronique d'un document par une pluralite de signataires | |
WO2017198950A1 (fr) | Procédé d'authentification augmentée d'un sujet matériel | |
WO2017089736A1 (fr) | Procede d'authentification et/ou de controle d'integrite d'un sujet | |
JP2004529565A (ja) | 画素の基本要素を利用した暗号化/復号化装置及びその方法とそれを利用した暗復号化システム及びその方法 | |
EP2901440A2 (fr) | Procédé d'authentification d'un élément de sécurité par superposition de n images partagées en couleur et élément de sécurité mettant en oeuvre ce procédé | |
EP2705506A1 (fr) | Procede d'authentification unitaire d'un objet materiel combinant cryptographie visuelle et signature matiere | |
EP3729167B1 (fr) | Procédé de construction d'une image de sécurité par multiplexage d'images en couleurs | |
US20150028579A1 (en) | Method of unitary authentication of a hardware object comprising visual cryptography and material signature | |
CN109635905A (zh) | 二维码生成方法、装置及系统 | |
FR3008211A1 (fr) | Procede d'impression d'elements graphiques de securite interdependants | |
FR3077767A1 (fr) | Procédé d’entrelacement d’image à multiples canaux | |
WO2024104674A1 (fr) | Document de sécurité comprenant un motif de sous-pixels | |
CN113627577B (zh) | 一种三维码的生成方法及基于三维码的防伪溯源系统 | |
FR2997784A1 (fr) | Codage d'une image | |
CN105303383A (zh) | 手机大众识读证卡证件防伪方法及网络认证系统构成方法 | |
FR3044451A3 (fr) | Procede d'authentification par motif de glass | |
FR3057375A1 (fr) | Procede de lecture d'une serie de codes-barres bidimentionnels disposes sur un support, produit programme d'ordinateur et dispositif de lecture associes | |
FR3116759A1 (fr) | Procédé de fabrication d’un dispositif de sécurité et dispositif de sécurité associé | |
EP3459755A1 (fr) | Procédé d'insertion de motifs guillochés, procédé d'extraction de motifs guillochés, procédé d'authentification de ces motifs guillochés et dispositifs de mise en oeuvre | |
FR3012995A1 (fr) | Impression amelioree de dispositifs de securite |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PUAI | Public reference made under article 153(3) epc to a published international application that has entered the european phase |
Free format text: ORIGINAL CODE: 0009012 |
|
17P | Request for examination filed |
Effective date: 20131130 |
|
AK | Designated contracting states |
Kind code of ref document: A1 Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR |
|
RAP1 | Party data changed (applicant data changed or rights of an application transferred) |
Owner name: SIGNOPTIC TECHNOLOGIES |
|
DAX | Request for extension of the european patent (deleted) | ||
REG | Reference to a national code |
Ref country code: HK Ref legal event code: DE Ref document number: 1195657 Country of ref document: HK |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: THE APPLICATION IS DEEMED TO BE WITHDRAWN |
|
18D | Application deemed to be withdrawn |
Effective date: 20181101 |
|
REG | Reference to a national code |
Ref country code: HK Ref legal event code: WD Ref document number: 1195657 Country of ref document: HK |