FR2566152A1 - Method for identification and authentication, by anti-fraud mathematical code, which can be affixed to documents or objects and provides absolute protection against false use and protection for lost or stolen items - Google Patents

Method for identification and authentication, by anti-fraud mathematical code, which can be affixed to documents or objects and provides absolute protection against false use and protection for lost or stolen items Download PDF

Info

Publication number
FR2566152A1
FR2566152A1 FR8409549A FR8409549A FR2566152A1 FR 2566152 A1 FR2566152 A1 FR 2566152A1 FR 8409549 A FR8409549 A FR 8409549A FR 8409549 A FR8409549 A FR 8409549A FR 2566152 A1 FR2566152 A1 FR 2566152A1
Authority
FR
France
Prior art keywords
sep
fraud
key
test
multiplicand
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
FR8409549A
Other languages
French (fr)
Other versions
FR2566152B1 (en
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to FR8409549A priority Critical patent/FR2566152B1/en
Publication of FR2566152A1 publication Critical patent/FR2566152A1/en
Application granted granted Critical
Publication of FR2566152B1 publication Critical patent/FR2566152B1/en
Expired legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/08Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
    • G07F7/10Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/08Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
    • G07F7/10Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
    • G07F7/1025Identification of user by a PIN code
    • G07F7/1058PIN is checked locally
    • G07F7/1066PIN data being compared to data on card

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Credit Cards Or The Like (AREA)
  • Control Of Vending Devices And Auxiliary Devices For Vending Devices (AREA)

Abstract

It relates to a method for identification and authentication, by anti-fraud mathematical code, which can be affixed to documents or objects and provides absolute protection against false use and protection for lost or stolen items. It consists in making public (printed or etched with the explanatory symbols) on the item to be protected a ''TEST NUMBER'' which is the partial result of multiplication between a multiplicand and this same factor reversed; the latter is known only to the holder and serves as key. The partial product (the first figures) of the result of this operation is the ''TEST NUMBER'' which is made public, which can be reconstituted only by the bearer of the key. This coding is particularly intended for cheques, credit cards, Treasury bills, etc., or objects of value, paintings, etc.

Description

La présente invention concerne un procédé d'identification et d'authentification , par code mathématique anti fraude apposable sur documents ou objets et assurant une protection rigoureuse contre l'utilisation de f@@x et de pièces perdues ou volées . The present invention relates to a method of identification and authentication, by anti-fraud code affixable to documents or objects and providing a rigorous protection against the use of f @@ x and lost or stolen coins.

Actuellemant certains documents et- objet-s , perdus ou- vo- lés,sont utilisés fréquement par des tiers malgré les contrôles ( inéfficaces ) . D'autre part des faux circulent sans qu'il soit. possible de les détecter a la présentation . Currently some documents and objects, lost or lost, are used frequently by third parties despite (ineffective) controls. On the other hand fakes circulate without it being. possible to detect them at the presentation.

Ce codage selon l'invention rend le contrôle mathématique ,
C'est a dire rigoureux ; Il permet de détecter immédiatement toute utilisation frauduleuse de la pièce codée par un tiers non autorisé .
This coding according to the invention makes the mathematical control,
That is rigorous; It makes it possible to immediately detect any fraudulent use of the coded piece by an unauthorized third party.

Il permet également de détecter les faux , même parfaits ; en outre le contrôle signature , souvent aléatoire ( qu'il soit manuel ou éle@tronique ) n'est plus nécéssaire . It can also detect false, even perfect; moreover, the signature control, often random (whether manual or electronic) is no longer necessary.

Le principe consiste a rendre public sur la pièce a protéger ( imprimé ou gravé , avec les symboles explicatifs ) un " NOMBRE TEST ", produit partiel d'une multiplication dont le multiplicande ( nombre de chiffres en fonction de la sécurité recherchée ) et le multiplicateur , qui est le multiplicande inversé , ne sont connus que du titulaire et servent de clé . The principle consists in making public on the part to be protected (printed or engraved, with the explanatory symbols) a "NUMBER TEST", partial product of a multiplication of which the multiplicande (number of digits according to the security sought) and the multiplier , which is the inverted multiplicand, are known only to the holder and serve as a key.

Les premiers chiffres du résultat ( nombre identique au multiplicande ) représentent le " NOMBRE TEST " public , qui ne peut être reconstitué que pat le porteur de la clé (\multiplicande) la suite du résultat n'étant pas dévoilée *
Exemple Fe formule rendue publique :

Figure img00010001
The first figures of the result (number identical to the multiplicand) represent the public "TEST NUMBER", which can only be reconstituted by the holder of the key (\ multiplicand) following the result not being revealed *
Example Fe formula made public:
Figure img00010001

<tb> A <SEP> (8 <SEP> chiffres) <SEP> x <SEP> A <SEP> (inversé) <SEP> =
<tb> Le test; d'identification consiste pour le bénéficiaire g, respectant les indications ci-dessus , a " calculer l'identité " du porteur , en éffectuant l'opération grâce a la clé communiquée par celui ci ; c'est a dire dans l'exemple ci-dessus (( la clé étant un numéro de téléphone ; 7255 10 36 ) :

Figure img00010002
<tb> A <SEP> (8 <SEP> digits) <SEP> x <SEP> A <SEP> (inverted) <SEP> =
<tb> The test; identification consists for the recipient g, respecting the indications above, to "calculate the identity" of the carrier, performing the operation with the key provided by the latter; that is, in the example above ((the key being a telephone number; 7255 10 36):
Figure img00010002

<tb> 7255 <SEP> 10 <SEP> 36 <SEP> x <SEP> 63 <SEP> 01 <SEP> 5527
<tb> puis a vérifier que son résultat est bien identique au " NOMBR
TEST " public , ( temps total du test 15 secondes ) .
<tb> 7255 <SEP> 10 <SEP> 36 <SEP> x <SEP> 63 <SEP> 01 <SEP> 5527
<tb> then check that its result is identical to "NOMBR
TEST "public, (total test time 15 seconds).

Quant au contrôle d'authenticité , il est automatique , par le fait qu'une fausse pièce me peut porter son " NOMBRE
TEST " d'origine , car elle serait alors inutilisable ; le contrôle est donc rigoureux et pourrait être éffectué par le bénéficiaire , a condition d'être en liaison directe avec l'émetteur de la piène .
As for the control of authenticity, it is automatic, by the fact that a false piece can carry me its "NUMBER
TEST "original, because it would then be unusable, the control is therefore rigorous and could be made by the recipient, provided to be in direct contact with the issuer of the trap.

Ce " NOMBRE TEST " peut être composé par le titulaire , avec une clé personnelle , ce qui peimet une excellente mémorisation et assure une sécurité totale , car dans ce cas,même la banque émettrice d'un chéquier par exemple , ignore la clé du titulaire . This "NUMBER TEST" can be composed by the holder, with a personal key, which peimet an excellent memorization and ensures a total security, because in this case, even the bank issuing a checkbook for example, ignores the key of the holder .

Le degré de sécu rité ( nombre de combinaisons possibles) peut être dosé en fonction du nombre de chiffres utilisés ; dans l'exemple cité il est de 100 millions , avec une clé de 10 chiffres il serait de 10 milliards , mais pourrait tout aussi bien atteindre un niveau indécryptable même pour les ordinateurs les plus puissants . The degree of security (number of possible combinations) can be determined according to the number of digits used; in the example cited it is 100 million, with a 10-digit key it would be 10 billion, but could as well reach an undecipherable level even for the most powerful computers.

L'unique façon de décrypter ce code étant l'éssai de tout tes les combinaisone possibles ;
Ce codage selon l'invention concerne en premier lieu les chèques et cartes de crédit , particulièrement touchés par ce type de fraudes , mais également les bons du Trésor , livrets de Caisse d'Epargne , cartes d'identé etc...... , ainst que certains objets de valeur , tableau@@ etc........ .
The only way to decrypt this code is the trial of all your possible combinations;
This coding according to the invention relates primarily to checks and credit cards, particularly affected by this type of fraud, but also treasury bills, booklets Savings, identity cards etc ...... , ainst that some valuables, table @@ etc .........

Claims (6)

REVENDICATIONS I) Procédé d'identification et d'authentification par code mathématique anti fraude , apposable sur documents ou objets et assurant une protection rigoureuse contre l'utilisation de faux et de pièces perdues ou volées . I) Method of identification and authentication by anti fraud fraud code, affixable on documents or objects and providing rigorous protection against the use of forgery and lost or stolen coins. Caractérisé par le fait qu'est rendu public sur la pièce a protéger ( imprimé ou gravé avec les symboles d'utilisation ) un " NOMBRE TEST " , produit partiel d'u@e opération mat@ématique anti fraude ( multiplication ) , ce " NOMBRE TEST " ne pouvant être reconstitué que par le porteur de la clé ( multiplicande et multiplicatur ) . Characterized by the fact that a "TEST NUMBER", partial product of a mat @ ematic operation against fraud (multiplication), is made public on the part to be protected (printed or engraved with the use symbols). NUMBER TEST "can only be reconstituted by the holder of the key (multiplicand and multiplicatur). 2) Procédé selon la revendication I , caractérisé en ce que l'opération mathématique anti fraude consiste en une multiplication entre un multiplicande ( dont le nombre de chiffres dépend de la sécurité recherchée ) et un multiplicateur qui est le multiplicande inversé . 2) Method according to claim I, characterized in that the anti-fraud mathematical operation consists of a multiplication between a multiplicand (whose number of digits depends on the security sought) and a multiplier which is the inverted multiplicand. 3) Procédé selon l'une quelconque des revendications 1 et 2 , caractérisé en ce que le " NOMBRE TEST "public représentë semlement la première moitié du résultat de la multiplication ( #ê me nombre de chiffres que le multiplicande ) les autres m'étant pas dévoi lés . 3) A method according to any one of claims 1 and 2, characterized in that the "NUMBER TEST" public representemlement semlement the first half of the result of the multiplication (# ê number of digits than the multiplicande) the others being me not deviate. 4) Procédé selon l'une quelconque des revendications 1 a 3 , caractérisé en ce que les symboles d'utilisation et le "NOMBRE: 4) Method according to any one of claims 1 to 3, characterized in that the symbols of use and the "NUMBER: TEST " sont rendus public comme suit :TEST "are made public as follows:
Figure img00030001
Figure img00030001
<tb> <Tb> <tb> A <SEP> (8 <SEP> chiffres) <SEP> x <SEP> A <SEP> (inversé) <SEP> = <SEP> 457 <SEP> 18 <SEP> 417......<tb> A <SEP> (8 <SEP> digits) <SEP> x <SEP> A <SEP> (inverted) <SEP> = <SEP> 457 <SEP> 18 <SEP> 417 ...... "A" étant le multiplicande clé , avec le nombre de chiffres utilisés ; le contrôle devant respecter ces indications ."A" being the key multiplicand, with the number of digits used; the control must respect these indications.
5) Procédé selon l'une quelconque des revendications 1 a 4 , caractérisé en ce que le contrôle consiste pour le bénéficiaire , a retrouver le " NOMBRE TEST " public en éffectuant la multiplication 5) Method according to any one of claims 1 to 4, characterized in that the control consists for the recipient, to find the "NUMBER TEST" public by performing the multiplication
Figure img00030002
Figure img00030002
grâce a la clé communiquée par le porteur . thanks to the key communicated by the wearer.
6) Procédé selon l'une quelconque des revendications 1 a 3 , caractérisé par le fait que le " NOMBRE TEST " peut être composé par le seul titulaire , avec une clé personnelle g, ce qui. permet une excellente mémorisation et assure un secret total .  6) Method according to any one of claims 1 to 3, characterized in that the "NUMBER TEST" can be composed by the sole holder, with a personal key g, which. allows excellent memorization and ensures total secrecy.
FR8409549A 1984-06-19 1984-06-19 IDENTIFICATION AND AUTHENTICATION PROCESS, BY ANTI-FRAUD MATHEMATICAL CODE, APPLICABLE ON DOCUMENTS OR OBJECTS AND PROVIDING RIGOROUS PROTECTION AGAINST THE USE OF FALSE AND LOST OR STOLEN PIECES Expired FR2566152B1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
FR8409549A FR2566152B1 (en) 1984-06-19 1984-06-19 IDENTIFICATION AND AUTHENTICATION PROCESS, BY ANTI-FRAUD MATHEMATICAL CODE, APPLICABLE ON DOCUMENTS OR OBJECTS AND PROVIDING RIGOROUS PROTECTION AGAINST THE USE OF FALSE AND LOST OR STOLEN PIECES

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
FR8409549A FR2566152B1 (en) 1984-06-19 1984-06-19 IDENTIFICATION AND AUTHENTICATION PROCESS, BY ANTI-FRAUD MATHEMATICAL CODE, APPLICABLE ON DOCUMENTS OR OBJECTS AND PROVIDING RIGOROUS PROTECTION AGAINST THE USE OF FALSE AND LOST OR STOLEN PIECES

Publications (2)

Publication Number Publication Date
FR2566152A1 true FR2566152A1 (en) 1985-12-20
FR2566152B1 FR2566152B1 (en) 1987-09-11

Family

ID=9305166

Family Applications (1)

Application Number Title Priority Date Filing Date
FR8409549A Expired FR2566152B1 (en) 1984-06-19 1984-06-19 IDENTIFICATION AND AUTHENTICATION PROCESS, BY ANTI-FRAUD MATHEMATICAL CODE, APPLICABLE ON DOCUMENTS OR OBJECTS AND PROVIDING RIGOROUS PROTECTION AGAINST THE USE OF FALSE AND LOST OR STOLEN PIECES

Country Status (1)

Country Link
FR (1) FR2566152B1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
FR2605429A2 (en) * 1982-06-08 1988-04-22 Grafeille Jean Marie Method of monitoring the use of a document and documents for implementing it

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
FR1602509A (en) * 1968-07-24 1970-12-21
US3985998A (en) * 1970-11-18 1976-10-12 Century International Corporation Personal authority verification system
GB2114348A (en) * 1982-02-02 1983-08-17 Brian Joseph Burke Credit card checking method and apparatus
CA1157834A (en) * 1982-02-01 1983-11-29 Tadeusz P. Wojcik Integrated identity verification device

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
FR1602509A (en) * 1968-07-24 1970-12-21
US3985998A (en) * 1970-11-18 1976-10-12 Century International Corporation Personal authority verification system
CA1157834A (en) * 1982-02-01 1983-11-29 Tadeusz P. Wojcik Integrated identity verification device
GB2114348A (en) * 1982-02-02 1983-08-17 Brian Joseph Burke Credit card checking method and apparatus

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
IBM TECHNICAL DISCLOSURE BULLETIN, vol. 15, no. 7, décembre 1972, page 2289, New York, US; E.P. GOLDWASSER: "Credit card verification" *

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
FR2605429A2 (en) * 1982-06-08 1988-04-22 Grafeille Jean Marie Method of monitoring the use of a document and documents for implementing it

Also Published As

Publication number Publication date
FR2566152B1 (en) 1987-09-11

Similar Documents

Publication Publication Date Title
TR200002758T2 (en) Credit card system and method
US6073121A (en) Check fraud prevention system
ES2132362T3 (en) PROCEDURE AS A SECURITY CONCEPT AGAINST THE UNAUTHORIZED EMPLOYMENT OF A MEANS OF PAYMENT IN PAYMENT WITHOUT EFFECTIVE MONEY IN PLACES OF PAYMENT.
NO973856L (en) Electronic Transfer System and Procedure for Electronic Transfer of Capital Using an Automated Cashier to Deliver Transferred Capital
CA2218431A1 (en) Method and system of using personal information as a key when distributing information
US8209755B2 (en) Signaling a security breach of a protected set of files
HK1025650A1 (en) Value and security product with at least one security characteristic, and method for detection of the security characteristics
EP1402141B1 (en) Security device for transporting and/or storing paper items of value
FR2566152A1 (en) Method for identification and authentication, by anti-fraud mathematical code, which can be affixed to documents or objects and provides absolute protection against false use and protection for lost or stolen items
Hyman Bitcoin atm: A criminal's laundromat for cleaning money
US20020184143A1 (en) Khater plus system
Morris Crime and prevention: a Treasury viewpoint
Al Qaruty Virtual Currencies & Islamic Law: Origin, Features And Sharia Rulings
Abu Keynote Paper Digital Ringgit: A New Digital Currency with Traditional Attributes
Deep Socio economic impact and analytics of cashless economy
FR2708127A1 (en) Device for identifying the bearer or the sender of documents. Documents equipped with this device and use of these documents
Identity How Safe Is
Dumchykov INTERNATIONAL LEGAL STANDARDS FOR COMBATING FRAUD IN THE FIELD OF COMPUTER INFORMATION
IT1254010B (en) Process for the manufacture of a forgery-resistant (paper or non-paper) backing
Moise Some Comments On The Offence Of Carrying Out Of Financial Operations Fraudulently In Romanian Legislation
Kalan et al. Plastic Money Security Issues In India
CN1100544A (en) Electronic black box method for anti-fake and software protection of credit card, certificate and trade mark
Effross Cyper-Banking Gains Currency-And Interest
McNamara Mum's often the word when criminals come a-callin'
Reid iFacts-don't become a victim of identity theft and fraud this festive season

Legal Events

Date Code Title Description
ST Notification of lapse