FR2566152A1 - Method for identification and authentication, by anti-fraud mathematical code, which can be affixed to documents or objects and provides absolute protection against false use and protection for lost or stolen items - Google Patents
Method for identification and authentication, by anti-fraud mathematical code, which can be affixed to documents or objects and provides absolute protection against false use and protection for lost or stolen items Download PDFInfo
- Publication number
- FR2566152A1 FR2566152A1 FR8409549A FR8409549A FR2566152A1 FR 2566152 A1 FR2566152 A1 FR 2566152A1 FR 8409549 A FR8409549 A FR 8409549A FR 8409549 A FR8409549 A FR 8409549A FR 2566152 A1 FR2566152 A1 FR 2566152A1
- Authority
- FR
- France
- Prior art keywords
- sep
- fraud
- key
- test
- multiplicand
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F7/00—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
- G07F7/08—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
- G07F7/10—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F7/00—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
- G07F7/08—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
- G07F7/10—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
- G07F7/1025—Identification of user by a PIN code
- G07F7/1058—PIN is checked locally
- G07F7/1066—PIN data being compared to data on card
Landscapes
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Credit Cards Or The Like (AREA)
- Control Of Vending Devices And Auxiliary Devices For Vending Devices (AREA)
Abstract
Description
La présente invention concerne un procédé d'identification et d'authentification , par code mathématique anti fraude apposable sur documents ou objets et assurant une protection rigoureuse contre l'utilisation de f@@x et de pièces perdues ou volées . The present invention relates to a method of identification and authentication, by anti-fraud code affixable to documents or objects and providing a rigorous protection against the use of f @@ x and lost or stolen coins.
Actuellemant certains documents et- objet-s , perdus ou- vo- lés,sont utilisés fréquement par des tiers malgré les contrôles ( inéfficaces ) . D'autre part des faux circulent sans qu'il soit. possible de les détecter a la présentation . Currently some documents and objects, lost or lost, are used frequently by third parties despite (ineffective) controls. On the other hand fakes circulate without it being. possible to detect them at the presentation.
Ce codage selon l'invention rend le contrôle mathématique ,
C'est a dire rigoureux ; Il permet de détecter immédiatement toute utilisation frauduleuse de la pièce codée par un tiers non autorisé .This coding according to the invention makes the mathematical control,
That is rigorous; It makes it possible to immediately detect any fraudulent use of the coded piece by an unauthorized third party.
Il permet également de détecter les faux , même parfaits ; en outre le contrôle signature , souvent aléatoire ( qu'il soit manuel ou éle@tronique ) n'est plus nécéssaire . It can also detect false, even perfect; moreover, the signature control, often random (whether manual or electronic) is no longer necessary.
Le principe consiste a rendre public sur la pièce a protéger ( imprimé ou gravé , avec les symboles explicatifs ) un " NOMBRE TEST ", produit partiel d'une multiplication dont le multiplicande ( nombre de chiffres en fonction de la sécurité recherchée ) et le multiplicateur , qui est le multiplicande inversé , ne sont connus que du titulaire et servent de clé . The principle consists in making public on the part to be protected (printed or engraved, with the explanatory symbols) a "NUMBER TEST", partial product of a multiplication of which the multiplicande (number of digits according to the security sought) and the multiplier , which is the inverted multiplicand, are known only to the holder and serve as a key.
Les premiers chiffres du résultat ( nombre identique au multiplicande ) représentent le " NOMBRE TEST " public , qui ne peut être reconstitué que pat le porteur de la clé (\multiplicande) la suite du résultat n'étant pas dévoilée *
Exemple Fe formule rendue publique :
The first figures of the result (number identical to the multiplicand) represent the public "TEST NUMBER", which can only be reconstituted by the holder of the key (\ multiplicand) following the result not being revealed *
Example Fe formula made public:
<tb> A <SEP> (8 <SEP> chiffres) <SEP> x <SEP> A <SEP> (inversé) <SEP> =
<tb> Le test; d'identification consiste pour le bénéficiaire g, respectant les indications ci-dessus , a " calculer l'identité " du porteur , en éffectuant l'opération grâce a la clé communiquée par celui ci ; c'est a dire dans l'exemple ci-dessus (( la clé étant un numéro de téléphone ; 7255 10 36 ) :
<tb> A <SEP> (8 <SEP> digits) <SEP> x <SEP> A <SEP> (inverted) <SEP> =
<tb> The test; identification consists for the recipient g, respecting the indications above, to "calculate the identity" of the carrier, performing the operation with the key provided by the latter; that is, in the example above ((the key being a telephone number; 7255 10 36):
<tb> 7255 <SEP> 10 <SEP> 36 <SEP> x <SEP> 63 <SEP> 01 <SEP> 5527
<tb> puis a vérifier que son résultat est bien identique au " NOMBR
TEST " public , ( temps total du test 15 secondes ) .<tb> 7255 <SEP> 10 <SEP> 36 <SEP> x <SEP> 63 <SEP> 01 <SEP> 5527
<tb> then check that its result is identical to "NOMBR
TEST "public, (total test time 15 seconds).
Quant au contrôle d'authenticité , il est automatique , par le fait qu'une fausse pièce me peut porter son " NOMBRE
TEST " d'origine , car elle serait alors inutilisable ; le contrôle est donc rigoureux et pourrait être éffectué par le bénéficiaire , a condition d'être en liaison directe avec l'émetteur de la piène .As for the control of authenticity, it is automatic, by the fact that a false piece can carry me its "NUMBER
TEST "original, because it would then be unusable, the control is therefore rigorous and could be made by the recipient, provided to be in direct contact with the issuer of the trap.
Ce " NOMBRE TEST " peut être composé par le titulaire , avec une clé personnelle , ce qui peimet une excellente mémorisation et assure une sécurité totale , car dans ce cas,même la banque émettrice d'un chéquier par exemple , ignore la clé du titulaire . This "NUMBER TEST" can be composed by the holder, with a personal key, which peimet an excellent memorization and ensures a total security, because in this case, even the bank issuing a checkbook for example, ignores the key of the holder .
Le degré de sécu rité ( nombre de combinaisons possibles) peut être dosé en fonction du nombre de chiffres utilisés ; dans l'exemple cité il est de 100 millions , avec une clé de 10 chiffres il serait de 10 milliards , mais pourrait tout aussi bien atteindre un niveau indécryptable même pour les ordinateurs les plus puissants . The degree of security (number of possible combinations) can be determined according to the number of digits used; in the example cited it is 100 million, with a 10-digit key it would be 10 billion, but could as well reach an undecipherable level even for the most powerful computers.
L'unique façon de décrypter ce code étant l'éssai de tout tes les combinaisone possibles ;
Ce codage selon l'invention concerne en premier lieu les chèques et cartes de crédit , particulièrement touchés par ce type de fraudes , mais également les bons du Trésor , livrets de Caisse d'Epargne , cartes d'identé etc...... , ainst que certains objets de valeur , tableau@@ etc........ . The only way to decrypt this code is the trial of all your possible combinations;
This coding according to the invention relates primarily to checks and credit cards, particularly affected by this type of fraud, but also treasury bills, booklets Savings, identity cards etc ...... , ainst that some valuables, table @@ etc .........
Claims (6)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
FR8409549A FR2566152B1 (en) | 1984-06-19 | 1984-06-19 | IDENTIFICATION AND AUTHENTICATION PROCESS, BY ANTI-FRAUD MATHEMATICAL CODE, APPLICABLE ON DOCUMENTS OR OBJECTS AND PROVIDING RIGOROUS PROTECTION AGAINST THE USE OF FALSE AND LOST OR STOLEN PIECES |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
FR8409549A FR2566152B1 (en) | 1984-06-19 | 1984-06-19 | IDENTIFICATION AND AUTHENTICATION PROCESS, BY ANTI-FRAUD MATHEMATICAL CODE, APPLICABLE ON DOCUMENTS OR OBJECTS AND PROVIDING RIGOROUS PROTECTION AGAINST THE USE OF FALSE AND LOST OR STOLEN PIECES |
Publications (2)
Publication Number | Publication Date |
---|---|
FR2566152A1 true FR2566152A1 (en) | 1985-12-20 |
FR2566152B1 FR2566152B1 (en) | 1987-09-11 |
Family
ID=9305166
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
FR8409549A Expired FR2566152B1 (en) | 1984-06-19 | 1984-06-19 | IDENTIFICATION AND AUTHENTICATION PROCESS, BY ANTI-FRAUD MATHEMATICAL CODE, APPLICABLE ON DOCUMENTS OR OBJECTS AND PROVIDING RIGOROUS PROTECTION AGAINST THE USE OF FALSE AND LOST OR STOLEN PIECES |
Country Status (1)
Country | Link |
---|---|
FR (1) | FR2566152B1 (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
FR2605429A2 (en) * | 1982-06-08 | 1988-04-22 | Grafeille Jean Marie | Method of monitoring the use of a document and documents for implementing it |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
FR1602509A (en) * | 1968-07-24 | 1970-12-21 | ||
US3985998A (en) * | 1970-11-18 | 1976-10-12 | Century International Corporation | Personal authority verification system |
GB2114348A (en) * | 1982-02-02 | 1983-08-17 | Brian Joseph Burke | Credit card checking method and apparatus |
CA1157834A (en) * | 1982-02-01 | 1983-11-29 | Tadeusz P. Wojcik | Integrated identity verification device |
-
1984
- 1984-06-19 FR FR8409549A patent/FR2566152B1/en not_active Expired
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
FR1602509A (en) * | 1968-07-24 | 1970-12-21 | ||
US3985998A (en) * | 1970-11-18 | 1976-10-12 | Century International Corporation | Personal authority verification system |
CA1157834A (en) * | 1982-02-01 | 1983-11-29 | Tadeusz P. Wojcik | Integrated identity verification device |
GB2114348A (en) * | 1982-02-02 | 1983-08-17 | Brian Joseph Burke | Credit card checking method and apparatus |
Non-Patent Citations (1)
Title |
---|
IBM TECHNICAL DISCLOSURE BULLETIN, vol. 15, no. 7, décembre 1972, page 2289, New York, US; E.P. GOLDWASSER: "Credit card verification" * |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
FR2605429A2 (en) * | 1982-06-08 | 1988-04-22 | Grafeille Jean Marie | Method of monitoring the use of a document and documents for implementing it |
Also Published As
Publication number | Publication date |
---|---|
FR2566152B1 (en) | 1987-09-11 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
TR200002758T2 (en) | Credit card system and method | |
US6073121A (en) | Check fraud prevention system | |
ES2132362T3 (en) | PROCEDURE AS A SECURITY CONCEPT AGAINST THE UNAUTHORIZED EMPLOYMENT OF A MEANS OF PAYMENT IN PAYMENT WITHOUT EFFECTIVE MONEY IN PLACES OF PAYMENT. | |
NO973856L (en) | Electronic Transfer System and Procedure for Electronic Transfer of Capital Using an Automated Cashier to Deliver Transferred Capital | |
CA2218431A1 (en) | Method and system of using personal information as a key when distributing information | |
US8209755B2 (en) | Signaling a security breach of a protected set of files | |
HK1025650A1 (en) | Value and security product with at least one security characteristic, and method for detection of the security characteristics | |
EP1402141B1 (en) | Security device for transporting and/or storing paper items of value | |
FR2566152A1 (en) | Method for identification and authentication, by anti-fraud mathematical code, which can be affixed to documents or objects and provides absolute protection against false use and protection for lost or stolen items | |
Hyman | Bitcoin atm: A criminal's laundromat for cleaning money | |
US20020184143A1 (en) | Khater plus system | |
Morris | Crime and prevention: a Treasury viewpoint | |
Al Qaruty | Virtual Currencies & Islamic Law: Origin, Features And Sharia Rulings | |
Abu | Keynote Paper Digital Ringgit: A New Digital Currency with Traditional Attributes | |
Deep | Socio economic impact and analytics of cashless economy | |
FR2708127A1 (en) | Device for identifying the bearer or the sender of documents. Documents equipped with this device and use of these documents | |
Identity | How Safe Is | |
Dumchykov | INTERNATIONAL LEGAL STANDARDS FOR COMBATING FRAUD IN THE FIELD OF COMPUTER INFORMATION | |
IT1254010B (en) | Process for the manufacture of a forgery-resistant (paper or non-paper) backing | |
Moise | Some Comments On The Offence Of Carrying Out Of Financial Operations Fraudulently In Romanian Legislation | |
Kalan et al. | Plastic Money Security Issues In India | |
CN1100544A (en) | Electronic black box method for anti-fake and software protection of credit card, certificate and trade mark | |
Effross | Cyper-Banking Gains Currency-And Interest | |
McNamara | Mum's often the word when criminals come a-callin' | |
Reid | iFacts-don't become a victim of identity theft and fraud this festive season |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
ST | Notification of lapse |