GB2291522A - Authentication technique - Google Patents

Authentication technique Download PDF

Info

Publication number
GB2291522A
GB2291522A GB9513946A GB9513946A GB2291522A GB 2291522 A GB2291522 A GB 2291522A GB 9513946 A GB9513946 A GB 9513946A GB 9513946 A GB9513946 A GB 9513946A GB 2291522 A GB2291522 A GB 2291522A
Authority
GB
United Kingdom
Prior art keywords
data
storage means
article
card
storing
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
GB9513946A
Other versions
GB2291522B (en
GB9513946D0 (en
Inventor
Michael Fernand Alexand Derome
Andrew Laurence Smith
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Thorn Secure Science Ltd
Original Assignee
Thorn Secure Science Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Thorn Secure Science Ltd filed Critical Thorn Secure Science Ltd
Publication of GB9513946D0 publication Critical patent/GB9513946D0/en
Publication of GB2291522A publication Critical patent/GB2291522A/en
Application granted granted Critical
Publication of GB2291522B publication Critical patent/GB2291522B/en
Anticipated expiration legal-status Critical
Expired - Fee Related legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/08Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
    • G07F7/10Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
    • G07F7/1016Devices or methods for securing the PIN and other transaction-data, e.g. by encryption
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/08Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/08Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
    • G07F7/086Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means by passive credit-cards adapted therefor, e.g. constructive particularities to avoid counterfeiting, e.g. by inclusion of a physical or chemical security-layer

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Credit Cards Or The Like (AREA)
  • Signal Processing For Digital Recording And Reproducing (AREA)
  • Storage Device Security (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

A dual-secure authentication technique takes advantage of the inherently secure nature of certain data storage media, such as that based upon the structural variation, from place to place over a strip, of magnetic characteristic, to attach to a valued article a secure identity code. The security is further enhanced by incorporating that code, together with further data, "signing" the code and further data using the secret key of a crytosystem pair and attaching the signed information to the article. Authentication requires the signed information to be de-crypted using the public key of the cryptosystem pair and ensuring that the code so recovered tallies with that recorded in the secure medium. <IMAGE>

Description

AUTHENTICATION TECHNIQUE This invention relates to a technique for authenticating products, cards, tokens and the like so as to combat illicit copying thereof.
Copying of products, cards, tokens and the like (hereinafter referred to generally as "valued articles" to avoid repetition) is a major problem and various techniques have been devised to combat such copying. In particular, techniques have been devised based upon the inclusion, on valued articles1 of twin sets of data, one set being characteristic of the holder of the valued article or its producer or issuer (as the case may be) and the other set being derived from the first set by some unique route that is difficult to replicate.When the valued article is to be authenticated, the two sets of data included thereon are read, the derivative set by way of a device which is conscious of the aforementioned unique route, and the two sets of data thus recovered are compared to authenticate the valued article, or at least to show that the person purporting to be the owner or holder of the valued article is not an impostor.
Techniques of this general kind are described for example in United States Patents nos. 4,879,747 and 4,995,081 to Leighton and Micali.
This invention aims to further improve upon such techniques by (inter alia) taking advantage of certain special characteristics of recording media available for incorporation in valued articles.
According to a first aspect of the invention, there is provided an authentication means for an article of value, comprising first and second data-storage means being carried by the article, each data-storage means storing data for authenticating or identifying the article and/or a transaction associated with the article, the first data-storage means storing first data as a non-random permanently structured magnetic characteristic which varies from place to place on the first storage means, the second storage means storing data obtained by operation of the secret key of a secret key/public key cryptosystem pair upon data comprising the first data and additional data Such an authentication means can make copying and counterfeiting more difficult than with a permanently structured magnetic characteristic alone whilst enabling conventional read heads to be employed to read the data in the first storage means.
According to a second aspect of the invention, there is provided a method of authenticating an article of value, comprising: a) storing authentification data in a first storage means carried by the article as a non-random permanently structured magnetic characteristic which varies from place to place on the storage means, b) operating on said authentification data and additional data using the secret key of a secret key/public key cryptosystem pair hereby creating encrypted data, c) storing the encrypted data in a second storage means carried by the article, d) reading the encrypted data from the second storage means, e) operating on the encrypted data with the public key of said cryptosystem pair to give decrypted authentification data and decrypted additional data, and f) comparing the decrypted authentification data with the authentification data stored in the first storage means thereby authenticating the article of value and/or the additional data..
In order that the invention may be clearly understood and readily carried into effect, some embodiments of the invention will now be described (by way of example only) with reference to the accompanying drawings, of which: Figure 1 shows a credit card which can be authenticated by means of one example of the invention, and Figure 24 illustrates schematically and by way of example the operation of various features of the invention in a typical transaction.
Figure 5 shows a block diagram of a method of authentication according to an aspect of the invention.
Referring now to Figure 1, there is shown in outline a technique in accordance with one example of this invention.
A valued article, in this case a credit card, is shown schematically at 1. The credit card 1 comprises conventional printed and/or embossed material 2 including holograms and trade marks or logos characteristic of the card issuing and/or handling company. There is also open information about the card holder and open account information and, on the reverse side, a signature strip 3 and a magnetic strip 4.
In accordance with this example of the invention, the magnetic strip 4 is formed with a magnetic watermark in the manner described, for example, in UK patent no.
1331604 whereby a structural variation of a magnetic characteristic from place to place along the strip is indelibly formed into the strip. This information can be read quite readily but the structural variation is exceedingly difficult to replicate in any manner which is not immediately rejected by the technique used to read the relevant information. Thus the information stored on the card 1 in strip 4 although overt is secure. Tape containing the structural function described above is marketed by THORN Secure Science International Ltd under the trade mark Watermark Magnetism and thus the structural variation aforesaid will be referred to hereinafter as a magnetic watermark.
To add further security, however, this example of the invention provides that the information recorded indelibly in strip 4, together with further information, is operated on, as described hereinafter, to generate a second piece of information which (hereinafter called a "certificate") is also recorded on the card 1, but in a conventional "soft magnetic" form; either on the strip 4 itself or on a further strip (not shown). It will be appreciated that information can be recorded conventionally on strip 4, superimposed upon the structural variations which have been referred to hereinbefore.Usually, there are two or more tracks of the strip 4 which are assigned to conventionally recorded data, and the strip is read by a composite head which contains normal magnetic heads for the conventionally recorded information and one or more special heads for the information recorded by structural variation.
The operation upon the information recorded indelibly in strip 4 referred to above comprises, in its most basic form, signature by the secret key of a cryptosystem pair. The signed information is recorded on the card 1, in this example on one of the tracks of strip 4 read by a conventional head. It can thus be reproduced and, after being operated on by the public key of the cryptosystem pair to "de-sign" it, compared with the information indelibly recorded as described earlier, to confirm that the "de-signed" information contains information which matches that recorded indelibly as the magnetic watermark.
Thus not only is the card authenticated as genuine because it contains the magnetic watermark but also the transaction information recorded less securely on the card is authenticated because it contains the signed version of the watermark.
This prevents watermarked cards being acquired illegally and false information entered in the accessible, conventional recording tracks. It also enables the logistics of card manufacture and distribution to be made more secure, because card stock is useless without the watermarked magnetic stripe and vice versa, and even if the two are acquired together, they cannot be used without knowledge of the secret code used to sign the watermarked information for incorporation in the certificate to be recorded conventionally on the card.
Thus, in principle, the watermarked information is easy to read but difficult to replicate in a manner that will not be rejected on reading, and the conventionally recorded information, whilst easily read and replicated, does not reveal its connection through the secret key to the watermarked information.
The conventionally recorded information need not be recorded on the strip 4. It could, for example, be recorded on a separate magnetic strip on the card, or in a different medium altogether, such as an integrated circuit chip. In this latter event, the chip can be relatively cheap since it is not required to contain high levels of security or complex anticopying procedures. In essence it operates as a low-level storage medium only.
The certificate information which is conventionally recorded, eg., on strip 4 or on a separate strip or in a chip, can usefully comprise a commencement date for the card's utility and also other information, such as the expiry date, credit limit, transaction availability and one or more pieces of information about the card-holder and/or biometric information derived from and characteristic to the holder.
In particular, the maiden name of the holder's mother might be included, as may basic physiological information such as height, hair colour, eye colour, etc., or a scan of a fingerprint or some other data peculiar to the card holder. In this latter respect, a particularly beneficial technique for deriving fingerprint data in a form that readily lends itself to recordal as described above is described in European Patent Application No.91302280.2 (Publication No. 450786), the contents of which are incorporated herein by reference.
The invention may, as mentioned previously, be used on a wide variety of value articles, such as (without limitation) sound recordings, spirits, vehicle components, and a wide range of secure documents, such as passports, identity cards, driving licences and the like.
It will be appreciated that, since the information recorded together with the signed version of the magnetic watermark, in the certificate contains a number of conformatory and/or instructional pieces of information, all of that information can be trusted as being genuine, since it was signed together with the watermark information, using the secret key.
Thus nothing that is outside the control of the card issuerlmanufacturer needs to be treated secretly or kept in confidence.
The strength of the magnetic watermark and the use of the secret key is all that is required to obtain the significantly improved level of security provided by this invention.
Thus, the technique ensures that valued articles cannot be used before they have officially been issued, or after they have expired. For off-line transactions, the reader can be sure that card expiry data and credit limits, for example are genuine. If the off-line reader includes biometric sensing, the reader can also be sure that the registered card holder is present. During on-line operations, the credit limit, expiry date and PIN (if present) can be up-dated if required since the central computer can generate a new signed certificate to be written on the card.
Conveniently RSA public key cryptography is used, but alternative procedures can be used if desired. In any event, a particular "certificate" (ie., signed information including the watermark data) is relevant only to one specific card and could only have been generated by one specific issuer - the one with access to the secret key of the RSA (or other) cryptosystem pair. As a result, the certificate can be stored on a soft magnetic track with no loss of security.
Some refinements of and enhancements to the invention will now be described in order to explain more fully the operation of a typical system.
Secure operation of an extended system is largely concerned with communication among system components, some of which are more trusted than others. The functionality of several of those data links which are particularly relevant to valued articles, protected as described hereinbefore, will now be described.
A simplified diagram of key usage is shown in Fig. 2. As it is based on RSA public key cryptography, only the public keys are communicated. Each secret key remains in a highly secure location, within the organisation that generated it.
The system provides public key (PPK) is stored within each card reader (CAD), in a memory location which cannot be overwritten. It is used by the CAD to check other data that has been signed by the provider, and is therefore trustworthy.
An example of this is each issuer's public key (IPK), which is signed by the system provider's secret key (PSK), as shown above.
In practice, there will be large numbers of CADs, each holding the same data. In addition, each CAD holds its own unique key (not shown), which distinguishes it from all other CADs, and enables it to communicate unambiguously with the issuer.
To initialise a card, the issuer first collects all the data that the CAD might need to know about the card holder and the card, as shown in Fig. 3 in a block marked DATA.
This includes the number recorded as the magnetic watermark, the PAN, expiry date, PIN policy, and so on, and is sufficient for the CAD to decide when an off-line transaction is appropriate.
The DATA block, when signed by the issuer's secret key (ISK), becomes the secure certificate, which is then copied onto a soft data area on the card.
In normal use, the CAD reads the certificate from the card, and decrypts the original data The production of updated certificates on-line also follows the above procedure, the CAD acting as intermediary between the issuer and the card.
The card is preferably provided with a transaction counter, which resides on the card, and the main purpose of which is to restrict the number of off-line transactions allowed before a new certificate is required. In addition, the availability of a transaction count allows the issuer to carry out further checks against attempted fraud. Printing the transaction number on each receipt gives the card holder a convenient indication of card usage.
In Fig. 4 the CAD has read the DATA block from the certificate, as described above. Held within the data block is the issuer's off-line policy, and the maximum off-line transaction count. The CAD also reads the card transaction count (CTC) from the card. It then has enough information to decide whether the transaction can continue off-line or not.
In either case, provided that the transaction is approved, the CAD increments the CTC on the card, and prints the CTC as part of the card holder's receipt.
The increment line to the card has been shown in Fig. 4 as a separate connection, for clarity. In practice, it would be part of a digital interface, whose operation could not really be blocked. To check that the transaction count has indeed incremented, the CAD re-reads the new transaction count from the card.
It is highly unusual for systems to be provably secure. Even when a system is believed to be secure, it is wise to plan for the contingency that supposedly secret information might become public knowledge. In the system described, the secret key of the system provider, and the secret keys of the issuers, should be kept securely. However, even if these keys become known, the system provided by this invention can be reconfigured, quickly and economically to use new key sets.
For instance, suppose that an issuer's secret key becomes known. The consequent threat is that a fraudster might produce certificates purporting to come from the issuer, and thereby use out-ofdate cards for off-line transactions.
To recover from this situation, the issuer generates a new key set, and gets the public key signed by the system provider. As each CAD comes on-line, the suspect public key is replaced by the new one. To allow this, the CAD must have a protocol which allows issuer keys to be updated. As the new key is signed by the system provider, it can be accepted by the CAD as genuine.
Then, as each card is presented to the updated CAD, any card using the old public key is given an on-line transaction, which results is its next certificate being signed with the new public key. Furthermore, an updated card, when presented to a CAD which was still using the old public key, would result in an on-line transaction during which the CAD would be updated.
Thus the procedure required to change the issuer's public key is secure, fast, economical, and transparent to the user.
The procedure for updating the system provider's key is similar, but somewhat more complex, since the system provider is the centre of trust. One option is to store a choice of system provider public keys in each CAD, when the system is initialised If one key becomes compromised, the system can move over to the next key. This involves re-signing all the issuer's keys, and updating the CADs as and when they come on line. The cards need not be updated. As before, the change is transparent to the user.
In the event that the article contains a PIN, that information may be secured within a relatively inaccessible region of an integrated circuit chip. In this case, the card itself can check the PIN when keyed in. Alternatively, an encrypted PIN may be stored within the "certificate" on the article and the CAD can then check the PIN, as is presently done at offline ATMs.
In another embodiment, the integrated circuit chip is replaced by a two dimensional bar code which can be read optically.
Figure 5 shows a flow diagram of a method according to the second aspect of the invention. The blocks have the following significances. Block 50 denotes storing authentification data in a first storage means carried by the article as a non-random permanently structured magnetic characteristic which varies from place to place on the storage means.
Block 51 denotes operating on said authentification data and additional data using the secret key of a secret key/public key cryptosystem pair hereby creating encrypted data.
This will normally be performed by, for example, the card issuing authority in the case of credit or other cards.
Block 52 denotes storing the encrypted data in a second storage means carried by the article.
Block 53 denotes reading the encrypted data from the second storage means.
Block 54 denotes operating on the encrypted data with the public key of said cryptosystem pair to give decrypted authentification data and decrypted additional data.
This will normally be performed by, for example, the card reading machine in the field in the case of credit or other cards.
Block 55 denotes comparing the decrypted authentiiication data with the authentification data stored in the first storage means thereby authenticating the article of value and/or the additional data. This will normally also be performed by the card reading system.
In general, the data stored in the second storage means may be read magnetically, optically or electronically depending upon the nature of the storage means employed.

Claims (9)

1. Authentication means for an article of value, comprising first and second data storage means being carried by the article, each data-storage means storing data for authenticating or identifying the article andlor a transaction associated with the article, the first data-storage means storing first data as a non-random permanently structured magnetic characteristic which varies from place to place on the first storage means, the second storage means storing data obtained by operation of the secret key of a secret key/public key cryptosystem pair upon data comprising the first data and additional data.
2. Authentication means according to claim 1 in which the first and second storage means comprise respective tracks on a common magnetic strip.
3. Authentication means according to claim 1 in which the second storage means comprises a magnetic strip seperate from said first storage means.
4. Authentication means according to claim 1 in which the second storage means is carried by the first storage means.
5. Authentication means according to claim 1 in which the second storage means comprises a two dimensional bar code.
6. Authentication means according to claim 1 in which the second storage means comprises an integrated circuit.
7. Authentication means according to claim 6 in which the integrated circuit includes relatively open and relatively secure data storage areas, the relatively secure data storage area storing a personal identification number (PIN) associated with an authorized user or possessor of the article of value.
8. An article of value having authentication means according to any preceding claim carried thereby
9. A method of authenticating an article of value, comprising: a) storing authentification data in a first storage means carried by the article as a non-random permanently structured magnetic characteristic which varies from place to place on the storage means, b) operating on said authentification data and additional data using the secret key of a secret keylpublic key cryptosystem pair hereby creating encrypted data, c) storing the encrypted data in a second storage means carried by the article, d) reading the encrypted data from the second storage means, e) operating on the encrypted data with the public key of said cryptosystem pair to give decrypted authentification data and decrypted additional data, and f) comparing the decrypted authentification data with the authentification data stored in the first storage means thereby authenticating the article of value and/or the additional data..
GB9513946A 1994-07-15 1995-07-07 Authentication technique Expired - Fee Related GB2291522B (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
GB9414368A GB9414368D0 (en) 1994-07-15 1994-07-15 Authentication technique

Publications (3)

Publication Number Publication Date
GB9513946D0 GB9513946D0 (en) 1995-09-06
GB2291522A true GB2291522A (en) 1996-01-24
GB2291522B GB2291522B (en) 1997-04-30

Family

ID=10758427

Family Applications (2)

Application Number Title Priority Date Filing Date
GB9414368A Pending GB9414368D0 (en) 1994-07-15 1994-07-15 Authentication technique
GB9513946A Expired - Fee Related GB2291522B (en) 1994-07-15 1995-07-07 Authentication technique

Family Applications Before (1)

Application Number Title Priority Date Filing Date
GB9414368A Pending GB9414368D0 (en) 1994-07-15 1994-07-15 Authentication technique

Country Status (11)

Country Link
EP (1) EP0771452A1 (en)
JP (1) JPH10503037A (en)
KR (1) KR970705106A (en)
CN (1) CN1152968A (en)
AU (1) AU682778B2 (en)
BR (1) BR9508281A (en)
CA (1) CA2195003A1 (en)
GB (2) GB9414368D0 (en)
TW (1) TW278167B (en)
WO (1) WO1996002901A1 (en)
ZA (1) ZA955824B (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO1998055970A1 (en) * 1997-06-05 1998-12-10 Dix It S.R.L. Method for ascertaining the authenticity of a predetermined product
FR2771196A1 (en) * 1997-11-19 1999-05-21 Jacques Rivailler Ensuring traceability of successive elements in series of transformations
FR2815155A1 (en) * 2000-10-09 2002-04-12 Jacques Rivaillier Marking and identification to secure a computer file, uses an alphabet formed by coding bits in terms of physical parameters of the data and integrates this into the file representation
WO2003043000A1 (en) * 2001-10-10 2003-05-22 Jacques Rivaillier Method of marking, identifying and securing computer files, documents, sounds and chemical compounds

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR100974412B1 (en) * 2001-12-18 2010-08-05 더 루드로우 컴퍼니 엘피 A cable assembly and a method for manufacturing the cable assembly
US7137553B2 (en) * 2001-12-31 2006-11-21 Digital Data Research Company Security clearance card, system and method of reading a security clearance card
CN101596820B (en) * 2008-06-03 2010-08-18 北京中维华盾科技发展有限公司 Method for making fingerprint encryption certificates and cards
US8742369B2 (en) 2010-11-01 2014-06-03 Honeywell International Inc. Value documents and other articles having taggants that exhibit delayed maximum intensity emissions, and methods and apparatus for their authentication
US20150295919A1 (en) * 2014-04-09 2015-10-15 De Sonneville International Ltd. Self-authenticating card
US9590983B2 (en) 2014-04-09 2017-03-07 Cardex Systems Inc. Self-authenticating chips

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US3927393A (en) * 1973-05-02 1975-12-16 Minnesota Mining & Mfg Magnetic record medium authentication system
US4806740A (en) * 1986-09-19 1989-02-21 Light Signatures, Inc. Magnetic characteristic identification system
US4837426A (en) * 1987-01-16 1989-06-06 Rand, Mcnally & Company Object verification apparatus and method
FR2618002B1 (en) * 1987-07-10 1991-07-05 Schlumberger Ind Sa METHOD AND SYSTEM FOR AUTHENTICATING ELECTRONIC MEMORY CARDS
FR2657981A1 (en) * 1990-02-05 1991-08-09 Kodak Pathe Process for certifying an information carrier and carrier obtained according to the process
EP0583709B1 (en) * 1992-08-17 1999-05-06 THOMSON multimedia Unforgeable identification device, identification device reader and method of identification
US5388158A (en) * 1992-11-20 1995-02-07 Pitney Bowes Inc. Secure document and method and apparatus for producing and authenticating same

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO1998055970A1 (en) * 1997-06-05 1998-12-10 Dix It S.R.L. Method for ascertaining the authenticity of a predetermined product
FR2771196A1 (en) * 1997-11-19 1999-05-21 Jacques Rivailler Ensuring traceability of successive elements in series of transformations
WO1999026194A1 (en) * 1997-11-19 1999-05-27 Eco-Sys International S.A. Method for ensuring the traceability of successive elements of a series of transformations and applications thereof
EA002385B1 (en) * 1997-11-19 2002-04-25 Эко-Сис Энтернасьональ С.А. Method for ensuring the traceability of successive elements of a series of transformations and applications thereof
FR2815155A1 (en) * 2000-10-09 2002-04-12 Jacques Rivaillier Marking and identification to secure a computer file, uses an alphabet formed by coding bits in terms of physical parameters of the data and integrates this into the file representation
WO2003043000A1 (en) * 2001-10-10 2003-05-22 Jacques Rivaillier Method of marking, identifying and securing computer files, documents, sounds and chemical compounds

Also Published As

Publication number Publication date
GB2291522B (en) 1997-04-30
CN1152968A (en) 1997-06-25
AU2892995A (en) 1996-02-16
CA2195003A1 (en) 1996-02-01
EP0771452A1 (en) 1997-05-07
AU682778B2 (en) 1997-10-16
BR9508281A (en) 1997-10-28
WO1996002901A1 (en) 1996-02-01
GB9414368D0 (en) 1994-09-07
GB9513946D0 (en) 1995-09-06
JPH10503037A (en) 1998-03-17
KR970705106A (en) 1997-09-06
TW278167B (en) 1996-06-11
ZA955824B (en) 1996-02-21

Similar Documents

Publication Publication Date Title
EP0640946B1 (en) Method and apparatus for verification of classes of documents
US5351302A (en) Method for authenticating objects identified by images or other identifying information
US5796835A (en) Method and system for writing information in a data carrier making it possible to later certify the originality of this information
JP5274020B2 (en) Authentic card
US5694471A (en) Counterfeit-proof identification card
US5786587A (en) Enhancement of chip card security
US6615351B1 (en) Method for checking the authenticity of a data medium
RU2435218C2 (en) Card with possibility of authentication
KR20030019398A (en) System and method for productiion and authentication of original documents
CA2410568A1 (en) Secure transactions with passive storage media
EP0710934A2 (en) Methods and systems for performing article authentication
GB2297856A (en) Electronic negotiable documents
AU682778B2 (en) Authentication technique
JP3787027B2 (en) Authentication type security system
JP4104801B2 (en) IC card reader and IC card system
KR100821080B1 (en) Securities, and Methods for Manufacturing and Examining the Same
JP3117122B2 (en) Authentication type security system
JP3980706B2 (en) IC card and authentication device thereof
JPH1173504A (en) Recording material for identification and authenticity discriminating method
JPH01173411A (en) Magnetic card with protective function
JP2839954B2 (en) Method and system for writing information on a medium that allows later to prove the originality of the information
JP4046918B2 (en) IC card, IC card reader and IC card system
JPH09282433A (en) Security system
CA2163749C (en) Method for authenticating objects identified by images or other identifying information
KR100701103B1 (en) System for tracking and forgery detection of products with built-in security information-preservable device and method therefor

Legal Events

Date Code Title Description
PCNP Patent ceased through non-payment of renewal fee

Effective date: 20020707