WO2001003077A1 - Systeme de verification de documents - Google Patents

Systeme de verification de documents Download PDF

Info

Publication number
WO2001003077A1
WO2001003077A1 PCT/IB2000/000908 IB0000908W WO0103077A1 WO 2001003077 A1 WO2001003077 A1 WO 2001003077A1 IB 0000908 W IB0000908 W IB 0000908W WO 0103077 A1 WO0103077 A1 WO 0103077A1
Authority
WO
WIPO (PCT)
Prior art keywords
data
document
verification
user
authentication
Prior art date
Application number
PCT/IB2000/000908
Other languages
English (en)
Other versions
WO2001003077A8 (fr
Inventor
Gavin Randall Tame
Original Assignee
Dexrad (Proprietary) Limited
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Dexrad (Proprietary) Limited filed Critical Dexrad (Proprietary) Limited
Priority to AU58368/00A priority Critical patent/AU5836800A/en
Priority to GB0202529A priority patent/GB2370810B/en
Priority to CA002378662A priority patent/CA2378662C/fr
Priority to BR0012163-0A priority patent/BR0012163A/pt
Publication of WO2001003077A1 publication Critical patent/WO2001003077A1/fr
Publication of WO2001003077A8 publication Critical patent/WO2001003077A8/fr

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/08Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
    • G07F7/12Card verification
    • G07F7/127Card verification in which both online and offline card verification can take place
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07BTICKET-ISSUING APPARATUS; FARE-REGISTERING APPARATUS; FRANKING APPARATUS
    • G07B1/00Machines for printing and issuing tickets
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07DHANDLING OF COINS OR VALUABLE PAPERS, e.g. TESTING, SORTING BY DENOMINATIONS, COUNTING, DISPENSING, CHANGING OR DEPOSITING
    • G07D7/00Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency
    • G07D7/004Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency using digital security elements, e.g. information coded on a magnetic thread or strip
    • G07D7/0043Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency using digital security elements, e.g. information coded on a magnetic thread or strip using barcodes
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/08Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/08Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
    • G07F7/12Card verification

Definitions

  • THIS invention relates to a method of generating a document, a method of verifying the authenticity of a document and to a system for implementing the methods.
  • the method may include generating a user identification record and storing the record for comparison with the user data when a user attempts to access the document creation system.
  • the user data and the user identification record may comprise data from a fingerprint scanner or another biometric device, for example.
  • the user data may be derived from data stored on a portable data carrier such as a smart card, the user data being generated when a physical characteristic of the user, such as a fingerprint, matches data stored on the portable data carrier.
  • the authentication data may be stored in a document verification database.
  • the verification data may take the form of a bar code, symbol or other machine readable indicium.
  • the verification data is a printed symbol or code readable optically, and contains data which corresponds at least partially to the user data and the related document data contained in the authentication data which is stored in the document verification database.
  • the verification data is preferably generated in an encrypted form.
  • the invention extends to a method of verifying the authenticity of a document generated by the above-defined method, including the steps of:
  • the method will include the step of decrypting the verification data read from the document.
  • the authentication data may be retrieved from a central database in an on-line process.
  • the authentication data may be data derived from the document itself, or from a bearer thereof, for example.
  • the invention includes a system for generating documents comprising:
  • a document creation station operable by a user to input document data and to generate printed documents based on the document data
  • access control means arranged to generate user data corresponding to an authorised user
  • processor means for generating verification data derived from the document data and the user data, the verification data being applied to the printed document;
  • a database for storing an authentication record corresponding to the verification data, for use in authentication of the document.
  • the system preferably includes at least one document reading device for reading the verification data on a document, and processor means for comparing the verification data read from the document with authentication data.
  • the system preferably further includes communication means for transferring authentication data from the database, for comparison with the verification data read from the document.
  • Figure 1 is a highly schematic block diagram of a document creation and verification system according to the invention.
  • the present invention aims to provide a method and system for generating documents the authenticity of which can readily be verified, and to a method and system for verifying such documents.
  • the main aim of the invention is to provide relatively secure and tamper proof methods of issuing/creating, distributing and verifying the authenticity of documents.
  • the invention also provides accountability throughout the document creation/management process, and was designed in order to prevent the fraudulent manipulation of or tampering with documents throughout their life cycle.
  • the invention aims to prevent fraudulent manipulation and tampering from the time of creation of a cheque (ie. entering the cheque data and printing the cheque) through to the final verification of the authenticity of a presented cheque and approval for payment thereof.
  • the methodology of the invention can be split into three main stages:
  • a document creation stage a document creation stage
  • a document distribution stage a document distribution stage
  • a document verification stage a document verification stage
  • the distribution of the documents is mentioned primarily for completeness. It is significant that, due to the inherent security of documents created by the method of the invention, the method of distribution of the documents can be flexible. This is because each document carries its own verification data, and the document can be verified at any stage of its distribution.
  • the document verification stage is an important component of the invention, by means of which documents are checked for authenticity. For example, the authenticity of a cheque may be verified before it is paid. Such verification may be carried out on-line, either manually or in an automated process, or offline in certain applications.
  • the document verification database Central to the above three stages is a document verification database, which holds a complete record of all documents created.
  • the document verification database contains a duplicate of verification data which is printed on the document itself, enabling future verification thereof.
  • sophisticated encryption techniques are used to generate and print the verification data.
  • Figure 1 shows, in a simplified block diagram form, the main components which form the system of the invention.
  • Documents are created at a document creation station using a computer 10 (typically a personal computer or PC) with an associated high quality printer 12.
  • Documents can also be created by a mass production printer using font based symbols (as opposed to the normal image based symbols). Such font based symbols do not slow down production capacity.
  • a scanner 14 is connected to the computer 10 and is used to identify a user of the system.
  • a central verification database 16 Connected to the computer 10, typically via modems which access an existing telecommunications network, or another means of communicating over a wide area, is a central verification database 16. Apart from the computer 10 (and others like it) enquiry stations 18 and document verification stations 20 are connected to the database 16. Each document verification station will typically comprise a computer 20 with an associated high speed scanner/feeder 22.
  • authorised users are provided with access cards or identity cards which contain encrypted machine readable data identifying the user.
  • the data is preferably biometric in nature, such as fingerprint data.
  • a fingerprint scanning unit is used to acquire a fingerprint of the user, and the fingerprint biometric data, together with other data identifying the user, is compressed and encrypted and encoded into a two-dimensional code or symbol which is printed on the access card.
  • a user presents the card to a reader, which scans and decodes the symbol on the card and retrieves the fingerprint biometric data therefrom, as well as other data identifying the user.
  • the user places his/her finger in a fingerprint scanner, and the "live" scanned fingerprint is compared with the biometric data stored on the card. If these details match, the user's details read from the card are entered into a user log together with the current date and time, and access is granted to the document creation station.
  • the user data log can be used subsequently to establish accountability.
  • a smart card containing data in its embedded memory chip, encrypted to a suitable level can be used instead.
  • the data on the access card can include data relating to the level of the document creation system to which the user has access.
  • the user can use a "live" fingerprint scan which is compared to a database of fingerprints (a one to many match).
  • verification data is generated. This data will be applied to the document which is created, and is also stored in the verification database as an authentication record, which means that a complete record of the document exists on the database.
  • the verification data will consist of one or more of the following (although it is not restricted to these):
  • the verification data is compressed and encrypted, and printed in a two dimensional graphic format or font format, as a symbol or code.
  • the data compression and encryption processes are now described.
  • the encryption of the verification data is an important part of the process as the protection of the symbol against fraudulent onslaughts depends on the strength of the encryption.
  • the encryption used can be divided into two distinct parts, namely private/public key encryption (Asymmetric Encryption) and multi- layered core encryption.
  • the public/private key encryption takes care of two aspects of authority. The first is the authority to create the verification data of a document. The second part is the authority to decode the verification data. The former is based on a private key, which is entered into the user's machine readable access card by an administrator of the system. This private key encrypts the data. The private key allows for the creation of a specific public key which creates the latter part, an authority to view the verification data. The public key allows for the decoding or access to the verification data within the two dimensional bar code.
  • the private key can only be created with the private creation system which allows a person in authority to create this key.
  • the multi-layered encryption system is an inner layer of encryption beneath the above mentioned private/public key layer.
  • This encryption makes use of three distinct encryption methods, which are completely different from each other. Two of the encryption methods are data scrambling algorithms.
  • the third layer is a form of encryption which allows for each symbol created to be uniquely encrypted. This layer creates the strongest encryption and therefore the most fraud proof verification symbol possible.
  • Data compression is important for small portable data carriers employing two- dimension graphic symbols. The more verification data which one can incorporate in the verification symbols, the more effective the security and verification of documents. There are three types of data compression, which are applied to four types of verification data.
  • Signature compression is used to compress scanned signatures. This compression is used primarily for the incorporation of signatures into two- dimensional verification symbols for personal cheques. It is used to compare the signature on a cheque with that incorporated within the verification symbol.
  • Facial compression is also used to compress digital facial images. These are used to verify ownership of private cheques and other personal documents.
  • This form of compression is necessary if one wishes to incorporate signatures within the restricted storage capacity of a two-dimensional symbol, as scanned signatures are digital raster images which consume large amounts of storage. Since this is a digital image compression it is a "lossy" compression (a compression which disposes of less relevant data).
  • Text data compression is used in all the verification symbols (two-dimensional symbols) of documents. There is normally a substantial amount of data required for the complete verification of documents and a high ratio "lossless" text compression (a compression which does not dispose of any data during the compression process) is needed. The compression allows for the entire verification record to be incorporated on a document.
  • Fingerprint biometric data acquisition and compression is required to be able to incorporate fingerprint biometrics into the document verification two- dimensional symbols.
  • This compression is a "lossy" type of data compression.
  • the fingerprint biometrics are used in the verification symbols when absolute accountability is required for document verification.
  • the fingerprint biometric scanner used can be a commercially available fingerprint matching product.
  • the above mentioned secure form of fingerprint verification as well as highly compressed fingerprint biometric data are the two main elements of security, absolute verification and definite accountability. This technology allows for verified and secure access to the system as well as ensuring accountability throughout the life cycle of a document. Since the compressed biometric data can travel with the document within a two-dimensional symbol, accountability data travels with the document and can be determined at any stage.
  • the encrypted symbol code which is printed on the document can be regarded as an extension of a traditional linear bar code, in that it is a printed symbol which facilitates machine reading thereof.
  • a conventional bar code is only capable of representing enough data (typically 8 to 12 characters) to serve as a key to a more comprehensive database or record.
  • the two dimensional graphic code used by the present invention has sufficient capacity, especially using the compression methods described above, to hold an entire data record containing a substantial amount of data.
  • the printed symbol is not merely a reference to a record stored elsewhere, but itself comprises a complete record.
  • the printed symbols also carry user definable levels of error correction.
  • the error correction used allows for one hundred percent recoverability of the data contained in the symbol when the symbol suffers damage which is less than a predetermined maximum damage threshold. This makes the system relatively robust.
  • the relevant verification data and accountability data is compressed and encrypted and encoded into a two-dimensional bitmap image.
  • This bitmap image or font set representing the symbol can be attached to any document and printed.
  • the images are used in different manners depending on the type of document verification they are been used for.
  • cheque verification a single two-dimensional symbol or code is printed on the cheque.
  • the monetary amount, to whom the cheque is payable, the creation date, the expiry date and all other relevant data as well as authority and accountability data is incorporated into the two-dimensional symbol.
  • the relevant data plus authority data is incorporated in a symbol as with the above mentioned cheque verification.
  • portions of the document can be incorporated in compressed and encrypted two-dimensional symbols or, in the case when total privacy is required, the entire document can be incorporated in a set of two- dimensional symbols.
  • the two-dimensional code Once the two-dimensional code has been created it can be printed on the document using a conventional printer and the document is ready for distribution.
  • the document creation system comprises one or more document creation stations. Each document creation station has all the relevant software for access control and the software for data compression and encryption and the generation of the two-dimensional verification symbol.
  • the document creation station is connected to the online verification database server by a local area network (LAN) if the verification database server is on the same premises or by a wide area network (WAN) if the verification database server is at a remote site.
  • LAN local area network
  • WAN wide area network
  • a stand-alone creation station On this type of station, all the functions of document creation are carried out on the workstation. The creation of the document, the creation of the compressed and encrypted two-dimensional code and the printing of the document are carried out at the station. The station is connected to a printer or a number of printers so that the documents can be printed.
  • a document symbol server The server is part of the LAN or WAN. The documents are not generated on the server. Only the verification data is sent to this server. The server records the verification data as a record on the central verification database. It then creates the compressed and encrypted two-dimensional code (in bitmap image form) and dispatches this symbol to the system which created the document.
  • the document creation station preferably includes a test system including a two-dimensional scanner, which can be a hand held scanner or a flat bed document scanner. This scanner is used to test the printed two-dimensional symbols on documents created by the system.
  • each document is self-verifying due to the printing of tamper proof machine-readable data on the document itself.
  • a third party who intercepts the cheque will not be able to read or alter the printed verification data on the cheque, so that even if the name of the payee or the amount of the cheque were to be altered, subsequent verification of the cheque will reveal the discrepancy.
  • Verification of the documents generated by the method of the invention is carried out in order to detect any fraudulent manipulation or tampering which has taken place, or even fraudulent creation of a document. Accountability for the document is also established and can be recorded where necessary. In some cases, typically in the case of cheque verification where payment takes place following the verification procedure, the payment details are entered against the verification data in the verification database, which prevents duplicate payments from being made.
  • the access control level depends on the level of security required, the type of document verification and the form of document verification.
  • the lowest level of access control is merely a PIN code and is used in remote offline verification. In mass document verification systems, especially those which verify documents of monetary value, the highest level of access control is used.
  • This latter form of access control is the same as that described above with regard to document creation.
  • the use of access cards which contain finger print biometric data ensures that absolute access control is established, as well as accountability. Since there are a few distinct forms of document verification, each form is described separately below.
  • Remote off-line verification is used in cases where on-line connectivity is not possible and where remote offline verification is necessary.
  • the verification can be carried out on a portable hand held device, a laptop PC, or a conventional desk top PC.
  • the system also makes use of remote two dimensional scanners which are battery operated or powered by the portable host computer device.
  • Remote verification can also take place by means of hand held computers with built-in scanners since these are programmable. Access control and verification programs are stored and executed on these devices.
  • Remote off-line verification can be carried out manually, in which case a two- dimensional scanner is attached to the PC or portable computer. The two- dimensional symbol or each symbol is scanned. The symbol is decoded, decompressed and decrypted. The data derived from the two-dimensional symbol is then displayed. The operator can determine the authenticity of the document and also review the accountability and authority of the document. In some forms of document verification the contents can be manually verified against those of the document. This is the case in the remote cheque verification system.
  • the remote off-line system can use automated OCR/ICR technology.
  • This form of verification has particular applications when remotely verifying documents of monetary value such as cheques.
  • An A4 hand-held scanner is used for this process.
  • the entire document is scanned.
  • the writing on the document is converted to computer compatible text data by means of optical character recognition (OCR).
  • OCR optical character recognition
  • the encrypted and compressed two- dimensional symbol is also decoded.
  • the system compares the data derived from the two-dimensional bar code with that which was derived from the optical character recognition. Any discrepancies are highlighted and recorded.
  • On-line verification can utilise manual or high speed batch scanning.
  • This first form of verification requires the operator to scan the document two- dimensional verification symbols with a handheld two-dimensional scanner or a hand held A4 document scanner.
  • the online central verification database is accessed.
  • the record for the particular document, within the online verification database is compared to that the data record decoded out of the symbol. If there are any discrepancies, they are highlighted.
  • High speed batch verification is the most sophisticated system. It is used primarily for high speed automated verification of documents of monetary value. It is a main component of a typical cheque verification system of the invention and provides a highly secure and computer automated cheque verification center for banks. The main component of this system is a verification work station. This work station has the following software:
  • This software restricts access to the system and also created an accountability log of the verifying operator.
  • the two-dimensional symbol decoding software is image based. The symbol is detected and decoded.
  • This software decompresses the decoded symbol data and then decrypts the data.
  • Image processing software This is highly specialized image processing software which cleans up and enhances the document image so that the two-dimensional bar code can be easily decoded. The document cleanup also aids the OCR software.
  • the purpose of the optical recognition software is a first phase verification of the printed data on the cheque with the data acquired from the two- dimensional symbol.
  • the OCR software used in the prototype system is based on backward propagation neural network technology as well as sophisticated image extraction techniques.
  • the neural network is trainable and can be trained to identify various fonts as well as partially visible letters and numbers.
  • the automated high speed verification process is conducted as follows.
  • the documents are loaded into the automatic document feeder of the scanner.
  • the software interface to the scanner triggers the document feeder so that the documents are automatically fed into the scanner and then scanned.
  • the document images are then processed by the image processing software.
  • the printed characters are extracted and identified by the optical character recognition.
  • the two-dimensional symbol is then extracted and the data is decoded, decompressed and decrypted.
  • the data acquired from the two- dimensional symbol is compared with the results of the optical character recognition. If there are any discrepancies in the comparison, they are recorded in the central verification database record for the particular document.
  • the data extracted from the two-dimensional verification symbol is then compared to the authentication record in the central verification database record. If there are discrepancies the document is marked as fraudulent.
  • the system also verifies that the document has not been previously paid in the case of verification of cheques and other documents of monetary value. In the case of documents of monetary value the system will approve payment of the document or cheque if it is satisfied that the document is fraud-free and has not already been paid on. All statuses are recorded in the central verification database. The entire process is automated and requires (and will not allow) any human intervention.
  • the central verification database is central to the process described above. All actions relating to a document are recorded in this database. The contents of the database are encrypted and a secure hardware device controls the encryption.
  • the encryption encoding is set by a person who has due authority to carry out this task.
  • Each time a document is created the verification data of the document is recorded in the verification database. A duplication of this record is used to create the printable two-dimensional verification symbol which travels with the document.
  • When a document is verified the data acquired from the verification symbol is compared with the original database record. All results of the document verification process are recorded in the verification database in the appropriate document record.
  • the central verification database can be accessed for this purpose.
  • enquiries which can be made include the following:
  • the inquiry system can also supply statistical reports, such as information on how many documents of a certain value were detected as being fraudulent.
  • An image of each document which is acquired from the document image scanner during the verification process, is stored and indexed in an archive controlled database.
  • the images are stored on optical storage media. These images can be used in the case of a dispute, and the encrypted symbols on the images can also be used recreate the database in a disaster recovery situation.

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Storage Device Security (AREA)
  • Credit Cards Or The Like (AREA)
  • Inspection Of Paper Currency And Valuable Securities (AREA)

Abstract

La présente invention concerne un procédé permettant de produire des documents et de vérifier leur authenticité, selon lequel on établit un contrôle de l'accès à un système de création de documents de façon que seuls les utilisateurs autorisés peuvent créer des documents. On enregistre des données utilisateur qui identifient un utilisateur du système, et on produit des données de vérification à partir des données utilisateur et des données correspondant aux documents produits à l'aide du système. On enregistre les données d'authentification correspondant aux données de vérification et on imprime ensuite le document avec une partie lisible par machine contenant les données de vérification. La partie lisible par machine se présente classiquement sous la forme d'un code à barres ou d'un symbole bidimensionnel. Lorsque le document est présenté, les données de vérification sont lues par balayage optique, par exemple, et comparées avec les données d'authentification extraites de sorte que l'on peut déterminer si le document est bien authentique.
PCT/IB2000/000908 1999-07-05 2000-07-05 Systeme de verification de documents WO2001003077A1 (fr)

Priority Applications (4)

Application Number Priority Date Filing Date Title
AU58368/00A AU5836800A (en) 1999-07-05 2000-07-05 Document verification system
GB0202529A GB2370810B (en) 1999-07-05 2000-07-05 Document verification system
CA002378662A CA2378662C (fr) 1999-07-05 2000-07-05 Systeme de verification de documents
BR0012163-0A BR0012163A (pt) 1999-07-05 2000-07-05 Processos para gerar um documento, e para verificar a autenticidade de um documento, e, sistema para gerar documentos

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
ZA994367 1999-07-05
ZA99/4367 1999-07-05

Publications (2)

Publication Number Publication Date
WO2001003077A1 true WO2001003077A1 (fr) 2001-01-11
WO2001003077A8 WO2001003077A8 (fr) 2001-03-29

Family

ID=25587804

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/IB2000/000908 WO2001003077A1 (fr) 1999-07-05 2000-07-05 Systeme de verification de documents

Country Status (5)

Country Link
AU (1) AU5836800A (fr)
BR (1) BR0012163A (fr)
CA (1) CA2378662C (fr)
GB (1) GB2370810B (fr)
WO (1) WO2001003077A1 (fr)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2005106808A1 (fr) * 2004-05-04 2005-11-10 De La Rue International Limited Procede et systeme pour former un dispositif de decodage
WO2005111950A1 (fr) * 2004-05-17 2005-11-24 Dexrad (Proprietary) Limited Systeme de creation et d'authentification de document
WO2006123196A1 (fr) * 2004-05-17 2006-11-23 Dexrad (Proprietary) Limited Procede et systeme de creation d'un document d'identification
WO2007071803A1 (fr) 2005-12-19 2007-06-28 Universidad De Zaragoza Systeme et procede d'enregistrement et de certification de l'activite et/ou de la communication entre terminaux
US7757091B2 (en) 2001-05-04 2010-07-13 Abathorn Limited Method and apparatus for the creation of a self-authenticating document
US7844832B2 (en) * 2005-11-29 2010-11-30 Nation Ron L System and method for data source authentication and protection system using biometrics for openly exchanged computer files
CN107209963A (zh) * 2015-02-19 2017-09-26 特洛伊集团公司 转换安全文档登记系统

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2520016A (en) * 2013-11-05 2015-05-13 Mastercard International Inc Document with verification data

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5022080A (en) * 1990-04-16 1991-06-04 Durst Robert T Electronic notary
EP0547837A2 (fr) * 1991-12-19 1993-06-23 Xerox Corporation Authentification de la copie d'un document
US5270773A (en) * 1992-11-27 1993-12-14 Xerox Corporation Image producing device with security to prevent disclosure of sensitive documents
WO1995023388A1 (fr) * 1994-02-28 1995-08-31 Non Stop Info Ab Procede et dispositif de controle pour l'authentification
JPH113456A (ja) * 1997-06-13 1999-01-06 Nippon Telegr & Teleph Corp <Ntt> カード認証システムおよび方法および記録媒体

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5022080A (en) * 1990-04-16 1991-06-04 Durst Robert T Electronic notary
EP0547837A2 (fr) * 1991-12-19 1993-06-23 Xerox Corporation Authentification de la copie d'un document
US5270773A (en) * 1992-11-27 1993-12-14 Xerox Corporation Image producing device with security to prevent disclosure of sensitive documents
WO1995023388A1 (fr) * 1994-02-28 1995-08-31 Non Stop Info Ab Procede et dispositif de controle pour l'authentification
JPH113456A (ja) * 1997-06-13 1999-01-06 Nippon Telegr & Teleph Corp <Ntt> カード認証システムおよび方法および記録媒体

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
PATENT ABSTRACTS OF JAPAN vol. 1999, no. 04 30 April 1999 (1999-04-30) *

Cited By (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7757091B2 (en) 2001-05-04 2010-07-13 Abathorn Limited Method and apparatus for the creation of a self-authenticating document
GB2426112B (en) * 2004-05-04 2007-11-14 Rue De Int Ltd Method and system for forming decoding device
GB2426112A (en) * 2004-05-04 2006-11-15 Rue De Int Ltd Method and system for forming decoding device
WO2005106808A1 (fr) * 2004-05-04 2005-11-10 De La Rue International Limited Procede et systeme pour former un dispositif de decodage
WO2006123196A1 (fr) * 2004-05-17 2006-11-23 Dexrad (Proprietary) Limited Procede et systeme de creation d'un document d'identification
WO2005111950A1 (fr) * 2004-05-17 2005-11-24 Dexrad (Proprietary) Limited Systeme de creation et d'authentification de document
US8479007B2 (en) 2004-05-17 2013-07-02 Dexrad (Proprietary) Limited Document creation and authentication system
US7844832B2 (en) * 2005-11-29 2010-11-30 Nation Ron L System and method for data source authentication and protection system using biometrics for openly exchanged computer files
WO2007071803A1 (fr) 2005-12-19 2007-06-28 Universidad De Zaragoza Systeme et procede d'enregistrement et de certification de l'activite et/ou de la communication entre terminaux
CN107209963A (zh) * 2015-02-19 2017-09-26 特洛伊集团公司 转换安全文档登记系统
EP3259740A4 (fr) * 2015-02-19 2018-11-07 Troy Group, Inc. Système d'enregistrement de documents sécurisés cachés
US10475269B2 (en) 2015-02-19 2019-11-12 Troy Group, Inc. Covert secure document registration system
US10733825B2 (en) 2015-02-19 2020-08-04 Troy Group, Inc. Covert secure document registration system

Also Published As

Publication number Publication date
AU5836800A (en) 2001-01-22
BR0012163A (pt) 2002-05-14
WO2001003077A8 (fr) 2001-03-29
GB2370810A (en) 2002-07-10
GB2370810B (en) 2004-02-25
CA2378662A1 (fr) 2001-01-11
CA2378662C (fr) 2008-10-07
GB0202529D0 (en) 2002-03-20

Similar Documents

Publication Publication Date Title
US5490217A (en) Automatic document handling system
US7789302B2 (en) Transfer of verification data
CN100334830C (zh) 自动交易机数字签名系统和方法
CN1208737C (zh) 安全生物统计识别方法及设备
EP1238321B1 (fr) Procede et systeme permettant de generer une signature electronique sure
US20060015733A1 (en) Process and system for the material reduction of counterfeit and identity-maker fraud
US20020095383A1 (en) Method and apparatus for secure sale of electronic tickets
US20070256137A1 (en) Document Creation and Authentication System
US20070078780A1 (en) Bio-conversion system for banking and merchant markets
US20060174134A1 (en) Secure steganographic biometric identification
JP2006313534A (ja) 修正不可能な自己確認物品を製造しかつその真偽性を確認するための方法およびシステム
JP2013025571A (ja) カード発行システム及びカード発行方法
JP5659505B2 (ja) 真贋判定装置及び真贋判定方法
CA2378662C (fr) Systeme de verification de documents
US7120798B2 (en) System and method for the generation and verification of signatures associated with hardcopy documents
US20070088953A1 (en) Method of preparing a document so that it can be authenticated
CA2302421A1 (fr) Documents proteges ameliores
ZA200200115B (en) Document verification system.
CN1916985A (zh) 自动交易机数字签名系统和方法
CN110021106B (zh) 一种基于二维码的票据识别方法及设备
KR20070026738A (ko) 장표(또는 유가증권) 관리를 위한 기록매체
RU42339U1 (ru) Система автоматизации обработки документов
JP4196864B2 (ja) 印鑑照合システム、通帳および通帳発行方法
KR20070026735A (ko) 장표(또는 유가증권) 관리 단말장치
KR20070026730A (ko) 장표(또는 유가증권) 관리 시스템

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CR CU CZ DE DK DM DZ EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT TZ UA UG US UZ VN YU ZA ZW

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE BF BJ CF CG CI CM GA GN GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
AK Designated states

Kind code of ref document: C1

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CR CU CZ DE DK DM DZ EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT TZ UA UG US UZ VN YU ZA ZW

AL Designated countries for regional patents

Kind code of ref document: C1

Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE BF BJ CF CG CI CM GA GN GW ML MR NE SN TD TG

CFP Corrected version of a pamphlet front page
CR1 Correction of entry in section i

Free format text: PAT. BUL. 02/2001 UNDER (51) ADD "G07F 7/08" AFTER "G07D 7/00"

DFPE Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101)
WWE Wipo information: entry into national phase

Ref document number: 200200115

Country of ref document: ZA

ENP Entry into the national phase

Ref country code: GB

Ref document number: 200202529

Kind code of ref document: A

Format of ref document f/p: F

WWE Wipo information: entry into national phase

Ref document number: 2378662

Country of ref document: CA

REG Reference to national code

Ref country code: DE

Ref legal event code: 8642

WWE Wipo information: entry into national phase

Ref document number: 10030276

Country of ref document: US

122 Ep: pct application non-entry in european phase
NENP Non-entry into the national phase

Ref country code: JP