WO2001075782A1 - Individual body identifying method by two-dimensional code, hybrid individual person authenticating system, and off-line person identifying system - Google Patents
Individual body identifying method by two-dimensional code, hybrid individual person authenticating system, and off-line person identifying system Download PDFInfo
- Publication number
- WO2001075782A1 WO2001075782A1 PCT/JP2001/002612 JP0102612W WO0175782A1 WO 2001075782 A1 WO2001075782 A1 WO 2001075782A1 JP 0102612 W JP0102612 W JP 0102612W WO 0175782 A1 WO0175782 A1 WO 0175782A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- information
- data
- individual
- personal identification
- person
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K19/00—Record carriers for use with machines and with at least a part designed to carry digital markings
- G06K19/06—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
- G06K19/06009—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking
- G06K19/06037—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking multi-dimensional coding
Definitions
- the present invention relates to an individual identification method using a ⁇ -coded two-dimensional code. Further, the present invention relates to a hybrid personal identification system and an offline personal identification system using an individual identification method using a two-dimensional code. Background art
- a means of personal authentication for confirming the identity of a trader, and a means of identifying themselves, that is, as individual product information-personal identification information, use alphanumeric characters such as passwords and ID numbers.
- An identification code represented by a combination of alphanumeric strings is known.
- An object of the present invention is to prevent leakage of personal identification information such as a password and an ID number and prevent unauthorized access in the above identification code.
- a further object of the first invention of the present application is to prevent personal information from being leaked, falsified, illegally used, and the like by using a two-dimensional code obtained by encrypting the individual product information.
- the second invention and the third invention of the present application as personal authentication means and personal identification means, have problems such as prevention of leakage of ID cards, prepaid cards, credit cards, prevention of forgery and falsification, prevention of unauthorized use, prevention of unauthorized access, and the like. And Disclosure of the invention
- the first invention of the present application provides an individual identification method using a two-dimensional code, characterized in that the contents of a two-dimensional code obtained by encrypting individual product information are recorded as image information in an existing image so as to be invisible.
- the personal identification information as the personal recognition means is composed of a plurality of encrypted two-dimensional codes, and the “arrangement order” of the plurality of two-dimensional codes is determined by the card reading information and online input information.
- the third invention of the present application relates to a method for encrypting personal identification information as personal identification means (this is a two-dimensional code by adding unique data obtained by digitally processing image data such as a signature, and obtaining a certificate or the like).
- This is a two-dimensional code by adding unique data obtained by digitally processing image data such as a signature, and obtaining a certificate or the like.
- individual product information for example, copyright information, product identification information, pharmaceutical prescription information
- individual product information is composed of a two-dimensional code and encrypted, and the content is converted into image information. Record partly.
- two-dimensional The content of the code is embedded in the first or last part of the image information.
- a password including a long-digit encryption key indicating personal identification information is set, the password is divided into a plurality of passwords, and each of the plurality of divided password substrings is divided into two.
- the order of the two-dimensional coded subsequences mixed in the dummy is determined. This arrangement order is characterized in that it is not recorded on a computer, a discriminator, or the like, that is, it is manually entered by a user.
- a two-dimensional code is used for an identification card or the like on a display device.
- Encrypt personal identification information as personal identification means add unique data obtained by digitally processing image data such as a signature, convert it into a two-dimensional code, and print it on a document such as a certificate.
- image data such as signatures
- FIG. 1 is an explanatory diagram of “digital watermark” showing an embodiment of the first invention of the present application
- FIG. 2 is a flowchart of “transparency of encrypted data into image data”).
- Fig. 3 is a flowchart of “Retrieving encrypted data from image data”.
- FIG. 4 is an explanatory diagram of the order of arrangement of the cards in the embodiment of the second invention of the present application.
- FIG. 5 is an explanatory diagram of the information reading means similarly selecting a card.
- FIG. 6 is an explanatory diagram of the same card information reading system.
- FIG. 7 is a flowchart at the time of issuing a certificate in the third embodiment of the present invention.
- FIG. 8 is a flowchart for the same collation.
- FIG. 9 is an explanatory view showing an example of image data such as a signature.
- FIG. 9A shows a digital signature
- FIG. 9B shows a handwriting signature.
- Individual product information (for example, copyright information, product identification information, and pharmaceutical prescription information) is encrypted by encoding software and matrix-coded.
- One cell is represented by one bit, and the contents of the code are stored as a series of numbers sequentially from top left to right and from top to bottom (code content recognition). Next, the number of cells (number of dots) in the X and Y directions of the code is stored as 1-byte data (code size recognition).
- the cell number data in the X-axis direction and the cell number data in the ⁇ -axis direction are prepended to the above-mentioned series of numbers, and this series of numbers is used as watermark data.
- the first byte of the target image information (digital) is extracted, and the least significant bit is replaced with the most significant bit of the watermark data.
- the processed byte is returned to the original position of the image.
- next byte of the image information is taken out and its least significant bit is replaced by the previous right-hand bit of the watermark data.
- Extraction of encrypted data performs the reverse process.
- the content of the two-dimensional code is embedded at the beginning or at the end of the image information.
- the least significant bit is changed every one bit (8 bits).
- the effect on image quality is so small that it is not noticeable to the human eye.
- the advantage over other digital watermarking methods is that two-dimensional coding (corresponding to a kind of encryption) increases the security for one layer, and finally the watermark information is two-dimensional. It has objective evidential ability to be restored as code. Of course, combinations with other encryption methods are possible and desirable.
- the password is divided into four parts, counting from the left, in the second row at the top, the fifth row at the bottom, the sixth row at the bottom, and the ninth row at the top.
- the order is "" -9-1-2-F ".
- a regular user who memorizes this order can use a hand-held or pen-type scanner 2 and refer to Fig. 4 ignoring other codes and ignoring other codes.
- the accessed side receives the restored hundreds to thousands of digits of the password and identifies it as the authorized user.
- FIGS. 5 and 6, 3 is a terminal device, 4 is a keyboard, 5 is a communication network such as the Internet, 6 is a computer for centralized management, 7 is data, and the second invention is an intrusion. Even if the user obtains the medium on which the two-dimensional coded password is described (recorded), unauthorized access is not easy (almost impossible) unless the authorized user verifies the "ordering" information. In the case of extremely sophisticated confidential information, the password is split between the person in charge and his / her boss in the first half and the second half, and the management system must be read if two people do not continue reading in the same operation. If the system is not authenticated, security will be further improved.
- the present invention divides and allocates required data to a plurality of IC cards including a dummy and sequentially stores cards storing effective data in the order stored by the user. It offers the same effect as reading at a much lower cost.
- Signature 'Signed authentication cannot be performed without the consent of the authorized user. In that sense, it competes with the present invention.
- the pressure-sensitive pad for signature / signature is less versatile
- the optical reader used by the present invention can also be used as an input device for many other purposes, and is far less versatile. Is excellent. Above all, a system can be constructed at low cost. It is of course possible and desirable for users who handle extremely important confidential information to use both in order to further increase the hurdle against intruders.
- the feature of the second invention of the present application is that the high unauthorized access prevention effect by the password of several tens, several hundreds to several thousand digits online is stored in the "offline" of several digits in the "order” and manually input. It is to be realized by being in 'online' offline and auto-manual hybrid.
- Hand-held or pen-type readers are required to manually read multiple two-dimensional codes in "arranged order", which can be easily manufactured at low cost.
- the file is converted into a two-dimensional code by the encoding software.
- the decoding software converts the two-dimensional code into image data and character data.
- the signature data and character data are displayed on a display invisible to the user. Have the user sign.
- a digital signature X and Write the signature for handwriting signature Y on the application form The issuer reads the signature X for digital signature as image data and then digitally processes it as the unique data, together with the certificate number, the card number, the finite term, and the data obtained by encrypting all the above data. Dimensionally coded and printed on the surface of the certificate. Certificate's Card Purpose-Depending on the personality, use only this digital signature X and not the conventional visual analog handwriting signature Y. If it is desired to be able to continue the conventional use in places where there is no optical reader, use the conventional visual handwriting signature as well.
- special notes include special data that can only be answered by the holder of the truth (knowledge items that can be identified only by the principal based on his / her experience) in the two-dimensional code. It can also be used as a means of identity verification.
- the above unique data is displayed on a display that is not visible to the owner, and if the owner cannot state its contents, it can be immediately judged as "not himself". For example, a mother's maiden name cannot be answered when asked unless she is a legitimate owner. If you cannot answer, you can immediately determine that it is 'illegal use'.
- the image data indicated by the holder such as a card is automatically collated with the image data detected and reproduced by the card's unique data. This can eliminate the involvement of the clerk (the clerk cannot know the image data corresponding to the unique data recorded on the card).
- ceramics and metal-based non-combustible materials can be used as paper and ink, which has the advantage of being difficult to burn out. Any combination is possible by printing and engraving a two-dimensional code on it using.
- the information amount of the individual item information can be expanded and encrypted by using the two-dimensional code obtained by encrypting the individual item information.
- a large amount of information can be stored in a card by applying a two-dimensional code that can be printed and engraved in a small space, and it can be stored in a low-cost optical device. Utilizing the fact that it can be easily read, it also has the effect of easily realizing a computer system that effectively prevents unauthorized access by adding further manual elements.
- the present invention can be used as individual item specifying means and personal authentication means in electronic commerce using IT technology. It is particularly effective when used as a means to prevent leakage of personal identification information such as passwords and ID numbers, and to prevent unauthorized access.
Landscapes
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Collating Specific Patterns (AREA)
- Image Processing (AREA)
- Editing Of Facsimile Originals (AREA)
Abstract
An individual identifying method by encrypted two-dimensional codes, a hybrid individual person authenticating system, and an off-line person identifying system are disclosed. The content of two-dimensional codes representing encrypted individual body information is recorded as image information. Individual person specific information as an individual person recognizing means is composed of encrypted two-dimensional codes. The 'order of arrangement' of two-dimensional codes mixed in dummies is made off-line input independent of card read information and online input information. Singular data created by subjecting image data on, e.g., a signature to a digital processing is added to data created by encrypting the individual person specific information as an individual person authenticating means. The resultant data is transformed into two-dimensional codes, which is printed on a document such as a certificate. In such a way, when individual person specific information such as a certificate is reproduced, image data such as on a signature is detected and reproduced based on the singular data, and thereby the person can be identified without online checking.
Description
明細書 二次元コードによる個別識別方法、ハイブリット型個人認証システムお よびオフライン本人確認システム 技術分野 Description Individual identification method using two-dimensional code, hybrid personal identification system, and offline personal identification system
本願発明は、 ^号化した二次元コードによる個別識別方法に関するも のである。更に二次元コードによる個別識別方法を使用したハイブリット型 個人認証システムおよびオフライン本人確認システムに関するものである。 背景技術 The present invention relates to an individual identification method using a ^ -coded two-dimensional code. Further, the present invention relates to a hybrid personal identification system and an offline personal identification system using an individual identification method using a two-dimensional code. Background art
物品販売管理上の物品特定手段、取引者の特定確認のための個人認 証手段、本人確認手段として、即ち個別商品情報-個人特定情報等とし て、パスワード、 ID番号等のごとく英数文字の組合わせによる英数字列に より表示される識別コードが公知である。 As a means of specifying goods in goods sales management, a means of personal authentication for confirming the identity of a trader, and a means of identifying themselves, that is, as individual product information-personal identification information, use alphanumeric characters such as passwords and ID numbers. An identification code represented by a combination of alphanumeric strings is known.
本願発明は、上記の識別コードにおいては、パスワード、 ID番号等の個 人特定情報の漏洩防止、不正アクセスの防止等を課題とする物である。 更に、本願第 1発明は、個品情報を暗号化した二次元コードとすることで、 個品情報の漏.)曳、変造、不正使用等を防止'阻止することを課題とする。 本願第 2発明および第 3発明は、個人認証手段、本人確認手段として、 I Dカード、プリぺードカード、クレジットカード漏洩防止、偽造変造防止、不正 使用の防止'阻止、不正アクセスの防止等を課題とする。 発明の開示 An object of the present invention is to prevent leakage of personal identification information such as a password and an ID number and prevent unauthorized access in the above identification code. A further object of the first invention of the present application is to prevent personal information from being leaked, falsified, illegally used, and the like by using a two-dimensional code obtained by encrypting the individual product information. The second invention and the third invention of the present application, as personal authentication means and personal identification means, have problems such as prevention of leakage of ID cards, prepaid cards, credit cards, prevention of forgery and falsification, prevention of unauthorized use, prevention of unauthorized access, and the like. And Disclosure of the invention
本願第 1発明は、個品情報を暗号化した二次元コードの内容を画像情 報として既存の画像内に目視できないように記録したことを特徴とする二 次元コードによる個別識別方法を提供する。 The first invention of the present application provides an individual identification method using a two-dimensional code, characterized in that the contents of a two-dimensional code obtained by encrypting individual product information are recorded as image information in an existing image so as to be invisible.
本願第 2発明は、個人認識手段としての個人特定情報を複数個の暗 号化した二次元コードで構成し、複数個の二次元コードの "並び順 "をカー ド読取情報'オンライン入力情報とは独立したオフライン入力とすることを 特徴とするハイブリット型個人認証システムを提供する。 According to the second invention of the present application, the personal identification information as the personal recognition means is composed of a plurality of encrypted two-dimensional codes, and the “arrangement order” of the plurality of two-dimensional codes is determined by the card reading information and online input information. Provides a hybrid personal identification system characterized by an independent offline input.
本願第 3発明は、本人確認手段としての個人特定情報を暗号化した データ (こ、 ^署名等の画像データをデジタル処理した特異データを加えて、二 次元コ ^~ド化して証明書等の書面に印刷することにより、 証明書等の個 人特定情報の再生に際し、特異データの再生により署名等の画像データ を検出することで、オンライン照合を必要とすることなく本人確認を可能とし たことを特徴とするオフライン本人確認システムを提供する。 The third invention of the present application relates to a method for encrypting personal identification information as personal identification means (this is a two-dimensional code by adding unique data obtained by digitally processing image data such as a signature, and obtaining a certificate or the like). By printing on paper, when reproducing personally identifiable information such as certificates, by detecting image data such as signatures by reproducing unique data, it was possible to verify the identity without the need for online verification. An offline personal identification system is provided.
本願第 1発明の好適な実施態様を示すと、個品情報(例えば、著作権 情報、製品の識別情報、医薬品処方箋情報)を 1二次元コードで構成し 且つ暗号化し、その内容を画像情報の一部に記録する。例えば、二次元
コードの内容を画像情報の最初或いは最後の一部に埋め込む。 According to a preferred embodiment of the first invention of the present application, individual product information (for example, copyright information, product identification information, pharmaceutical prescription information) is composed of a two-dimensional code and encrypted, and the content is converted into image information. Record partly. For example, two-dimensional The content of the code is embedded in the first or last part of the image information.
本願第 2発明の好適な実施態様を示すと、個人特定情報を示す長い桁 数の暗号鍵を含むパスワードを設定し、これを複数個に分割し、分割した 複数個のパスワード部分列をそれぞれ二次元コード化して複数個の二次 元コード化部分列を形成する。ダミー(蹈)に混在した複数個の二次元コー ド化部分列の並び順を決定する。この並び順は、コンピューターや識別力一 ド等には記録しないこと、即ち、ユーザーが手動で入力することを特徴とす る。 According to a preferred embodiment of the second invention of the present application, a password including a long-digit encryption key indicating personal identification information is set, the password is divided into a plurality of passwords, and each of the plurality of divided password substrings is divided into two. Dimensionally coded to form a plurality of 2D coded subsequences. The order of the two-dimensional coded subsequences mixed in the dummy is determined. This arrangement order is characterized in that it is not recorded on a computer, a discriminator, or the like, that is, it is manually entered by a user.
本願第 3発明の好適な実施態様を示すと、身分証明書等に二次元コー ドを使用して表示器に表示する。本人確認手段としての個人特定情報を 暗号化し、署名等の画像データをデジタル処理した特異データを加えて、 二次元コード化して証明書等の書面に印刷する。証明書等の個人特定情 報の再生に際し、特異データの再生により署名等の画像データを検出する ことで、オンライン照合を必要とすることなく本人確認を可能とする。 図面の簡単な説明 According to a preferred embodiment of the third invention of the present application, a two-dimensional code is used for an identification card or the like on a display device. Encrypt personal identification information as personal identification means, add unique data obtained by digitally processing image data such as a signature, convert it into a two-dimensional code, and print it on a document such as a certificate. When reproducing personally identifiable information such as certificates, by detecting image data such as signatures by reproducing unique data, it is possible to verify the identity without the need for online verification. BRIEF DESCRIPTION OF THE FIGURES
第 1図は、本願第 1発明の実施例を示す、 "電子透かし"の説明図である ( 第 2図は、同じく、「暗号の画像データへの透き込み」のフローチャートであ る。 FIG. 1 is an explanatory diagram of “digital watermark” showing an embodiment of the first invention of the present application ( FIG. 2 is a flowchart of “transparency of encrypted data into image data”).
第 3図は、同じく、「画像データから暗号データの取り出し」のフローチャート で&)る。 Fig. 3 is a flowchart of “Retrieving encrypted data from image data”.
第 4図は、本願第 2発明の実施例におけるカードの、、並び順〃の説明図で あ 。 FIG. 4 is an explanatory diagram of the order of arrangement of the cards in the embodiment of the second invention of the present application.
第 5図は、同じく、、、カード、、を選択しての情報読取手段の説明図である。 第 6図は、同じぐカード情報の読取システムの説明図である。 FIG. 5 is an explanatory diagram of the information reading means similarly selecting a card. FIG. 6 is an explanatory diagram of the same card information reading system.
第 7図は、本願第 3発明の実施例における証明書発行時のフローチャート である。 FIG. 7 is a flowchart at the time of issuing a certificate in the third embodiment of the present invention.
第 8図は、同じ 照合時のフローチャートである。 FIG. 8 is a flowchart for the same collation.
第 9図は、署名等の画像データの一例を示す説明図で、 a図はデジタル署 名用署名、 b図は肉筆署名用署名を示す。 発明を実施するための最良の形態 FIG. 9 is an explanatory view showing an example of image data such as a signature. FIG. 9A shows a digital signature, and FIG. 9B shows a handwriting signature. BEST MODE FOR CARRYING OUT THE INVENTION
本発明をより詳細に説述するために、添付の図面に従ってこれを説明す る。 The present invention will be described in more detail with reference to the accompanying drawings.
第 1図ないし第 3図を參照して、本願第 1発明による"電子透かじにつ いて説明する。 With reference to FIG. 1 to FIG. 3, the “electronic transparency” according to the first invention of the present application will be described.
個品情報(例えば、著作権情報、製品の識別情報、医薬品処方箋情 報)をエンコードソフトにより暗号化してマトリックスコード化する。 Individual product information (for example, copyright information, product identification information, and pharmaceutical prescription information) is encrypted by encoding software and matrix-coded.
一つのセルを 1ビットで表して、コードの内容を左上から右方向に、上か ら下に順次一連の数列として記憶する(コード内容の認識)。
つぎに、コードの X方向と Y方向のセル数(ドット数)をそれぞれ 1バイトの データとして記憶する(コードのサイズ認識)。 One cell is represented by one bit, and the contents of the code are stored as a series of numbers sequentially from top left to right and from top to bottom (code content recognition). Next, the number of cells (number of dots) in the X and Y directions of the code is stored as 1-byte data (code size recognition).
これら X軸方向のセル数データと Υ軸方向のセル数データを上記の一連 の数列の頭につけて、この一連の数列を透かしデータとする。 The cell number data in the X-axis direction and the cell number data in the Υ-axis direction are prepended to the above-mentioned series of numbers, and this series of numbers is used as watermark data.
対象となる画像情報(デジタル)の最初の 1バイトを取り出し、その最下 位ビットを上記透かしデータの最上位のビットによって置換する。 The first byte of the target image information (digital) is extracted, and the least significant bit is replaced with the most significant bit of the watermark data.
処理の終わったその当該バイ卜を画像の元の位置に戻す。 The processed byte is returned to the original position of the image.
画像情報の次の 1バイトを取出しその最下位ビットを透かしデータの前 回の右隣の 1ビットによって置換する。 The next byte of the image information is taken out and its least significant bit is replaced by the previous right-hand bit of the watermark data.
全てのセル数を終えるまで上記と同様の処理を繰り返す。 The same processing as described above is repeated until all the cell numbers are completed.
暗号データの取出し(二次元コードの回復)はその逆のプロセスを行う。 Extraction of encrypted data (recovery of a two-dimensional code) performs the reverse process.
"電子透かじ'の適用例としては、ネットワーク上でやり取りされる画像 等の著作権の確認等に利用が考えられる。 An example of the application of "electronic watermarking" is to confirm the copyright of images exchanged on a network.
二次元の二次元コードを使用することで、非可視であるとともに、画像と して再現できる為に明白かつ客観的な証拠力を持つ電子透かし技術とな る。 By using a two-dimensional two-dimensional code, it becomes a digital watermarking technology that is invisible and has clear and objective evidence because it can be reproduced as an image.
具体的には、二次元コードの内容を画像情報の最初或は最後の一部 に埋め込むものであるが、それによつて変更されるのは 1パイ卜(8ビット)毎 にその最下位のビットのみであることで、画質に対する影響は極めて微細 で人間の目に感知されることはない。他の電子透かし手法に比しての優位 性は、二次元コード化(一種の暗号化に相当する)によって一階層分安全 性が高まっていることに加え、最終的には透かし情報が二次元コードとして 復元されるため客観的な証拠能力を持つことです。勿論他の暗号化手法 との組み合わせは可能であり望ましいことである。 More specifically, the content of the two-dimensional code is embedded at the beginning or at the end of the image information. The least significant bit is changed every one bit (8 bits). The effect on image quality is so small that it is not noticeable to the human eye. The advantage over other digital watermarking methods is that two-dimensional coding (corresponding to a kind of encryption) increases the security for one layer, and finally the watermark information is two-dimensional. It has objective evidential ability to be restored as code. Of course, combinations with other encryption methods are possible and desirable.
第 4図ないし第 6図を参照して、第 2発明を説明する。 The second invention will be described with reference to FIGS. 4 to 6.
カード 1に印字された 20個のコードのうちで 1 6個をダミーとする。パス ワードは 4分割されて左から数えて上段 2番目、下段 5番目、下段 6番目、 上段 9番目に入っている。その並び順は" Ε— 9一 2— F"とする。 Of the 20 codes printed on card 1, 16 are dummy. The password is divided into four parts, counting from the left, in the second row at the top, the fifth row at the bottom, the sixth row at the bottom, and the ninth row at the top. The order is "" -9-1-2-F ".
この並び順を記憶している正規ユーザーはハンドへルド型或はペン型の スキャナー 2用いて、第 4図 を参照して、他のコードは無視して左から下 段 5番目 # 1、上段 9番目 # 2、上段 2番目 # 3、下段 6番目 #4の順で読 み取る。アクセスされる側では、復元された数百から数千桁のバスワードを 受領し、正規ユーザ一であることを識別する。 A regular user who memorizes this order can use a hand-held or pen-type scanner 2 and refer to Fig. 4 ignoring other codes and ignoring other codes. Read in the order of ninth # 2, upper second # 3, lower sixth # 4. The accessed side receives the restored hundreds to thousands of digits of the password and identifies it as the authorized user.
第 5図および第 6図を参照して、 3は端末機器、 4はキーボード、 5はィ ンターネット等の通信網、 6は集中管理用コンピューター、 7はデータである, 第 2発明は、侵入者が二次元コード化バスワードの記載(記録)された媒 体を入手したとしても、正規ユーザーが「並べ順」情報を口外しない限り不 正アクセスは容易でない(不可能に近い)。極めて高度な機密情報などの 場合、パスワード分割にあたって担当者とその上司とに前半'後半と半分 づっ振り分け、 2人が同一操作の中で引き続いて読取らなければ管理シス
テムが認証しないようにしておけば、安全性はさらに向上する。 Referring to FIGS. 5 and 6, 3 is a terminal device, 4 is a keyboard, 5 is a communication network such as the Internet, 6 is a computer for centralized management, 7 is data, and the second invention is an intrusion. Even if the user obtains the medium on which the two-dimensional coded password is described (recorded), unauthorized access is not easy (almost impossible) unless the authorized user verifies the "ordering" information. In the case of extremely sophisticated confidential information, the password is split between the person in charge and his / her boss in the first half and the second half, and the management system must be read if two people do not continue reading in the same operation. If the system is not authenticated, security will be further improved.
ICカードを個人認証に用いる方法も提案されているが、本発明は、ダ ミーを含む複数の ICカードに所要のデータを分割'割当てて実効データを 蔵するカードをユーザーの記憶した順序で順次読取らせることと同等の効 果を、はるかに低いコストで提供するものである。 Although a method of using an IC card for personal authentication has been proposed, the present invention divides and allocates required data to a plurality of IC cards including a dummy and sequentially stores cards storing effective data in the order stored by the user. It offers the same effect as reading at a much lower cost.
署名 'サインによる認証も同様に正規ユーザーの同意なしには行うことが できない。その意味で本発明と競合する。しかし、署名■サイン用の感圧 パットが汎用性に乏しいのに対し、本発明の使用する光学的読取装置は 他の多くの目的のための入力機器としても使用でき、汎用性においては、 はるかに優れている。何により低コストでシステムを構築できる。極めて重 要な機密を扱うユーザーについては侵入者に対するハードルを更に高める ために両者を併用することも勿論可能であり、望ましいことである。 Signature 'Signed authentication cannot be performed without the consent of the authorized user. In that sense, it competes with the present invention. However, while the pressure-sensitive pad for signature / signature is less versatile, the optical reader used by the present invention can also be used as an input device for many other purposes, and is far less versatile. Is excellent. Above all, a system can be constructed at low cost. It is of course possible and desirable for users who handle extremely important confidential information to use both in order to further increase the hurdle against intruders.
本願第 2発明の特徴は、オンライン上での数十、数百から数千桁に及ぶ パスワードによる高い不正アクセス阻止効果を、数桁の「並べ順」の数字を "オフライン"記憶し手動で入力することによって実現することにあり、オンラ イン'オフラインと自動-手動のハイブリットにある。 The feature of the second invention of the present application is that the high unauthorized access prevention effect by the password of several tens, several hundreds to several thousand digits online is stored in the "offline" of several digits in the "order" and manually input. It is to be realized by being in 'online' offline and auto-manual hybrid.
複数の二次元コードを"並べ順 "に手動で読取るためにはハンドへルド型 或はペン型の読取機が必要になるが、これらは容易に低コストで製造でき る。 Hand-held or pen-type readers are required to manually read multiple two-dimensional codes in "arranged order", which can be easily manufactured at low cost.
"並び順 "を簡単に覚えられる方法として、二次元コードを印刷するにあ たってその周囲の余白に小さぐ'い' 'から"ん"までの仮名を印刷するよう【こ すれば約 50個までを容易に管理■記憶する手段とできる。ダミーを増やし て更に難度を上げるには、 a— Zのアルファベット、 0— 9の数字、更には漢 字まで使えば十分に対応できる。 As an easy way to remember the "ordering", when printing a two-dimensional code, print a small number of kana characters, from small 'I' to 'n', in the margins around it. Can be easily managed and stored. To increase the level of difficulty by increasing the number of dummies, it is sufficient to use a- Z alphabets, 0-9 numbers, and even kanji.
第 7図および第 8図を参照して、第 3発明の実施例を説明する。 An embodiment of the third invention will be described with reference to FIGS. 7 and 8.
A.証明書発行(第 7図参照) A. Certificate issuance (See Fig. 7)
申込書に記載された署名をスキャナーで読取り、画像データとして保存 する。 Scan the signature on the application form with a scanner and save it as image data.
画像データを圧縮、暗号化する。 Compress and encrypt image data.
住所、氏名等の個人情報や IDナンバー等と画像データを合成して一つ のファイルにする。 Combine image data with personal information such as address and name, ID number, etc. into one file.
エンコードソフトにより、ファイルを二次元コードに変換する。 The file is converted into a two-dimensional code by the encoding software.
カードの表面または裏面に二次元コードを印刷する。 Print a two-dimensional code on the front or back of the card.
利用者にカードを発行する。 Issue a card to the user.
B.照合時(第 8図参照) B. During verification (see Fig. 8)
カードの二次元コード部分をスキャナーで読み取る。 Scan the two-dimensional code part of the card with a scanner.
デコードソフトで二次元コードから画像データと文字データに変換する。 利用者には見えない表示機に署名のデータと文字データを表示する。 利用者に署名をしてもらう。 The decoding software converts the two-dimensional code into image data and character data. The signature data and character data are displayed on a display invisible to the user. Have the user sign.
文字データ、署名データを照合する。
照合結果"正""不正' 'の確認 Verifies character data and signature data. Confirmation of collation result "correct""invalid"
つぎに、第 3発明の適用例を説明する。 Next, an application example of the third invention will be described.
パスポート、免許証、 IDカード、クレジットカード等の申請時に氏名、住所. 電話番号等の従来から必要とされているデータに加え、血液型その他特 記事項などに併せて、デジタル署名用署名 Xと肉筆署名用署名 Yを申請 書に記載する。発行元では、このデジタル署名用署名 Xを画像データとして 読み込んだのちデジタル処理したもの特異データとして、証明書番号'カー ド番号、有限期限と前記の全てのデータを暗号化したものと併せて二次元 コード化し、証明書の表面に印刷する。証明書'カードの目的 -性格によつ てはこのデジタル署名 Xのみを使い、従来の目視用アナログ肉筆署名 Yは 使用しない。光学的読取器のない場所で従来型の使用も継続できるよう にすることを望む場合には、従来通りの目視用アナログ肉筆サインを併用 する。 When applying for a passport, driver's license, ID card, credit card, etc., in addition to the data required conventionally, such as the name, address, telephone number, blood type and other special notes, a digital signature X and Write the signature for handwriting signature Y on the application form. The issuer reads the signature X for digital signature as image data and then digitally processes it as the unique data, together with the certificate number, the card number, the finite term, and the data obtained by encrypting all the above data. Dimensionally coded and printed on the surface of the certificate. Certificate's Card Purpose-Depending on the personality, use only this digital signature X and not the conventional visual analog handwriting signature Y. If it is desired to be able to continue the conventional use in places where there is no optical reader, use the conventional visual handwriting signature as well.
上記の署名のハイブリッド化に加えて或は代えて特記事項には真実の 保持者にしか答えられない特異なデータ(本人の経験にもとづく本人のみ が特定できる知識事項)を二次元コードに含めて、それを本人確認の手段 とすることもできる。所持者には見えないように設置された表示器に上記の 特異データが表示され、所持人がその内容を述べることが出来なければ直 ちに"本人でない"と判定できる。例えば、母親の旧姓などは、正規の所持 者でなければ質問されても答えられない。答えられないど'不正使用であ る"と直ちに判定することができる。 In addition to or instead of the above-mentioned signature hybridization, special notes include special data that can only be answered by the holder of the truth (knowledge items that can be identified only by the principal based on his / her experience) in the two-dimensional code. It can also be used as a means of identity verification. The above unique data is displayed on a display that is not visible to the owner, and if the owner cannot state its contents, it can be immediately judged as "not himself". For example, a mother's maiden name cannot be answered when asked unless she is a legitimate owner. If you cannot answer, you can immediately determine that it is 'illegal use'.
なお、上記のごとく表示器に表示してクレジット販売の店員が目視確認 するに変えて、カード等所持者の示す画像データと、カードの特異データよ リ再生検出した画像データとの自動照合を行うことで、店員の関与を排除 することができる(店員はカードに記録されている特異データに対応する画 像データを知ることはできない)。 As described above, instead of displaying on the display unit and visually checking by the credit sales clerk, the image data indicated by the holder such as a card is automatically collated with the image data detected and reproduced by the card's unique data. This can eliminate the involvement of the clerk (the clerk cannot know the image data corresponding to the unique data recorded on the card).
更に、目的によっては、セラミック'金属系の不燃材料を用紙■インキとす れぱ、焼失しにくいという長所も併せもつこととなり、勿論 ICカードとの併用 更には ICカード上の一部に不燃材料を使用しその上に二次元コードを印 刷-刻印するといつた組合わせも可能である。 In addition, depending on the purpose, ceramics and metal-based non-combustible materials can be used as paper and ink, which has the advantage of being difficult to burn out. Any combination is possible by printing and engraving a two-dimensional code on it using.
本願第 1発明は、個品情報を暗号化した二次元コードとしたことで、個 品情報の情報量を拡大し且つ暗号化することができる。 According to the first invention of the present application, the information amount of the individual item information can be expanded and encrypted by using the two-dimensional code obtained by encrypting the individual item information.
本願第 2発明は、パスワードの盗用等の不正アクセス対策として、小さな スペースに印字 '刻印できる二次元コードを適用することでカードに多数の 情報を収容でき、それを低コストの光学機器を用いて簡単に読取ることが できることを利用して、さらに手作業の要素を加味することによって不正ァ クセスを効果的に阻止するコンピューターシステムを容易に実現できる効果 を有する。 According to the second invention of the present application, as a countermeasure against unauthorized access such as password theft, a large amount of information can be stored in a card by applying a two-dimensional code that can be printed and engraved in a small space, and it can be stored in a low-cost optical device. Utilizing the fact that it can be easily read, it also has the effect of easily realizing a computer system that effectively prevents unauthorized access by adding further manual elements.
本願第 3発明は、証明書等の個人特定情報の再生に際し、特異データ の再生により署名等の画像データを検出することで、オンライン照合を必
要とすることなく本人確認を可能とする効果を有する。 産業上の利用可能性 In the third invention of the present application, when reproducing personal identification information such as a certificate, on-line verification is required by detecting image data such as a signature by reproducing the unique data. This has the effect of making it possible to confirm the identity of the user without requiring it. Industrial applicability
本発明は、 IT技術を利用した電子商取引における個品特定手段および 本人認証手段として利用することができる。特に、パスワード、 ID番号等の 個人特定情報の漏洩防止、不正アクセスの防止手段として利用されると き、効果を有する。
INDUSTRIAL APPLICABILITY The present invention can be used as individual item specifying means and personal authentication means in electronic commerce using IT technology. It is particularly effective when used as a means to prevent leakage of personal identification information such as passwords and ID numbers, and to prevent unauthorized access.
Claims
請求の範囲 個品情報を暗号化した二次元コードの内容を画像情報として記録したこ とを特徴とする二次元コードによる個別識別方法。 Claims An individual identification method using a two-dimensional code, characterized in that the contents of a two-dimensional code obtained by encrypting individual product information are recorded as image information.
2. 2.
個人認識手段としての個人特定情報を複数個の暗号化した二次元 コードで構成し、ダミーに混在した複数個の二次元コードの"並び順 "をカー ド読取情報'オンライン入力情報とは独立したオフライン入力とすることを 特徴とするハイブリット型個人認証システム。 Personal identification information as personal recognition means is composed of a plurality of encrypted two-dimensional codes, and the "order" of a plurality of two-dimensional codes mixed in dummy is independent of the card reading information 'online input information. A hybrid personal identification system characterized by offline input.
3. 3.
本人確認手段としての個人特定情報を暗号化したデータに、画像デー タをデジタル処理してなる特異データを加えて、二次元コード化して証明書 等の書面に印刷することにより、証明書等の個人特定情報の再生に際し. 特異データの再生により個人特定情報を検出再生することで、オンライン 照合を必要とすることなく本人確認を可能としたことを特徴とするオフライン 本人確認システム By adding unique data obtained by digitally processing image data to data obtained by encrypting personal identification information as personal identification means, two-dimensionally encoding it and printing it on a document such as a certificate, When reproducing personal identification information. Offline personal identification system characterized by detecting and reproducing personal identification information by reproducing peculiar data, enabling identification without the need for online verification.
4. Four.
クレーム 3において、特異データを、署名等の画像データをデジタル処理 したものとしたことを特徴とするオフライン本人確認システム An off-line identity verification system in claim 3, wherein the unique data is digitally processed image data such as a signature.
5. Five.
クレーム 3において、申請書にデジタル署名用署名と肉筆署名用署名と を記載させ、特異データを、デジタル署名用署名の画像データをデジタル 処理したものとしたことを特徴とするオフライン本人確認システム。 An off-line identity verification system according to claim 3, wherein a digital signature and a handwriting signature are described in the application, and the unique data is digitally processed image data of the digital signature.
6. クレーム 3において、特異データを、本人の経験にもとづく本人のみが 特定できる知識事項の所持者記憶データとしたことを特徴とするオフライン 本人確認システム。
6. An off-line identity verification system according to claim 3, wherein the peculiar data is data of a possessor of knowledge items that can be identified only by the principal based on the principal's experience.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
AU2001242824A AU2001242824A1 (en) | 2000-04-03 | 2001-03-29 | Individual body identifying method by two-dimensional code, hybrid individual person authenticating system, and off-line person identifying system |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP2000100393A JP2001283167A (en) | 2000-04-03 | 2000-04-03 | Individual identification method with two-dimensional code and hybrid type individual authentication system and off-line person himself or herself confirmation system |
JP2000-100393 | 2000-04-03 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2001075782A1 true WO2001075782A1 (en) | 2001-10-11 |
Family
ID=18614610
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/JP2001/002612 WO2001075782A1 (en) | 2000-04-03 | 2001-03-29 | Individual body identifying method by two-dimensional code, hybrid individual person authenticating system, and off-line person identifying system |
Country Status (3)
Country | Link |
---|---|
JP (1) | JP2001283167A (en) |
AU (1) | AU2001242824A1 (en) |
WO (1) | WO2001075782A1 (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103679456A (en) * | 2012-09-18 | 2014-03-26 | 中国银联股份有限公司 | System and method for trading based on signature information |
CN106656511A (en) * | 2017-01-13 | 2017-05-10 | 阳振庭 | Method and system for uniformly managing identity endorsement |
CN109376818A (en) * | 2018-10-09 | 2019-02-22 | 杭州收盈科技有限公司 | A kind of encryption time synchronization method based on offline dynamic two-dimension code |
Families Citing this family (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2005346447A (en) * | 2004-06-03 | 2005-12-15 | Gijutsu Transfer Service:Kk | Forgery-preventive card with two-dimensional code, and information presentation collation system and information presentation collation method using the forgery-preventive card |
JP2008272817A (en) * | 2007-05-07 | 2008-11-13 | Vector Co Ltd | Marking device |
JP2011018279A (en) * | 2009-07-10 | 2011-01-27 | Toshiba Corp | Signature authentication device and signature authentication program |
CN105760915B (en) * | 2016-02-02 | 2018-08-24 | 程烨 | A kind of generation method and device of anti-counterfeiting image |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO1998023062A1 (en) * | 1996-11-22 | 1998-05-28 | T-Netix, Inc. | Voice recognition for information system access and transaction processing |
JPH10191025A (en) * | 1996-12-26 | 1998-07-21 | Nippon Telegr & Teleph Corp <Ntt> | Information embedding device for digital image |
JPH11272816A (en) * | 1998-03-25 | 1999-10-08 | Toshiba Tec Corp | Id card and individual authentication system |
-
2000
- 2000-04-03 JP JP2000100393A patent/JP2001283167A/en active Pending
-
2001
- 2001-03-29 AU AU2001242824A patent/AU2001242824A1/en not_active Abandoned
- 2001-03-29 WO PCT/JP2001/002612 patent/WO2001075782A1/en active Application Filing
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO1998023062A1 (en) * | 1996-11-22 | 1998-05-28 | T-Netix, Inc. | Voice recognition for information system access and transaction processing |
JPH10191025A (en) * | 1996-12-26 | 1998-07-21 | Nippon Telegr & Teleph Corp <Ntt> | Information embedding device for digital image |
JPH11272816A (en) * | 1998-03-25 | 1999-10-08 | Toshiba Tec Corp | Id card and individual authentication system |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103679456A (en) * | 2012-09-18 | 2014-03-26 | 中国银联股份有限公司 | System and method for trading based on signature information |
CN106656511A (en) * | 2017-01-13 | 2017-05-10 | 阳振庭 | Method and system for uniformly managing identity endorsement |
CN109376818A (en) * | 2018-10-09 | 2019-02-22 | 杭州收盈科技有限公司 | A kind of encryption time synchronization method based on offline dynamic two-dimension code |
Also Published As
Publication number | Publication date |
---|---|
JP2001283167A (en) | 2001-10-12 |
AU2001242824A1 (en) | 2001-10-15 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP1312033B1 (en) | The transfer of verification data | |
US5984366A (en) | Unalterable self-verifying articles | |
US5485519A (en) | Enhanced security for a secure token code | |
JP4323098B2 (en) | A signature system that verifies the validity of user signature information | |
US5673320A (en) | Method and apparatus for image-based validations of printed documents | |
US20060020559A1 (en) | System for authentication and identification for computerized and networked systems | |
CN104166871B (en) | Anti-counterfeit label and anti-counterfeit method based on combination of two-dimension codes and RFID chips | |
CN101069187B (en) | Secure cards and methods | |
JP2010506245A (en) | Computer-based credit card | |
JP2011113523A (en) | User authentication device | |
WO2004079643A1 (en) | Secure steganographic biometric identification | |
JP2006313534A (en) | Method and system for manufacturing uncorrectable self-identification article and checking its authenticity | |
WO2001075782A1 (en) | Individual body identifying method by two-dimensional code, hybrid individual person authenticating system, and off-line person identifying system | |
US11279164B1 (en) | Length-modulated screening lines and line codes | |
JP2000309154A (en) | Identification card | |
CN101170626B (en) | Information processing apparatus, information processing method | |
JP4466108B2 (en) | Certificate issuance method and certificate verification method | |
US20060092476A1 (en) | Document with user authentication | |
JP2010079515A (en) | Authentication system, key for use in the same, authentication method, and program | |
JP3636898B2 (en) | Information card and information card system | |
JP2001086319A (en) | Recording matter, method, device and system for authentication | |
US20040123100A1 (en) | Certificate issuing method and certificate verifying method | |
JPH1173504A (en) | Recording material for identification and authenticity discriminating method | |
JP2004310313A (en) | Card for individual identification including two-dimensional coded personal biological information and personal identification method using the same information | |
JP2003060890A (en) | Individual authentication system using communication network |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AK | Designated states |
Kind code of ref document: A1 Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EE ES FI GB GD GE GH GM HR HU ID IL IN IS KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT TZ UA UG US UZ VN YU ZA ZW |
|
AL | Designated countries for regional patents |
Kind code of ref document: A1 Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE TR BF BJ CF CG CI CM GA GN GW ML MR NE SN TD TG |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
DFPE | Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101) | ||
122 | Ep: pct application non-entry in european phase |