WO2001075782A1 - Procede d'identification d'un corps par un code a deux dimensions, systeme hybride d'authentification de personne individuelle et systeme d'identification de personne hors ligne - Google Patents

Procede d'identification d'un corps par un code a deux dimensions, systeme hybride d'authentification de personne individuelle et systeme d'identification de personne hors ligne Download PDF

Info

Publication number
WO2001075782A1
WO2001075782A1 PCT/JP2001/002612 JP0102612W WO0175782A1 WO 2001075782 A1 WO2001075782 A1 WO 2001075782A1 JP 0102612 W JP0102612 W JP 0102612W WO 0175782 A1 WO0175782 A1 WO 0175782A1
Authority
WO
WIPO (PCT)
Prior art keywords
information
data
individual
personal identification
person
Prior art date
Application number
PCT/JP2001/002612
Other languages
English (en)
Japanese (ja)
Inventor
Hitoshi Kokumai
Ryohei Masuno
Masayuki Kuriyama
Original Assignee
Mnemonic Security Limited
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Mnemonic Security Limited filed Critical Mnemonic Security Limited
Priority to AU2001242824A priority Critical patent/AU2001242824A1/en
Publication of WO2001075782A1 publication Critical patent/WO2001075782A1/fr

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/06009Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking
    • G06K19/06037Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking multi-dimensional coding

Definitions

  • the present invention relates to an individual identification method using a ⁇ -coded two-dimensional code. Further, the present invention relates to a hybrid personal identification system and an offline personal identification system using an individual identification method using a two-dimensional code. Background art
  • a means of personal authentication for confirming the identity of a trader, and a means of identifying themselves, that is, as individual product information-personal identification information, use alphanumeric characters such as passwords and ID numbers.
  • An identification code represented by a combination of alphanumeric strings is known.
  • An object of the present invention is to prevent leakage of personal identification information such as a password and an ID number and prevent unauthorized access in the above identification code.
  • a further object of the first invention of the present application is to prevent personal information from being leaked, falsified, illegally used, and the like by using a two-dimensional code obtained by encrypting the individual product information.
  • the second invention and the third invention of the present application as personal authentication means and personal identification means, have problems such as prevention of leakage of ID cards, prepaid cards, credit cards, prevention of forgery and falsification, prevention of unauthorized use, prevention of unauthorized access, and the like. And Disclosure of the invention
  • the first invention of the present application provides an individual identification method using a two-dimensional code, characterized in that the contents of a two-dimensional code obtained by encrypting individual product information are recorded as image information in an existing image so as to be invisible.
  • the personal identification information as the personal recognition means is composed of a plurality of encrypted two-dimensional codes, and the “arrangement order” of the plurality of two-dimensional codes is determined by the card reading information and online input information.
  • the third invention of the present application relates to a method for encrypting personal identification information as personal identification means (this is a two-dimensional code by adding unique data obtained by digitally processing image data such as a signature, and obtaining a certificate or the like).
  • This is a two-dimensional code by adding unique data obtained by digitally processing image data such as a signature, and obtaining a certificate or the like.
  • individual product information for example, copyright information, product identification information, pharmaceutical prescription information
  • individual product information is composed of a two-dimensional code and encrypted, and the content is converted into image information. Record partly.
  • two-dimensional The content of the code is embedded in the first or last part of the image information.
  • a password including a long-digit encryption key indicating personal identification information is set, the password is divided into a plurality of passwords, and each of the plurality of divided password substrings is divided into two.
  • the order of the two-dimensional coded subsequences mixed in the dummy is determined. This arrangement order is characterized in that it is not recorded on a computer, a discriminator, or the like, that is, it is manually entered by a user.
  • a two-dimensional code is used for an identification card or the like on a display device.
  • Encrypt personal identification information as personal identification means add unique data obtained by digitally processing image data such as a signature, convert it into a two-dimensional code, and print it on a document such as a certificate.
  • image data such as signatures
  • FIG. 1 is an explanatory diagram of “digital watermark” showing an embodiment of the first invention of the present application
  • FIG. 2 is a flowchart of “transparency of encrypted data into image data”).
  • Fig. 3 is a flowchart of “Retrieving encrypted data from image data”.
  • FIG. 4 is an explanatory diagram of the order of arrangement of the cards in the embodiment of the second invention of the present application.
  • FIG. 5 is an explanatory diagram of the information reading means similarly selecting a card.
  • FIG. 6 is an explanatory diagram of the same card information reading system.
  • FIG. 7 is a flowchart at the time of issuing a certificate in the third embodiment of the present invention.
  • FIG. 8 is a flowchart for the same collation.
  • FIG. 9 is an explanatory view showing an example of image data such as a signature.
  • FIG. 9A shows a digital signature
  • FIG. 9B shows a handwriting signature.
  • Individual product information (for example, copyright information, product identification information, and pharmaceutical prescription information) is encrypted by encoding software and matrix-coded.
  • One cell is represented by one bit, and the contents of the code are stored as a series of numbers sequentially from top left to right and from top to bottom (code content recognition). Next, the number of cells (number of dots) in the X and Y directions of the code is stored as 1-byte data (code size recognition).
  • the cell number data in the X-axis direction and the cell number data in the ⁇ -axis direction are prepended to the above-mentioned series of numbers, and this series of numbers is used as watermark data.
  • the first byte of the target image information (digital) is extracted, and the least significant bit is replaced with the most significant bit of the watermark data.
  • the processed byte is returned to the original position of the image.
  • next byte of the image information is taken out and its least significant bit is replaced by the previous right-hand bit of the watermark data.
  • Extraction of encrypted data performs the reverse process.
  • the content of the two-dimensional code is embedded at the beginning or at the end of the image information.
  • the least significant bit is changed every one bit (8 bits).
  • the effect on image quality is so small that it is not noticeable to the human eye.
  • the advantage over other digital watermarking methods is that two-dimensional coding (corresponding to a kind of encryption) increases the security for one layer, and finally the watermark information is two-dimensional. It has objective evidential ability to be restored as code. Of course, combinations with other encryption methods are possible and desirable.
  • the password is divided into four parts, counting from the left, in the second row at the top, the fifth row at the bottom, the sixth row at the bottom, and the ninth row at the top.
  • the order is "" -9-1-2-F ".
  • a regular user who memorizes this order can use a hand-held or pen-type scanner 2 and refer to Fig. 4 ignoring other codes and ignoring other codes.
  • the accessed side receives the restored hundreds to thousands of digits of the password and identifies it as the authorized user.
  • FIGS. 5 and 6, 3 is a terminal device, 4 is a keyboard, 5 is a communication network such as the Internet, 6 is a computer for centralized management, 7 is data, and the second invention is an intrusion. Even if the user obtains the medium on which the two-dimensional coded password is described (recorded), unauthorized access is not easy (almost impossible) unless the authorized user verifies the "ordering" information. In the case of extremely sophisticated confidential information, the password is split between the person in charge and his / her boss in the first half and the second half, and the management system must be read if two people do not continue reading in the same operation. If the system is not authenticated, security will be further improved.
  • the present invention divides and allocates required data to a plurality of IC cards including a dummy and sequentially stores cards storing effective data in the order stored by the user. It offers the same effect as reading at a much lower cost.
  • Signature 'Signed authentication cannot be performed without the consent of the authorized user. In that sense, it competes with the present invention.
  • the pressure-sensitive pad for signature / signature is less versatile
  • the optical reader used by the present invention can also be used as an input device for many other purposes, and is far less versatile. Is excellent. Above all, a system can be constructed at low cost. It is of course possible and desirable for users who handle extremely important confidential information to use both in order to further increase the hurdle against intruders.
  • the feature of the second invention of the present application is that the high unauthorized access prevention effect by the password of several tens, several hundreds to several thousand digits online is stored in the "offline" of several digits in the "order” and manually input. It is to be realized by being in 'online' offline and auto-manual hybrid.
  • Hand-held or pen-type readers are required to manually read multiple two-dimensional codes in "arranged order", which can be easily manufactured at low cost.
  • the file is converted into a two-dimensional code by the encoding software.
  • the decoding software converts the two-dimensional code into image data and character data.
  • the signature data and character data are displayed on a display invisible to the user. Have the user sign.
  • a digital signature X and Write the signature for handwriting signature Y on the application form The issuer reads the signature X for digital signature as image data and then digitally processes it as the unique data, together with the certificate number, the card number, the finite term, and the data obtained by encrypting all the above data. Dimensionally coded and printed on the surface of the certificate. Certificate's Card Purpose-Depending on the personality, use only this digital signature X and not the conventional visual analog handwriting signature Y. If it is desired to be able to continue the conventional use in places where there is no optical reader, use the conventional visual handwriting signature as well.
  • special notes include special data that can only be answered by the holder of the truth (knowledge items that can be identified only by the principal based on his / her experience) in the two-dimensional code. It can also be used as a means of identity verification.
  • the above unique data is displayed on a display that is not visible to the owner, and if the owner cannot state its contents, it can be immediately judged as "not himself". For example, a mother's maiden name cannot be answered when asked unless she is a legitimate owner. If you cannot answer, you can immediately determine that it is 'illegal use'.
  • the image data indicated by the holder such as a card is automatically collated with the image data detected and reproduced by the card's unique data. This can eliminate the involvement of the clerk (the clerk cannot know the image data corresponding to the unique data recorded on the card).
  • ceramics and metal-based non-combustible materials can be used as paper and ink, which has the advantage of being difficult to burn out. Any combination is possible by printing and engraving a two-dimensional code on it using.
  • the information amount of the individual item information can be expanded and encrypted by using the two-dimensional code obtained by encrypting the individual item information.
  • a large amount of information can be stored in a card by applying a two-dimensional code that can be printed and engraved in a small space, and it can be stored in a low-cost optical device. Utilizing the fact that it can be easily read, it also has the effect of easily realizing a computer system that effectively prevents unauthorized access by adding further manual elements.
  • the present invention can be used as individual item specifying means and personal authentication means in electronic commerce using IT technology. It is particularly effective when used as a means to prevent leakage of personal identification information such as passwords and ID numbers, and to prevent unauthorized access.

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Image Processing (AREA)
  • Editing Of Facsimile Originals (AREA)
  • Collating Specific Patterns (AREA)

Abstract

Procédé d'identification individuelle par des codes cryptés à deux dimensions, système hybride d'authentification de personne individuelle et système d'identification de personne hors ligne. Le contenu de codes à deux dimensions représentant des informations de corps individuel cryptées est enregistré en tant qu'information d'image. Des informations spécifiques de la personne individuelle en tant que moyen de reconnaissance de la personne individuelle sont composées de codes cryptés en deux dimensions. L'«ordre de disposition» de codes en deux dimensions mélangés en éléments factices est fait hors ligne, indépendamment des informations lues sur carte et des entrées en ligne. Des données singulières créées par le fait que des données d'image, par ex. une signature, sont soumises à un traitement numérique sont ajoutées aux données créées par cryptage des informations spécifiques de la personne individuelle en tant que moyens d'authentification de la personne individuelle. Les données résultantes sont transformées en codes en deux dimensions qui sont imprimés sur un document tel qu'un certificat. De cette manière, lorsque des informations spécifiques d'une personne individuelle telles qu'un certificat sont reproduites, les données d'image telles qu'une signature sont détectées et reproduites sur la base des données singulières. La personne peut ainsi être identifiée sans vérification en ligne.
PCT/JP2001/002612 2000-04-03 2001-03-29 Procede d'identification d'un corps par un code a deux dimensions, systeme hybride d'authentification de personne individuelle et systeme d'identification de personne hors ligne WO2001075782A1 (fr)

Priority Applications (1)

Application Number Priority Date Filing Date Title
AU2001242824A AU2001242824A1 (en) 2000-04-03 2001-03-29 Individual body identifying method by two-dimensional code, hybrid individual person authenticating system, and off-line person identifying system

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
JP2000100393A JP2001283167A (ja) 2000-04-03 2000-04-03 二次元コードによる個別識別方法、ハイブリット型個人認証システムおよびオフライン本人確認システム
JP2000-100393 2000-04-03

Publications (1)

Publication Number Publication Date
WO2001075782A1 true WO2001075782A1 (fr) 2001-10-11

Family

ID=18614610

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/JP2001/002612 WO2001075782A1 (fr) 2000-04-03 2001-03-29 Procede d'identification d'un corps par un code a deux dimensions, systeme hybride d'authentification de personne individuelle et systeme d'identification de personne hors ligne

Country Status (3)

Country Link
JP (1) JP2001283167A (fr)
AU (1) AU2001242824A1 (fr)
WO (1) WO2001075782A1 (fr)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103679456A (zh) * 2012-09-18 2014-03-26 中国银联股份有限公司 一种基于签名信息的交易系统及方法
CN106656511A (zh) * 2017-01-13 2017-05-10 阳振庭 一种统一管理身份签注的方法及系统
CN109376818A (zh) * 2018-10-09 2019-02-22 杭州收盈科技有限公司 一种基于离线动态二维码的加密对时方法

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2005346447A (ja) * 2004-06-03 2005-12-15 Gijutsu Transfer Service:Kk 2次元コードを備えた偽造防止カード、該偽造防止カードを用いた情報提示照合システム及び情報提示照合方法。
JP2008272817A (ja) * 2007-05-07 2008-11-13 Vector Co Ltd マーキング装置
JP2011018279A (ja) * 2009-07-10 2011-01-27 Toshiba Corp 署名認証装置および署名認証プログラム
CN105760915B (zh) 2016-02-02 2018-08-24 程烨 一种防伪图像的生成方法及装置

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO1998023062A1 (fr) * 1996-11-22 1998-05-28 T-Netix, Inc. Reconnaissance vocale pour acces a un systeme d'informations et traitement de transactions
JPH10191025A (ja) * 1996-12-26 1998-07-21 Nippon Telegr & Teleph Corp <Ntt> デジタル画像への情報埋め込み装置
JPH11272816A (ja) * 1998-03-25 1999-10-08 Toshiba Tec Corp Idカ−ド及び個人認証システム

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO1998023062A1 (fr) * 1996-11-22 1998-05-28 T-Netix, Inc. Reconnaissance vocale pour acces a un systeme d'informations et traitement de transactions
JPH10191025A (ja) * 1996-12-26 1998-07-21 Nippon Telegr & Teleph Corp <Ntt> デジタル画像への情報埋め込み装置
JPH11272816A (ja) * 1998-03-25 1999-10-08 Toshiba Tec Corp Idカ−ド及び個人認証システム

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103679456A (zh) * 2012-09-18 2014-03-26 中国银联股份有限公司 一种基于签名信息的交易系统及方法
CN106656511A (zh) * 2017-01-13 2017-05-10 阳振庭 一种统一管理身份签注的方法及系统
CN109376818A (zh) * 2018-10-09 2019-02-22 杭州收盈科技有限公司 一种基于离线动态二维码的加密对时方法

Also Published As

Publication number Publication date
JP2001283167A (ja) 2001-10-12
AU2001242824A1 (en) 2001-10-15

Similar Documents

Publication Publication Date Title
EP1312033B1 (fr) Transmission de donnees de verification
US5984366A (en) Unalterable self-verifying articles
US5485519A (en) Enhanced security for a secure token code
JP4323098B2 (ja) 利用者の署名情報の正当性を検証する署名システム
US5673320A (en) Method and apparatus for image-based validations of printed documents
US20060020559A1 (en) System for authentication and identification for computerized and networked systems
CN104166871B (zh) 基于二维码与rfid芯片结合的防伪标签及其防伪方法
CN101069187B (zh) 保密卡和方法
WO2007072793A1 (fr) Carte permettant une authentification
JP2011113523A (ja) ユーザ認証装置
WO2004079643A1 (fr) Identification biometrique steganographique securisee
JP2006313534A (ja) 修正不可能な自己確認物品を製造しかつその真偽性を確認するための方法およびシステム
US20050206158A1 (en) Certificate issuing method and certificate verifying method
WO2001075782A1 (fr) Procede d&#39;identification d&#39;un corps par un code a deux dimensions, systeme hybride d&#39;authentification de personne individuelle et systeme d&#39;identification de personne hors ligne
JP2000309154A (ja) 身分証明証
CN101170626B (zh) 信息处理装置及其方法
US20060092476A1 (en) Document with user authentication
US11279164B1 (en) Length-modulated screening lines and line codes
JP3636898B2 (ja) 情報カードおよび情報カードシステム
JP2004310313A (ja) 二次元コード化した個人生体情報を含む本人認証用カードおよび二次元コード化した個人生体情報を使用した個人認証方法。
JP2010079515A (ja) 認証システム、そのシステムに用いるキー、認証方法およびプログラム
JP2001086319A (ja) 認証用記録物、認証方法、認証装置および認証システム
JP2003060890A (ja) 通信ネットワークを利用した個人認証システム
WO2010089673A2 (fr) Technologie d&#39;authentification de données
JP2002092564A (ja) 機密情報の記録・格納カードおよび機密情報保護方法ならびに機密情報の秘匿記録・格納方法

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EE ES FI GB GD GE GH GM HR HU ID IL IN IS KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT TZ UA UG US UZ VN YU ZA ZW

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE TR BF BJ CF CG CI CM GA GN GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
DFPE Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101)
122 Ep: pct application non-entry in european phase