WO2001075782A1 - Procede d'identification d'un corps par un code a deux dimensions, systeme hybride d'authentification de personne individuelle et systeme d'identification de personne hors ligne - Google Patents
Procede d'identification d'un corps par un code a deux dimensions, systeme hybride d'authentification de personne individuelle et systeme d'identification de personne hors ligne Download PDFInfo
- Publication number
- WO2001075782A1 WO2001075782A1 PCT/JP2001/002612 JP0102612W WO0175782A1 WO 2001075782 A1 WO2001075782 A1 WO 2001075782A1 JP 0102612 W JP0102612 W JP 0102612W WO 0175782 A1 WO0175782 A1 WO 0175782A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- information
- data
- individual
- personal identification
- person
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K19/00—Record carriers for use with machines and with at least a part designed to carry digital markings
- G06K19/06—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
- G06K19/06009—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking
- G06K19/06037—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking multi-dimensional coding
Definitions
- the present invention relates to an individual identification method using a ⁇ -coded two-dimensional code. Further, the present invention relates to a hybrid personal identification system and an offline personal identification system using an individual identification method using a two-dimensional code. Background art
- a means of personal authentication for confirming the identity of a trader, and a means of identifying themselves, that is, as individual product information-personal identification information, use alphanumeric characters such as passwords and ID numbers.
- An identification code represented by a combination of alphanumeric strings is known.
- An object of the present invention is to prevent leakage of personal identification information such as a password and an ID number and prevent unauthorized access in the above identification code.
- a further object of the first invention of the present application is to prevent personal information from being leaked, falsified, illegally used, and the like by using a two-dimensional code obtained by encrypting the individual product information.
- the second invention and the third invention of the present application as personal authentication means and personal identification means, have problems such as prevention of leakage of ID cards, prepaid cards, credit cards, prevention of forgery and falsification, prevention of unauthorized use, prevention of unauthorized access, and the like. And Disclosure of the invention
- the first invention of the present application provides an individual identification method using a two-dimensional code, characterized in that the contents of a two-dimensional code obtained by encrypting individual product information are recorded as image information in an existing image so as to be invisible.
- the personal identification information as the personal recognition means is composed of a plurality of encrypted two-dimensional codes, and the “arrangement order” of the plurality of two-dimensional codes is determined by the card reading information and online input information.
- the third invention of the present application relates to a method for encrypting personal identification information as personal identification means (this is a two-dimensional code by adding unique data obtained by digitally processing image data such as a signature, and obtaining a certificate or the like).
- This is a two-dimensional code by adding unique data obtained by digitally processing image data such as a signature, and obtaining a certificate or the like.
- individual product information for example, copyright information, product identification information, pharmaceutical prescription information
- individual product information is composed of a two-dimensional code and encrypted, and the content is converted into image information. Record partly.
- two-dimensional The content of the code is embedded in the first or last part of the image information.
- a password including a long-digit encryption key indicating personal identification information is set, the password is divided into a plurality of passwords, and each of the plurality of divided password substrings is divided into two.
- the order of the two-dimensional coded subsequences mixed in the dummy is determined. This arrangement order is characterized in that it is not recorded on a computer, a discriminator, or the like, that is, it is manually entered by a user.
- a two-dimensional code is used for an identification card or the like on a display device.
- Encrypt personal identification information as personal identification means add unique data obtained by digitally processing image data such as a signature, convert it into a two-dimensional code, and print it on a document such as a certificate.
- image data such as signatures
- FIG. 1 is an explanatory diagram of “digital watermark” showing an embodiment of the first invention of the present application
- FIG. 2 is a flowchart of “transparency of encrypted data into image data”).
- Fig. 3 is a flowchart of “Retrieving encrypted data from image data”.
- FIG. 4 is an explanatory diagram of the order of arrangement of the cards in the embodiment of the second invention of the present application.
- FIG. 5 is an explanatory diagram of the information reading means similarly selecting a card.
- FIG. 6 is an explanatory diagram of the same card information reading system.
- FIG. 7 is a flowchart at the time of issuing a certificate in the third embodiment of the present invention.
- FIG. 8 is a flowchart for the same collation.
- FIG. 9 is an explanatory view showing an example of image data such as a signature.
- FIG. 9A shows a digital signature
- FIG. 9B shows a handwriting signature.
- Individual product information (for example, copyright information, product identification information, and pharmaceutical prescription information) is encrypted by encoding software and matrix-coded.
- One cell is represented by one bit, and the contents of the code are stored as a series of numbers sequentially from top left to right and from top to bottom (code content recognition). Next, the number of cells (number of dots) in the X and Y directions of the code is stored as 1-byte data (code size recognition).
- the cell number data in the X-axis direction and the cell number data in the ⁇ -axis direction are prepended to the above-mentioned series of numbers, and this series of numbers is used as watermark data.
- the first byte of the target image information (digital) is extracted, and the least significant bit is replaced with the most significant bit of the watermark data.
- the processed byte is returned to the original position of the image.
- next byte of the image information is taken out and its least significant bit is replaced by the previous right-hand bit of the watermark data.
- Extraction of encrypted data performs the reverse process.
- the content of the two-dimensional code is embedded at the beginning or at the end of the image information.
- the least significant bit is changed every one bit (8 bits).
- the effect on image quality is so small that it is not noticeable to the human eye.
- the advantage over other digital watermarking methods is that two-dimensional coding (corresponding to a kind of encryption) increases the security for one layer, and finally the watermark information is two-dimensional. It has objective evidential ability to be restored as code. Of course, combinations with other encryption methods are possible and desirable.
- the password is divided into four parts, counting from the left, in the second row at the top, the fifth row at the bottom, the sixth row at the bottom, and the ninth row at the top.
- the order is "" -9-1-2-F ".
- a regular user who memorizes this order can use a hand-held or pen-type scanner 2 and refer to Fig. 4 ignoring other codes and ignoring other codes.
- the accessed side receives the restored hundreds to thousands of digits of the password and identifies it as the authorized user.
- FIGS. 5 and 6, 3 is a terminal device, 4 is a keyboard, 5 is a communication network such as the Internet, 6 is a computer for centralized management, 7 is data, and the second invention is an intrusion. Even if the user obtains the medium on which the two-dimensional coded password is described (recorded), unauthorized access is not easy (almost impossible) unless the authorized user verifies the "ordering" information. In the case of extremely sophisticated confidential information, the password is split between the person in charge and his / her boss in the first half and the second half, and the management system must be read if two people do not continue reading in the same operation. If the system is not authenticated, security will be further improved.
- the present invention divides and allocates required data to a plurality of IC cards including a dummy and sequentially stores cards storing effective data in the order stored by the user. It offers the same effect as reading at a much lower cost.
- Signature 'Signed authentication cannot be performed without the consent of the authorized user. In that sense, it competes with the present invention.
- the pressure-sensitive pad for signature / signature is less versatile
- the optical reader used by the present invention can also be used as an input device for many other purposes, and is far less versatile. Is excellent. Above all, a system can be constructed at low cost. It is of course possible and desirable for users who handle extremely important confidential information to use both in order to further increase the hurdle against intruders.
- the feature of the second invention of the present application is that the high unauthorized access prevention effect by the password of several tens, several hundreds to several thousand digits online is stored in the "offline" of several digits in the "order” and manually input. It is to be realized by being in 'online' offline and auto-manual hybrid.
- Hand-held or pen-type readers are required to manually read multiple two-dimensional codes in "arranged order", which can be easily manufactured at low cost.
- the file is converted into a two-dimensional code by the encoding software.
- the decoding software converts the two-dimensional code into image data and character data.
- the signature data and character data are displayed on a display invisible to the user. Have the user sign.
- a digital signature X and Write the signature for handwriting signature Y on the application form The issuer reads the signature X for digital signature as image data and then digitally processes it as the unique data, together with the certificate number, the card number, the finite term, and the data obtained by encrypting all the above data. Dimensionally coded and printed on the surface of the certificate. Certificate's Card Purpose-Depending on the personality, use only this digital signature X and not the conventional visual analog handwriting signature Y. If it is desired to be able to continue the conventional use in places where there is no optical reader, use the conventional visual handwriting signature as well.
- special notes include special data that can only be answered by the holder of the truth (knowledge items that can be identified only by the principal based on his / her experience) in the two-dimensional code. It can also be used as a means of identity verification.
- the above unique data is displayed on a display that is not visible to the owner, and if the owner cannot state its contents, it can be immediately judged as "not himself". For example, a mother's maiden name cannot be answered when asked unless she is a legitimate owner. If you cannot answer, you can immediately determine that it is 'illegal use'.
- the image data indicated by the holder such as a card is automatically collated with the image data detected and reproduced by the card's unique data. This can eliminate the involvement of the clerk (the clerk cannot know the image data corresponding to the unique data recorded on the card).
- ceramics and metal-based non-combustible materials can be used as paper and ink, which has the advantage of being difficult to burn out. Any combination is possible by printing and engraving a two-dimensional code on it using.
- the information amount of the individual item information can be expanded and encrypted by using the two-dimensional code obtained by encrypting the individual item information.
- a large amount of information can be stored in a card by applying a two-dimensional code that can be printed and engraved in a small space, and it can be stored in a low-cost optical device. Utilizing the fact that it can be easily read, it also has the effect of easily realizing a computer system that effectively prevents unauthorized access by adding further manual elements.
- the present invention can be used as individual item specifying means and personal authentication means in electronic commerce using IT technology. It is particularly effective when used as a means to prevent leakage of personal identification information such as passwords and ID numbers, and to prevent unauthorized access.
Landscapes
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Image Processing (AREA)
- Editing Of Facsimile Originals (AREA)
- Collating Specific Patterns (AREA)
Abstract
Procédé d'identification individuelle par des codes cryptés à deux dimensions, système hybride d'authentification de personne individuelle et système d'identification de personne hors ligne. Le contenu de codes à deux dimensions représentant des informations de corps individuel cryptées est enregistré en tant qu'information d'image. Des informations spécifiques de la personne individuelle en tant que moyen de reconnaissance de la personne individuelle sont composées de codes cryptés en deux dimensions. L'«ordre de disposition» de codes en deux dimensions mélangés en éléments factices est fait hors ligne, indépendamment des informations lues sur carte et des entrées en ligne. Des données singulières créées par le fait que des données d'image, par ex. une signature, sont soumises à un traitement numérique sont ajoutées aux données créées par cryptage des informations spécifiques de la personne individuelle en tant que moyens d'authentification de la personne individuelle. Les données résultantes sont transformées en codes en deux dimensions qui sont imprimés sur un document tel qu'un certificat. De cette manière, lorsque des informations spécifiques d'une personne individuelle telles qu'un certificat sont reproduites, les données d'image telles qu'une signature sont détectées et reproduites sur la base des données singulières. La personne peut ainsi être identifiée sans vérification en ligne.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
AU2001242824A AU2001242824A1 (en) | 2000-04-03 | 2001-03-29 | Individual body identifying method by two-dimensional code, hybrid individual person authenticating system, and off-line person identifying system |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP2000100393A JP2001283167A (ja) | 2000-04-03 | 2000-04-03 | 二次元コードによる個別識別方法、ハイブリット型個人認証システムおよびオフライン本人確認システム |
JP2000-100393 | 2000-04-03 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2001075782A1 true WO2001075782A1 (fr) | 2001-10-11 |
Family
ID=18614610
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/JP2001/002612 WO2001075782A1 (fr) | 2000-04-03 | 2001-03-29 | Procede d'identification d'un corps par un code a deux dimensions, systeme hybride d'authentification de personne individuelle et systeme d'identification de personne hors ligne |
Country Status (3)
Country | Link |
---|---|
JP (1) | JP2001283167A (fr) |
AU (1) | AU2001242824A1 (fr) |
WO (1) | WO2001075782A1 (fr) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103679456A (zh) * | 2012-09-18 | 2014-03-26 | 中国银联股份有限公司 | 一种基于签名信息的交易系统及方法 |
CN106656511A (zh) * | 2017-01-13 | 2017-05-10 | 阳振庭 | 一种统一管理身份签注的方法及系统 |
CN109376818A (zh) * | 2018-10-09 | 2019-02-22 | 杭州收盈科技有限公司 | 一种基于离线动态二维码的加密对时方法 |
Families Citing this family (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2005346447A (ja) * | 2004-06-03 | 2005-12-15 | Gijutsu Transfer Service:Kk | 2次元コードを備えた偽造防止カード、該偽造防止カードを用いた情報提示照合システム及び情報提示照合方法。 |
JP2008272817A (ja) * | 2007-05-07 | 2008-11-13 | Vector Co Ltd | マーキング装置 |
JP2011018279A (ja) * | 2009-07-10 | 2011-01-27 | Toshiba Corp | 署名認証装置および署名認証プログラム |
CN105760915B (zh) | 2016-02-02 | 2018-08-24 | 程烨 | 一种防伪图像的生成方法及装置 |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO1998023062A1 (fr) * | 1996-11-22 | 1998-05-28 | T-Netix, Inc. | Reconnaissance vocale pour acces a un systeme d'informations et traitement de transactions |
JPH10191025A (ja) * | 1996-12-26 | 1998-07-21 | Nippon Telegr & Teleph Corp <Ntt> | デジタル画像への情報埋め込み装置 |
JPH11272816A (ja) * | 1998-03-25 | 1999-10-08 | Toshiba Tec Corp | Idカ−ド及び個人認証システム |
-
2000
- 2000-04-03 JP JP2000100393A patent/JP2001283167A/ja active Pending
-
2001
- 2001-03-29 WO PCT/JP2001/002612 patent/WO2001075782A1/fr active Application Filing
- 2001-03-29 AU AU2001242824A patent/AU2001242824A1/en not_active Abandoned
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO1998023062A1 (fr) * | 1996-11-22 | 1998-05-28 | T-Netix, Inc. | Reconnaissance vocale pour acces a un systeme d'informations et traitement de transactions |
JPH10191025A (ja) * | 1996-12-26 | 1998-07-21 | Nippon Telegr & Teleph Corp <Ntt> | デジタル画像への情報埋め込み装置 |
JPH11272816A (ja) * | 1998-03-25 | 1999-10-08 | Toshiba Tec Corp | Idカ−ド及び個人認証システム |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103679456A (zh) * | 2012-09-18 | 2014-03-26 | 中国银联股份有限公司 | 一种基于签名信息的交易系统及方法 |
CN106656511A (zh) * | 2017-01-13 | 2017-05-10 | 阳振庭 | 一种统一管理身份签注的方法及系统 |
CN109376818A (zh) * | 2018-10-09 | 2019-02-22 | 杭州收盈科技有限公司 | 一种基于离线动态二维码的加密对时方法 |
Also Published As
Publication number | Publication date |
---|---|
JP2001283167A (ja) | 2001-10-12 |
AU2001242824A1 (en) | 2001-10-15 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP1312033B1 (fr) | Transmission de donnees de verification | |
US5984366A (en) | Unalterable self-verifying articles | |
US5485519A (en) | Enhanced security for a secure token code | |
JP4323098B2 (ja) | 利用者の署名情報の正当性を検証する署名システム | |
US5673320A (en) | Method and apparatus for image-based validations of printed documents | |
US20060020559A1 (en) | System for authentication and identification for computerized and networked systems | |
CN104166871B (zh) | 基于二维码与rfid芯片结合的防伪标签及其防伪方法 | |
CN101069187B (zh) | 保密卡和方法 | |
WO2007072793A1 (fr) | Carte permettant une authentification | |
JP2011113523A (ja) | ユーザ認証装置 | |
WO2004079643A1 (fr) | Identification biometrique steganographique securisee | |
JP2006313534A (ja) | 修正不可能な自己確認物品を製造しかつその真偽性を確認するための方法およびシステム | |
US20050206158A1 (en) | Certificate issuing method and certificate verifying method | |
WO2001075782A1 (fr) | Procede d'identification d'un corps par un code a deux dimensions, systeme hybride d'authentification de personne individuelle et systeme d'identification de personne hors ligne | |
JP2000309154A (ja) | 身分証明証 | |
CN101170626B (zh) | 信息处理装置及其方法 | |
US20060092476A1 (en) | Document with user authentication | |
US11279164B1 (en) | Length-modulated screening lines and line codes | |
JP3636898B2 (ja) | 情報カードおよび情報カードシステム | |
JP2004310313A (ja) | 二次元コード化した個人生体情報を含む本人認証用カードおよび二次元コード化した個人生体情報を使用した個人認証方法。 | |
JP2010079515A (ja) | 認証システム、そのシステムに用いるキー、認証方法およびプログラム | |
JP2001086319A (ja) | 認証用記録物、認証方法、認証装置および認証システム | |
JP2003060890A (ja) | 通信ネットワークを利用した個人認証システム | |
WO2010089673A2 (fr) | Technologie d'authentification de données | |
JP2002092564A (ja) | 機密情報の記録・格納カードおよび機密情報保護方法ならびに機密情報の秘匿記録・格納方法 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AK | Designated states |
Kind code of ref document: A1 Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EE ES FI GB GD GE GH GM HR HU ID IL IN IS KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT TZ UA UG US UZ VN YU ZA ZW |
|
AL | Designated countries for regional patents |
Kind code of ref document: A1 Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE TR BF BJ CF CG CI CM GA GN GW ML MR NE SN TD TG |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
DFPE | Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101) | ||
122 | Ep: pct application non-entry in european phase |