WO2003009520A1 - Systeme et procede destines a authentifier des souvenirs - Google Patents
Systeme et procede destines a authentifier des souvenirs Download PDFInfo
- Publication number
- WO2003009520A1 WO2003009520A1 PCT/US2002/020697 US0220697W WO03009520A1 WO 2003009520 A1 WO2003009520 A1 WO 2003009520A1 US 0220697 W US0220697 W US 0220697W WO 03009520 A1 WO03009520 A1 WO 03009520A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- item
- memorabilia
- date
- image
- digital
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07D—HANDLING OF COINS OR VALUABLE PAPERS, e.g. TESTING, SORTING BY DENOMINATIONS, COUNTING, DISPENSING, CHANGING OR DEPOSITING
- G07D7/00—Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency
- G07D7/004—Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency using digital security elements, e.g. information coded on a magnetic thread or strip
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N1/00—Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
- H04N1/00127—Connection or combination of a still picture apparatus with another apparatus, e.g. for storage, processing or transmission of still picture signals or of information associated with a still picture
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N2201/00—Indexing scheme relating to scanning, transmission or reproduction of documents or the like, and to details thereof
- H04N2201/32—Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
- H04N2201/3201—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
- H04N2201/3204—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title of data relating to a user, sender, addressee, machine or electronic recording medium
- H04N2201/3205—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title of data relating to a user, sender, addressee, machine or electronic recording medium of identification information, e.g. name or ID code
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N2201/00—Indexing scheme relating to scanning, transmission or reproduction of documents or the like, and to details thereof
- H04N2201/32—Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
- H04N2201/3201—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
- H04N2201/3204—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title of data relating to a user, sender, addressee, machine or electronic recording medium
- H04N2201/3207—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title of data relating to a user, sender, addressee, machine or electronic recording medium of an address
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N2201/00—Indexing scheme relating to scanning, transmission or reproduction of documents or the like, and to details thereof
- H04N2201/32—Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
- H04N2201/3201—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
- H04N2201/3212—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title of data relating to a job, e.g. communication, capture or filing of an image
- H04N2201/3214—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title of data relating to a job, e.g. communication, capture or filing of an image of a date
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N2201/00—Indexing scheme relating to scanning, transmission or reproduction of documents or the like, and to details thereof
- H04N2201/32—Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
- H04N2201/3201—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
- H04N2201/3212—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title of data relating to a job, e.g. communication, capture or filing of an image
- H04N2201/3215—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title of data relating to a job, e.g. communication, capture or filing of an image of a time or duration
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N2201/00—Indexing scheme relating to scanning, transmission or reproduction of documents or the like, and to details thereof
- H04N2201/32—Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
- H04N2201/3201—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
- H04N2201/3225—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title of data relating to an image, a page or a document
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N2201/00—Indexing scheme relating to scanning, transmission or reproduction of documents or the like, and to details thereof
- H04N2201/32—Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
- H04N2201/3201—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
- H04N2201/3274—Storage or retrieval of prestored additional information
Definitions
- This invention relates generally to digital imaging systems and more particularly to digital authentication of memorabilia.
- a major share of the collectibles market is represented by sports or entertainment memorabilia that is autographed by an athlete or other personality.
- Examples of autographed memorabilia are almost limitless and include autographed sports cards, jerseys, photographs, baseballs, football helmets and any piece of merchandise that can be signed.
- the extrinsic and intrinsic value of such autographed sports and entertainment memorabilia depends on many factors such as the prominence of the athlete or celebrity, the time when item was signed, the rarity of the autograph and, of course, the genuineness of the autograph.
- the high demand for autographed memorabilia and the difficulty in assessing the genuineness of an autograph there exists the problem of forgers and counterfeiters in the industry creating fraudulent autographs.
- less complex means of authenticating an autograph include providing the buyer with a certificate of authenticity stating that the signed item is genuine and providing a photograph of the item being signed with the certificate.
- Other methods include assigning the certificate of authenticity a number and dated description that is cataloged by the retailer of the signed memorabilia or creating a label corresponding to the certificate of authenticity that is affixed to the autographed item and recorded in a database by such retailer.
- a retailer may also issue a picture of the signing of the item that is filed by the authenticator with certificate information and registered.
- More complex techniques of authenticating the signed item include providing a certificate of authenticity with a numbered holograph label corresponding to the certificate of authenticity that is affixed to the item with a tamper-resistant seal and recorded in a database. As an additional step, invisible, permanent, infrared or ultraviolet activated ink mark corresponding to the hologram label may be used to tag the item.
- These techniques are also highly dependent on the reputation and honesty of the retailer or authenticating party and provide no means of verifying with a great degree of certainty the date the signed item can into existence. Additionally, these systems are often used by the manufacturer of the memorabilia and may be compromised by the vendor or the retailer.
- a method employed in a system for authenticating memorabilia in one embodiment of the present invention comprises the steps of: applying an identification code to an item of memorabilia recording a digital image of the item of memorabilia providing date and time information from a secure date and time reference; generating a date/time value derived from said date and time reference; generating an image value derived from said digital image; marking said digital image with said date and time information, said date and time value and said image value; and storing said marked digital image.
- a method employed in a system for authenticating memorabilia in one embodiment of the present invention comprises the steps of: applying an identification code to an item of memorabilia; obtaining a handwritten signature on the item of memorabilia from a signor; recording a digital image of the item of memorabilia; providing date and time information from a secure date and time reference; generating a date/time value derived from said date and time reference; generating an image value derived from said digital image; marking said digital image with said date and time information, said date/time value and said image value; and storing said marked digital image BRIEF DESCRIPTION OF THE DRAWINGS
- Fig. 1 illustrates a system implementation for authenticating memorabilia according to one embodiment of the invention.
- Fig. 2 is a flow chart illustrating the steps for authenticating memorabilia according to one embodiment of the invention.
- Fig. 3 illustrates a sample certificate of authenticity used in one embodiment of the invention.
- Fig. 4 illustrates a system implementation of one embodiment of the present invention utilizing a digital file management system
- Fig. 5 is a flow chart illustrating the file marking according to one embodiment of the present invention.
- Fig. 6 is a flow chart illustrating validation of the CRCs in a filed marked image according to one embodiment of the present invention
- Fig. 7 is a flow chart illustrating calculation of the Image CRC for TIFF format images according to one embodiment of the present invention
- Fig. 8 is a flow chart illustrating calculation of the Date CRC for TIFF format images according to one embodiment of the present invention.
- Fig. 9 is a flow chart illustrating calculation of the Image CRC for JPEG format images according to one embodiment of the present invention.
- Fig. 10 is a flow chart illustrating calculation of the Date CRC for JPEG format images according to one embodiment of the present invention.
- Figure 1 illustrates an exemplary embodiment of a system for authenticating memorabilia of the present invention.
- a central processor 110 is configured in communication with a first input device 40, a second input device 30, and a server 100 (described in more detail below) which includes or is connected to a secure time and date reference, a registration database 50, and output device 60.
- First input device 40 is adapted to input information associated with the item to be authenticated from the authenticating service provider and may comprise a personal computer, workstation, keyboard or other input device.
- Second input device 30 is adapted to generate one or more digital image files associated with the item to be authenticated and may comprise a digital camera or a digital video recorder.
- An ID code is assigned to and applied on the surface of the item 10 of memorabilia to be signed and authenticated.
- the ID code may comprise a number identification code, a character based identification code, a bar code, a hologram or any other means of assigning a code or symbol of identification to the item to be signed.
- Item 10 may be a two-dimensional item of memorabilia such as a photo or sports card or a three-dimensional item of memorabilia such as a baseball or football helmet.
- Figure 2 shows a flow diagram of one embodiment of the present invention.
- the flow diagram shows exemplary steps for a method of authenticating memorabilia for which an actual implementation could include only some of, as well as additional process steps.
- the method of authenticating memorabilia begins with a visual inspection of the items to be authenticated (e.g., baseballs, helmets, sports cards, etc.) at a particular sporting event or scheduled signing appearance. Detailed computer entries of all items to be signed are made and may be stored and registered in a master database 50 of the authenticating service provider or other third party. (Step 1000). In cases where more than one item will be signed, an inventory lot can be organized and numbered in series (e.g., as item 1 of 25, item 2 of 25, etc.).
- information about the manufacturer or initial seller of the items to be signed may stored. For example, if the item to be signed is a special item, such as an authentic jersey actually worn by a certain player, information about dealer or prior owner of this item may be recorded. Similarly, if, for example, the item to be signed is a limited edition item of memorabilia (such as a portrait of a player) generated by a manufacturer, additional information about the manufacturer and item might be recorded as well.
- an ID code is generated and assigned to each item and/or each inventory lot of the item(s) to be signed. This code may be generated from the master database 50. (Step 1010).
- the ID code may be generated in many forms but is preferably comprised of a unique, randomly generated number/character ID.
- an LD code may be assigned to each inventory lot of the items being signed instead of or as an additional step to assigning an ID code to each item.
- the ID code assigned to each item and/or each inventory lot may be produced on a tamper evident label or attachment, such as a sticker or tag, and applied to the surface of each item 10 to be signed. (Step 1020). This code may also be applied to the item using infrared or ultraviolet activated ink. Alternatively, a separate additional code could be applied to the item using infrared or ultraviolet activated ink. The ID code(s) may then be stored and registered in the registration database 50.
- processor 110 may itself include the first input device 40.
- Processor 110 may comprise a personal computer, workstation, server or other component that maintains the necessary hardware and software to carry out the authenticating processes described herein.
- Processor 110 records and processes the at least one digital image and other data associated with the item being signed and may be configured to include registration database 50 and the components of server 100 discussed below.
- registration database 50 and server 100 will be maintained separately by the authenticating service provider and/or other third party service providers at remote locations.
- registration database 50 may be maintained remotely by a separate division of the authenticating party attending the signing event in order to restrict access or maintained by an independent third party service provider to ensure that the integrity of the data stored in the registration database is not compromised.
- server 100 which maintains or is connected to a secure time and date reference (discussed below) is also preferably maintained by a third party independent of the authenticating party attending the signing event to ensure that the integrity of data it receives and the time and date reference are not compromised.
- an output device 60 for generating a certificate of authenticity (CO A) which may comprise a printer, is also connected to processor 110 and may be located at a remote or local location as well.
- Processor 110 may be connected to registration database 50, server 100, and/or the output device 60 by any number of methods including by Internet connection, a direct dial-in connection, a modem connection, facsimile transmission, e-mail connection, wireless connection, links through dedicated computer connections, dedicated hardwire connections or any other methods for connecting to a computer server or uploading digital files or other information as are known in the art.
- the item to be authenticated is signed by the athlete or other personality and eye- witnessed by a trained representative of the authenticating service provider.
- the authenticating service provider may be employed by the authenticating service provider in other areas such as for book signings, celebrity gatherings and other events where an item is to be authenticated.
- pertinent information concerning the signed item is entered and recorded by processor 110. (Step 1040).
- Such information may include the name of the athlete or personality signing the item, the owner's information, a description of the item being signed, the name of the witness, city and date of authentication, and the ID code.
- This information may be recorded or entered by the witness himself or another representative of the authenticating service provider or may be prepared in advance and released or recorded by processor 110 upon completion of the event or each time the item is signed where the pertinent information in known in advance of the actual signing. Some or all of this information may be stored locally by the authenticating service provider and/or stored in the registration database.
- At least one digital camera and/or at least one digital video recorder 30 is provided to record at least one digital image of the signed item.
- the digital camera or digital video recorder 30 will record both a digital image of the actual signature of the item that was signed and a digital image of the athlete or personality signing the item at the event location.
- the digital camera or digital video recorder can be operated by the witness or another representative or set to record digital images automatically throughout the signing. It is also possible to employ other input devices to record the digital image of the signed item. For example, where the signed item is a paper item or other flat item such as a photograph, a scanning device may be used to scan images of the signed item.
- the signature of the item and ED code are represented in a single digital image to ensure that the correct digital image is assigned to the authenticated item.
- the second input device 30 or other image recording device is adapted to create digital images to be input to processor 110 and stored.
- processor 110 is preferably connected to a digital file authentication system such as server 100 which can determine the time an digital image was first received from processor 110.
- Server 100 operates in one aspect by recording additional independent data which is stored with each digital image. (Step 1060).
- this additional data includes a "true date” which is gleaned from a secure clock (described in further detail below) which is not settable by the user (the Authentidate); a number that may be derived from a cyclic redundancy code (CRC) algorithm (described in further detail below) against the image data, this number is called the “image CRC”; and a CRC derived from the "true date", called the "date CRC”.
- This additional data is preferably recorded within each digital image as soon as possible after the image is acquired from processor 110. As will be discussed in further detail, if the image is altered in any way after the recording of the additional data, recalculation of the image CRC on the altered image will not match the original CRC recorded within it.
- the server 100 provides a method for ensuring that the image associated with each item being signed (e.g. the autograph) was recorded on the specified date and has not been altered in any way since.
- the owner or purchaser of the signed item is registered in a registration database 50 of the authenticator or other third party service provider.
- the registration database 50 may be organized by ID code to verify ownership and track ownership history (Step 1070).
- a Certificate of Authenticity (COA) may also be generated and provided to the owner of the signed item.
- the COA may also be stored electronically, for example, in the registration database 50.
- a sample COA which includes pertinent information concerning the signed item such as the name and address of the owner of the signed item, the name of the athlete or personality signing the item, the name of the witness, the date and city of the authentication, the AG code, a digital image of the signature of the item, and a digital image of the athlete or personality signing the item.
- Other details such as the company providing the item of memorabilia, a description of the item and the item number within the series may also be provided.
- the COA may be presented to the owner in the form of a digital file, a paper certificate or a plastic ID card.
- the owner may be provided with digital access to the information embedded in the COA or other item details through a web site maintained by the authenticating service provider.
- owner information including the ID code is stored on a registration database 50 of the authenticating party or other third party service provider.
- owner information including the ID code is stored on a registration database 50 of the authenticating party or other third party service provider.
- the identity of the registered owner authenticity of the signed item can be verified.
- the new owner obtains the Certificate of Authenticity from the prior owner.
- the old COA is sent to the service provider with updated owner information.
- the old certificate is destroyed and a new certificate is issued and the item is re-registered and the owner registration database is updated.
- the party maintaining the registration database will only allow one COA to be in existence at any give time for any particular item.
- the information embedded in each COA, a digital image of each COA itself, and/or other pertinent data or information concerning the item of memorabilia and the signing event may be sent to a digital file authentication system such as server 100 to be time and date stamped just as each digital image may be time and date stamped.
- a preferred method for authenticating memorabilia of the present invention uses server 100 to provide secure date and time stamping of the digital image of the signed item.
- a third party file registration service may be provided which allows the authenticating party (i.e.
- a digital file e.g., the digital image of the signed item or other data concerning the signed item
- a service provider to create an "electronic signature" of the selected digital file based solely on file content.
- the signature along with a user-provided file name and user- selected keywords are uploaded to the provider's site and stored in a registration database maintained by the file registration service provider under an account established by the authenticator service provider.
- Verification of content and submittal date of the digital file at a later time requires going on-line to access the service provider's site and retrieving the prior registration record by file name or keywords.
- the retrieved database record shows the file signature and the original date that the file signature was registered.
- the authenticating party must run (locally again) the electronic signature program on the file to be verified and compare the registered signature to the retrieved registered signature to determine whether the signature of the digital file in question matches that of the originally registered file. What the authenticating party now has is verification that the signature of the file in hand matches the signature of a file which was registered on a particular date.
- server 100 which includes or is connected to secure clock 130 to verify and authenticate image files associated with the item being signed.
- a server 100 is configured in communication with processor 110 of the authenticating system, storage device 120 and a secure time and date reference 130.
- the secure time and date reference 130 is provided by a hardware device or service provider which incorporates a secure clock.
- Original images associated with the signed item will be obtained from processor 110.
- the resulting digital image will be processed by server 100 as discussed in further detail herein, and may be stored on storage device 120 from where it can be later retrieved.
- a digital file authentication system such as server 100 operates in one aspect by recording additional independent data with each stored digital image.
- these additional data include: a "true date” which is gleaned from a secure clock (described in further detail below) which is not settable by the user (the AuthentidateTM); a number derived from a cyclic redundancy code (CRC) algorithm (described in further detail below) against the image data, this number is called the “image CRC”; and a CRC derived from the "true date”, called the "date CRC”.
- CRC cyclic redundancy code
- the image and date CRCs can be checked and verified at any time. If the recalculated value matches the recorded value, it can be stated with extreme confidence that the image presently recorded was recorded on the specified date and has not been altered in any way since then. No other known system, including paper storage, can offer similar assurance as to the creation date or authenticity of a document.
- Digital files (such as an image of the signed item, a digital Certification of Authentication, or other files containing pertinent information about the signed item) are first acquired (either retrieved from storage or received from input device 110).
- Date and time information is obtained from secure clock 130 (Step 202) or may be requested from a third party timestamp service.
- the secure clock 130 is preferably maintained by another independent service provider which supplies a secure, accurate and reliable time and date which is not easily compromised. However, as discussed below, secure clock 130 may be maintained and the timestamp function performed by the party operating server 100.
- Step 204 Proper operation of the secure clock or timestamp service provided is assessed.
- Step 204. If the secure clock is deemed functional, then the date and time data are accepted as read from the clock (in step 202). If a failure of the secure clock is determined, an error indication will be returned and the image processing is halted.
- Step 206. With the clock having been deemed functional (in step 204), special tags (as will be discussed infra) and the Authentidate information (including date and time) are added to the digital file and the CRC data fields are initialized to 0 (i.e., the data fields are filled with 0's).
- Step 208. Two computed values are then calculated, which are derived from the image content and Authentidate information, respectively.
- the computed values can be computed in any fashion based on data contained within the digital file which will allow detection of data corruption, such as for example, a standard checksum.
- data corruption such as for example, a standard checksum.
- CRCs cyclic redundancy codes
- the computed values are generated by a known CRC algorithm (which will be discussed in further detail below) which is run on both the image content and the Authentidate, creating an Image CRC and an Authentidate CRC, respectively.
- a known CRC algorithm which will be discussed in further detail below
- the Image CRC and Authentidate CRC are "transformed" by a proprietary mathematical transformation for added security (as will be discussed infra) creating an Image CRC and an Authentidate CRC.
- Step 214. The image file is then marked with the Image CRC and Authentidate CRC.
- the marked digital files are stored on media by storage device 120.
- Step 218. The authenticity of the image and the time and date stamp can then subsequently be determined by examining the computed values stored within the Digital Files as shown in Fig. 6 which depicts an exemplary flow chart describing one embodiment for validating CRCs in a filed image.
- the first step in validating the CRCs in a digital file is to read the special tag and date areas and retrieve the stored image CRC and date CRC values.
- Step 300. If the CRC values cannot be located or read in the digital file (step 302), then it is determined that either the image has not been properly filed or the image has been altered or is otherwise compromised, and an error is posted.
- Step 304. If the special tags are found, the CRCs are recalculated for the digital file and the date string.
- Step 306. The same algorithms used to calculate the CRCs initially are used to regenerate them at this point. The recalculated image CRC is transformed and compared to the image CRC read from the tag.
- Step 308. (Alternatively, the stored image CRC can be reverse transformed prior to comparison to the recalculated value.) If the recalculated digital file CRC does not match the one stored in the special tag, the image is determined to have been altered or otherwise be corrupted and an error is indicated. (Step 310.) If the stored and recalculated image CRCs compare favorably (i.e., they match), the date CRCs are tested. The recalculated date CRC is transformed and compared to the date CRC read from the tag.
- Step 312. (Alternatively, the stored date CRC can be reverse transformed prior to comparison with the recalculated value.) If the recalculated date CRC does not match the one stored in the special tag, the date string is determined to have been altered or be otherwise corrupted and an error is indicated. (Step 314.) If the date CRCs match, at this point both image and date CRCs have compared favorably, the digital file is determined to be unaltered and thus authenticated. (Step 316.) It should be appreciated that the incorporation of the CRC in the image may use alternative methods, such as digital watermarking in which digital watermarks are integrated within digital files as noise, or random information that already exists in the file, thereby making the detection and removal of the watermark difficult.
- alternative methods such as digital watermarking in which digital watermarks are integrated within digital files as noise, or random information that already exists in the file, thereby making the detection and removal of the watermark difficult.
- a secure, non- compromisable clock serves as a secure time and date source which is not alterable by the user.
- the secure clock 130 is preferably maintained by an independent service provider other than the authenticating party and other than the service provider operating server 100 in order to supply a secure, accurate and reliable time and date information which is not easily compromised.
- secure clock 130 may be maintained by the party operating server 100. In this case, one could use either custom designed hardware or a commercially available product that offers a secure clock. In either case, a mechanism must be in place to prevent fraudulent or arbitrary date/time adjustment.
- One embodiment in which the operator of server 100 could supply the secure clock itself is described in U.S. Patent Application 09/562,735, pp.
- the computed values mentioned above with reference to Figure 5 in the present invention are Cyclic Redundancy Codes (CRCs).
- CRC Cyclic Redundancy Codes
- the CRC is a 32 bit-integer value which represents the result of performing the known CRC-32 algorithm on a block of data.
- the CRC-32 algorithm is a common, public domain algorithm for detecting even minute changes in data with a variety of applications. For example, CRCs are used in the communications field to verify that data has been transmitted correctly over transmission lines of unknown quality. It is also used to detect corruption of compressed data such as in the popular PKZIP utility. One of the strengths of CRCs is detecting changes to data which might otherwise go undetected.
- CRC-32 algorithm A technical discussion of the CRC-32 algorithm will not be presented here. There are many sources of CRC-32 algorithms and source code in the public domain. As stated earlier, use of the CRC is not required for the present invention per se, and any calculation method is acceptable which will provide a number which is derived from the image data and is suitable for detection of data corruption.
- CRC value alone may be used, a higher level of security can be incorporated into the present invention to ensure the authenticity of an image by addition of a mathematical transformation to the CRC value.
- a typical algorithm to calculate a CRC-32 is in the public domain and thus easily accessible. This fact, in conjunction with the details provided herein, would allow anyone to recalculate the CRC on an altered image, enabling them to counterfeit an "Authentidate" and falsely confirm the image as authentic and unaltered.
- the actual calculated (image or date) CRC is mathematically transformed to a new value prior to image marking.
- the functional requirements of the transformation are that the resultant value for any input value is consistent, and that the resultant value is unique for each unique input value.
- the transformation could, for example, be a permutation of the bit-order of the input, an exclusive OR of the input value with a consistent, predetermined "magic" number, or a combination of these operations.
- a file management and imaging system embodiment of the present invention may use known TIFF (Tagged Image File) and JPEG (Joint Photographic Experts Group) file formats for storage of (scanned) bitonal and color images, respectively.
- TIFF and JPEG image file formats allow for inclusion of user data inside the image file in a manner which does not affect the displayed image.
- the present invention is equally applicable to other file formats which have a mechanism to store user-defined data in the file or the file marked with the user-defined data can be stored in an ancillary file or separate database, for example, for word processing documents, spreadsheets, digitized audio or video or any other digitized file.
- the known TIFF format is a file format which allows image data to be stored in a compressed manner along with information about the image (tags) such as compression method used, resolution, size, number of colors, title, date, etc.
- tags such as compression method used, resolution, size, number of colors, title, date, etc.
- a written world- wide standard defines the TIFF file format, what tags must be present, what tags are optional and how specific tags are used.
- the maintaining organization of the TIFF standard, Adobe Corporation accepts requests for custom tag numbers for companies developing applications which use tags within the TIFF image. Adobe will assign unique numbers to individual companies to prevent interference between vendors. For example, an individual company may apply for and be assigned its own proprietary tags numbers, and other vendors will likewise be assigned their own unique proprietary tag numbers.
- Use of a custom tag allows storage of a custom data block.
- the TIFF specification calls for programs to ignore tags that they do not understand and which are not in the baseline specification. This allows common image viewers to view, display and print images which have custom tags because the image files still fit the TIFF
- TIFF image tags are used: Tag # Use
- Custom Tag 1 custom data block contains proprietary information including: Image CRC Authentidate CRC Illustrated in Fig. 7 is an exemplary flow chart demonstrating calculation of an image
- Step 500 The routine works through the format of the TIFF file based on the Image File Directory (IFD) for the file, calculating CRC-32 for each LFD entry and their associated data (step 502) passing results of the prior CRC-32 as the seed to the next (step 510) until all the IFD entries have been cycled through. (Step 506.)
- IFD Image File Directory
- the proprietary transformation method (as described above) is used to transform the resulting CRC value into a unique and secure value CRC.
- the transformed image CRC value, CRC is then stored in the image file.
- Illustrated in Fig. 8 is an exemplary flow chart demonstrating calculation of a date CRC for a TIFF image file.
- the calculation of the date CRC for the TIFF image file requires a routine which can calculate a CRC-32 on a given block of data using a given 32-bit seed value.
- the initial seed value is set to the image CRC value.
- the routine reads the 0x0132 TJ_FFTAG_DATETIME tag.
- Step 602. If the DATETEVIE tag cannot be found and read (step 604), an error is returned (step 605), otherwise, a CRC-32 is calculated for the data contained within the DATETEVIE tag.
- the resulting CRC is then transformed into CRC by means of the proprietary transformation technique (step 608) and stored within the image file.
- Step 610.
- the Joint Photographic Experts Group developed the namesake format and maintains the standard for JPEG and the JPG file format (sometimes also called JFIF - JPEG File Image Format). This format was developed for the storage and transmission of photographic images.
- the compression techniques used are ideally suited to storing subtle differences between color changes, such as a photograph.
- JPG file is interpreted as a stream of characters with special identifiers called “markers” separating different elements of the image information and image data.
- markers special identifiers
- the exact meaning of each marker is not important to this discussion except that the JPG standard defines a set of markers to be used by manufacturers for special or proprietary features. These markers are named "APPx" where x is a digit between 0 and 9 inclusive.
- the present invention adds a special marker and data block to JPG files when they are stored.
- the "APP8" marker will be used for the simple reason that this marker is rarely used by other manufacturers.
- This marker holds various proprietary information including the following: Authentidate Image CRC Authentidate CRC
- Illustrated in Fig. 9 is an exemplary flow chart demonstrating calculation of an image CRC for a JPEG image file.
- the calculation of the CRC for the JPEG image file requires a routine which can calculate a CRC-32 on a given block of data using a given 32-bit seed value.
- the initial seed value is set to -1.
- Step 700. The image file data is read sequentially and the position of the APP8 is determined and read. (Step 702.) If the APP8 marker cannot be found and read (step 704), an error is returned.
- Step 705. A CRC-32 is calculated for all data in the file from the beginning of the file up to but not including the APP8 marker.
- Step 706. The result of this calculation is used as a seed to calculate a CRC-32 on the remainder of the file following the APP8 marker.
- Step 708. The resulting CRC is transformed into CRC by means of the proprietary transformation technique.
- Step 710. The transformed image CRC is then stored within the image file.
- Step 712. Illustrated in Fig. 10 is an exemplary flow chart demonstrating calculation of a date
- CRCs for a JPEG image file The calculation of the CRC for the JPEG image file requires a routine which can calculate a CRC-32 on a given block of data using a given 32-bit seed value.
- the initial seed value is set to the image CRC value.
- Step 800. The file is read sequentially and the position of the APP8 is determined and read.
- Step 802. If the APP8 marker cannot be found and read (step 804), an error is returned.
- a CRC-32 is calculated for the secure data string within the APP8 data area or block.
- the resulting CRC is transformed into CRC by means of the proprietary transformation technique.
- the transformed date CRC is stored within the image file.
- Step 810. The present invention has been illustrated and described with respect to specific embodiments thereof. It is to be understood, however, that the above-described embodiments are merely illustrative of the principles of the invention and are not intended to be exclusive embodiments.
- digital image files e.g., of the signed item
- the server 100 will be equally applicable to any digital file regardless of its source or how it is generated.
- the server 100 may receive and time and date stamp other digital files containing other information pertaining to the signed item such as the ID code, witness and owner information, an electronic certificate of authenticity and other data concerning the signed item.
- server 100 need not mark and store each digital file in order to perform the digital file authentication.
- server 100 receives a digital file (such as an image of the signed item), retrieves a time stamp to note the time of receipt of the file, and performs the step of obtaining the digital signature of the document.
- the time stamp and the digital signature, along with other information that may be desirable, such as a file ID number, user identification information, or other parameters to identify the file may be stored in a database maintained by the operator of server 100.
- Server 100 may also rend a receipt to the user (e.g.
- the party authenticating the item of memorabilia, the owner, or the party maintaining the registration database which includes pertinent information relating to the submitted file, including, for example, the time stamp, the digital signature, the file ED number, or other information.
- a digital copy of the submitted file may be maintained by server 100.
- the file could be saved in association with the log of information to be kept on the file such as the ID number, the time stamp and the digital signature.
- the digital file is not saved nor maintained by the operator of the server 100. After the file has been processed in order to derive its digital signature, the digital file may be returned or deleted.
- a digital copy of the file is not maintained at the site of the operator of server 100 performing the date and time stamp service and the user (e.g., the authenticating party that witnessed the signing or the operator of the registration database) is responsible for maintaining a digital copy of the file.
- the user or any third party such as the owner of the item or operator of the registration database 50, can verify if the newly submitted file is the same as the document originally submitted by the user, and further can verify the date upon which the original file was originally submitted.
- the server 100 runs the digital signature routine on the file to be verified. This second digital signature is compared against the original digital signature, and if they are the same, then the server 100 may issue notice that digital file is verfied.
- Other methods of digital file authentication and digital file signature and time stamp creation and verification are described in United States patent application 09/729,411 which is hereby incorporated by reference.
Landscapes
- Engineering & Computer Science (AREA)
- Multimedia (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Editing Of Facsimile Originals (AREA)
Abstract
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US90696101A | 2001-07-16 | 2001-07-16 | |
US09/906,961 | 2001-07-16 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2003009520A1 true WO2003009520A1 (fr) | 2003-01-30 |
Family
ID=25423304
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/US2002/020697 WO2003009520A1 (fr) | 2001-07-16 | 2002-06-28 | Systeme et procede destines a authentifier des souvenirs |
Country Status (1)
Country | Link |
---|---|
WO (1) | WO2003009520A1 (fr) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7346927B2 (en) | 2002-12-12 | 2008-03-18 | Access Business Group International Llc | System and method for storing and accessing secure data |
US7801871B2 (en) | 2005-08-09 | 2010-09-21 | Nexsan Technologies Canada Inc. | Data archiving system |
WO2014022735A1 (fr) * | 2012-08-03 | 2014-02-06 | Goldberg Seth G | Système et procédé de génération d'autographes automatiques |
US9159072B2 (en) | 2007-03-22 | 2015-10-13 | Crystalier, Limited | Systems and methods for marking collectibles to increase their uniqueness |
WO2017116809A1 (fr) * | 2015-12-31 | 2017-07-06 | Ebay, Inc. | Analyse de défauts d'images |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5923763A (en) * | 1996-03-21 | 1999-07-13 | Walker Asset Management Limited Partnership | Method and apparatus for secure document timestamping |
US6250549B1 (en) * | 1998-06-17 | 2001-06-26 | Defabio, Jr. Daniel J. | Method for authenticating signatures and memorabilia kit employing same |
US20010033676A1 (en) * | 2000-02-07 | 2001-10-25 | Noyes Frederick D. | Autograph verification and authentication system |
US20020009033A1 (en) * | 2000-06-14 | 2002-01-24 | Christensen Kjeld K. | Identifying copy protected optical compact discs |
-
2002
- 2002-06-28 WO PCT/US2002/020697 patent/WO2003009520A1/fr not_active Application Discontinuation
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5923763A (en) * | 1996-03-21 | 1999-07-13 | Walker Asset Management Limited Partnership | Method and apparatus for secure document timestamping |
US6250549B1 (en) * | 1998-06-17 | 2001-06-26 | Defabio, Jr. Daniel J. | Method for authenticating signatures and memorabilia kit employing same |
US20010033676A1 (en) * | 2000-02-07 | 2001-10-25 | Noyes Frederick D. | Autograph verification and authentication system |
US20020009033A1 (en) * | 2000-06-14 | 2002-01-24 | Christensen Kjeld K. | Identifying copy protected optical compact discs |
Non-Patent Citations (1)
Title |
---|
SCHNEIER BRUCE, 1996, APPLIED CRYPTOGRAPHY 2ND ED., pages: 34 - 44, XP002960096 * |
Cited By (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7346927B2 (en) | 2002-12-12 | 2008-03-18 | Access Business Group International Llc | System and method for storing and accessing secure data |
US7801871B2 (en) | 2005-08-09 | 2010-09-21 | Nexsan Technologies Canada Inc. | Data archiving system |
US8086578B2 (en) | 2005-08-09 | 2011-12-27 | Nexsan Technologies Canada Inc. | Data archiving system |
US8843461B2 (en) | 2005-08-09 | 2014-09-23 | Nexsan Technologies Canada Inc. | Data archiving system |
US9159072B2 (en) | 2007-03-22 | 2015-10-13 | Crystalier, Limited | Systems and methods for marking collectibles to increase their uniqueness |
US9346310B2 (en) | 2007-03-22 | 2016-05-24 | Crystalier, Limited | Systems and methods for marking collectibles to increase their uniqueness |
WO2014022735A1 (fr) * | 2012-08-03 | 2014-02-06 | Goldberg Seth G | Système et procédé de génération d'autographes automatiques |
US8860993B2 (en) | 2012-08-03 | 2014-10-14 | Seth G. Goldberg | System and method for generating automated autographs |
WO2017116809A1 (fr) * | 2015-12-31 | 2017-07-06 | Ebay, Inc. | Analyse de défauts d'images |
CN108431856A (zh) * | 2015-12-31 | 2018-08-21 | 电子湾有限公司 | 图像的缺陷分析 |
US10319014B2 (en) | 2015-12-31 | 2019-06-11 | Ebay Inc. | Online marketplace system, method, and computer readable medium for providing flaw accentuation to an image of an item for sale |
US11100550B2 (en) | 2015-12-31 | 2021-08-24 | Ebay Inc. | Flaw analysis of images |
US11756092B2 (en) | 2015-12-31 | 2023-09-12 | Ebay Inc. | Flaw analysis of images |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11979399B2 (en) | Robust encoding of machine readable information in host objects and biometrics, and associated decoding and authentication | |
US7770013B2 (en) | Digital authentication with digital and analog documents | |
EP1312030B1 (fr) | Filigranes d'authentification pour produits emballés | |
JP4800553B2 (ja) | 印刷対象物と関連した適用業務の為の認証用ウォータマーク | |
US7415476B2 (en) | Digital file management and imaging system and method including secure file marking | |
US7111170B2 (en) | Distributed system for responding to watermarked documents | |
US8903181B2 (en) | Low cost unique identification generation using combination of patterns and unique code images | |
US8256688B2 (en) | Method for certifying and subsequently authenticating original, paper or digital documents for evidences | |
US7028902B2 (en) | Barcode having enhanced visual quality and systems and methods thereof | |
US20050132194A1 (en) | Protection of identification documents using open cryptography | |
US20040039912A1 (en) | Computer networked system and method of digital file management and authentication | |
US20180278423A1 (en) | Computer implemented method for automatically certifying documents with integrity and authenticity guarantees and computer programs thereof | |
KR101039390B1 (ko) | 바코드를 이용한 발급문서 진위확인 방법 및 장치 | |
AU2001277147A1 (en) | Authentication watermarks for printed objects and related applications | |
JP2004537822A (ja) | 認証電子文書管理システム及び方法 | |
US7046828B1 (en) | Method and system for verifying and authenticating signed collectibles | |
KR20070020680A (ko) | 제품인증 방법 및 그 장치 | |
WO2003009520A1 (fr) | Systeme et procede destines a authentifier des souvenirs | |
US20060123236A1 (en) | Image data registration method and apparatus and image data verification method and apparatus | |
JP2003016266A (ja) | 手続システム及びそのための記憶媒体 | |
JP2004202766A (ja) | 印刷物製造装置、印刷物認証装置、印刷物、印刷物製造方法、印刷物認証方法 | |
KR101298224B1 (ko) | 2차원 코드를 이용한 인증 방법 | |
Dittman et al. | Framework for media data and owner authentication based on cryptography, watermarking, and biometric authentication | |
El-Affendi et al. | A Framework for Online Document Attestation Using Encryption and Digital Watermarking | |
AU2008260092A1 (en) | Document authentication and workflow |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AK | Designated states |
Kind code of ref document: A1 Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ OM PH PL PT RO RU SD SE SG SI SK SL TJ TM TN TR TT TZ UA UG UZ VN YU ZA ZM ZW |
|
AL | Designated countries for regional patents |
Kind code of ref document: A1 Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
REG | Reference to national code |
Ref country code: DE Ref legal event code: 8642 |
|
122 | Ep: pct application non-entry in european phase | ||
NENP | Non-entry into the national phase |
Ref country code: JP |
|
WWW | Wipo information: withdrawn in national office |
Country of ref document: JP |