WO2003009520A1 - Systeme et procede destines a authentifier des souvenirs - Google Patents

Systeme et procede destines a authentifier des souvenirs Download PDF

Info

Publication number
WO2003009520A1
WO2003009520A1 PCT/US2002/020697 US0220697W WO03009520A1 WO 2003009520 A1 WO2003009520 A1 WO 2003009520A1 US 0220697 W US0220697 W US 0220697W WO 03009520 A1 WO03009520 A1 WO 03009520A1
Authority
WO
WIPO (PCT)
Prior art keywords
item
memorabilia
date
image
digital
Prior art date
Application number
PCT/US2002/020697
Other languages
English (en)
Inventor
John T. Botti
Original Assignee
Authentidate Holding Corp.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Authentidate Holding Corp. filed Critical Authentidate Holding Corp.
Publication of WO2003009520A1 publication Critical patent/WO2003009520A1/fr

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07DHANDLING OF COINS OR VALUABLE PAPERS, e.g. TESTING, SORTING BY DENOMINATIONS, COUNTING, DISPENSING, CHANGING OR DEPOSITING
    • G07D7/00Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency
    • G07D7/004Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency using digital security elements, e.g. information coded on a magnetic thread or strip
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/00127Connection or combination of a still picture apparatus with another apparatus, e.g. for storage, processing or transmission of still picture signals or of information associated with a still picture
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N2201/00Indexing scheme relating to scanning, transmission or reproduction of documents or the like, and to details thereof
    • H04N2201/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
    • H04N2201/3201Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N2201/3204Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title of data relating to a user, sender, addressee, machine or electronic recording medium
    • H04N2201/3205Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title of data relating to a user, sender, addressee, machine or electronic recording medium of identification information, e.g. name or ID code
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N2201/00Indexing scheme relating to scanning, transmission or reproduction of documents or the like, and to details thereof
    • H04N2201/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
    • H04N2201/3201Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N2201/3204Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title of data relating to a user, sender, addressee, machine or electronic recording medium
    • H04N2201/3207Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title of data relating to a user, sender, addressee, machine or electronic recording medium of an address
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N2201/00Indexing scheme relating to scanning, transmission or reproduction of documents or the like, and to details thereof
    • H04N2201/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
    • H04N2201/3201Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N2201/3212Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title of data relating to a job, e.g. communication, capture or filing of an image
    • H04N2201/3214Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title of data relating to a job, e.g. communication, capture or filing of an image of a date
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N2201/00Indexing scheme relating to scanning, transmission or reproduction of documents or the like, and to details thereof
    • H04N2201/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
    • H04N2201/3201Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N2201/3212Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title of data relating to a job, e.g. communication, capture or filing of an image
    • H04N2201/3215Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title of data relating to a job, e.g. communication, capture or filing of an image of a time or duration
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N2201/00Indexing scheme relating to scanning, transmission or reproduction of documents or the like, and to details thereof
    • H04N2201/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
    • H04N2201/3201Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N2201/3225Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title of data relating to an image, a page or a document
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N2201/00Indexing scheme relating to scanning, transmission or reproduction of documents or the like, and to details thereof
    • H04N2201/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
    • H04N2201/3201Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N2201/3274Storage or retrieval of prestored additional information

Definitions

  • This invention relates generally to digital imaging systems and more particularly to digital authentication of memorabilia.
  • a major share of the collectibles market is represented by sports or entertainment memorabilia that is autographed by an athlete or other personality.
  • Examples of autographed memorabilia are almost limitless and include autographed sports cards, jerseys, photographs, baseballs, football helmets and any piece of merchandise that can be signed.
  • the extrinsic and intrinsic value of such autographed sports and entertainment memorabilia depends on many factors such as the prominence of the athlete or celebrity, the time when item was signed, the rarity of the autograph and, of course, the genuineness of the autograph.
  • the high demand for autographed memorabilia and the difficulty in assessing the genuineness of an autograph there exists the problem of forgers and counterfeiters in the industry creating fraudulent autographs.
  • less complex means of authenticating an autograph include providing the buyer with a certificate of authenticity stating that the signed item is genuine and providing a photograph of the item being signed with the certificate.
  • Other methods include assigning the certificate of authenticity a number and dated description that is cataloged by the retailer of the signed memorabilia or creating a label corresponding to the certificate of authenticity that is affixed to the autographed item and recorded in a database by such retailer.
  • a retailer may also issue a picture of the signing of the item that is filed by the authenticator with certificate information and registered.
  • More complex techniques of authenticating the signed item include providing a certificate of authenticity with a numbered holograph label corresponding to the certificate of authenticity that is affixed to the item with a tamper-resistant seal and recorded in a database. As an additional step, invisible, permanent, infrared or ultraviolet activated ink mark corresponding to the hologram label may be used to tag the item.
  • These techniques are also highly dependent on the reputation and honesty of the retailer or authenticating party and provide no means of verifying with a great degree of certainty the date the signed item can into existence. Additionally, these systems are often used by the manufacturer of the memorabilia and may be compromised by the vendor or the retailer.
  • a method employed in a system for authenticating memorabilia in one embodiment of the present invention comprises the steps of: applying an identification code to an item of memorabilia recording a digital image of the item of memorabilia providing date and time information from a secure date and time reference; generating a date/time value derived from said date and time reference; generating an image value derived from said digital image; marking said digital image with said date and time information, said date and time value and said image value; and storing said marked digital image.
  • a method employed in a system for authenticating memorabilia in one embodiment of the present invention comprises the steps of: applying an identification code to an item of memorabilia; obtaining a handwritten signature on the item of memorabilia from a signor; recording a digital image of the item of memorabilia; providing date and time information from a secure date and time reference; generating a date/time value derived from said date and time reference; generating an image value derived from said digital image; marking said digital image with said date and time information, said date/time value and said image value; and storing said marked digital image BRIEF DESCRIPTION OF THE DRAWINGS
  • Fig. 1 illustrates a system implementation for authenticating memorabilia according to one embodiment of the invention.
  • Fig. 2 is a flow chart illustrating the steps for authenticating memorabilia according to one embodiment of the invention.
  • Fig. 3 illustrates a sample certificate of authenticity used in one embodiment of the invention.
  • Fig. 4 illustrates a system implementation of one embodiment of the present invention utilizing a digital file management system
  • Fig. 5 is a flow chart illustrating the file marking according to one embodiment of the present invention.
  • Fig. 6 is a flow chart illustrating validation of the CRCs in a filed marked image according to one embodiment of the present invention
  • Fig. 7 is a flow chart illustrating calculation of the Image CRC for TIFF format images according to one embodiment of the present invention
  • Fig. 8 is a flow chart illustrating calculation of the Date CRC for TIFF format images according to one embodiment of the present invention.
  • Fig. 9 is a flow chart illustrating calculation of the Image CRC for JPEG format images according to one embodiment of the present invention.
  • Fig. 10 is a flow chart illustrating calculation of the Date CRC for JPEG format images according to one embodiment of the present invention.
  • Figure 1 illustrates an exemplary embodiment of a system for authenticating memorabilia of the present invention.
  • a central processor 110 is configured in communication with a first input device 40, a second input device 30, and a server 100 (described in more detail below) which includes or is connected to a secure time and date reference, a registration database 50, and output device 60.
  • First input device 40 is adapted to input information associated with the item to be authenticated from the authenticating service provider and may comprise a personal computer, workstation, keyboard or other input device.
  • Second input device 30 is adapted to generate one or more digital image files associated with the item to be authenticated and may comprise a digital camera or a digital video recorder.
  • An ID code is assigned to and applied on the surface of the item 10 of memorabilia to be signed and authenticated.
  • the ID code may comprise a number identification code, a character based identification code, a bar code, a hologram or any other means of assigning a code or symbol of identification to the item to be signed.
  • Item 10 may be a two-dimensional item of memorabilia such as a photo or sports card or a three-dimensional item of memorabilia such as a baseball or football helmet.
  • Figure 2 shows a flow diagram of one embodiment of the present invention.
  • the flow diagram shows exemplary steps for a method of authenticating memorabilia for which an actual implementation could include only some of, as well as additional process steps.
  • the method of authenticating memorabilia begins with a visual inspection of the items to be authenticated (e.g., baseballs, helmets, sports cards, etc.) at a particular sporting event or scheduled signing appearance. Detailed computer entries of all items to be signed are made and may be stored and registered in a master database 50 of the authenticating service provider or other third party. (Step 1000). In cases where more than one item will be signed, an inventory lot can be organized and numbered in series (e.g., as item 1 of 25, item 2 of 25, etc.).
  • information about the manufacturer or initial seller of the items to be signed may stored. For example, if the item to be signed is a special item, such as an authentic jersey actually worn by a certain player, information about dealer or prior owner of this item may be recorded. Similarly, if, for example, the item to be signed is a limited edition item of memorabilia (such as a portrait of a player) generated by a manufacturer, additional information about the manufacturer and item might be recorded as well.
  • an ID code is generated and assigned to each item and/or each inventory lot of the item(s) to be signed. This code may be generated from the master database 50. (Step 1010).
  • the ID code may be generated in many forms but is preferably comprised of a unique, randomly generated number/character ID.
  • an LD code may be assigned to each inventory lot of the items being signed instead of or as an additional step to assigning an ID code to each item.
  • the ID code assigned to each item and/or each inventory lot may be produced on a tamper evident label or attachment, such as a sticker or tag, and applied to the surface of each item 10 to be signed. (Step 1020). This code may also be applied to the item using infrared or ultraviolet activated ink. Alternatively, a separate additional code could be applied to the item using infrared or ultraviolet activated ink. The ID code(s) may then be stored and registered in the registration database 50.
  • processor 110 may itself include the first input device 40.
  • Processor 110 may comprise a personal computer, workstation, server or other component that maintains the necessary hardware and software to carry out the authenticating processes described herein.
  • Processor 110 records and processes the at least one digital image and other data associated with the item being signed and may be configured to include registration database 50 and the components of server 100 discussed below.
  • registration database 50 and server 100 will be maintained separately by the authenticating service provider and/or other third party service providers at remote locations.
  • registration database 50 may be maintained remotely by a separate division of the authenticating party attending the signing event in order to restrict access or maintained by an independent third party service provider to ensure that the integrity of the data stored in the registration database is not compromised.
  • server 100 which maintains or is connected to a secure time and date reference (discussed below) is also preferably maintained by a third party independent of the authenticating party attending the signing event to ensure that the integrity of data it receives and the time and date reference are not compromised.
  • an output device 60 for generating a certificate of authenticity (CO A) which may comprise a printer, is also connected to processor 110 and may be located at a remote or local location as well.
  • Processor 110 may be connected to registration database 50, server 100, and/or the output device 60 by any number of methods including by Internet connection, a direct dial-in connection, a modem connection, facsimile transmission, e-mail connection, wireless connection, links through dedicated computer connections, dedicated hardwire connections or any other methods for connecting to a computer server or uploading digital files or other information as are known in the art.
  • the item to be authenticated is signed by the athlete or other personality and eye- witnessed by a trained representative of the authenticating service provider.
  • the authenticating service provider may be employed by the authenticating service provider in other areas such as for book signings, celebrity gatherings and other events where an item is to be authenticated.
  • pertinent information concerning the signed item is entered and recorded by processor 110. (Step 1040).
  • Such information may include the name of the athlete or personality signing the item, the owner's information, a description of the item being signed, the name of the witness, city and date of authentication, and the ID code.
  • This information may be recorded or entered by the witness himself or another representative of the authenticating service provider or may be prepared in advance and released or recorded by processor 110 upon completion of the event or each time the item is signed where the pertinent information in known in advance of the actual signing. Some or all of this information may be stored locally by the authenticating service provider and/or stored in the registration database.
  • At least one digital camera and/or at least one digital video recorder 30 is provided to record at least one digital image of the signed item.
  • the digital camera or digital video recorder 30 will record both a digital image of the actual signature of the item that was signed and a digital image of the athlete or personality signing the item at the event location.
  • the digital camera or digital video recorder can be operated by the witness or another representative or set to record digital images automatically throughout the signing. It is also possible to employ other input devices to record the digital image of the signed item. For example, where the signed item is a paper item or other flat item such as a photograph, a scanning device may be used to scan images of the signed item.
  • the signature of the item and ED code are represented in a single digital image to ensure that the correct digital image is assigned to the authenticated item.
  • the second input device 30 or other image recording device is adapted to create digital images to be input to processor 110 and stored.
  • processor 110 is preferably connected to a digital file authentication system such as server 100 which can determine the time an digital image was first received from processor 110.
  • Server 100 operates in one aspect by recording additional independent data which is stored with each digital image. (Step 1060).
  • this additional data includes a "true date” which is gleaned from a secure clock (described in further detail below) which is not settable by the user (the Authentidate); a number that may be derived from a cyclic redundancy code (CRC) algorithm (described in further detail below) against the image data, this number is called the “image CRC”; and a CRC derived from the "true date", called the "date CRC”.
  • This additional data is preferably recorded within each digital image as soon as possible after the image is acquired from processor 110. As will be discussed in further detail, if the image is altered in any way after the recording of the additional data, recalculation of the image CRC on the altered image will not match the original CRC recorded within it.
  • the server 100 provides a method for ensuring that the image associated with each item being signed (e.g. the autograph) was recorded on the specified date and has not been altered in any way since.
  • the owner or purchaser of the signed item is registered in a registration database 50 of the authenticator or other third party service provider.
  • the registration database 50 may be organized by ID code to verify ownership and track ownership history (Step 1070).
  • a Certificate of Authenticity (COA) may also be generated and provided to the owner of the signed item.
  • the COA may also be stored electronically, for example, in the registration database 50.
  • a sample COA which includes pertinent information concerning the signed item such as the name and address of the owner of the signed item, the name of the athlete or personality signing the item, the name of the witness, the date and city of the authentication, the AG code, a digital image of the signature of the item, and a digital image of the athlete or personality signing the item.
  • Other details such as the company providing the item of memorabilia, a description of the item and the item number within the series may also be provided.
  • the COA may be presented to the owner in the form of a digital file, a paper certificate or a plastic ID card.
  • the owner may be provided with digital access to the information embedded in the COA or other item details through a web site maintained by the authenticating service provider.
  • owner information including the ID code is stored on a registration database 50 of the authenticating party or other third party service provider.
  • owner information including the ID code is stored on a registration database 50 of the authenticating party or other third party service provider.
  • the identity of the registered owner authenticity of the signed item can be verified.
  • the new owner obtains the Certificate of Authenticity from the prior owner.
  • the old COA is sent to the service provider with updated owner information.
  • the old certificate is destroyed and a new certificate is issued and the item is re-registered and the owner registration database is updated.
  • the party maintaining the registration database will only allow one COA to be in existence at any give time for any particular item.
  • the information embedded in each COA, a digital image of each COA itself, and/or other pertinent data or information concerning the item of memorabilia and the signing event may be sent to a digital file authentication system such as server 100 to be time and date stamped just as each digital image may be time and date stamped.
  • a preferred method for authenticating memorabilia of the present invention uses server 100 to provide secure date and time stamping of the digital image of the signed item.
  • a third party file registration service may be provided which allows the authenticating party (i.e.
  • a digital file e.g., the digital image of the signed item or other data concerning the signed item
  • a service provider to create an "electronic signature" of the selected digital file based solely on file content.
  • the signature along with a user-provided file name and user- selected keywords are uploaded to the provider's site and stored in a registration database maintained by the file registration service provider under an account established by the authenticator service provider.
  • Verification of content and submittal date of the digital file at a later time requires going on-line to access the service provider's site and retrieving the prior registration record by file name or keywords.
  • the retrieved database record shows the file signature and the original date that the file signature was registered.
  • the authenticating party must run (locally again) the electronic signature program on the file to be verified and compare the registered signature to the retrieved registered signature to determine whether the signature of the digital file in question matches that of the originally registered file. What the authenticating party now has is verification that the signature of the file in hand matches the signature of a file which was registered on a particular date.
  • server 100 which includes or is connected to secure clock 130 to verify and authenticate image files associated with the item being signed.
  • a server 100 is configured in communication with processor 110 of the authenticating system, storage device 120 and a secure time and date reference 130.
  • the secure time and date reference 130 is provided by a hardware device or service provider which incorporates a secure clock.
  • Original images associated with the signed item will be obtained from processor 110.
  • the resulting digital image will be processed by server 100 as discussed in further detail herein, and may be stored on storage device 120 from where it can be later retrieved.
  • a digital file authentication system such as server 100 operates in one aspect by recording additional independent data with each stored digital image.
  • these additional data include: a "true date” which is gleaned from a secure clock (described in further detail below) which is not settable by the user (the AuthentidateTM); a number derived from a cyclic redundancy code (CRC) algorithm (described in further detail below) against the image data, this number is called the “image CRC”; and a CRC derived from the "true date”, called the "date CRC”.
  • CRC cyclic redundancy code
  • the image and date CRCs can be checked and verified at any time. If the recalculated value matches the recorded value, it can be stated with extreme confidence that the image presently recorded was recorded on the specified date and has not been altered in any way since then. No other known system, including paper storage, can offer similar assurance as to the creation date or authenticity of a document.
  • Digital files (such as an image of the signed item, a digital Certification of Authentication, or other files containing pertinent information about the signed item) are first acquired (either retrieved from storage or received from input device 110).
  • Date and time information is obtained from secure clock 130 (Step 202) or may be requested from a third party timestamp service.
  • the secure clock 130 is preferably maintained by another independent service provider which supplies a secure, accurate and reliable time and date which is not easily compromised. However, as discussed below, secure clock 130 may be maintained and the timestamp function performed by the party operating server 100.
  • Step 204 Proper operation of the secure clock or timestamp service provided is assessed.
  • Step 204. If the secure clock is deemed functional, then the date and time data are accepted as read from the clock (in step 202). If a failure of the secure clock is determined, an error indication will be returned and the image processing is halted.
  • Step 206. With the clock having been deemed functional (in step 204), special tags (as will be discussed infra) and the Authentidate information (including date and time) are added to the digital file and the CRC data fields are initialized to 0 (i.e., the data fields are filled with 0's).
  • Step 208. Two computed values are then calculated, which are derived from the image content and Authentidate information, respectively.
  • the computed values can be computed in any fashion based on data contained within the digital file which will allow detection of data corruption, such as for example, a standard checksum.
  • data corruption such as for example, a standard checksum.
  • CRCs cyclic redundancy codes
  • the computed values are generated by a known CRC algorithm (which will be discussed in further detail below) which is run on both the image content and the Authentidate, creating an Image CRC and an Authentidate CRC, respectively.
  • a known CRC algorithm which will be discussed in further detail below
  • the Image CRC and Authentidate CRC are "transformed" by a proprietary mathematical transformation for added security (as will be discussed infra) creating an Image CRC and an Authentidate CRC.
  • Step 214. The image file is then marked with the Image CRC and Authentidate CRC.
  • the marked digital files are stored on media by storage device 120.
  • Step 218. The authenticity of the image and the time and date stamp can then subsequently be determined by examining the computed values stored within the Digital Files as shown in Fig. 6 which depicts an exemplary flow chart describing one embodiment for validating CRCs in a filed image.
  • the first step in validating the CRCs in a digital file is to read the special tag and date areas and retrieve the stored image CRC and date CRC values.
  • Step 300. If the CRC values cannot be located or read in the digital file (step 302), then it is determined that either the image has not been properly filed or the image has been altered or is otherwise compromised, and an error is posted.
  • Step 304. If the special tags are found, the CRCs are recalculated for the digital file and the date string.
  • Step 306. The same algorithms used to calculate the CRCs initially are used to regenerate them at this point. The recalculated image CRC is transformed and compared to the image CRC read from the tag.
  • Step 308. (Alternatively, the stored image CRC can be reverse transformed prior to comparison to the recalculated value.) If the recalculated digital file CRC does not match the one stored in the special tag, the image is determined to have been altered or otherwise be corrupted and an error is indicated. (Step 310.) If the stored and recalculated image CRCs compare favorably (i.e., they match), the date CRCs are tested. The recalculated date CRC is transformed and compared to the date CRC read from the tag.
  • Step 312. (Alternatively, the stored date CRC can be reverse transformed prior to comparison with the recalculated value.) If the recalculated date CRC does not match the one stored in the special tag, the date string is determined to have been altered or be otherwise corrupted and an error is indicated. (Step 314.) If the date CRCs match, at this point both image and date CRCs have compared favorably, the digital file is determined to be unaltered and thus authenticated. (Step 316.) It should be appreciated that the incorporation of the CRC in the image may use alternative methods, such as digital watermarking in which digital watermarks are integrated within digital files as noise, or random information that already exists in the file, thereby making the detection and removal of the watermark difficult.
  • alternative methods such as digital watermarking in which digital watermarks are integrated within digital files as noise, or random information that already exists in the file, thereby making the detection and removal of the watermark difficult.
  • a secure, non- compromisable clock serves as a secure time and date source which is not alterable by the user.
  • the secure clock 130 is preferably maintained by an independent service provider other than the authenticating party and other than the service provider operating server 100 in order to supply a secure, accurate and reliable time and date information which is not easily compromised.
  • secure clock 130 may be maintained by the party operating server 100. In this case, one could use either custom designed hardware or a commercially available product that offers a secure clock. In either case, a mechanism must be in place to prevent fraudulent or arbitrary date/time adjustment.
  • One embodiment in which the operator of server 100 could supply the secure clock itself is described in U.S. Patent Application 09/562,735, pp.
  • the computed values mentioned above with reference to Figure 5 in the present invention are Cyclic Redundancy Codes (CRCs).
  • CRC Cyclic Redundancy Codes
  • the CRC is a 32 bit-integer value which represents the result of performing the known CRC-32 algorithm on a block of data.
  • the CRC-32 algorithm is a common, public domain algorithm for detecting even minute changes in data with a variety of applications. For example, CRCs are used in the communications field to verify that data has been transmitted correctly over transmission lines of unknown quality. It is also used to detect corruption of compressed data such as in the popular PKZIP utility. One of the strengths of CRCs is detecting changes to data which might otherwise go undetected.
  • CRC-32 algorithm A technical discussion of the CRC-32 algorithm will not be presented here. There are many sources of CRC-32 algorithms and source code in the public domain. As stated earlier, use of the CRC is not required for the present invention per se, and any calculation method is acceptable which will provide a number which is derived from the image data and is suitable for detection of data corruption.
  • CRC value alone may be used, a higher level of security can be incorporated into the present invention to ensure the authenticity of an image by addition of a mathematical transformation to the CRC value.
  • a typical algorithm to calculate a CRC-32 is in the public domain and thus easily accessible. This fact, in conjunction with the details provided herein, would allow anyone to recalculate the CRC on an altered image, enabling them to counterfeit an "Authentidate" and falsely confirm the image as authentic and unaltered.
  • the actual calculated (image or date) CRC is mathematically transformed to a new value prior to image marking.
  • the functional requirements of the transformation are that the resultant value for any input value is consistent, and that the resultant value is unique for each unique input value.
  • the transformation could, for example, be a permutation of the bit-order of the input, an exclusive OR of the input value with a consistent, predetermined "magic" number, or a combination of these operations.
  • a file management and imaging system embodiment of the present invention may use known TIFF (Tagged Image File) and JPEG (Joint Photographic Experts Group) file formats for storage of (scanned) bitonal and color images, respectively.
  • TIFF and JPEG image file formats allow for inclusion of user data inside the image file in a manner which does not affect the displayed image.
  • the present invention is equally applicable to other file formats which have a mechanism to store user-defined data in the file or the file marked with the user-defined data can be stored in an ancillary file or separate database, for example, for word processing documents, spreadsheets, digitized audio or video or any other digitized file.
  • the known TIFF format is a file format which allows image data to be stored in a compressed manner along with information about the image (tags) such as compression method used, resolution, size, number of colors, title, date, etc.
  • tags such as compression method used, resolution, size, number of colors, title, date, etc.
  • a written world- wide standard defines the TIFF file format, what tags must be present, what tags are optional and how specific tags are used.
  • the maintaining organization of the TIFF standard, Adobe Corporation accepts requests for custom tag numbers for companies developing applications which use tags within the TIFF image. Adobe will assign unique numbers to individual companies to prevent interference between vendors. For example, an individual company may apply for and be assigned its own proprietary tags numbers, and other vendors will likewise be assigned their own unique proprietary tag numbers.
  • Use of a custom tag allows storage of a custom data block.
  • the TIFF specification calls for programs to ignore tags that they do not understand and which are not in the baseline specification. This allows common image viewers to view, display and print images which have custom tags because the image files still fit the TIFF
  • TIFF image tags are used: Tag # Use
  • Custom Tag 1 custom data block contains proprietary information including: Image CRC Authentidate CRC Illustrated in Fig. 7 is an exemplary flow chart demonstrating calculation of an image
  • Step 500 The routine works through the format of the TIFF file based on the Image File Directory (IFD) for the file, calculating CRC-32 for each LFD entry and their associated data (step 502) passing results of the prior CRC-32 as the seed to the next (step 510) until all the IFD entries have been cycled through. (Step 506.)
  • IFD Image File Directory
  • the proprietary transformation method (as described above) is used to transform the resulting CRC value into a unique and secure value CRC.
  • the transformed image CRC value, CRC is then stored in the image file.
  • Illustrated in Fig. 8 is an exemplary flow chart demonstrating calculation of a date CRC for a TIFF image file.
  • the calculation of the date CRC for the TIFF image file requires a routine which can calculate a CRC-32 on a given block of data using a given 32-bit seed value.
  • the initial seed value is set to the image CRC value.
  • the routine reads the 0x0132 TJ_FFTAG_DATETIME tag.
  • Step 602. If the DATETEVIE tag cannot be found and read (step 604), an error is returned (step 605), otherwise, a CRC-32 is calculated for the data contained within the DATETEVIE tag.
  • the resulting CRC is then transformed into CRC by means of the proprietary transformation technique (step 608) and stored within the image file.
  • Step 610.
  • the Joint Photographic Experts Group developed the namesake format and maintains the standard for JPEG and the JPG file format (sometimes also called JFIF - JPEG File Image Format). This format was developed for the storage and transmission of photographic images.
  • the compression techniques used are ideally suited to storing subtle differences between color changes, such as a photograph.
  • JPG file is interpreted as a stream of characters with special identifiers called “markers” separating different elements of the image information and image data.
  • markers special identifiers
  • the exact meaning of each marker is not important to this discussion except that the JPG standard defines a set of markers to be used by manufacturers for special or proprietary features. These markers are named "APPx" where x is a digit between 0 and 9 inclusive.
  • the present invention adds a special marker and data block to JPG files when they are stored.
  • the "APP8" marker will be used for the simple reason that this marker is rarely used by other manufacturers.
  • This marker holds various proprietary information including the following: Authentidate Image CRC Authentidate CRC
  • Illustrated in Fig. 9 is an exemplary flow chart demonstrating calculation of an image CRC for a JPEG image file.
  • the calculation of the CRC for the JPEG image file requires a routine which can calculate a CRC-32 on a given block of data using a given 32-bit seed value.
  • the initial seed value is set to -1.
  • Step 700. The image file data is read sequentially and the position of the APP8 is determined and read. (Step 702.) If the APP8 marker cannot be found and read (step 704), an error is returned.
  • Step 705. A CRC-32 is calculated for all data in the file from the beginning of the file up to but not including the APP8 marker.
  • Step 706. The result of this calculation is used as a seed to calculate a CRC-32 on the remainder of the file following the APP8 marker.
  • Step 708. The resulting CRC is transformed into CRC by means of the proprietary transformation technique.
  • Step 710. The transformed image CRC is then stored within the image file.
  • Step 712. Illustrated in Fig. 10 is an exemplary flow chart demonstrating calculation of a date
  • CRCs for a JPEG image file The calculation of the CRC for the JPEG image file requires a routine which can calculate a CRC-32 on a given block of data using a given 32-bit seed value.
  • the initial seed value is set to the image CRC value.
  • Step 800. The file is read sequentially and the position of the APP8 is determined and read.
  • Step 802. If the APP8 marker cannot be found and read (step 804), an error is returned.
  • a CRC-32 is calculated for the secure data string within the APP8 data area or block.
  • the resulting CRC is transformed into CRC by means of the proprietary transformation technique.
  • the transformed date CRC is stored within the image file.
  • Step 810. The present invention has been illustrated and described with respect to specific embodiments thereof. It is to be understood, however, that the above-described embodiments are merely illustrative of the principles of the invention and are not intended to be exclusive embodiments.
  • digital image files e.g., of the signed item
  • the server 100 will be equally applicable to any digital file regardless of its source or how it is generated.
  • the server 100 may receive and time and date stamp other digital files containing other information pertaining to the signed item such as the ID code, witness and owner information, an electronic certificate of authenticity and other data concerning the signed item.
  • server 100 need not mark and store each digital file in order to perform the digital file authentication.
  • server 100 receives a digital file (such as an image of the signed item), retrieves a time stamp to note the time of receipt of the file, and performs the step of obtaining the digital signature of the document.
  • the time stamp and the digital signature, along with other information that may be desirable, such as a file ID number, user identification information, or other parameters to identify the file may be stored in a database maintained by the operator of server 100.
  • Server 100 may also rend a receipt to the user (e.g.
  • the party authenticating the item of memorabilia, the owner, or the party maintaining the registration database which includes pertinent information relating to the submitted file, including, for example, the time stamp, the digital signature, the file ED number, or other information.
  • a digital copy of the submitted file may be maintained by server 100.
  • the file could be saved in association with the log of information to be kept on the file such as the ID number, the time stamp and the digital signature.
  • the digital file is not saved nor maintained by the operator of the server 100. After the file has been processed in order to derive its digital signature, the digital file may be returned or deleted.
  • a digital copy of the file is not maintained at the site of the operator of server 100 performing the date and time stamp service and the user (e.g., the authenticating party that witnessed the signing or the operator of the registration database) is responsible for maintaining a digital copy of the file.
  • the user or any third party such as the owner of the item or operator of the registration database 50, can verify if the newly submitted file is the same as the document originally submitted by the user, and further can verify the date upon which the original file was originally submitted.
  • the server 100 runs the digital signature routine on the file to be verified. This second digital signature is compared against the original digital signature, and if they are the same, then the server 100 may issue notice that digital file is verfied.
  • Other methods of digital file authentication and digital file signature and time stamp creation and verification are described in United States patent application 09/729,411 which is hereby incorporated by reference.

Landscapes

  • Engineering & Computer Science (AREA)
  • Multimedia (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Editing Of Facsimile Originals (AREA)

Abstract

L'invention concerne un système et un procédé destinés à authentifier un article de souvenir (10) au moyen d'un service d'authentification pouvant authentifier et enregistrer un tel article (10) à l'aide d'un système d'imagerie numérique afin de fournir l'authentification d'un fichier numérique de l'article par marquage d'image sécurisé. Ce système et ce procédé consistent à assigner un code d'identification (1010) à l'article de souvenir, à enregistrer une image numérique de l'article de souvenir (1050), à fournir la date et l'heure au moyen d'une référence de date et d'heure sécurisée, et à marquer l'image numérique de l'article de ces informations (1060), une valeur date/heure et une valeur image, ou à assigner la date et l'heure correspondant à l'image numérique en fonction de l'heure à laquelle cette image a été reçue ou créée. L'article de souvenir peut être signé et authentifié par une tierce partie (1030) et une image numérique de l'article signé et des informations peut être traitée et utilisée afin d'enregistrer le propriétaire de l'article (1070) et de générer un certificat d'authenticité de l'article signé (1080).
PCT/US2002/020697 2001-07-16 2002-06-28 Systeme et procede destines a authentifier des souvenirs WO2003009520A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US90696101A 2001-07-16 2001-07-16
US09/906,961 2001-07-16

Publications (1)

Publication Number Publication Date
WO2003009520A1 true WO2003009520A1 (fr) 2003-01-30

Family

ID=25423304

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2002/020697 WO2003009520A1 (fr) 2001-07-16 2002-06-28 Systeme et procede destines a authentifier des souvenirs

Country Status (1)

Country Link
WO (1) WO2003009520A1 (fr)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7346927B2 (en) 2002-12-12 2008-03-18 Access Business Group International Llc System and method for storing and accessing secure data
US7801871B2 (en) 2005-08-09 2010-09-21 Nexsan Technologies Canada Inc. Data archiving system
WO2014022735A1 (fr) * 2012-08-03 2014-02-06 Goldberg Seth G Système et procédé de génération d'autographes automatiques
US9159072B2 (en) 2007-03-22 2015-10-13 Crystalier, Limited Systems and methods for marking collectibles to increase their uniqueness
WO2017116809A1 (fr) * 2015-12-31 2017-07-06 Ebay, Inc. Analyse de défauts d'images

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5923763A (en) * 1996-03-21 1999-07-13 Walker Asset Management Limited Partnership Method and apparatus for secure document timestamping
US6250549B1 (en) * 1998-06-17 2001-06-26 Defabio, Jr. Daniel J. Method for authenticating signatures and memorabilia kit employing same
US20010033676A1 (en) * 2000-02-07 2001-10-25 Noyes Frederick D. Autograph verification and authentication system
US20020009033A1 (en) * 2000-06-14 2002-01-24 Christensen Kjeld K. Identifying copy protected optical compact discs

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5923763A (en) * 1996-03-21 1999-07-13 Walker Asset Management Limited Partnership Method and apparatus for secure document timestamping
US6250549B1 (en) * 1998-06-17 2001-06-26 Defabio, Jr. Daniel J. Method for authenticating signatures and memorabilia kit employing same
US20010033676A1 (en) * 2000-02-07 2001-10-25 Noyes Frederick D. Autograph verification and authentication system
US20020009033A1 (en) * 2000-06-14 2002-01-24 Christensen Kjeld K. Identifying copy protected optical compact discs

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
SCHNEIER BRUCE, 1996, APPLIED CRYPTOGRAPHY 2ND ED., pages: 34 - 44, XP002960096 *

Cited By (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7346927B2 (en) 2002-12-12 2008-03-18 Access Business Group International Llc System and method for storing and accessing secure data
US7801871B2 (en) 2005-08-09 2010-09-21 Nexsan Technologies Canada Inc. Data archiving system
US8086578B2 (en) 2005-08-09 2011-12-27 Nexsan Technologies Canada Inc. Data archiving system
US8843461B2 (en) 2005-08-09 2014-09-23 Nexsan Technologies Canada Inc. Data archiving system
US9159072B2 (en) 2007-03-22 2015-10-13 Crystalier, Limited Systems and methods for marking collectibles to increase their uniqueness
US9346310B2 (en) 2007-03-22 2016-05-24 Crystalier, Limited Systems and methods for marking collectibles to increase their uniqueness
WO2014022735A1 (fr) * 2012-08-03 2014-02-06 Goldberg Seth G Système et procédé de génération d'autographes automatiques
US8860993B2 (en) 2012-08-03 2014-10-14 Seth G. Goldberg System and method for generating automated autographs
WO2017116809A1 (fr) * 2015-12-31 2017-07-06 Ebay, Inc. Analyse de défauts d'images
CN108431856A (zh) * 2015-12-31 2018-08-21 电子湾有限公司 图像的缺陷分析
US10319014B2 (en) 2015-12-31 2019-06-11 Ebay Inc. Online marketplace system, method, and computer readable medium for providing flaw accentuation to an image of an item for sale
US11100550B2 (en) 2015-12-31 2021-08-24 Ebay Inc. Flaw analysis of images
US11756092B2 (en) 2015-12-31 2023-09-12 Ebay Inc. Flaw analysis of images

Similar Documents

Publication Publication Date Title
US11979399B2 (en) Robust encoding of machine readable information in host objects and biometrics, and associated decoding and authentication
US7770013B2 (en) Digital authentication with digital and analog documents
EP1312030B1 (fr) Filigranes d'authentification pour produits emballés
JP4800553B2 (ja) 印刷対象物と関連した適用業務の為の認証用ウォータマーク
US7415476B2 (en) Digital file management and imaging system and method including secure file marking
US7111170B2 (en) Distributed system for responding to watermarked documents
US8903181B2 (en) Low cost unique identification generation using combination of patterns and unique code images
US8256688B2 (en) Method for certifying and subsequently authenticating original, paper or digital documents for evidences
US7028902B2 (en) Barcode having enhanced visual quality and systems and methods thereof
US20050132194A1 (en) Protection of identification documents using open cryptography
US20040039912A1 (en) Computer networked system and method of digital file management and authentication
US20180278423A1 (en) Computer implemented method for automatically certifying documents with integrity and authenticity guarantees and computer programs thereof
KR101039390B1 (ko) 바코드를 이용한 발급문서 진위확인 방법 및 장치
AU2001277147A1 (en) Authentication watermarks for printed objects and related applications
JP2004537822A (ja) 認証電子文書管理システム及び方法
US7046828B1 (en) Method and system for verifying and authenticating signed collectibles
KR20070020680A (ko) 제품인증 방법 및 그 장치
WO2003009520A1 (fr) Systeme et procede destines a authentifier des souvenirs
US20060123236A1 (en) Image data registration method and apparatus and image data verification method and apparatus
JP2003016266A (ja) 手続システム及びそのための記憶媒体
JP2004202766A (ja) 印刷物製造装置、印刷物認証装置、印刷物、印刷物製造方法、印刷物認証方法
KR101298224B1 (ko) 2차원 코드를 이용한 인증 방법
Dittman et al. Framework for media data and owner authentication based on cryptography, watermarking, and biometric authentication
El-Affendi et al. A Framework for Online Document Attestation Using Encryption and Digital Watermarking
AU2008260092A1 (en) Document authentication and workflow

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ OM PH PL PT RO RU SD SE SG SI SK SL TJ TM TN TR TT TZ UA UG UZ VN YU ZA ZM ZW

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
REG Reference to national code

Ref country code: DE

Ref legal event code: 8642

122 Ep: pct application non-entry in european phase
NENP Non-entry into the national phase

Ref country code: JP

WWW Wipo information: withdrawn in national office

Country of ref document: JP