WO2003065305A1 - Apparatus for protecting forgery and alteration of smart card using angular multiplexing hologram and method thereof - Google Patents

Apparatus for protecting forgery and alteration of smart card using angular multiplexing hologram and method thereof Download PDF

Info

Publication number
WO2003065305A1
WO2003065305A1 PCT/KR2003/000239 KR0300239W WO03065305A1 WO 2003065305 A1 WO2003065305 A1 WO 2003065305A1 KR 0300239 W KR0300239 W KR 0300239W WO 03065305 A1 WO03065305 A1 WO 03065305A1
Authority
WO
WIPO (PCT)
Prior art keywords
above described
data
smart card
hologram
value
Prior art date
Application number
PCT/KR2003/000239
Other languages
French (fr)
Inventor
Hong-Jong Chang
Seong-Eun Lee
Chul-Won Lee
Original Assignee
Hong-Jong Chang
Seong-Eun Lee
Chul-Won Lee
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hong-Jong Chang, Seong-Eun Lee, Chul-Won Lee filed Critical Hong-Jong Chang
Publication of WO2003065305A1 publication Critical patent/WO2003065305A1/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/08Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code using markings of different kinds or more than one marking of the same kind in the same record carrier, e.g. one marking being sensed by optical and the other by magnetic means
    • G06K19/10Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code using markings of different kinds or more than one marking of the same kind in the same record carrier, e.g. one marking being sensed by optical and the other by magnetic means at least one kind of marking being used for authentication, e.g. of credit or identity cards
    • G06K19/16Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code using markings of different kinds or more than one marking of the same kind in the same record carrier, e.g. one marking being sensed by optical and the other by magnetic means at least one kind of marking being used for authentication, e.g. of credit or identity cards the marking being a hologram or diffraction grating
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/08Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
    • G07F7/10Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
    • G07F7/1008Active credit-cards provided with means to personalise their use, e.g. with PIN-introduction/comparison system
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/067Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components
    • G06K19/07Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips
    • G06K19/073Special arrangements for circuits, e.g. for protecting identification code in memory
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/067Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components
    • G06K19/07Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips
    • G06K19/073Special arrangements for circuits, e.g. for protecting identification code in memory
    • G06K19/07309Means for preventing undesired reading or writing from or onto record carriers
    • G06K19/07363Means for preventing undesired reading or writing from or onto record carriers by preventing analysis of the circuit, e.g. dynamic or static power analysis or current analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/067Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components
    • G06K19/07Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips
    • G06K19/073Special arrangements for circuits, e.g. for protecting identification code in memory
    • G06K19/07309Means for preventing undesired reading or writing from or onto record carriers
    • G06K19/07372Means for preventing undesired reading or writing from or onto record carriers by detecting tampering with the circuit
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/34Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
    • G06Q20/341Active cards, i.e. cards including their own processing means, e.g. including an IC or chip
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/409Device specific authentication in transaction processing
    • G06Q20/4097Device specific authentication in transaction processing using mutual authentication between devices and transaction partners
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/08Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
    • G07F7/0806Details of the card
    • G07F7/0813Specific details related to card security
    • G07F7/082Features insuring the integrity of the data on or in the card

Landscapes

  • Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Business, Economics & Management (AREA)
  • Microelectronics & Electronic Packaging (AREA)
  • General Engineering & Computer Science (AREA)
  • Accounting & Taxation (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Finance (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Holo Graphy (AREA)

Abstract

The invention relates to apparatus, and accompanying methods for use therein, for protecting forgery and alternation of smart card using angular multiplexing hologram. In the protecting system of the forgery and alternation of the smart card using the angular multiplexing hologram comprised to, a program memory storing the control program; a data memory storing above described hologram data of the smart card; a microprocessor connecting with above described program memory and data memory, processing above described control program, restoring the hologram data of the smart card, and processing the verification operation with above described hologram data and the restored data storing on the RF memory chip of the smart card; a USB controller connecting with above described microprocessor, and transferring the data to/from host computer; an optical module connecting with above described microprocessor, and reading above described hologram data of the smart card; a RF module connecting with above described microprocessor, and reading the raw data stored on the RF memory chip of the smart card; an optical calibrator connecting with above described microprocessor, and calibrating above described optical module for accurately reading above described hologram data of the smart card; a card outlet connecting with above described microprocessor, and controlling and driving in-and-out state of the smart card; a system controller connecting with above described microprocessor, producing the control signal required above described all device, monitoring state of data transferring with host computer, and controlling and monitoring above described all device and any device by the command directed to above described microprocessor; a system power module interfaced with above described USB controller, and producing the required power as incoming the power by USB cable; and a inner system bus connecting with above described all device each other, and transferring the data and the control signal.

Description

Apparatus for Protecting Forgery and Alteration of Smart Card using Angular Multiplexing Hologram and Method Thereof
Technical Field
The invention relates to apparatus, and accompanying methods for use therein, for protecting forgery and alternation of smart card using angular multiplexing hologram.
Background Art
With the rapid development of information and communication technology, online dissemination is rapidly increasing. So, protection of information has become important. In an information-oriented environment, the pattern of business conduct will be switched from paper document-centered, face-to-face handling to online electronic document-based operation. So, information and services will be provided promptly based on standardized information technology. But, with the rapid dissemination of important data and private information on network, we have to consider various dysfunctions such as illegal taping, forgery, alternation, and false identity.
So, to ensure the security and reliability of information distribution, we create user authentication, information protection, integrity security and non-repudiation by applying PKI (Public Key Infrastructure). In addition, the smart card system makes the most use of such an infrastructure.
With the development of information and communication technology, smart card is being widely used for e-money, ID cards, telephone cards, royalty cards, transportation and medical service. Also, it is recognized as an infrastructure for ensuring safety, reliability and security that is necessary to execute user authentication, access control, information storage and control.
Dataquest, an agency specializing in market research, forecasts that the market of smart card will grow up by 31.8% of annual average to $3,561,000,000 in 2003 from $897,000,000 in 1998.
The reason for such rapid growth of the smart card market is the operational benefits to both the user and supplier in security, convenience, multi -functionality and cost-effectiveness.
Although, smart card is recognized as the securest of what can be realized on the current technological level, stored private credit information or even the private key could be extracted by hacking. In addition, the user authentication and e-money based on the IC chip could be forged and altered, and private information could be misused if hacked.
It is already known that Crypto Research, a USA company specializing in cryptosystem technology, owns hacking technology called DPA
(Differential Power Analysis). So, infrastructure is needed to intercept forgery and alternation by smart card, hacking and verify the existence of forgery and alternation.
Disclosure of Invention
The present invention advantageously satisfies these needs, while overcoming known obstacles in the art, by providing the apparatus for accurately and safely reading the hologram data of the smart card using the angular multiplexing hologram.
Also, another object of the invention is that, advantageously satisfies these needs, it provides the method for accurately and safely reading the hologram data of the smart card using the angular multiplexing hologram.
Also, another object of the invention is that, advantageously satisfies these needs, it provides the apparatus and its method for the forgery and the alternation of the smart card by using the angular multiplexing hologram which can be coded the raw data to the angular multiplexing by using the angular value and the secrete key.
Also, another object of the invention is that, advantageously satisfies these needs, it provides the apparatus and the method for the forgery and the alternation of the smart card by using the angular multiplexing hologram that the angular multiplexing coded data can be written to the writing material of the smart card by using hologram.
Also, another object of the invention is that, advantageously satisfies these needs, it provides the apparatus and the method for the forgery and the alternation of the smart card by using the angular multiplexing hologram that the forgery and the alternation of the smart card can be certificated by the comparison the hash value of the raw data to the hash value produced by decoding the angular multiplexing coded data. To accomplish above described object, according to this invention, in the protecting system of the forgery and alternation of the smart card using the angular multiplexing hologram comprised to, means producing one random value and one challenge value responding to user request for coding; means producing the one-time password by using the user identification based on the above described challenge value; means producing the coded data as coding the raw data by using above described one-time password, which above described raw data represents the various user information; and means recording above described coded data on the recoding material as above described one or more random angular value; means providing above described one or more random angular value and challenge value to the client according to the request of the forgery and the alternation, for reading the smart card information which is recoded the coded data on the recoding material according to above described the forgery and the alternation system of the smart card, it is provided the smart card reader apparatus consists of, a program memory storing the control program; a data memory storing above described hologram data of the smart card; a microprocessor connecting with above described program memory and data memory, processing above described control program, restoring the hologram data of the smart card, and processing the verification operation with above described hologram data and the restored data storing on the RF memory chip of the smart card; a USB controller connecting with above described microprocessor, and transferring the data to/from host computer; an optical module connecting with above described microprocessor, and reading above described hologram data of the smart card; a RF module connecting with above described microprocessor, and reading the raw data stored on the RF memory chip of the smart card; an optical calibrator connecting with above described microprocessor, and calibrating above described optical module for accurately reading above described hologram data of the smart card; a card outlet connecting with above described microprocessor, and controlling and driving in-and-out state of the smart card; a system controller connecting with above described microprocessor, producing the control signal required above described all device, monitoring state of data transferring with host computer, and controlling and monitoring above described all device and any device by the command directed to above described microprocessor; a system power module interfaced with above described USB controller, and producing the required power as incoming the power by USB cable! and a inner system bus connecting with above described all device each other, and transferring the data and the control signal.
Also, to accomplish above described object, according to this invention, it is provided the smart card reader method consists of, a step verifying the insertion of the smart card by the first limit switch, and if the smart card is inserting, the roller is driven and then the smart card is setting on the card holder; a step verifying the completion of the smart card insertion by the second limit switch, and the driving of the roller is completed and then the first limit switch and the second limit switch becomes inactive state;
. a step reading the data of RF memory chip of the smart card inserted on the card holder by above described steps; a step detecting the edge of the reference position established on the hologram chip of the smart card; a step calibrating the optical module to calibrate the accurate position of the optical module if the edge is not detected by above described step; a step reading any hologram cell data of the hologram chip of the smart card, if the edge is detected by above described steps; a step processing the hologram data image read by above described hologram cell data reading step; a step comparing the reading data of above described RF data reading step and the processing data of above described hologram data image processing step, and then transferring the comparing result to host computer by using above described USB controller; and a step withdrawing the smart card from the card holder after completing above described all steps.
Also, to accomplish above described object, according to this invention, it is provided that the writing method and its system of the security data, which producing one and or more random angular value and challenge value according to respond to the security request of the user, producing the one-time password by the user identify based on above described challenge value, coding the raw data by using above described one-time password, producing the coded data, and then writing the coded data on the recoded material by using above described one or more random angular value. Also, above described one or more random angular value and challenge value is registered corresponding to the user identify, and above described one or more random angular value and challenge value may be used as decoding the coded data.
Also, above described user identify may be the issue number of the certificate of authentication.
Also, above one-time password may be produced by using IDEA coding method.
Also, above described recoding of the coded data may be processed by the coding device. Also, above described recoding material may be the photopolymer.
Also, according to one embodiment of the present invention, it is provided the method of the forgery and the alternation of the smart card that the request of the forgery or the alternation from the user is received, and the request is transferred to the certification server, and the previously registered one or more random angular value and challenge value according to the request of the forgery and the alternation is received, and the one-time password is produced by using user identification based on above described challenge value, and the decoded data is produced as decoding above described coded data according to above described one or more random angular value by using decoding key, and the first hash value is produced to above described decoding data by the hash algorithm, and above described first hash value is compared to the second hash value produced by above, described raw data, and then the forgery or the alternation of the smart card is detected as the comparison result.
Accordingly, above described second hash value is produced by the hash algorithm based on the raw data received from IC chip of the smart card. Also, above described one or more random angular value and challenge value is coded by using the public key on the certification server, and decoded by the secrete key on the client.
Also, above described one-time password may be produced by using IDEA coding method.
Also, the yield of above described decoded data may be processed by the decoded device.
Also, above described user identify may be the issue number of the certificate of authentication. Also, in case that the raw data of the smart card is forged or altered, the distinguished result is informed to the certification server or the user.
Accordingly, above described client may be one of computer, notebook, mobile telephone, and PDA.
According to the other embodiment of the present invention, it is provided the recoding material, in the recording material which implements the program of the command executed by the digital processing device to process the distinguish of the forgery and the alternation of the smart card and is read by the digital processing device, which consists following steps : a step transferring the distinguish method of the forgery and the alternation of the smart card to above described certification server as receiving the request of the forgery and the alternation from user; a step receiving previously registered one or more random angular value and challenge value according to the request of the forgery and the alternation; a step producing the one-time password by using the user identification based on above described challenge value; a step producing the decoded data as decoding above described coded data according to above described one or more random angular value by using decoding key; a step producing the first hash value to above described decoding data by the hash algorithm; a step comparing above described first hash value with the second hash value produced by above described raw data, and then detecting the forgery or the alternation of the smart card as the comparison result.
Brief Description of Drawings
Fig. 1 is the block diagram of the reader apparatus of the hologram data of the smart card using the angular multiplexing hologram according to this invention.
Fig. 2 is the block diagram of the structure of the optical module device shown in Fig. 1.
Fig. 3 is the block diagram of the structure of the RF module device shown in Fig. 1. Fig. 4 is the block diagram of the structure of the arbitrator of the optical module device shown in Fig. 1.
Fig. 5 is the block diagram of the structure of the card in/out device shown in Fig. 1.
Fig. 6 is the flow chart of the reader operation of the hologram data of the smart card using the angular multiplexing hologram according to this invention.
Fig. 7 is the flow chart of data reading operation on the RF memory chip shown in Fig. 6.
Fig. 8 is the flow chart of the detecting operation of the reference position edge shown in Fig. 6.
Fig. 9 is the flow chart of the operation of optical module calibration shown in Fig. 6.
Fig. 10 is the flow chart of the image processing operation of the hologram data shown in Fig. 6. Fig. 11 is the flow chart of the user interface accomplished in user computer.
Fig. 12 is the block diagram of the structure of coding module according to this invention.
Fig. 13 is the block diagram of the structure of decoding module according to this invention.
Fig. 14 is the flow chart of the method for writing the coding data on the smart card according to this invention.
Fig. 15 is the flow chart of the method for distinguishing the forgery and alternation of the smart card according to this invention. Fig. 16 is the flow chart of the method for producing the first hash value and the second hash value for distinguishing the forgery and alternation of the smart card according to this invention.
Best Mode for Carrying Out the Invention
Referring now to the attached drawings, the overall operation of the embodiment of this invention is represented as follows.
Now, Fig. 1 is the block diagram of the reader apparatus of the hologram data of the smart card using the angular multiplexing hologram according to this invention.
Referring to Fig. 1, the apparatus of the hologram data reader according to this invention, in the protecting system of the forgery and alternation of the smart card using the angular multiplexing hologram comprised to, means producing one random value and one challenge value responding to user request for coding; means producing the one-time password by using the user identification based on the above described challenge value; means producing the coded data as coding the raw data by using above described one-time password, which above described raw data represents the various user information; and means recording above described coded data on the recoding material as above described one or more random angular value; means providing above described one or more random angular value 5 and challenge value to the client according to the request of the forgery and the alternation, for reading the smart card information which is recoded the coded data on the recoding material according to above described the forgery and the alternation system of the smart card, it is provided the smart card reader 10 apparatus consists of, a program memory 122 storing the control program; a data memory 123 storing above described hologram data of the smart card; a microprocessor 121 connecting with above described program
15 memory 122 and data memory 123, processing above described control program, restoring the hologram data of the smart card, and processing the verification operation with above described hologram data and the restored data storing on the RF memory chip of the smart card; a USB controller 120 connecting with above described 20 microprocessor 121, and transferring the data to/from host computer 100; an optical module 130 connecting with above described microprocessor 121, and reading above described hologram data of the smart card; a RF module 140 connecting with above described microprocessor 25 121, and reading the raw data stored on the RF memory chip of the smart card; an optical calibrator 150 connecting with above described microprocessor 121, and calibrating above described optical module 130 for accurately reading above described hologram data of the smart card; a card outlet 160 connecting with above described microprocessor 30 121, and controlling and driving in-and-out state of the smart card; a system controller 124 connecting with above described microprocessor 121, producing the control signal required above described all device, monitoring state of data transferring with host computer 100, and controlling and monitoring above described all device and any device by the command directed to above described microprocessor 121; a system power module 170 interfaced with above described USB controller 120, and producing the required power as incoming the power by USB cable 110; and a inner system bus 180 connecting with above described all device each other, and transferring the data and the control signal.
Also, above described optical module 130, referring to Fig. 2, to verify the hologram image of the smart card, in optical system module 200 using angular multiplexing hologram, consists of. an optical laser diode driver 250 driving the green optical laser diode or the red optical laser diode of above described optical system module 200, and then inserting the green light or the red light to the hologram chip 220 of the smart card 230; an image sensor 260 capturing the hologram image of the smart card 230 by the green light or the red light inserted from above described optical laser diode driver 250; an image sensor driver 270 converting the hologram image of the smart card captured by above described image sensor 260 to digital data, and then transferring to above described microprocessor 121; and an optical system module calibrator 240 calibrating above described optical laser diode driver 250 accurately as to insert the green light or the red light to the hologram image of the smart card.
Also, above described RF module 140, referring to Fig. 3, to verify the raw data stored on the RF memory chip of the smart card, consists of, a RF transmitter 310 processing the data receiving/ transmitting to/from RF memory chip 320 of the smart card 330; and a RF driver 300interfacing with above described system inner bus 180, controlling the stats of above described RF transmitter 310, and monitoring the state of the data receiving/transmitting to/from RF memory chip 320 of the smart card. Also, above described optical module calibrator 150, referring to Fig.
4, consists of, an optical module calibrator controller 480, as above described optical system module calibrator 240 as shown in Fig. 2 is comprised on above optical module 470, controlling above described optical module calibrator 240 to calibrate above optical module 470 within less than lum; a bearing 410a, 410b, 410c, 410d making above described optical module 470 to move upward and downward as moving freely the upward and downward movement of above described optical module 470; a stepping motor 420 processing the upward and downward movement of above described optical module 470 as calibrating the upward and downward movement within les than 1mm; and a stepping motor controller 490 controlling the operation of above described stepping motor 420, and monitoring the state of above described stepping motor 420. Also, above described card outlet 160, referring to Fig. 5, consists of, a first limit switch 530a detecting the insertion of the smart card, and making it insert into the card holder 520; a roller 560 making the smart card insert into the card holder 520 after detecting the insertion of the smart card by above described first limit switch 530a; a spindle motor 540 controlling the operation and the state of above described roller 560; a spindle motor controller 570 controlling the operation of above described spindle motor 540, and monitoring the state of above described spindle motor 540; and a second limit switch 530b making the stop signal of the operation of above described spindle motor 540 produce at above described spindle motor controller 570 after the finish of the smart card insertion.
Now, as above described, the detailed presentation of the operation 5 of the apparatus for reading the hologram data using the angular multiplexing hologram according to this invention is as follows :
Fist of all, Fig. 6 is the flow chart of the reader operation of the hologram data of the smart card using the angular multiplexing hologram according to this invention. 10 Referring to Fig. 6, the reading method of the hologram data of the smart card using the angular multiplexing hologram consists of, an insertion step (step 610) of the smart card detecting the signal for verifying the insertion state of the smart card by above described first limit switch 530a (step 611), and if the insertion of the smart card is verified (step 15 612), driving above described spindle motor 540, and then operating above described roller 560, and then processing the insertion of the smart card (step 613), also, detecting the completed state of the insertion of the smart card by above described second limit switch 530b (step 614), and if the completed signal is detected (step 615), completing the insertion of the smart card as 20 stopping above described spindle motor 540 (step 616).
And, if the insertion of the smart card is completed, it calls the process1 for reading RF data on RF memory chip of the smart card (step 620).
Above described process for reading RF data (step 620), referring to Fig. 7, is as follows. That is, first of all, the frequency of RF memory chip 320 25 of the smart card is verified (step 710), and then if the verified frequency is available (step 720), the processing type of RF data of above described RF memory chip 320 is detected (step 730). If the processing type is the reading type of the RF data, RF data of RF memory chip 320 is reading by driving above described RF driver 300 (step 750). From now on, after the read data is stored 30 on the buffer of above described data memory 123, the reading process of RF data is completed (step 760). If the processing type is the modifying type of the RF data or storing type on above RF memory chip 320, the data stored on above described data memory 123 is written on above described RF memory chip 320 by above described RF driver 300, and then the writing process of RF data is completed (step 740).
From now on, if the operation process of RF data is completed (step 622), the hologram data on above described hologram chip 220 of the smart card is read (step 630).
Accordingly, to read the hologram data, first of all, the reference position edge detecting process (step 631) for detecting the edge data predetermined on above described hologram chip 220 is called.
Accordingly, above described reference position edge detecting process (step 631), referring to Fig. 8, is processed as follows. That is, first of all, above described optical laser diode driver 250 becomes active state to drive the laser diode 210 of above described optical module 200 (step 810). From now on, the photographic data on above described image sensor 260, which is hologram image data on above described hologram chip 220, is read (step 820), and then the read data is stored on the buffer of above described data memory 123 (step 830). Accordingly, above described edge data is predetermined and is stored on above hologram chip 200, and the hologram data is accurately read by such edge data. Therefore, if the read hologram image data stored on above described buffer of the data memory 123 exists within the predetermined threshold value, the state is set 'TRUE', and then the process is completed (step 850). Also, if the read hologram image data stored on above described buffer of the data memory 123 do not exists within the predetermined threshold value, the state is set 'FALSE', and then the process is completed (step 840).
In case that the edge data is not detected on above described reference position edge detecting process (step 631), that is, in case that the result is set to 'FALSE', the optical module calibration process (step 633) is called, which processes the operation of the edge position calibration of the optical module by above described optical system module calibrator 240 and above described stepping motor controller 490.
Accordingly, above described optical module calibration process (step 633), referring to Fig. 9, is processed as follows. In case that the edge data is detected on above described reference position edge detecting process (step 631), the process is completed. Also, in case that the edge data is not detected on above described. reference position edge detecting process (step 631), above described stepping motor driver 570 is driven (step 920), and then above described stepping motor 540 is operated while above described edge data is exists within the predetermined threshold value (step 930). If the difference between the position of the edge data and the predetermined threshold value is the minus value, above described stepping motor 540 is operated to the direction of counterclockwise (step 950, step 951, step 952), and if the difference between the position of the edge data and the predetermined threshold value is the plus value, above described stepping motor 540 is operated to the direction of clockwise (step 940, step 941, step 942).
And, if above edge data exists within the predetermined threshold value, it is detected that above reference position edge exists with the predetermined threshold value (step 960), and then in case of existence within the threshold value, the process is completed, but in case of non-existence within the threshold value, above described optical system module calibrator 240 is operated (step 970) and above described reference position edge detecting process (step 910) is called and the edge is detected. Also, in case that the edge data is detected on above described reference position edge detecting process (step 631), that is, in case that the result is set to 'TRUE', after the contents of one hologram cell is read (step 634), the read contents of one hologram cell is stored on the buffer of above described data memory 123 (step 635). If the reading of the hologram cell is completed (step 636), to read the contents of next hologram cell, it is verified that the previous reading hologram cell is the last cell (step 637), and then in case of not being last cell, above described optical module calibration process (step 633) is called, and then the contents of next hologram cell is read. Accordingly, if all hologram cell is read on above described step 637, the hologram image data processing process (step 638) is called, which processes the hologram image data stored on above described data memory 123.
Accordingly, above described hologram image data processing process (step 638), referring to Fig. 10, is processed as follows.
To read the data on above described hologram chip 220 of the smart card, the hologram image on above described hologram chip 220 is reflected to above image sensor 260 as driving above optical laser diode driver 250 (step 1010). From now on, the hologram data reflected to above described image sensor 260 is captured by above image sensor driver 270 (step 1020 and step 1030), and then if the capturing is completed, the operation of above described laser diode driver 250 is completed (step 1040). From now on, the hologram image data captured by above described image sensor driver 270 is stored on the buffer of above described data memory 123 (step 1050). The compression of the stored data on the buffer is decompressed (step 1060), the decoding process is processed to restore the data password decompressed (step 1070), and then it is stored on the buffer of above described data memory 123 (step 1080), and then the process is completed.
Accordingly, above described decoding operation uses Read-Solomon decoding algorithm and/or Read-Solomon decoder.
From now on, the hologram data processed by above described hologram image data processing process (step 638) is compared (step 640) to the data processed by above described RF data reading process (step 620), and then the comparison result is transferred to above described host computer 100 by above described USB controller 120 (step 650). If the transferring of the comparison result value is completed (step 652), the smart card is withdrawn by above described roller 560 while the control signal of above described first limit switch 530a becomes active as driving above spindle motor controller 570 (step 660). And, if above described comparison result value is transferred to above described host computer 100, referring to Fig. 11, 'OK' sign (step 1170) or 'BAD' sign (step 1180) is displayed by the compared result value on above described host computer 100.
Accordingly, in above described host computer 100, above described apparatus for the hologram data reading is automatically recognized by Play &
Plug method (from step 1110 to step 1130), and then above described apparatus for the hologram data reading becomes active as same time the booting of above described host computer 100.
In a meantime, Fig. 12 is the block diagram of the structure of coding module according to this invention.
Referring to Fig. 12, above described coding module consists of, a laser 1210 irradiating the light; a light splitter 1220 splitting the light to the object light and the reference light; a light modulator 1230 modulating the light angle; and a spatial light modulator (SLM) 1240 forming the image as inserting above described coded data.
Where, accordingly, above laser 1210 is a He-Ne source. Also, above described light modulator 1230 is modulated as corresponding to one or more random angular value of above described certification server, and may consist the acoustic-optic deflector (AOD), the stepping motor or the moving window.
Also, above described light splitter 1220 may be the beam splitter.
Therefore, the light incident on above described light splitter 1220 is split from the reference light and the object light, and above described object light can modulate the inserted coded data by above described spatial light modulator 1240. Above described reference light and object light occur the interference within the recoding material 1250 storing the hologram data, and then the phase of the light induction may be occurred by the strength of the occurred interference pattern. Through above described processing, above described interference pattern can be stored on above described recording material 1250. At this time, to modulate the recoding position of the coded data stored on above described recording material 1250, above described light modulator 1230 can be modulated according to the predetermined one or more random angular value. And, Fig. 13 is the block diagram of the structure of decoding module according to this invention.
Referring to Fig. 13, above described decoding module consists of, a laser 1310 producing the light; a light modulator 1320 modulating the light angle; a first light splitter 1330 extracting the coded data stored on the smart card; and a second light splitter 1340 decoding the coded data by using the produced one-time password.
And, above described decoding module may additionally consist of a light detector 1350 detecting the decoding data going through above described second light splitter 1340. Accordingly, above described first light splitter 1330 and above described second light splitter 1340 may be the beam splitter.
Also, above described decoding module can decode the one or more coded data by using the one-time password as controlling above described light modulator 1320 according to above described one or more angular value.
Therefore, the light incident on predefined light modulator 1320 corresponding to the predetermined angular value splits into the object light and the reference light. And, above described reference light is incident on above described recording material by above described first light splitter 1330, and then the interference pattern stored the recoding material can be diffracted. Accordingly, above described interference pattern may be the coded data.
Accordingly, above described object light can modulate the inserted one-time password by above described spatial light modulator 1350. Above described object light and the check pattern consisting of the original light- and-darkness decoded by the diffraction is incident on above described second light splitter 1340 can output the decoding data. Accordingly, above described decoding data transfers to above described host computer as inserting to the light detector 1350. Accordingly, above described light detector 1350 may be the charge-coupled device (CCD). Now, the overall operation is detailed represented referring to the drawings.
Fig. 14 is the flow chart of the method for writing the coding data on the smart card according to this invention.
Referring to Fig. 14, the certification server verifies the receiving Or not the coding request from user. Where, above described coding request is produced when the smart card is inserted to the apparatus according to this invention installed the certification server.
Above described user uses the certification server as to record the coded hologram data for preventing from the forgery or the alternation of the smart card. If the user inserts the smart card the apparatus according to this invention installed the certification server, above described certification server can record the coded data on the predefined position of the user smart card by the predefined rule. Accordingly, the surface of the smart card possesses the recording material as to record above described coded data. Accordingly, above described recording material is the photopolymer.
Also, above described predefined rule means that the coded data is recorded to the recoding material of the smart card according to the coding request of the user. And, the overall operation is as follows.
If the coding request is received from the user, above certification server produces the random angular value and the challenge value (step 1410). Accordingly, above described random angular value is the value used when the coded data is repeatedly recorded on the recoding material, and then it is produced one or more value according to the predefined condition. Above random angular value uses the random number generator, and above described challenge value is produced by the definition of Lamport method.
Also, above described certification server stores above described random angular value and challenge value to the user database 1400. The storing of above described random angular value and challenge value is transferred to the host computer subsequently, and then they may be used decoding the coded data.
Also, above described certification server produces the one-time password using IDEA algorithm based on above described challenge value and the user identification (step 1420). Where, above described user identification may be the issue number of the certification issued to certificate the user. As above described, the certification means the document composed to the unique user name, the public key of the user, and so forth information doing not forge as coding by the secrete key. Therefore, above described certification server must store the issue number corresponding to certification to the user database when the certification is issued. Accordingly, above described IDEA algorithm produces the one-time password as converting the challenge value through 8 rounds by using the user identification.
Accordingly, above described certification server codes the raw data by using above described one-time password. Where, above described raw data consists the various information of the user (step 1430). Above described coded data is modulated by the object light incident to the spatial light modulator of above described coding module, and 3-D hologram data is recorded on the designated recording material by the light-and-darkness as interference of the object light and the reference light. From now on, above coded data is repeatedly stored on the difference position of the recording material corresponding to the pre-produced random angular value (step 1440).
Therefore, in the smart card possessed by the user, the coded data is stored on the recording material attached to the surface of the smart card in addition to the raw data stored on IC chip. Therefore, the user can verify the facts of the forgery and the alternation of the user smart card.
Now, referring to Fig. 15, the method for the forgery and the alternation of the method is detailed described as follows.
Fig. 15 is the flow chart of the method for distinguishing the forgery and alternation of the smart card according to this invention.
Referring to Fig. 15, the host computer can receive the request of the forgery or the alternation from user (step 1510). Above described user inserts the smart card of the user to the reader/writer apparatus according to this invention. In case that the user inserts the smart card to the reader/writer apparatus, the request for the forgery and alternation of the smart card is produced, and then above described request is transferred to above described host computer. Where, above described host computer may be computer, notebook, mobile phone, and PDA, and then they are connected with the certification server via the wire/wireless network. If above described host computer receives the request for the forgery and the alternation from the user, it produces the first hash value using the coded data stored on the recording material and the second hash value using the raw data stored on IC chip (step 1520). And, referring to Fig. 16, it is detailed represented as follows. - Fig. 16 is the flow chart of the method for producing the first hash value and the second hash value for distinguishing the forgery and alternation of the smart card according to this invention.
Referring to Fig. 16, above described host computer transfers the request for the forgery and the alternation to above described certification server (step 1610). From now on, the communication of the host computer and the certification server is processed by one of the cable communication and the wireless communication. And then, above described certification server produces the random angular value and the challenge value stored corresponding to the user identification as responding to the request for the forgery and the alternation, and then it is coded to the public key, and it is provided to above described host computer (step 1620).
Above described host computer decodes above described random angular value and challenge value coded using the secrete key by above described public key (step 1630). As above described, because the certification server and the host computer are the structure based on the public key, the certification server, if the request of the host computer is existed, codes the data as such the certification by using the public key, and then it is transferred to the host computer. And then, above described host computer decodes above described data by using the public key known only to the user. Accordingly, above described host computer produces the one-time password by using the user identification based on above described challenge value (step 1640). The production of above described one-time password, as above described, can be used by IDEA algorithm. Where, above described user identification is the issue number of the certification, and whether it is received from IC chip, or it is received from above described certification server, merely above described host computer must be acknowledged.
While, above described host computer produces the decoding data from the coding data stored on the recording material by the decoding module using above described one-time password (step 1650). Above described one- time password may be used as the decoding key decoding the coding data stored on the smart card. At this time, above described coding data has more than one value, and one or more coding data is decoded by using above described random angular value.
Also, above described host computer produces the first hash value from above described decoding data by using the hash algorithm (step 1660). Where, above described hash algorithm is not the block algorithm, but is the exclusive algorithm, and above described exclusive algorithm may be computed by process of the appending, division and repeat operation. Accordingly, above described exclusive algorithm divides message X having any length into the input block (XI, ... , Xt) of t unit as appending to the times of the input units. Accordingly, above described hash code is computed as applying repeatedly the compressed function after the chain value is initialized to the given initial value (IV).
Also, in case that the request for the forgery and the alternation from the user, above described host computer receives the raw data from IC chip of the smart card (step 1655). Where, above described raw data is the various information corresponding to the user.
And then, above described host computer produces the second hash value from above described raw data by using the hash algorithm (step 1670). Referring to Fig. 15, above described host computer comparisons above described first hash value produced by above described step 1660 and above described second hash value produced by above described step 1670 (step 1680).
And, as above described host computer verifies the forgery and the alternation of above described raw data according to the result of the coincidence of the first hash value and the second hash value as the comparison result (step 1690). That is, as the comparison result, if the first hash value is identical to the second hash value, above described host computer verifies that the forgery or the alternation of the smart card is not existed. However, in case that the first hash value is not identical to the second hash value, above described host computer verifies that the forgery or the alternation of the smart card is existed. Such as the verified result is provided from the display device of above certification server or the apparatus according to this invention. And then, above described certification server does not permit the access of the user as rejecting the certification of the user, and the user verifies whether the forgery or the alternation of the smart card or not from above described display device.

Claims

Claims
1. In the protecting system of the forgery and alternation of the smart card using the angular multiplexing hologram comprised to, means producing one random value and one challenge value responding to user request for coding; means producing the one-time password by using the user identification based on the above described challenge value; means producing the coded data as coding the raw data by using above described one-time password, which above described raw data represents the various user information; and means recording above described coded data on the recoding material as above described one or more random angular value; means providing above described one or more random angular value and challenge value to the client according to the request of the forgery and the alternation, for reading the smart card information which is recoded the coded data on the recoding material according to above described the forgery and the alternation system of the smart card, the smart card reader apparatus consists of, a program memory storing the control program; a data memory storing above described hologram data of the smart card; a microprocessor connecting with above described program memory and data memory, processing above described control program, restoring the hologram data of the smart card, and processing the verification operation with above described hologram data and the restored data storing on the RF memory chip of the smart card; a USB controller connecting with above described microprocessor, and transferring the data to/from host computer; an optical module connecting with above described microprocessor, and reading above described hologram data of the smart card; a RF module connecting with above described microprocessor, and reading the raw data stored on the RF memory chip of the smart card; an optical calibrator connecting with above described microprocessor, and calibrating above described optical module for accurately reading above described hologram data of the smart card; a card outlet connecting with above described microprocessor, and controlling and driving in-and-out state of the smart card; a system controller connecting with above described microprocessor, producing the control signal required above described all device, monitoring state of data transferring with host computer, and controlling and monitoring above described all device and any device by the command directed to above described microprocessor; a system power module interfaced with above described USB controller, and producing the required power as incoming the power by USB cable; and a inner system bus connecting with above described all device each other, and transferring the data and the control signal.
2. An apparatus as claimed in claim 1, above described optical module, to verify the hologram image of the smart card, consists of, an optical laser diode driver driving the green optical laser diode or the red optical laser diode of above described optical system module, and then inserting the green light or the red light to the hologram chip of the smart card; an image sensor capturing the hologram image of the smart card by the green light or the red light inserted from above described optical laser diode driver; an image sensor driver converting the hologram image of the smart card captured by above described image sensor to digital data, and then transferring to above described microprocessor; and an optical system module calibrator calibrating above described optical laser diode driver accurately as to insert the green light or the red light to the hologram image of the smart card.
3. An apparatus as claimed in claim 1, above described RF module, to verify the raw data stored on the RF memory chip of the smart card, consists of, a RF transmitter processing the data receiving/ transmitting to/from RF memory chip of the smart card; and a RF driver interfacing with above described system inner bus, controlling the stats of above described RF transmitter, and monitoring the state of the data receiving/transmitting to/from RF memory chip of the smart card.
4. An apparatus as claimed in claim 1, above described optical module calibrator consists of, an optical module calibrator controller, as above described optical system module calibrator is comprised on above optical module, controlling above described optical module calibrator to calibrate above optical module within less than lum; a bearing making above described optical module to move upward and downward as moving freely the upward and downward movement of above described optical module; a stepping motor processing the upward and downward movement of above described optical module as calibrating the upward and downward movement within les than 1mm; and a stepping motor controller controlling the operation of above described stepping motor, and monitoring the state of above described stepping motor.
5. An apparatus as claimed in claim 1, above described card outlet consists of, a first limit switch detecting the insertion of the smart card, and making it insert into the card holder; a roller making the smart card insert into the card holder after detecting the insertion of the smart card by above described first limit switch; a spindle motor controlling the operation and the state of above described roller; a spindle motor controller controlling the operation of above described spindle motor, and monitoring the state of above described spindle motor; and a second limit switch making the stop signal of the operation of above described spindle motor produce at above described spindle motor controller after the finish of the smart card insertion.
6. Reading method of the smart card for reading accurately the raw data of the smart card consists the following step, a step verifying the insertion of the smart card by above described first limit switch, and then inserting the smart card on the card holder as driving above described roller, if the smart card is inserting; a step verifying the completion of the insertion of the smart card by above described second limit switch, and then completing the driving of the roller, and becoming the inactive the state of the first limit switch and the second limit switch; a step reading the data of RF memory chip of the smart card inserted on the card holder; a step detecting the reference position edge defined on the hologram chip of the smart card; a step calibrating the optical module to calibrate accurately the position of above described optical module, if the edge is not detected by above described edge detecting step; a step reading the data of any hologram cell of the hologram chip of the smart card, if the edge is detected by above described edge detecting step; a step processing the image of the hologram data read by above described reading step; a step comparing the reading data on above described RF data reading step and the data processed by above described hologram data image processing step, and then transferring the comparison result into the host computer by above described USB controller; and a step withdrawing the smart card from the card holder after above described all steps are completed.
7. A method as claimed in claim 6, as above described reference position edge detection step consists that after the hologram data of the smart card is read by driving above described optical module, the read (0, 0) column cell data value is verified to exist within the predetermined threshold value, and then if it is existed within the predetermined threshold value, 'TRUE' value is returned, and if it is not existed within the predetermined threshold value, 'FALSE' value is returned.
8. A method as claimed in claim 6, to detect accurately the reference position edge in case that above described reference position edge is not detected, above described optical module calibration step consists of, a step verifying the detection of the reference position edge as calling repeatedly the above described reference position edge detection step by driving above described stepping motor, if above described optical module is not installed into the hologram cell; and a step verifying the detection of the reference position edge as calling repeatedly the above described reference position edge detection step by driving above described optical module calibrator controller, if above described optical module is installed into the hologram cell.
9. A method as claimed in claim 6, above described the image processing step of the hologram data consists of, a step decompressing the state of the compression of the hologram data read by above described data reading step of the hologram cell; a step decoding the secrete of the hologram data read by above described hologram cell data reading step into the raw data.
10. A method as claimed in claim 9, above described hologram data decoding uses Read-Solomon algorithm and/or Read-Solomon decoder.
11. A method for writing the secrete data using the angular multiplexing hologram, in the recording method on the record material of the smart card as coding the raw data - where is, the raw data is the various information for the user - using the angular multiplexing hologram, consists of, a step producing one or more random angular value and the challenge value according to response the coding request of above described user; a step producing the one-time password based on above described challenge value by using the user identification; a step producing the coding data as coding above described raw data by using above described one-time password; and a step recording above described coding data on the recording material corresponding one or more random angular value.
12. A method as claimed in claim 11, consists additionally of the step registering above described one or more random angular value and above described challenge value corresponding to above descrined user identification.
13. A method as claimed in claim 11, above described user identification is the issue number of the certification.
14. A method as claimed in claim 11, above described one-time password is produced by IDEA coding method.
15. A method as claimed in claim 11, the recording of above described coding data is processed by the coding device.
16. A method as claimed in claim 11, above described recording material is the photopolymer.
17. A method for verifying the forgery and the alternation of the smart card, in the host computer connected to the certification server based on public key infrastructure through the cable/wireless network, consists of, a step transferring the received request for the forgery and the alternation from user into above described certification server; a step receiving predetermined one or more random angular value and challenge value corresponding to the request for the forgery and the alternation; a step producing the one-time password based on above described challenge value by using the user identification; a step producing the decoding data as decoding above described coding data using above described one-time password as the decoding key by one or more random angular value; a step producing above described first hash value by the hash algorithm; a step comparing above described first hash value and the second hash value produced from above described raw data; and a step verifying the forgery and the alternation of the smart card as the comparing result.
18. A method as claimed in claim 17, above described second hash value is produced by the hash algorithm based on the raw data received from IC chip of the smart card.
19. A method as claimed in claim 17, above described one or more random angular value and challenge value is coded by the public key on above described certification server, and it is decoded by the secrete key on the host computer.
20. A method as claimed in claim 17, above described one-time password is produced by IDEA coding method.
21. A method as claimed in claim 17, the production of above described decoding data is processed by the decoding device.
22. A method as claimed in claim 17, above described user identification is the issue number of the certification.
23. A method as claimed in claim 17, consists of the step notifying the verifying result to above described certification server or above described user, if the raw data of the smart card is forged or altered.
24. A method as claimed in claim 17, above described host computer possesses one of computer, notebook, mobile phone, and PDA.
25. A system for detecting the forgery and the alternation of the smart card consists of, a memory stored the program; and a processor processing above described program as interfacing with above described memory; and then, above described processor processes as follow steps by above described program, a step producing one or more random angular value and challenge value as responding the coding request of the user; a step producing the one-time password based on above described challenge value using the user identification; a step producing the coding data as coding above described raw data using above described one-time password; a step recoding above described coding data on above described recording material corresponding to above described one or more random angular value and challenge value; and a step providing above described one or more random angular value and challenge value as responding the request for the forgery or the alternation into above described host computer.
26. A recording material, in the recording material that typically implements the program of the commands processed by the digital processing device and is accessed by the digital processing device to process the method for verifying the forgery and the alternation of the smart card, consists of the following steps, a step transferring the received request for the forgery and the alternation from user into above described certification server; a step receiving predetermined one or more random angular value and challenge value corresponding to the request for the forgery and the alternation; a step producing the one-time password based on above described challenge value by using the user identification; a step producing the decoding data as decoding above described coding data using above described one-time password as the decoding key by one or more random angular value; a step producing above described first hash value by the hash algorithm; a step comparing above described first hash value and the second hash value produced from above described raw data; and a step verifying the forgery and the alternation of the smart card as the comparing result.
27. A recording device for coding data using angular multiplexing hologram consists of, means producing one random value and one challenge value responding to user request for coding; means producing the one-time password by using the user identification based on the above described challenge value; means producing the coded data as coding the raw data by using above described one-time password; and means recording above described coded data on the recoding material as above described one or more random angular value.
PCT/KR2003/000239 2002-01-31 2003-02-03 Apparatus for protecting forgery and alteration of smart card using angular multiplexing hologram and method thereof WO2003065305A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
KR10-2002-0005752A KR100463453B1 (en) 2002-01-31 2002-01-31 An Apparatus and A method for Smart Card Reader of the Hologram Data using the Angle Multiplexing Hologram
KR10-2002-0005752 2002-01-31

Publications (1)

Publication Number Publication Date
WO2003065305A1 true WO2003065305A1 (en) 2003-08-07

Family

ID=27656350

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/KR2003/000239 WO2003065305A1 (en) 2002-01-31 2003-02-03 Apparatus for protecting forgery and alteration of smart card using angular multiplexing hologram and method thereof

Country Status (2)

Country Link
KR (1) KR100463453B1 (en)
WO (1) WO2003065305A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112311807A (en) * 2020-11-09 2021-02-02 珠海格力电器股份有限公司 Method, device, equipment and storage medium for preventing smart card from being reused

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH04179592A (en) * 1990-11-14 1992-06-26 Toppan Printing Co Ltd Card with hologram
JPH06160301A (en) * 1992-11-16 1994-06-07 Toppan Printing Co Ltd Apparatus and method for inspecting hologram card
JPH11133232A (en) * 1997-10-27 1999-05-21 Dainippon Printing Co Ltd Composite hologram
JP2000251050A (en) * 1999-03-01 2000-09-14 Ntt Data Corp Ic card, ic card information reader, centralized ic card information managing device, method and system for detecting illegally recorded information on ic card
JP2001195551A (en) * 2000-01-14 2001-07-19 Ntt Data Corp Ic card reader and ic card system
JP2001216495A (en) * 2000-02-04 2001-08-10 Ntt Data Corp Ic card, ic card reader and ic card system

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH08194797A (en) * 1995-01-19 1996-07-30 A M C:Kk Data propriety recognition method, and recording body and recognition device for it
KR100373931B1 (en) * 2000-05-09 2003-02-26 삼성에스디에스 주식회사 Magnetic card who isn't able to reproduce or forge, an apparatus for check the magnetic card and method thereof
KR100406009B1 (en) * 2001-04-24 2003-11-17 장홍종 Method for protecting forgery and alteration of smart card using angular multiplexing hologram and system thereof

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH04179592A (en) * 1990-11-14 1992-06-26 Toppan Printing Co Ltd Card with hologram
JPH06160301A (en) * 1992-11-16 1994-06-07 Toppan Printing Co Ltd Apparatus and method for inspecting hologram card
JPH11133232A (en) * 1997-10-27 1999-05-21 Dainippon Printing Co Ltd Composite hologram
JP2000251050A (en) * 1999-03-01 2000-09-14 Ntt Data Corp Ic card, ic card information reader, centralized ic card information managing device, method and system for detecting illegally recorded information on ic card
JP2001195551A (en) * 2000-01-14 2001-07-19 Ntt Data Corp Ic card reader and ic card system
JP2001216495A (en) * 2000-02-04 2001-08-10 Ntt Data Corp Ic card, ic card reader and ic card system

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112311807A (en) * 2020-11-09 2021-02-02 珠海格力电器股份有限公司 Method, device, equipment and storage medium for preventing smart card from being reused

Also Published As

Publication number Publication date
KR100463453B1 (en) 2004-12-23
KR20030065236A (en) 2003-08-06

Similar Documents

Publication Publication Date Title
US11664996B2 (en) Authentication in ubiquitous environment
US9483629B2 (en) Document authentication based on expected wear
CN106576044B (en) Authentication in ubiquitous environments
CN104281954B (en) Antifake method for products
US8108317B2 (en) System and method for restricting access to a terminal
KR20200005639A (en) Data check
US20150161594A1 (en) Payment unit, system and method
CN104809618A (en) Radio frequency identification tag-based product anti-counterfeiting method
RU2183349C1 (en) Article marking and identification system
US20230169503A1 (en) Systems and methods for near field contactless card communication and cryptographic authentication
CN113821807A (en) Encryption method and device, decryption method and device and security system of RFID asset information
CN113595714A (en) Contactless card with multiple rotating security keys
WO2003065305A1 (en) Apparatus for protecting forgery and alteration of smart card using angular multiplexing hologram and method thereof
WO2005076201A1 (en) Personal authentication method, personal authentication system, and optical information recording medium
US10503957B2 (en) Fingerprint authentication system and method
US11651361B2 (en) Secure authentication based on passport data stored in a contactless card
CN110210871A (en) A kind of false proof device and its method of cash register
TWI734384B (en) Identification operating system and data structure product thereof
CN114862387B (en) Payment method, system and device based on credible bar code
KR20030070580A (en) System for processing transaction of card by certifying electronic signature
KR20010025201A (en) Card reader and method for operating thereof
CN116128508A (en) Transaction certificate generation method and device, processor and electronic equipment
JP2020115386A (en) Authentication in ubiquitous environment
KR20030016522A (en) Id certification system using bar-code and fingerprint recognition, and method using the same
CN113468495A (en) Method for realizing block chain fingerprint identification and authentication of personal assets

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ OM PH PL PT RO RU SC SD SE SG SK SL TJ TM TN TR TT TZ UA UG US UZ VC VN YU ZA ZM ZW

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IT LU MC NL PT SE SI SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
122 Ep: pct application non-entry in european phase
NENP Non-entry into the national phase

Ref country code: JP

WWW Wipo information: withdrawn in national office

Country of ref document: JP