WO2005119588A1 - 2次元コードを備えた偽造防止カード、該偽造防止カードを用いた情報提示照合システム及び情報提示照合方法 - Google Patents
2次元コードを備えた偽造防止カード、該偽造防止カードを用いた情報提示照合システム及び情報提示照合方法 Download PDFInfo
- Publication number
- WO2005119588A1 WO2005119588A1 PCT/JP2005/010537 JP2005010537W WO2005119588A1 WO 2005119588 A1 WO2005119588 A1 WO 2005119588A1 JP 2005010537 W JP2005010537 W JP 2005010537W WO 2005119588 A1 WO2005119588 A1 WO 2005119588A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- data
- card
- dimensional code
- information
- stored
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K19/00—Record carriers for use with machines and with at least a part designed to carry digital markings
- G06K19/06—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
- G06K19/06009—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking
- G06K19/06037—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking multi-dimensional coding
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B42—BOOKBINDING; ALBUMS; FILES; SPECIAL PRINTED MATTER
- B42D—BOOKS; BOOK COVERS; LOOSE LEAVES; PRINTED MATTER CHARACTERISED BY IDENTIFICATION OR SECURITY FEATURES; PRINTED MATTER OF SPECIAL FORMAT OR STYLE NOT OTHERWISE PROVIDED FOR; DEVICES FOR USE THEREWITH AND NOT OTHERWISE PROVIDED FOR; MOVABLE-STRIP WRITING OR READING APPARATUS
- B42D25/00—Information-bearing cards or sheet-like structures characterised by identification or security features; Manufacture thereof
- B42D25/20—Information-bearing cards or sheet-like structures characterised by identification or security features; Manufacture thereof characterised by a particular use or purpose
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B42—BOOKBINDING; ALBUMS; FILES; SPECIAL PRINTED MATTER
- B42D—BOOKS; BOOK COVERS; LOOSE LEAVES; PRINTED MATTER CHARACTERISED BY IDENTIFICATION OR SECURITY FEATURES; PRINTED MATTER OF SPECIAL FORMAT OR STYLE NOT OTHERWISE PROVIDED FOR; DEVICES FOR USE THEREWITH AND NOT OTHERWISE PROVIDED FOR; MOVABLE-STRIP WRITING OR READING APPARATUS
- B42D25/00—Information-bearing cards or sheet-like structures characterised by identification or security features; Manufacture thereof
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K19/00—Record carriers for use with machines and with at least a part designed to carry digital markings
- G06K19/06—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
- G06K19/08—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code using markings of different kinds or more than one marking of the same kind in the same record carrier, e.g. one marking being sensed by optical and the other by magnetic means
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K19/00—Record carriers for use with machines and with at least a part designed to carry digital markings
- G06K19/06—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
- G06K19/08—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code using markings of different kinds or more than one marking of the same kind in the same record carrier, e.g. one marking being sensed by optical and the other by magnetic means
- G06K19/10—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code using markings of different kinds or more than one marking of the same kind in the same record carrier, e.g. one marking being sensed by optical and the other by magnetic means at least one kind of marking being used for authentication, e.g. of credit or identity cards
- G06K19/14—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code using markings of different kinds or more than one marking of the same kind in the same record carrier, e.g. one marking being sensed by optical and the other by magnetic means at least one kind of marking being used for authentication, e.g. of credit or identity cards the marking being sensed by radiation
Definitions
- Forgery prevention card provided with two-dimensional code, information presentation collation system and information presentation collation method using the forgery prevention card
- the present invention relates to a forgery prevention card provided with a two-dimensional code, an IC chip, and an RFID tag, an information presentation matching system and an information presentation matching method using the forgery prevention card, and in particular, relates to a two-dimensional card attached to the forgery prevention card.
- Forgery prevention card, information presentation matching system, and information presentation that can easily recognize that data has been tampered by comparing the information stored in the code with the information stored in the IC chip and RFID tag.
- an IC chip is embedded inside the card with the 2D code marked on the surface, and the ID number unique to the 2D code, the user ID number that the user recites and the IC number recorded on the IC chip
- a system has been proposed which increases the card available amount when the three parties are compared with each other and matches the management data of the host computer (for example, JP-A-2000-222552, columns 2 to 4; FIG. 1).
- An object of the present invention is to store such data, even for data having a relatively large amount of information, such as a face photograph and personal identification information having high individual specificity, and use the data for identification and the like.
- Another object of the present invention is to provide a forgery prevention card having a two-dimensional code, an information presentation collation system and an information presentation collation method using the forgery prevention card, and another object is to collate with data stored in the two-dimensional code.
- Another object of the present invention is to provide an information presentation matching system and an information presentation matching method using the forgery prevention card. Further, another object is to embed an identifier in the form of a digital watermark in a two-dimensional code, thereby preventing a forgery prevention card having a higher resiliency, an information presentation matching system and an information presentation matching method using the forgery prevention card. Is to provide. Disclosure of the invention
- a card provided with a two-dimensional code according to the present invention is a card formed by stacking at least two card materials, and at least one of an IC chip and an RFID tag is provided between the card materials.
- a two-dimensional code that stores image data is formed on at least one of the card materials that are sandwiched, and the data that is stored in the two-dimensional code is compared with the IC chip and the RFID tag. It is characterized by storing collation data for
- the data calculated from the image decoded from the two-dimensional code is compared with the data stored in the IC chip and the RFID tag to determine whether or not the card is forged. You can check.
- the two-dimensional code irradiates the card material with laser light, adjusts a focal position of the laser light to the inside of the card material in a thickness direction, and performs laser marking by changing a material at the focal position. It is preferable that the mark is formed because no marking mark is formed on the surface.
- the two-dimensional code is formed by the so-called inner marking method, it is difficult to forge the card by falsifying the card surface.
- the card is less susceptible to damage or dirt.
- the image data is any one of the card photograph data, iris data, DNA data, vein pattern data, fingerprint data, imprint data, and signature data of at least the black and white image or the color image of the cardholder. If there is, it is possible to perform collation using data having high individual specificity, so that the security of the card is improved, which is preferable.
- each of the two-dimensional codes stores the image data or character data, and at least one two-dimensional code has a code size larger than Omm. If it is formed below Omm, 2. It is difficult to copy the two-dimensional code formed below Omm by digital copy, so card forgery by copying can be prevented, which is preferable.
- an identifier in the form of a digital watermark is embedded in the two-dimensional code.
- the identifier in the digital watermark form is usually embedded invisibly, it is difficult to extract the identifier, and it is difficult to forge the card.
- An information presentation matching system is a card formed by laminating at least two card materials, wherein at least one of an IC chip and an RFID tag is sandwiched between the card materials.
- An information presentation matching system using a card wherein the image data stored in the two-dimensional code and the information stored in the two-dimensional code are compared with the IC chip and the RFID tag.
- the data calculated from the image data decoded from the two-dimensional code can be compared with the data stored in the IC chip and the RFID tag, and whether or not the card has been forged is determined. Can be confirmed.
- the two-dimensional code irradiates the card material with laser light, adjusts the focal position of the laser light to the inside of the card material in the thickness direction, modifies the material at the focal position, and performs laser marking. If the two-dimensional code is formed by applying the method, it is difficult to falsify the two-dimensional code. Also, since no marking mark is formed on the surface, it is less susceptible to external influences such as breakage and dirt.
- an identifier in the form of a digital watermark is embedded in the two-dimensional code
- the collating means includes an extraction means for extracting the identifier from the two-dimensional code, and stores related data corresponding to the identifier. If it is configured to decrypt and collate with the information stored in the two-dimensional code, it is possible to further collate with the identifier in the form of a digital watermark, and higher security can be ensured. It is.
- the information presentation matching system includes personal information sampling means for reading personal information, and the matching means comprises personal information sampling data read by the personal information sampling means, the image data, If the system is configured to match data, the data sampled on the spot can be compared with the information stored on the card, and the person who intends to use the card is the card holder. This is preferable because it is possible to confirm whether or not this is the case.
- the image data includes face photograph data of the card holder, iris data, It is preferable to use any one of DNA data, vein pattern data, fingerprint data, imprint data, and signature data because it is possible to perform matching with highly individual-specific data.
- An information presentation matching method is a card formed by laminating at least two force materials, wherein an IC chip and an RFID tag are provided between the card materials.
- an identifier in the form of a digital watermark is embedded in the two-dimensional code, and the information matching step includes an extraction step of extracting the identifier from the two-dimensional code, and the information matching step corresponds to the identifier. If it is configured to decode the related data obtained and collate it with the information stored in the two-dimensional code, it is possible to perform more sophisticated collation, which is preferable.
- the digital watermark is embedded in a state where it cannot be Therefore, it is possible to perform data security with higher security by collating the image data, the collation data, and the data indicated by the digital watermark form identifier, which are less likely to be forged.
- FIG. 1 is an explanatory diagram showing a configuration of an information presentation system according to an embodiment of the present invention
- FIG. 2 is an explanatory diagram showing an example of a card provided with a two-dimensional code
- FIG. 3 is provided with an IC chip and an RFID tag.
- FIG. 4 is an explanatory diagram showing an example of a card
- FIG. 4 is an explanatory diagram showing vector marking and dot marking
- FIG. 5 is an explanatory diagram showing a two-dimensional code formed by one dot per cell
- FIG. FIG. 7 is an explanatory view showing the state of the inner marking
- FIG. 8 is an explanatory view of the laser marking device
- FIG. 9 is an explanatory view of the laser marker.
- FIG. 1 to 9 are diagrams showing an embodiment of the present invention, and are explanatory diagrams showing the configuration of an information presentation system according to the present embodiment
- FIG. 2 is an explanatory diagram showing an example of a card provided with a two-dimensional code
- Fig. 3 is an explanatory diagram showing an example of a card equipped with an IC chip and an RFID tag
- Fig. 4 is an explanatory diagram showing vector marking and dot marking
- Fig. 5 is a two-dimensional code formed with one cell and one dot.
- FIG. 6 is an explanatory diagram showing a state in which a two-dimensional code is converted into an image
- FIG. 7 is an explanatory diagram showing a state of inner marking
- FIG. 8 is an explanatory diagram of a laser marking device
- FIG. FIG. 4 is an explanatory diagram of a laser marker.
- FIG. 1 is an explanatory diagram showing an information presentation system S according to the present embodiment.
- the information presentation system S is configured to include a two-dimensional code 1, a reading device 10 as reading means of information stored in an IC chip and an RFID tag, and a computer 20 for collating and outputting the read information. ing.
- the reader 10 may be of a stationary type or a handy type, and is a unit in which a two-dimensional code reader, an IC chip, and an RFID tag reader are integrated.
- a two-dimensional code For example, to read a two-dimensional code, light is emitted from the LED for the light source to the two-dimensional code, the irregularly reflected light is imaged on a CCD image sensor, and this image formation pattern is converted into a binary signal.
- the converted binarized signal is decoded in accordance with the code rules, and may be decoded in the computer 20 or in the reading device 10.
- the card 2 has a contact for reading data, and reads data stored in the IC chip via the contact.
- the reader 10 is configured such that the two-dimensional code reader is integrated with the IC chip and the RFID tag reader. However, these may be provided separately. Further, as the reader 10, a CCD camera, an IC chip, and an RFID tag reader mounted on a mobile phone can be used.
- two-dimensional code images captured using a CCD camera mounted on the mobile phone and information read by an IC chip removably mounted on the mobile phone and an RFID tag reading device are used by wireless communication means. And send it to the computer 20. Next, the data is analyzed and collated by the computer 20, and the The analysis and collation results may be transmitted to the mobile phone again using the wireless communication means.
- a combination device 20 such as a computer is used as a matching unit and an output unit.
- the computer 20 includes a display unit 21 including a monitor and a liquid crystal screen, a CPU 31, an operation unit 22 including a keyboard and a mouse, and an audio output unit 23 including a speaker or the like. Have been.
- collating means and the output means are not limited to the computer 20, and if the reading device 10 is provided with an arithmetic unit having a decoding function and a collating function, a display unit, and an audio output unit, these are referred to as collating means and output means. It is good.
- FIG. 2 shows a card 2 as an example of a forgery prevention card used in the information presentation system S according to the present embodiment.
- Card 2 is formed by laminating a transparent, translucent, white resin plate and a resin plate made of colored AS resin, polystyrene, polypropylene, etc. (hereinafter referred to as “resin layer 202J”). .
- polycarbonate layer 201J is used as a transparent, translucent, and white resin plate material.
- Polycarbonate also called polycarbonate, is a linear polymer having a carbonate bond in the main chain.
- Polycarbonate is a material with excellent dimensional stability, transparency and impact resistance, and is a stable material that is also used as engineering plastics.
- polycarbonate is used as a transparent or translucent resin plate material, but this resin plate material is not limited to polycarbonate.
- a transparent, translucent, white translucent substance such as polystyrene, acrylic, polyethylene, or polypropylene may be used.
- a plate material of various colors such as blue, red, and yellow may be used, and the color may be erased by laser marking to make a light and dark pattern appear. Also, forming white characters etc. May be.
- the resin layer 202 a colored resin having a high reflectance is used.
- the resin used for the resin layer 202 is black, which is similar to the color of the marking.
- a resin having a high lightness color such as a primary color or a white color that can be clearly distinguished from the color of the marking is suitably used.
- an IC chip 203 and an RFID tag 204 are sandwiched between the polycarbonate layer 201 and the resin layer 202. Both of them may be pinched, or only one of them may be pinched.
- An IC chip is a semiconductor integrated circuit that can store data that is nearly 100 times that of a magnetic card.
- RFID tags are non-contact devices that use wireless power to guide stored power and communicate stored information.
- access control in buildings, etc. air baggage tracking systems, traffic control systems, car theft It is used in various fields such as prevention systems and collection management in libraries.
- the basic configuration of the RFID tag 204 includes an antenna 205 and an IC chip 206 in which information is stored.
- various information such as a user's face image, user name, employee number, address, company name, and logo mark are marked.
- the type of information to be masked is appropriately selected according to the type of card and the purpose of use.
- the polycarbonate layer 201 has a two-dimensional code 1 composed of dots arranged vertically and horizontally in nxn or mxn (n and m are natural numbers). Is attached.
- the two-dimensional code is a code for displaying data by expressing a light and dark pattern by a combination of white and black cells arranged in a matrix.
- a two-dimensional code 101 can be formed.
- the two-dimensional code 101 is formed in a size that cannot be copied by a digital copier.
- the two-dimensional code 1 is formed with a code size of 10.62 mm and a cell size of 60 im
- the two-dimensional code 101 is formed with a code size of 1.1 mm and a cell size of 30 ⁇ m.
- the two-dimensional code # 01 can store character data and image data.
- the two-dimensional code 101 which has a small code size, is difficult to copy accurately, data or IC chips stored in the two-dimensional code 1 are unlikely to be forged or tampered with a digital copier. It is suitable to store data for collation with data stored in the 203 and the RFID tag 204.
- Information such as a two-dimensional code and a user's face image, user name, employee number, address, company name, and logo mark in the present embodiment is formed by laser marking.
- the laser marking includes a vector marking and a dot marking.
- a two-dimensional code formed by vector marking and dot marking will be described with reference to FIGS.
- the vector marking is created by painting a line from top to bottom as shown in FIG. 4 (a).
- dots arranged vertically and horizontally in nxn or mxn are arranged in a matrix.
- the cells are developed and arranged to form square or rectangular cells.
- dot marking for example, when forming cells of a two-dimensional code, each cell is recognized as one individual and marking is performed by arranging dots in the cell, so that marking may jump out of the cell. There will be no marking errors such as the creation of blank areas.
- the cell size can be increased or decreased by adjusting the number of dots in one cell, the distance between dots, or the dot diameter.
- a face image can be restored by creating a two-dimensional code that encodes an individual's face image and decoding the two-dimensional code.
- the two-dimensional code When a two-dimensional code is created within a range that can be read by a general reading device, the two-dimensional code stores information of about 3,000 bytes. For this reason, if the data to be stored is less than 3,000 bytes, it is possible to store information in one code, but if the data amount is more than that, the data will be stored in multiple 2D code. Is stored separately.
- the dot density can be adjusted by adjusting the dot diameter, it is possible to express images and characters precisely.
- each marking of the present embodiment is performed by an inner marking method.
- the inner marking method is an example of laser marking.
- a marking mark is formed inside the object to be marked by focusing the laser beam to be applied to the inside of the object to be marked, not to the surface of the object to be marked. Therefore, no irregularities due to the marking are formed on the surface of the object to be marked.
- a marking mark can be formed inside the card in the thickness direction.
- FIG. 7 is an explanatory diagram showing a state in which inner masking of the polycarbonate layer 201 is performed.
- the laser beam L is focused inside the polycarbonate layer 201, and a marking mark is formed by altering the polycarbonate material at the focal position.
- the distance in the thickness direction of the polycarbonate layer 201 (hereinafter, referred to as “depth”) can be changed by adjusting the focal position of the laser beam L.
- the focal position it is possible to perform marking at various depths. Also, by changing the depth, it becomes possible to adjust the visible marking density. That is, when the marking marks 207 and the marking marks 208 are compared, the marking marks 208 having a small depth are visually recognized slightly deeper than the marking marks 207 having a large depth.
- vector marking may be performed depending on what is to be marked. For example, it is better to paint the dense parts of the hair and express the ends of the hair with a single stroke. In addition, it is preferable to perform vector marking on portions that can be represented by a vector, such as the outline of the eyes and eyelashes.
- the marking in the present embodiment may be performed only by dot marking, may be performed only by vector marking, or may be performed by combining dot marking and vector marking.
- marking can be performed by laminating the resin layer 202 on the polycarbonate layer 201 and focusing the laser beam on the surface of the polycarbonate layer 201.
- the image G stored in the two-dimensional code 1 is displayed on the display unit 21 of the computer 20.
- the audio output unit 23 may be configured to emit audio.
- the display unit 21 displays the image G stored in the two-dimensional code and the result of collating the data stored in the IC chip and the RFID tag held inside the card.
- the read data is stored in the storage unit of the reading device 10 every time one two-dimensional code is read. After all, after all the two-dimensional codes are read, the image G, sound, and collation result are output based on the read data.
- the image G When the image G is displayed on the display unit 21, the image G can be compared with the person presenting the card 2 to visually check whether the card 2 is used fairly by the person. It is possible.
- an identifier in the form of a digital watermark can be embedded in the two-dimensional code 1, and this digital watermark technology enables more secure collation.
- a digital watermark is another piece of data embedded in data, and is usually embedded in a form that humans cannot recognize.
- the data to be embedded is converted and embedded so as to have a small error with respect to the data to be embedded.
- collation data for collating information stored in the two-dimensional code is embedded as an identifier in a digital watermark form.
- a known method such as an assignment method, a selection method, a configuration method, or the like is used.
- the two-dimensional code codes a face image
- the read two-dimensional code and the digital watermark form identifier are decrypted and collated by a program known in the computer 20.
- collation detection data for detecting collation data may be embedded as an identifier of the digital watermark form.
- personal collation data is stored in the database of the computer 20 in advance, and the personal information corresponding to the database can be searched and extracted using the collation detection data stored in the identifier as a key.
- the extracted personal information is collated with the personal information decoded from the 2D code.
- personal information such as a user name is embedded in the two-dimensional code 1 as an identifier, and when the two-dimensional code 1 is read and decoded by the computer 20, the information of the identifier is decoded into personal information such as a user name using a known program. Then, the personal information on the card 2 read by the CCD camera or the like may be collated with the personal information. Further, the decrypted information may be displayed on the display unit 21 of the computer 20.
- FIG. 8 is an explanatory diagram showing a laser marking device for writing the two-dimensional code 1 on the card 2.
- the laser marking device includes a laser marker 40 and a control device 30 as a control means.
- the laser marker 40 is conventionally known, for example YAG lasers, C0 2 lasers, YV0 4 laser, UV laser, a green laser or the like.
- a configuration is shown in which the control device 30 and the laser marker 40 are installed in a one-to-one correspondence. However, a plurality of laser markers 140 are connected to the control device 30 to perform marking.
- the configuration may be such that the laser marker 40 that emits an appropriate laser beam is selected according to the material.
- FIG. 9 shows a configuration of a YAG laser device as an example of the laser marker 40.
- the laser light emitted from the laser oscillator is changed in optical path by a leveling mirror 56, the beam diameter is reduced by apertures 55 and 58, and then the beam diameter is increased by a Galileo expander 57. Can be expanded.
- the optical path is changed and adjusted by the galvanomirror 47, and the light is condensed by the ⁇ lens 59 and irradiated on the card 2.
- the YAG laser oscillator 50 is provided with an ultrasonic Q switch element 43 for obtaining a pulse laser beam having an extremely high peak output (peak value).
- the laser marker 140 according to the present embodiment is configured such that one dot is marked by a predetermined number of Q switch pulses.
- the laser oscillator 50 further includes a total reflection mirror 51, an internal aperture 52, and a lamp house. 53, an internal shirt 44 and an output mirror 54, and an external shirt 45 is provided on the output side of the YAG laser oscillator 50.
- the ultrasonic Q switch element 43, the inner shirt 44, the outer shirt 45, the attenuator 46, and the galvanomirror 47 are controlled by a controller 41.
- the controller 41 performs the above control based on the information sent from the control device 30.
- the control device 30 generates marking data based on data input via various input means, a communication network, or the like, and operates the laser marker 140 based on the generated marking data.
- the control device 30 includes a CPU 31 for performing various arithmetic processes and controlling the laser marker 40, an operation unit 32 including a keyboard and a mouse, and a display unit 21 including a monitor and a liquid crystal screen.
- An input unit 37 consisting of an interface board for taking in image data, a communication unit 35 consisting of a modem etc. connected to the communication network I, various types of control programs, marking conditions, etc.
- a storage unit 36 for storing data is provided.
- the control program is stored in the ROM 36a of the storage unit 36.
- the marking condition is a condition in which laser marking is performed according to the properties and shape of the work, and is stored in the hard disk 36b of the storage unit 36.
- the marking conditions include the number of times of marking, laser irradiation time per dot, dot density, dot size, laser frequency, laser output, speed, and the like. These conditions are read by the CPU 31 when performing laser marking.
- the image data input means 37 is a means for taking in image data, and is composed of a scanner, a digital camera, a video camera, a vein pattern imaging device, a mobile terminal, a mobile phone, and the like.
- the control device 30 generates a two-dimensional code based on the digital data input via the image data input means 37, operates the laser marker 40, and 2D code 1 marking control. Information such as the user's face image, user name, user number, expiration date, card issuer name, etc. is stored in the image data input means.
- the coordinates are taken in from 37, the plane coordinate position on the card 2 for each dot, the dot depth and the dot diameter, which are the distance in the thickness direction from the card 2 surface, are calculated, and marking control is performed.
- Switching between two-dimensional coding of image data and direct marking of image data is performed by switching the mode of the control device 30.
- FIG. 10 shows an example of a processing flow in the information presentation matching system S of the present embodiment.
- the data stored in the two-dimensional code is the person's face image data.
- the information presentation matching system S is combined with an ATM or the like installed in a bank or the like.
- the information presentation matching system S may be configured integrally with a function such as an ATM.
- the two-dimensional code attached to the card 2 presented by the user and the data stored in the IC chip and the RFID tag are read by the reading device 10 installed in an ATM or the like (step S 1). .
- step S2 the read data is taken into the computer 20 (step S2).
- the data stored in the captured two-dimensional code is decoded, and a face image G is formed (step S3).
- the face image G obtained by decoding the two-dimensional code and the collation data stored in the IC chip and the RFID tag held inside the card 2 are collated by the computer 20 (step S4).
- the face image data stored in the two-dimensional code the face image data stored in the two-dimensional code and the face image data stored in the IC chip 203 and the RFID tag 204 held inside the card 2 are used. Check with the information data. This collation is performed by a known “face authentication system”.
- a face image of a luzer is acquired from an input device such as a camera, a face position is detected from the acquired face image, a face portion is cut out, and a face feature point is extracted.
- a characteristic amount unique to the individual is calculated from the face characteristic point by using a mathematical method, and the characteristic amount is stored in the IC chip 203 and the RFID tag 204.
- the face image data of the user is coded in the two-dimensional code
- the face image data stored in the two-dimensional code is decoded to form the face image G
- the face image G is obtained from the face image G in the same manner as described above. It is possible to calculate an individual characteristic amount. Therefore, matching can be performed by collating the individual-specific feature amounts stored in the IC chip 203 and the RFID tag 204 with the individual-specific feature amounts calculated from the decoded face image G.
- the face image G decoded from the image data of the two-dimensional code and the comparison result are displayed on the display unit 21 (step S5).
- the personal characteristic amount which is the same data as the information stored in the IC chip 203 and the RFID tag 204, is used. It can also be stored in the two-dimensional code 101. In this case, the feature amount calculated from the face image G stored in the two-dimensional code 1, the feature amount stored in the IC chip 203, the RFID tag 204, and the feature amount stored in the two-dimensional code 101 It is possible to collate the three with the feature amount.
- an identifier in the form of a digital watermark can be embedded in the two-dimensional code, and this digital watermarking technology enables more secure collation.
- an individual characteristic amount which is collation data for collating face image data stored in a two-dimensional code, is embedded as a digital watermark form identifier.
- the read two-dimensional code and the identifier in the form of a digital watermark are decrypted by the well-known program in the computer 20 and collated by the well-known face authentication system.
- collation detection data for detecting collation data may be embedded as an identifier of the digital watermark form.
- individual characteristic amounts are stored in advance in the database of the computer 20, and the corresponding individual characteristic amounts can be searched and extracted from the database using the collation detection data stored in the identifier as a key. Is configured.
- the extracted individual-specific features are collated with the individual-specific features calculated from the image G decoded from the two-dimensional code.
- the identifier if the identifier is not detected or cannot be verified, it indicates that the card may have been forged.
- decrypted information may be displayed on the display unit 21 of the computer 20, and the visual confirmation may be performed.
- a face image of the user who actually presented the card 2 was captured by an imaging device such as a CCD camera as personal information sampling means installed in an ATM or the like to obtain personal information sampling data. It is advisable to perform a comparison with the decoded face image G.
- the face image G is compared with the captured image data as the personal information sampling data read from the CCD camera by the above-mentioned “face authentication system”, and the data is input by an ATM or the like. — It is checked whether the user who uses the card 2 and the user stored in the card 2 are the same person, and the result of the comparison is displayed on the display unit 21.
- the card 2 can be prevented from being illegally used.
- collation result when the collation result is “suspected forgery” or “not the person in question”, it may be configured to automatically notify a security guard or the like.
- a bank employee or security guard compares the face image G displayed on the display unit 21 with the person presenting the card 2, and confirms whether the card 2 has been used fairly by the person. Is also good.
- the feature calculated from the face image G stored in the two-dimensional code 1 the feature stored in the IC chip 203, the RFID tag 204, and the feature calculated from the sampled image are used.
- the quantity and the feature quantity stored in the two-dimensional code 101 can be collated.
- character information described on the card 2 can be simultaneously captured.
- the character data to be imaged is stored in the two-dimensional code 101, and the imaged character information is collated with the character information decoded from the two-dimensional code 101.
- the feature amount calculated from the image data stored in the two-dimensional code 1 and the IC chip 203, the RFID tag 204 It is possible to check the presence or absence of card forgery by comparing the feature amount stored in the character data stored in the two-dimensional code 101 with the sampled character data.
- various data other than the face image stored in the two-dimensional code are collated with the data stored in the IC chip and the RFID tag, and the other various data other than the face image stored in the two-dimensional code are compared.
- the data of the person presenting the card 2 at an ATM or the like can be sampled on the spot, and the sampled data can be compared with the data stored in the two-dimensional code, IC chip, and RFID tag.
- the vein pattern data is stored in a two-dimensional code, and the information stored in the two-dimensional code is compared with the vein pattern data stored in the IC chip or the RFID card in the same manner as described above, and the result is obtained. It can be displayed on the display unit 21.
- This collation is performed by a known “vein pattern authentication system”.
- the vein pattern is sampled by irradiating the hand or finger with light in the near infrared region and imaging the vein pattern obtained from the transmitted light. This utilizes the property that light in the near-infrared region has a high transmittance to living tissue except for being absorbed by hemoglobin in blood.
- the vein pattern of the vein pattern sensor is acquired and stored in the IC chip or the RFID tag.
- the card Since the user's vein pattern data is coded in the two-dimensional code, the card is forged by comparing the vein pattern data stored in the two-dimensional code with the data stored in the IC chip or RFID tag. Whether it is possible You can check.
- a vein pattern sensor as a personal information sampling means is installed in an ATM or the like, and the vein pattern data of a user who uses the card 2 in the ATM or the like is sampled from the vein pattern sensor. Verifies the vein pattern data image stored in the chip and RFID tag, and confirms whether the user who uses Card 2 at an ATM or the like and the user stored in Card 2 are the same person. be able to.
- collation result when the collation result is “suspected forgery” or “not the person in question”, it may be configured to automatically notify a security guard or the like.
- a fine two-dimensional code 101 may be formed, and the same collation as in the above “face authentication system” may be performed.
- the vein pattern has a unique vein pattern that differs from individual to individual, similar to a fingerprint, which has a high individuality.
- fingerprint data collected from a finger has a high solid-specific property, but there are many problems, such as difficulty in recognizing when there is a flaw, and difficulty in recognizing a reprinted image with a thin fingerprint as the age increases. According to the vein pattern matching system, it is possible to realize very high identification and matching accuracy.
- iris data, fingerprint data, DNA data, etc. can be stored in a two-dimensional code, IC chip, or RFID tag and used in this system.
- a system with higher security can be realized by storing personal data with high personal specificity in a two-dimensional code and performing collation.
- an identifier in the form of a digital watermark is embedded in the two-dimensional code.
- the present system can be used not only for personal identification at banks and the like described above but also for various stores, classrooms, hospitals, immigration control, and the like.
- a two-dimensional code is formed on the employee card 2 in which an IC chip and an RFID tag are sandwiched, and the information presentation system S of the present embodiment is used in a bank or the like.
- a two-dimensional code is formed on any card such as a membership card, driver's license, credit card, car verification, etc., and IC chips and RFID tags are sandwiched inside the card and used for identity verification and authentication. be able to.
- vein pattern data, iris data, DNA data, original signatures, fingerprints, and voice data written by the identity are used for the identity verification. It may be used as a means.
- passports and driver's licenses have been increasingly forged in recent years. Therefore, if the passport or driver's license body is not marked with a photograph of the face, but instead has a two-dimensional code undermarked and reads the two-dimensional code when verifying the identity, forgery can be prevented. It is possible to prevent and prevent fraudulent acts.
- a two-dimensional code that stores face photo data and a two-dimensional code that stores one of data such as vein pattern data, fingerprint data, iris data, and DNA data It is also possible to form both of them, and to perform identity verification by using both the face and other identification information. For more accurate confirmation, triple and quadruple checks can be performed using imprint data, signature data, voiceprint data, handwriting data, and the like.
- the image data is stored in the two-dimensional code, but character data such as ID password data is stored in the two-dimensional code, and the data is collated with the ID password input by the user. Is also good.
- a separate code may be provided on the IC chip and the RFID tag to activate the two-dimensional code.
- the information presentation system S according to the present embodiment can be used in the following situations.
- the seal imprinted on the bank statement and personal information are coded, and a card with a plurality of two-dimensional codes 1 is created.
- system in the present embodiment can be used in a temporary agency.
- the card 2 has a two-dimensional code 1 that encodes a photograph of the staff's face, and holds an IC chip and an RFID tag that store the staff's face information.
- the staff When the staff is dispatched, they read the 2D code attached to the card at the dispatch destination. Then, the face photograph is displayed on the display means on the spot.
- the dispatched staff can check whether they are the contracted staff, and the information stored in the IC chip sandwiched between the cards 2, the information stored in the RFID tag, and the two-dimensional code is stored. By collating the information, it is possible to confirm the presence or absence of forgery of Ricardo.
- a two-dimensional code consisting of cells formed from dots arranged vertically and horizontally in nxn or mxn is used to convert the user
- the two-dimensional code is attached to the inside of the recard material by laser marking, it is easier to detect illegal acts such as rewriting of information than cards with a two-dimensional code attached by printing or sticking It is possible.
- the present invention since laser marking is performed by the inner marking method, it is difficult to forge the card surface without irregularities or the like. Further, according to the present invention, since the card is formed by laminating a plurality of card materials, the IC chip and the RFID tag can be sandwiched between the plurality of card materials.
- the IC chip is a data carrier using digital signals, and the RFID reads and writes data by wireless reflection, so if it is used alone, it is easy to falsify and steal data. Therefore, by comparing the information of the two-dimensional code with the information stored in the IC chip or RFID tag, double or triple matching can be performed, and the safety is improved.
- the card is formed by laminating a plurality of card materials, even if the card material to which the two-dimensional code is attached is a transparent or translucent material, a colored material is used as the layered card material. By using it, the visibility of the attached information such as the two-dimensional code can be enhanced.
Abstract
Description
Claims
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP2004-165865 | 2004-06-03 | ||
JP2004165865A JP2005346447A (ja) | 2004-06-03 | 2004-06-03 | 2次元コードを備えた偽造防止カード、該偽造防止カードを用いた情報提示照合システム及び情報提示照合方法。 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2005119588A1 true WO2005119588A1 (ja) | 2005-12-15 |
Family
ID=35463084
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/JP2005/010537 WO2005119588A1 (ja) | 2004-06-03 | 2005-06-02 | 2次元コードを備えた偽造防止カード、該偽造防止カードを用いた情報提示照合システム及び情報提示照合方法 |
Country Status (2)
Country | Link |
---|---|
JP (1) | JP2005346447A (ja) |
WO (1) | WO2005119588A1 (ja) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113062371A (zh) * | 2021-03-23 | 2021-07-02 | 湖南建研信息技术股份有限公司 | 防止桩基静载检测造假的标签、装置及方法 |
US20220224504A1 (en) * | 2020-02-14 | 2022-07-14 | P-Chip Ip Holdings Inc. | Light-triggered transponder |
Families Citing this family (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2010128913A (ja) * | 2008-11-28 | 2010-06-10 | Noa:Kk | 年齢の識別認識システム |
JP6321584B2 (ja) * | 2015-06-30 | 2018-05-09 | 東芝テック株式会社 | 情報処理装置、販売データ処理装置および情報処理システム |
CN106897759A (zh) * | 2017-01-06 | 2017-06-27 | 贵州恒昊软件科技有限公司 | 电子封条、客户端、数据处理方法和系统 |
JP6513866B1 (ja) * | 2018-08-10 | 2019-05-15 | 株式会社セブン銀行 | 本人認証装置およびプログラム |
JP7263610B1 (ja) | 2022-03-25 | 2023-04-24 | マクセル株式会社 | 書類用スタンド |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPH0736383A (ja) * | 1992-11-20 | 1995-02-07 | Pitney Bowes Inc | 物その他の実体を識別する方法および識別カードを製造する装置 |
JPH11339049A (ja) * | 1998-05-27 | 1999-12-10 | Hitachi Maxell Ltd | カード認証システム |
JP2000076411A (ja) * | 1998-09-01 | 2000-03-14 | Toppan Printing Co Ltd | Idカード及びidカード発行装置並びにidカード読取装置 |
JP2001175838A (ja) * | 1999-12-20 | 2001-06-29 | Dainippon Printing Co Ltd | 情報書込可能媒体とその書込方法 |
JP2002108823A (ja) * | 2000-09-26 | 2002-04-12 | Hitachi Ltd | 本人認証方法、ワンストップサービス方法及び関連するシステム |
JP2003516572A (ja) * | 1999-12-07 | 2003-05-13 | サン マイクロシステムズ インコーポレイテッド | 安全な写真担持用識別装置及びこのような識別装置を認証する手段及び方法 |
JP2003339049A (ja) * | 2002-05-21 | 2003-11-28 | Canon Inc | 画像復号装置及び画像復号方法 |
JP2003346098A (ja) * | 2002-05-24 | 2003-12-05 | Fuji Xerox Co Ltd | 個人認証システム、個人認証方法及び個人認証用端末装置 |
Family Cites Families (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPH0944591A (ja) * | 1995-08-03 | 1997-02-14 | Olympus Optical Co Ltd | コードシート及び情報再生装置 |
JP2000062360A (ja) * | 1998-08-25 | 2000-02-29 | Toppan Printing Co Ltd | カード |
JP2001283167A (ja) * | 2000-04-03 | 2001-10-12 | Asahi Business Assist:Kk | 二次元コードによる個別識別方法、ハイブリット型個人認証システムおよびオフライン本人確認システム |
JP2002288605A (ja) * | 2001-03-22 | 2002-10-04 | Ntt Data Technology Corp | Dna利用型記録媒体及びそのdna利用型記録媒体を利用した本人認証システムと電子署名システム |
JP2003248802A (ja) * | 2002-02-22 | 2003-09-05 | Hitachi Electronics Service Co Ltd | パスポート偽造自動検出装置及びパスポート偽造自動検出システム |
JP2004110670A (ja) * | 2002-09-20 | 2004-04-08 | Denso Wave Inc | 情報コード読取装置 |
-
2004
- 2004-06-03 JP JP2004165865A patent/JP2005346447A/ja active Pending
-
2005
- 2005-06-02 WO PCT/JP2005/010537 patent/WO2005119588A1/ja active Application Filing
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPH0736383A (ja) * | 1992-11-20 | 1995-02-07 | Pitney Bowes Inc | 物その他の実体を識別する方法および識別カードを製造する装置 |
JPH11339049A (ja) * | 1998-05-27 | 1999-12-10 | Hitachi Maxell Ltd | カード認証システム |
JP2000076411A (ja) * | 1998-09-01 | 2000-03-14 | Toppan Printing Co Ltd | Idカード及びidカード発行装置並びにidカード読取装置 |
JP2003516572A (ja) * | 1999-12-07 | 2003-05-13 | サン マイクロシステムズ インコーポレイテッド | 安全な写真担持用識別装置及びこのような識別装置を認証する手段及び方法 |
JP2001175838A (ja) * | 1999-12-20 | 2001-06-29 | Dainippon Printing Co Ltd | 情報書込可能媒体とその書込方法 |
JP2002108823A (ja) * | 2000-09-26 | 2002-04-12 | Hitachi Ltd | 本人認証方法、ワンストップサービス方法及び関連するシステム |
JP2003339049A (ja) * | 2002-05-21 | 2003-11-28 | Canon Inc | 画像復号装置及び画像復号方法 |
JP2003346098A (ja) * | 2002-05-24 | 2003-12-05 | Fuji Xerox Co Ltd | 個人認証システム、個人認証方法及び個人認証用端末装置 |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20220224504A1 (en) * | 2020-02-14 | 2022-07-14 | P-Chip Ip Holdings Inc. | Light-triggered transponder |
US11943330B2 (en) * | 2020-02-14 | 2024-03-26 | P-Chip Ip Holdings Inc. | Light-triggered transponder |
US11949768B2 (en) | 2020-02-14 | 2024-04-02 | P-Chip Ip Holdings Inc. | Light-triggered transponder |
CN113062371A (zh) * | 2021-03-23 | 2021-07-02 | 湖南建研信息技术股份有限公司 | 防止桩基静载检测造假的标签、装置及方法 |
Also Published As
Publication number | Publication date |
---|---|
JP2005346447A (ja) | 2005-12-15 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
AU2016100419A4 (en) | Instrument and document authentication system | |
US7039223B2 (en) | Authentication method utilizing a sequence of linear partial fingerprint signatures selected by a personal code | |
CA2467861C (en) | Validation and verification apparatus and method | |
JP5612332B2 (ja) | 生体情報を保存した不正防止セキュリティカード及びその使用方法 | |
AU603801B2 (en) | Method and apparatus for verifying identity | |
US8646686B2 (en) | Secure system for creating and validating personal identification cards with operator discretion | |
US10438106B2 (en) | Smartcard | |
CA2337951C (en) | Secure document reader and method therefor | |
RU2335015C2 (ru) | Способ идентификации и аутентификации идентификатора, связанного с объектом или живым существом, без специального аппарата считывания | |
US20020021001A1 (en) | Biometric authentication card, system and method | |
WO2005119588A1 (ja) | 2次元コードを備えた偽造防止カード、該偽造防止カードを用いた情報提示照合システム及び情報提示照合方法 | |
JP2010518474A (ja) | セキュリティ保護バーコード | |
WO2007072793A1 (ja) | 真贋判別可能なカード | |
JP2010518473A (ja) | 仮想コード窓 | |
US11648792B2 (en) | Embedded variable curved spiral patterns | |
EP1251448B1 (en) | Method, device and system for biometric identification | |
KR101438443B1 (ko) | 위조 신분증 감식시스템 및 이를 이용한 감식방법 | |
Malčík et al. | Anatomy of biometric passports | |
KR101485798B1 (ko) | 개인 식별 카드, 개인 식별 카드의 발급 방법 및 시스템, 개인 식별 카드의 인증 방법 및 시스템 | |
US20040258280A1 (en) | Optical document authentication system | |
JP4491285B2 (ja) | 2次元コードによる情報検証システム及び情報検証方法 | |
IL285790B1 (en) | Verifiable access certificate | |
US10192084B1 (en) | System and method for authenticating objects with authorized access controls | |
KR101095000B1 (ko) | 닥줄기를 이용한 보안 카드 시스템 | |
KR20180017655A (ko) | Oid 코드를 이용한 신분증 및 이의 위변조 방지 시스템 및 방법 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AK | Designated states |
Kind code of ref document: A1 Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BW BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE EG ES FI GB GD GE GH GM HR HU ID IL IN IS KE KG KM KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NA NG NI NO NZ OM PG PH PL PT RO RU SC SD SE SG SK SL SM SY TJ TM TN TR TT TZ UA UG US UZ VC VN YU ZA ZM ZW |
|
AL | Designated countries for regional patents |
Kind code of ref document: A1 Designated state(s): BW GH GM KE LS MW MZ NA SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IS IT LT LU MC NL PL PT RO SE SI SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
NENP | Non-entry into the national phase |
Ref country code: DE |
|
WWW | Wipo information: withdrawn in national office |
Country of ref document: DE |
|
122 | Ep: pct application non-entry in european phase |