WO2007072794A1 - ホログラムチップにより真贋判別可能なカード - Google Patents
ホログラムチップにより真贋判別可能なカード Download PDFInfo
- Publication number
- WO2007072794A1 WO2007072794A1 PCT/JP2006/325225 JP2006325225W WO2007072794A1 WO 2007072794 A1 WO2007072794 A1 WO 2007072794A1 JP 2006325225 W JP2006325225 W JP 2006325225W WO 2007072794 A1 WO2007072794 A1 WO 2007072794A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- card
- chip
- hologram
- authentication
- reading
- Prior art date
Links
- 239000011159 matrix material Substances 0.000 claims description 23
- 239000000758 substrate Substances 0.000 claims description 10
- 229920003002 synthetic resin Polymers 0.000 claims 1
- 239000000057 synthetic resin Substances 0.000 claims 1
- 238000012545 processing Methods 0.000 abstract description 40
- 238000000034 method Methods 0.000 description 34
- 238000001514 detection method Methods 0.000 description 25
- 238000005516 engineering process Methods 0.000 description 15
- 230000003287 optical effect Effects 0.000 description 10
- 230000006378 damage Effects 0.000 description 8
- 239000000976 ink Substances 0.000 description 8
- 239000000835 fiber Substances 0.000 description 7
- 238000003384 imaging method Methods 0.000 description 7
- 238000003780 insertion Methods 0.000 description 7
- 230000037431 insertion Effects 0.000 description 7
- 239000002923 metal particle Substances 0.000 description 7
- 238000007639 printing Methods 0.000 description 7
- 239000000463 material Substances 0.000 description 5
- 238000004049 embossing Methods 0.000 description 4
- 239000002279 physical standard Substances 0.000 description 4
- 230000008569 process Effects 0.000 description 4
- 241000282414 Homo sapiens Species 0.000 description 3
- 238000003491 array Methods 0.000 description 3
- 238000000605 extraction Methods 0.000 description 3
- 230000001788 irregular Effects 0.000 description 3
- 239000005001 laminate film Substances 0.000 description 3
- 239000013307 optical fiber Substances 0.000 description 3
- 238000003909 pattern recognition Methods 0.000 description 3
- 239000011241 protective layer Substances 0.000 description 3
- 239000011347 resin Substances 0.000 description 3
- 229920005989 resin Polymers 0.000 description 3
- 238000010186 staining Methods 0.000 description 3
- 210000003462 vein Anatomy 0.000 description 3
- 239000012237 artificial material Substances 0.000 description 2
- JCYWCSGERIELPG-UHFFFAOYSA-N imes Chemical class CC1=CC(C)=CC(C)=C1N1C=CN(C=2C(=CC(C)=CC=2C)C)[C]1 JCYWCSGERIELPG-UHFFFAOYSA-N 0.000 description 2
- 239000010410 layer Substances 0.000 description 2
- 239000002245 particle Substances 0.000 description 2
- 230000002265 prevention Effects 0.000 description 2
- 238000011160 research Methods 0.000 description 2
- 230000004044 response Effects 0.000 description 2
- 238000012216 screening Methods 0.000 description 2
- 239000004065 semiconductor Substances 0.000 description 2
- 230000001953 sensory effect Effects 0.000 description 2
- 206010063659 Aversion Diseases 0.000 description 1
- 241000282461 Canis lupus Species 0.000 description 1
- OAICVXFJPJFONN-UHFFFAOYSA-N Phosphorus Chemical compound [P] OAICVXFJPJFONN-UHFFFAOYSA-N 0.000 description 1
- 235000005811 Viola adunca Nutrition 0.000 description 1
- 240000009038 Viola odorata Species 0.000 description 1
- 235000013487 Viola odorata Nutrition 0.000 description 1
- 235000002254 Viola papilionacea Nutrition 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 238000006243 chemical reaction Methods 0.000 description 1
- 239000003795 chemical substances by application Substances 0.000 description 1
- 239000003086 colorant Substances 0.000 description 1
- 238000004891 communication Methods 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 230000005611 electricity Effects 0.000 description 1
- 230000002708 enhancing effect Effects 0.000 description 1
- 230000001747 exhibiting effect Effects 0.000 description 1
- 230000006870 function Effects 0.000 description 1
- 239000011521 glass Substances 0.000 description 1
- 230000036541 health Effects 0.000 description 1
- 239000000696 magnetic material Substances 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 230000003340 mental effect Effects 0.000 description 1
- 238000002156 mixing Methods 0.000 description 1
- 239000005445 natural material Substances 0.000 description 1
- 238000002360 preparation method Methods 0.000 description 1
- 238000003672 processing method Methods 0.000 description 1
- 230000001681 protective effect Effects 0.000 description 1
- 230000005855 radiation Effects 0.000 description 1
- 239000012857 radioactive material Substances 0.000 description 1
- 230000037152 sensory function Effects 0.000 description 1
- 239000000126 substance Substances 0.000 description 1
- 230000009466 transformation Effects 0.000 description 1
- 230000000007 visual effect Effects 0.000 description 1
- 238000011179 visual inspection Methods 0.000 description 1
- 208000008918 voyeurism Diseases 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K19/00—Record carriers for use with machines and with at least a part designed to carry digital markings
- G06K19/06—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
- G06K19/06009—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking
- G06K19/06037—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking multi-dimensional coding
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K19/00—Record carriers for use with machines and with at least a part designed to carry digital markings
- G06K19/06—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
- G06K19/06009—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking
- G06K19/06046—Constructional details
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07D—HANDLING OF COINS OR VALUABLE PAPERS, e.g. TESTING, SORTING BY DENOMINATIONS, COUNTING, DISPENSING, CHANGING OR DEPOSITING
- G07D7/00—Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency
- G07D7/06—Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency using wave or particle radiation
- G07D7/12—Visible light, infrared or ultraviolet radiation
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07D—HANDLING OF COINS OR VALUABLE PAPERS, e.g. TESTING, SORTING BY DENOMINATIONS, COUNTING, DISPENSING, CHANGING OR DEPOSITING
- G07D7/00—Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency
- G07D7/06—Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency using wave or particle radiation
- G07D7/12—Visible light, infrared or ultraviolet radiation
- G07D7/121—Apparatus characterised by sensor details
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07D—HANDLING OF COINS OR VALUABLE PAPERS, e.g. TESTING, SORTING BY DENOMINATIONS, COUNTING, DISPENSING, CHANGING OR DEPOSITING
- G07D7/00—Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency
- G07D7/06—Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency using wave or particle radiation
- G07D7/12—Visible light, infrared or ultraviolet radiation
- G07D7/128—Viewing devices
Definitions
- the invention according to this application relates to a structure of an object that requires forgery and authentication immediately, such as a card, a bill, and a securities, and a method for authenticating the authenticity of the object.
- FIG. 1 shows an example of the current cash card processing flow.
- a sensor at the card entrance detects that and takes the card into the apparatus.
- the terminal When the card is taken in, the terminal reads the magnetic recording unit power card information of the card.
- card information such as bank code, branch code, account type and account number.
- card identification number, an expiration date, an account type, and an account number are recorded as card information in the magnetic recording unit.
- personal identification numbers may be recorded on cash cards or credit cards. In such cases, personal identification numbers are also read.
- the terminal device determines whether the inserted card is a card that can be handled by the terminal device.
- the terminal device ejects the card as an incorrect card that can not be handled.
- the card user In response to a request from the host computer, the card user enters a personal identification number
- the host computer When the card user inputs a PIN in response to a request from the host computer, the host computer reads the input PIN stored in the host computer. Compare with the corresponding PIN.
- the host computer determines that the card user is the correct card holder, and requests input of the withdrawal amount.
- the withdrawal request amount is appropriate, the amount is withdrawn, the cash card is discharged from the terminal device, the entry into the passbook or the issuance of the statement of account is performed, and the transaction is terminated. . If the security code is recorded on the cash card, the transaction is performed with the security code being correct, and then the magnetic recording unit power is erased.
- FIG. 2 (a) shows an example of a cash card used in the current cash card processing flow shown in FIG.
- reference numeral 1 denotes a cash card body which is also plastic, and on the front side thereof, a magnetic stripe 2 in which information is recorded and an arrow 3 indicating the insertion direction of the cache card are formed. Although illustration is omitted, the required items are posted as embossed letters.
- the information written on the magnetic stripe can be easily read using a device called a skimmer, so counterfeit cards are created, which often results in the use of counterfeit cards.
- the cash card and the credit card are provided with information such as the name of the holder by embossing, and such information is also used for the magnetic information, the embossed information is forged. It has become a key to card creation.
- a security code consisting of four digits has been used as a means for determining the propriety of a card user, which is not a means of preventing unauthorized use by preventing card forgery.
- This secret code is often based on analogical numbers and has caused a lot of damage so far.
- Recently, not only analogical reasoning but also stealing of PINs by means such as voyeurism has been carried out, and unauthorized use prevention by PINs has become extremely difficult.
- biometrics biometrics
- pattern recognition technology is adopted in part.
- biometrics include iris authentication, fingerprint authentication, palm print authentication, finger vein authentication, palm vein authentication, hand-back vein authentication, and there are contact and non-contact types of authentication other than the inside iris authentication. But all patterns in advance Since it takes time and effort to register patterns, and time is also required for authentication, the operation cost increases.
- biometric authentication systems that can not use cardholders themselves can not be used even if they try to request an agent to handle the card because the time for using the card or the card processing device is not familiar. This point is also inconvenient for the user.
- an embossed hologram in which irregularities are formed on plastic is attached to a credit card, a prepaid card, a bill, securities, and the like. Since this emboss hologram is so difficult to duplicate, it is virtually impossible to forge cards with embossed holograms, but in the present usage form it is possible to have a single glance at human beings. As it is read, it is possible to forge a card etc. using similar embossed holograms.
- Fig. 2 (b) shows an example of a credit card with a hologram on which card authentication of authenticity is performed by a sensory function.
- reference numeral 1 denotes a credit card main body made of plastic or the like, on the front side of which a magnetic stripe 2 in which information is recorded and an arrow 3 indicating the insertion direction of a cash card are formed.
- illustration is omitted, the required items are described as embossed letters.
- the cash card 1 is inserted into the terminal device with the portion marked with the arrow 3 first, but an authentication verifying chip 4 made of, for example, an embossed hologram is attached near its tip.
- the magnetic stripe has the same insertion direction to the terminal device of the power card provided on the back of the card, and as a result, the magnetic information of the credit card is read.
- the direction is opposite to that of a cash card.
- the authentication verifying chip 4 has a pattern “A” exemplified by the operator who inserts the card into the terminal device, which is visually or sensibly confirmed by the function and read by the card terminal device. There is nothing to do.
- Sensory authentication is a major screening factor for primary screening due to variations in the ability of the individual performing the authentication, and variations due to the authentication environment, mental condition, physical condition, etc., even for the same individual. Effective but less reliable.
- the method of mechanically reading the embossed hologram pattern is roughly classified into a method of reading an image in a plane by a camera or the like and a method of reading data in a line by a combination of light emitting and receiving elements.
- the method of reading a planar image is effective for the judgment of authenticity, but the device for which the amount of information to be processed is large is also complicated.
- JP-A-6-124866, JP-A-6-318282, JP-A-7-220077, JP-A-9-319849, JP-A-11-180079, JP-A-10-143 621 JP-A-2000-47557, JP-A-2000-48146, and JP-A-2002-74283 show structures for linearly reading data.
- JP-A-11-272836 a discrimination technique using a diffraction grating is disclosed in JP-A-11-272836, and a discrimination technique using an interference phenomenon of an embossed hologram and a pattern is disclosed in JP-A-2002-279480.
- Japanese Patent Application Laid-Open No. 2002-341733 discloses an identification technique using the symbol.
- JP-A-6-124866, JP-A-6-318282, JP-A-7-220077, JP-A-9-319849, JP-A-11-180079, JP-A-10-143 621 JP-A-2000-47557, JP-A-2000-48146, and JP-A-2002-74283 show structures for linearly reading data.
- the authentication of authentication by auxiliary equipment may be performed by using a magnifying tool such as a fine line, a special drawing, a micro character, a special shape screen, a magnifying glass or the like, or using a special filter that generates optical interference. To authenticate the authenticity.
- a magnifying tool such as a fine line, a special drawing, a micro character, a special shape screen, a magnifying glass or the like, or using a special filter that generates optical interference.
- a material exhibiting special optical properties such as a light emitting substrate, a light emitting laminate film, a light emitting ink, a thermal ink, a photochromic ink, etc. is mixed in a substrate 'laminate film' ink, etc.
- auxiliary equipment such as UV lamps, but these are also unreliable because the final certification relies on human sensuality.
- the authentication by mechanical processing is performed by mechanically detecting the characteristics of the material to perform authentication, and detection targets include detection of magnetic and optical characteristics.
- a light emitting material, a magnetic material, and the like are mixed in a base material 'laminate film' ink, etc., and a detection device is used.
- Coded specific information is magnetically indicated by an OCR character or a magnetic barcode.
- Cards subject to unauthorized use or forgery of a card include “card description information” given when the card is issued to the user, and “card body information given in the card manufacturing process. There is “. (Refer to "Linkage IC card ticket side forgery prevention technology note book” Ministry of Finance Printing Bureau (http: ⁇ w ww. Npo. Go. Jp / en / info / lcnb. Pdl))
- the card entry information is information that is given a print request when the card is issued to the card body, and corresponds to information on issue such as holder information and expiration date.
- the falsification which is a typical form of unauthorized use, is an act of rewriting all or part of the card description information, and is performed by deleting the legitimate information and adding the illegal information.
- the card body information is information which the card itself has by removing the card description information from the issued card, and the physical shape of the card, mainly the background pattern given in the pre-printing step, the printing of the background Information associated with the card substrate, such as layers and protective laminate layers.
- Forgery is an illicit act performed on the card body, and is made by copying or imitating a design, a pattern, etc., which is information attached to the card body, to produce a card that is similar in appearance.
- the pattern, pattern, etc. given to the genuine card note is read by a scanner, etc., processed, corrected, etc., and carried out using a printer, etc.
- the authentication method for authenticating a forgery is roughly divided into a sensory method, an assistive device, and a mechanical treatment.
- Authentic authentication by sensuality is to authenticate authenticity with human's sense of vision, touch, etc.
- the color, the watermark of the main body, the pattern or the color given by changing the viewing angle There are holograms etc. that change etc., and the ones by touch include detection of given concave / convex shape, detection of texture of card body etc.
- products that perform authentication authentication such as finger touching and visual inspection such as embossing, embossing, and perforation.
- FIG. 3 shows a conventional example of a card having an artificial material metric chip with metal particles disclosed in Japanese Patent Laid-Open No. 10-44650.
- This card 1 is a thin plate-like artificial product which is a light transmitting resin in which metal particles 5 are mixed on a card base 7 which is light impermeable, in which an opening 8 for an authentication verifying chip is formed.
- An metric card 4 is laminated, and an opening is formed at the same position as the opening formed in the card base 7, and an opaque card surface plate 6 in which a magnetic stripe 2 and an arrow 3 are formed is laminated. .
- the arrangement pattern of the metal particles 5 observed via the opening is artifact metrics Chip 4 Unique to each. Using this, the arrangement pattern of the metal particles 5 is observed by photographing the light passing through the artifact metric chip 4 through the opening, and the individual artifact metric chip 4, that is, the card, is observed. Certify.
- FIG. 4 shows another conventional example of a card having a fiber-based artifact metric tip disclosed in Japanese Patent Application Laid-Open No. 2003-29636.
- (a) is a general view
- (b) is a cross-sectional view
- (c) is an enlarged view of an artifact metric tip.
- an artificial substance metric chip 8 constructed by three-dimensionally mixing a mesh member 9 and short fibers 10 in a transparent resin in the opening of the card base 1 which is light impermeable.
- the magnetic stripe 2 and the arrow 3 are formed on the surface of the card base 1 by being inserted.
- an interference pattern is generated by the pattern of the mesh member 9 and the short fibers 10.
- This interference pattern is unique to each artifact metric chip 8, that is, to each card, and this is used to transmit the identification pattern of artifact metric chip 8 of the card authentication verifying chip. Alternatively, shoot with reflected light and authenticate the card.
- Machine reading of patterns such as psychometrics or artifact metrics is generally read by an imaging device and authenticated by pattern recognition technology. Therefore, there is a possibility of forgery by copying technology.
- JP-A-6-124866, JP-A-6-318282, JP-A-7-220077, JP-A-9-319849, JP-A-11-180079, JP-A-10-143 621 JP-A-2000-47557, JP-A-2000-48146, and JP-A-2002-74283 show structures for linearly reading data.
- the methods described in these known documents all read the embossed hologram with a straight line along the longitudinal direction of the rectangular card on which the embossed hologram or diffraction grating (grating) is formed. Therefore, the equipment is relatively simple, and the processing is simple, and the strength is its strength. The resistance to forgery is low.
- identification technology using a diffraction grating is disclosed in JP-A-11-272836
- identification technology using an emboss hologram and moire is disclosed in JP-A-2002-279480, and an embossing hologram and a latent image are used.
- Japanese Patent Application Laid-Open No. 2002-341733 discloses an identification technique.
- the technology to determine the authenticity of the card itself has not been established, and it can not be forged! The / ⁇ card is realized! An ugly wolf.
- Patent Document 1 Japanese Patent Application Laid-Open No. 10-44650
- Patent Document 2 Japanese Patent Application Laid-Open No. 2003-29636
- Patent Document 3 Japanese Patent Application Laid-Open No. 6-124866
- Patent Document 4 Japanese Patent Application Laid-Open No. 6-318282
- Patent Document 5 Japanese Patent Application Laid-Open No. 7-220077
- Patent Document 6 Japanese Patent Application Laid-Open No. 9-319849
- Patent Document 7 Japanese Patent Application Laid-Open No. 11-180079
- Patent Document 8 Japanese Patent Application Laid-Open No. 11-272836
- Patent document 9 Unexamined-Japanese-Patent No. 10-143621
- Patent Document 10 Japanese Patent Application Laid-Open No. 2000-47557
- Patent Document 11 JP-A 2000-48146
- Patent Document 12 Japanese Patent Laid-Open No. 2000-66567
- Patent Document 13 Japanese Patent Application Laid-Open No. 2000-298880
- Patent Document 14 Japanese Patent Application Laid-Open No. 2002-74283
- Patent Document 15 Japanese Patent Application Laid-Open No. 2002-279480
- Patent Document 16 Japanese Patent Application Laid-Open No. 2002-341733
- Patent document 17 Unexamined-Japanese-Patent No. 2005-205897 gazette
- Non-Patent Document 1 "Financial Services and Artifacts Metrics", Institute of Finance Research, Bank of Japan (http: www.imes. boj.or.jp/japanese/jdps/2004/04-J-12.pdl)
- Non-Patent Document 2 "The Sixth Information Security 'Symposium: Patterns of Artifacts in the Financial Field” (http: //www•imes.boi.or.jp/japanese/kinyu/2004/kk23- 2 — 6. pdf)
- Non-Patent Document 3 “Anti-counterfeiting technology note book for linked IC card ticket side” Ministry of Finance Printing Bureau (http:
- Non-Patent Document 4 Nikkei Electronics, 883
- the invention of a card structure, a card processing method, and a card processing device capable of enhancing security without making fundamental changes to a cash card or credit card conventionally used widely is provided. Do.
- an authentication verifying chip formed of an embossed hologram or a diffraction grating is fixed inseparably to a card.
- a card authentication device is added to a device for processing cards, and detection of information on the authentication chip is performed by fixing the card and using movement of the authentication chip by card loading operation. Do a scan.
- FIG. 1 Flow chart of conventional cash card processing.
- FIG. 2 An explanatory view of a conventional cash card and a credit card.
- FIG. 3 An example of a conventional card using an artifact metric by metal particles.
- FIG. 4 An example of a conventional card using an artifact metric by fiber pieces.
- FIG. 5 Description of the card of the present invention using an embossed hologram.
- FIG. 6 An example of writing authentication information using an embossed hologram.
- FIG. 11 An example in which the random number used for the authenticity identification chip according to the present invention is a binary number.
- FIG. 12 An example in which random numbers used for the authenticity identification chip according to the present invention are arranged as binary numbers.
- 13 An additional example of random numbers used for the authenticity identification chip according to the present invention.
- FIG. 16 An example in which random numbers used for the authenticity identification chip according to the present invention are arranged as a quaternary number.
- FIG. 17 A description of how to obtain multiple authentication chips from one random number sequence.
- ⁇ 19 Description of an authentication verifying chip reader using matrix-arranged reading elements.
- ⁇ 20 Description of an authentication verifying chip reader using an array of single color readers.
- ⁇ 21 Configuration of an array of single color detection devices.
- ⁇ 25 Description of the authentication verifying chip reader according to the present invention by a single reading element.
- ⁇ 26 Description of the authentication verifying chip reader according to the present invention by two reading elements.
- ⁇ 27 Description of the reading path.
- FIG. 29 An example of the reading path of an authentication verifying chip by binary random numbers.
- FIG. 30 An example of feature point extraction of an authentication verifying chip by binary random numbers.
- FIG. 31 Example of feature point extraction of authentication verifying chip by quaternary random number.
- FIG. 32 An example of processing an authentication verifying chip by binary random number by analog processing.
- 33 Example of alignment mark, reading start ⁇ end line, mark for synchronization signal.
- FIG. 35 Another example of the card-by-card side processing flow.
- FIG. 36 Still another example of the card-by-card side processing flow.
- Fig. 5 shows the basic configuration of a card with an embossed hologram chip attached.
- (a) is a general view
- (b) is a cross-sectional view
- (c) to (e) are enlarged views of the embossed hologram chip.
- a face plate 14 having an opening formed on a light-impermeable card base 13 is attached, and an embossed hologram chip 12 is inserted into the opening. Further, the magnetic stripe 2 and the arrow 3 are formed on the surface plate 14.
- the embossed hologram chip is composed of pits and pits with a depth of 1Z4 wavelength of the laser light to be used, and is composed of a narrow ridge portion, and in the portion where the pits are present, the outgoing laser light is the incident laser light. Since the emission laser light is not detected due to the cancellation, the emission laser light is detected without being canceled by the incident laser light in the part where there is no pit.
- the structure shown in (c) is the most basic structure, and pits 16 of 1 Z 4 wavelength depth of laser light used at an appropriate interval on the embossed hologram chip 15 and a part where pits are not formed 1 7 and are arranged.
- the solid line indicated by the bi-directional arrow represents that both the incident light and the emitted light are present
- the broken line indicated by the one-way arrow indicates that the incident light is present but the emitted light is absent. Represents.
- the example shown in (d) is an example in which the direction of the laser light is inclined, and the written data can not be read without the information of the inclination angle.
- inclined pits 19 of 1 Z 4 wavelength depth of the used laser light are formed at appropriate intervals on the embossed hologram chip 18 and pits are formed so that inclined portions 20 are disposed.
- the solid line indicated by the bi-directional arrow represents that both the incident light and the outgoing light are present
- the dashed line indicated by the one-way arrow indicates that the incident light is present. It indicates that there is no light. It is almost impossible to duplicate the embossed hologram chip of this structure.
- the example shown in (e) is an example using laser light of a plurality of wavelengths, and it is difficult to read the written data if there is no information on all the wavelengths of the laser light used.
- the embossed hologram chip 21 has a pit 22 with a depth of 1Z4 wavelength of red (R) laser light, a pit 23 with a depth of 1Z4 wavelength of green (G) laser light, and a blue (B) laser light Pits 25 and pits having a depth of 1Z4 wavelength are formed, and portions 24 and 24 are arranged at appropriate intervals.
- the solid line indicated by the bi-directional arrow represents that both the incident light and the outgoing light exist, and the broken line indicated by the one-directional arrow indicates the incident light. There is no emitted light !, that means. It is even more nearly impossible to duplicate the embossed hologram chip of this structure.
- pits for recording information are arranged at regular intervals! (A) corresponds to FIG. 5 (c), and a pit 101 is formed at a position where information of 101010 110 of the embossed hologram chip base 15 is recorded, and a protective layer 100 is provided thereon.
- FIG. 5 (b) corresponds to FIG. 5 (d), and in order to record the information of 1010101 10 of the embossed hologram chip base 18, a pit 104 having an inclined surface is formed at the position of the information 1, and An inclined surface 103 is formed at a position, and a protective layer 102 is provided thereon.
- a pit 104 having an inclined surface is formed at the position of the information 1
- An inclined surface 103 is formed at a position, and a protective layer 102 is provided thereon.
- FIG. 5 (c) corresponds to FIG. 5 (e), and pits 108 for the information “00101010” by the 780 nm infrared laser and the information “01000100” by the 650 nm red light laser on the embossed hologram chip substrate 21.
- a pit 105 is formed for information of "100100 01" by a 405 nm blue light laser, and a protective layer 105 is formed thereon.
- FIG. 8 shows an embodiment of a pit of an authentication verifying chip composed of computer-generated binary data suitable for machine reading.
- Fig. 9 shows an example of a true 256-digit true random number obtained by detecting radiation emitted by the nuclear destruction of radioactive materials, and the random numbers used for encryption keys etc. are usually It is supplied as such a hexadecimal number.
- FIG. 10 shows the hexadecimal random numbers shown in FIG. 9 arranged in a matrix of 8 columns and 32 rows. This hexadecimal number can be expressed by replacing it with a 4-digit binary number.
- the embossed hologram chip shown in FIG. 6 (c) can use light of multiple wavelengths. Therefore, the pits of a card authentication verifying chip, which is generally made by a computer and is generally referred to as red (R), green (G) and blue (B) light, suitable for machine reading which is binary data next The configuration example is shown.
- FIG. 13 shows the 256-digit hexadecimal random number preceding the 256-digit hexadecimal random number shown in FIG. 9 together.
- hexadecimal random number sequence a is the same random number sequence as shown in FIG. 9, and “hexadecimal random number sequence b” is a random number sequence prior to “hexadecimal random number sequence a”. is there.
- FIG. 14 shows a random number sequence divided into two bits in order to convert this hexadecimal random number sequence into a binary random number sequence and convert it into a quaternary number represented as 0, R, G, B.
- Fig. 15 shows the result of converting "H" into a quaternary number "B”.
- FIG. 16 shows a quaternary number obtained in this manner, which is arranged in a matrix of 32 columns and 32 rows in the same manner as the binary numbers shown in FIG. 8 or FIG.
- FIG. 17 illustrates a method of obtaining a plurality of authentication chips with one random number sequence power.
- (a), (b), (c), and (d) are respectively 16 ⁇ 16 matrix patterns obtained based on the 32 ⁇ 32 matrix pattern shown in FIG. a) has coordinates (0, 0) as the origin, (a) has coordinates (0, 0) as the origin, (b) has coordinates (1, 0) as the origin, and (c) has coordinates (0, 0) 1) is the origin and (d) is the origin of coordinates (1, 1).
- one matrix pattern force obtained from the random number sequence shown in FIG. 6 can also obtain a plurality of matrix patterns.
- One random number sequence force In order to obtain a plurality of matrix patterns, in addition to this, the usage start position of the random number sequence shown in FIG. 6 is changed, or the creation start position of the matrix pattern shown in FIG. Various methods are available such as
- the card issuer it becomes possible for the card issuer to keep one random number sequence in the secret as a master random number sequence, and to obtain a plurality of matrix patterns based on the master random number sequence. Also, multiple matrix patterns can be automatically managed by origin information.
- FIG. 8 The embodiments shown in FIG. 8, FIG. 12 and FIG. 17 are represented by 1 bit and are authenticated by a binary number.
- the information is recorded, and the embodiment shown in FIG. 16 records the authentication information by a quaternary number represented by 2 bits.
- a quaternary number represented by 2 bits.
- an octal number represented by 3 bits and a hexadecimal number represented by 4 bits can also be used.
- Figure 7 shows the mounting position of the authentication chip with these structures.
- the attachment position of the authentication verifying chip 46 is the center top position shown in FIG. 7A and the middle position shown in FIG.
- the middle stage rear position shown in (c), the lower head position shown in (d), the lower center position shown in (e), and the lower rear position shown in (f) are possible.
- the upper position is also possible, it is desirable to avoid the upper position if there is a possibility of affecting the information reading from the magnetic stripe.
- the reading of the authentication verifying chip which is a hologram chip, will be described.
- the reading method includes a method of reading the hologram chip as a surface as it is, a method of reading a surface as a collection of lines, and a method of reading a surface as a collection of points.
- FIG. 18 shows an example using an imaging device which is the most basic configuration of the method of reading the hologram chip as it is.
- the hologram chip 15 is read from the card body 11 consisting of the card substrate 13, the card top plate 14, and the hologram chip 15 by the imaging device 110 and is authenticated by the pattern recognition technology.
- the imaging device 110 photographs the hologram chip 15 irradiated from the laser beam light source (not shown), the hologram chip 15 is authenticated by the photographed image, and as a result, the card 11 true and false certified.
- FIG. 19 shows an example of the configuration of a reading device which is composed of detection elements arranged in a matrix and performs reading in a planar manner.
- (a) shows a schematic configuration of the reading device
- (b) shows a correspondence between the signal and the reading device.
- 11 is a card body
- 13 is a substrate
- 14 is a top plate
- 15 is a hologram authentication chip, which is an authentication verifying chip.
- a reading element matrix 111 is a reading element matrix in which small-sized reading elements 112 are disposed in a planar shape so as to cover the authentication verifying chip 15 and hide them.
- the light receiving element power which is also equal to the photodiode is constituted.
- the authentication verifying chip 15 When the card 11 is taken into the reading device and stopped, the authentication verifying chip 15 is located below the planar reading element matrix 111, and the reading element matrix 111 reads the authentication verifying information of the authentication verifying chip 15.
- FIG. 20 shows an example in which the reading elements are arranged in an array. In this figure, (a)
- Fig. 7 shows the schematic configuration of the detection unit of the reader
- Fig. 13 (b) shows the correspondence between the card and the array of read elements. Since the card 11 in this figure is the same as the card shown in FIG. 19, the description of the card is omitted.
- 113 is a housing having a length slightly longer than the movement direction width of the authentication verifying chip 15, and a plurality of reading elements 112 are linearly arranged in it to constitute a reading element array.
- Each of the reading elements is constituted by a light source which is equivalent to a semiconductor laser and a light receiving element which is equivalent to a photodiode.
- the card 11 when the card 11 is taken into the card reader, it passes under the array of reader elements. At this time, the reading elements 112 arranged in an array read the authentication information in the authentication chip 15.
- FIG. 21 shows an example of arrangement of the reading elements of the reading device shown in FIG. As shown in (a), 32 reading elements “DOO” to “D31” are provided in one row on the base. In addition, as shown in (b) as the arrangement, it is also possible to arrange the reading elements “DOO” to “D31” in a staggered arrangement.
- FIG. 22 shows an example of the configuration of a card identification apparatus in the case of using a plurality of different types of colors which are quaternary numbers shown in FIG. This example is based on the reading element array shown in FIG. 20, and the red reading element array 115R, the green reading element array 115G, and the blue reading element array 115B are stored in the housing 114 !.
- FIG. 23 shows a configuration example of a reading element array in the case of using the laser light R, the laser light G and the laser light B shown in FIG.
- the reading element array includes 32 laser light R reading element arrays "ROO” to “: R31”, laser light G reading element arrays “GOO” to “G31”, and laser light B reading element arrays "BOO” to " B31 "Forces are arranged in three rows.
- a laser for CD In the development of the next-generation DVD, a laser for CD, a laser for DVD, an optical head that integrates laser beams from the laser for the next-generation DVD using an optical system, or three laser beams emitted with one element It is considered to use a three-wavelength laser that can be used for detection using a photodetector that supports three wavelengths. (Refer to Nikkei Electronics, p. 883, p. 119, 2004. 9. 27) If this photodetector is used side by side in one row, laser light R, laser light G, laser light can be obtained with the same configuration as that shown in FIG.
- the B read element array can be configured.
- Figure 24 shows a reader with a new configuration.
- a light scanning means used by reflecting a laser beam by a rotating polygonal columnar mirror (polygon mirror) is used in a laser beam printer or the like.
- this scanning means can perform optical scanning only by the rotational movement of the polygon mirror, since the obtained reflected light beam is reflected radially, the light beam does not vertically enter the object. Therefore, the optical scanning by the polygon mirror is not an optimal means to be used as a detection means of a hologram chip that reads information by the depth of pits and the wavelength of incident light.
- FIG. 24 (a) shows the relationship between the paraboloid and parallel rays.
- X is the X axis
- Y is the Y axis orthogonal to the X axis
- O is the origin.
- a straight line based on F is folded back at parabola 100, it becomes parallel to the ⁇ axis.
- FIG. 24 (b) shows the basic configuration of an apparatus for reading an embossed hologram by applying this principle.
- reference numeral 120 denotes a reflector having a paraboloid, which is formed in a semi-cylindrical shape having a length in the direction perpendicular to the paper surface.
- a light passage hole 121 for allowing light to pass is formed at a position corresponding to the origin of FIG. 24 (a).
- a polygon mirror (polygon mirror) having a polygon reflection surface, which has a rotation axis parallel to the extension direction axis of the semi-cylindrical parabolic reflector 120 at the focal point of the semi-cylindrical parabolic reflector 120 122 are arranged.
- Reference numeral 124 denotes a hollow tip.
- the laser beam emitted from the light emitting / receiving element 123 in the Y-axis direction in FIG. 24A passes through the light passage hole 121 and is incident on the polygon mirror 122.
- the laser beam light incident on the polygon mirror is reflected and reflected by the semi-cylindrical parabolic reflector 120, and is incident on the hologram chip 124.
- the laser beam light reflected by the polygon mirror 122 and incident on the semi-cylindrical parabolic reflector 120 is again reflected.
- the light is reflected in a direction parallel to the traveling direction of the laser beam emitted from the light emitting / receiving element 123 and enters the hologram chip 124.
- the laser beam light incident on the pit of the hologram chip 124 is reflected without being extinguished, the reflected laser beam light is incident on the light emitting / receiving element 123 along the same path as the incident laser beam light.
- all the laser beam light emitted from the light emitting / receiving element 123 is perpendicularly incident on the hologram chip 124.
- the information of the hologram chip 124 in the part that hits the back side of the polygon mirror 122 when viewed from the light emitting / receiving element 123 can not be read. Although necessary information can not be written to this portion or unnecessary information can be written, according to the configuration shown in FIG. 24 (c), there is no portion corresponding to the back side of the polygon mirror 122, and it is written to the hologram chip 124. All information can be read.
- FIG. 24 (c) What is shown in FIG. 24 (c) is a basic configuration for that, and uses half of a semi-cylindrical parabolic reflector.
- reference numeral 125 denotes a reflecting mirror having a paraboloid, which is formed in a semi-cylindrical shape having a length in the direction perpendicular to the paper surface only by the portion where X is negative in FIG. .
- the light passage hole 121 formed in FIG. 24 (b) is formed because it is unnecessary. It has not been.
- a polygon mirror having a polygon reflection surface (polygon mirror having a rotation axis parallel to the extension direction axis of the semi-cylindrical semi-parabolic reflector 125 at the focal point of the semi-cylindrical semi-parabolic reflector 125 122) is arranged.
- Reference numeral 126 denotes an embossed hologram chip.
- the laser beam emitted from the light emitting / receiving element 123 toward the polygon mirror 122 is reflected by the polygon mirror 122 and is incident on the semi-cylindrical semiparabolic reflector 125 and reflected, and is reflected by the hologram chip 126. It is incident vertically.
- the portion of the hologram chip 124 which also sees the light receiving / emitting element 123 and hits the back side of the polygon mirror 122 is only the end portion, so it can not be read.
- the center portion of the semi-cylindrical partial parabolic reflector 127 is made smaller and the polygon mirror 122 has an offset configuration in which it does not face the semi-cylindrical partial parabolic reflector 127.
- the unreadable part is completely eliminated, and the information written in all parts of the embossed hologram chip 128 can be read.
- FIG. 25 shows a reader using a single read element.
- (a) is a schematic configuration of a relation between a card and a reader
- (b) is an explanatory view of a data detection method.
- 11 is a force card body
- 13 is a card substrate
- 14 is a card top plate
- 15 is an authentication verifying chip
- 131 is a reading element
- 130 is a housing for containing the reading element 131. Moves in a direction perpendicular to the card 11 loading direction.
- the movement of the card 11 in the direction orthogonal to the loading direction is pseudo linear motion by rotational motion with one point as a fulcrum, linear motion by conversion of rotational motion force into linear motion, or linear motion by a rear motor etc. And so on can be used as appropriate.
- a representative example of the movement path is shown in (b). In this example, it moves in the direction indicated by the arrow in (b) at a uniform speed, and moves along a linear path 132 combined with the card's own movement direction.
- Do. Read element 131 is always It is also possible to move to any position in the direction orthogonal to the taking-in direction of the card 11 and fix it for use because it must move.
- the reading device shown in FIG. 25 uses a single reading element. As shown in FIG. 26, by making this reading element plural, reading by a plurality of paths becomes possible.
- the processing load does not increase because the information to be processed is linear information.
- FIG. 26 (a) is a schematic configuration of the relationship between the card and the reader, and (b) is an explanatory diagram of a detection method. Since the card 11 in this figure is the same as the card 11 shown in FIG. 25, the description of the card is omitted.
- a second reading element 132 and housing 133 are included. It also has a reader.
- the second reading device composed of the reading element 132 and the housing 133 shown in this figure is the direction opposite to the movement direction of the first reading device composed of the reading element 131 and the housing 130. It is also possible to move in the same direction.
- a representative example of the path is shown in (b).
- the first reader and the second reader move at the same speed in the direction shown by the arrows in (b), and the card itself Move along the path 132, 120 combined with the direction of movement of the
- a reading error may occur due to a path error or a defect in the reading device. In such a case, as shown at 134 in FIG.
- the final reading information is determined by the average value or majority decision.
- the authentication data on the straight line detection path is 111010010.
- This detection path is not limited to the path shown in FIG. 29.
- an arbitrary path as shown in FIG. 28 can be taken, and furthermore, can be changed each time reading is performed.
- Such a combination of data detection paths is a sufficiently large number such as 3232 1048 even under the condition that the data detection paths do not backtrack. Nevertheless, the pattern information stored in the reader for comparison is only 1024 bits.
- the example of the quaternary number shown in FIG. 16 is different from the example of the quaternary number in that only the amount of information of the pattern to be compared for information detection is increased to 2048 bits, so the description will be omitted. .
- Figure 28 shows some examples of the read path.
- (A) to (d) are examples using a single information reading path, and (e) to (f) are examples using two reading paths. Note that three or more reading paths are acceptable.
- reading paths can also be realized by selecting-switching the reading elements of the detection array shown in FIGS. 21 and 23.
- the path 132 shown in FIG. 25 is obtained by reading out the detection elements in the order of DOO, D01, D02, D03---028, D29, D30, D31.
- the reading path is not limited to these examples, and any path can be adopted. Furthermore, it is possible to read out electricity in an irregular order.
- a method of authenticating the authenticity of the authentication verifying chip shown in FIG. 12 and FIG. 16 by applying the feature point extraction method used in the geometryt will be described.
- FIG. 30 a method of authenticating the authenticity of the authentication chip by the binary information of 0 and 1 shown in FIG. 12 will be described.
- four or more consecutive “0s” are black and white reversed characters, and four or more consecutive “1s” are shown as enclosed characters.
- FIG. 31 illustrates a method of authenticating the authenticity of the authentication chip by the quaternary number shown in FIG.
- the feature points in this matrix are five “000”, “00 00” ⁇ 3 even, “00000” ⁇ ) even, “000000” force two even, side by side as feature points.
- GGG power, “GGGG” power, and “GGGGG” are side by side.
- BBB force, “: BBBBJ force, 3“ BBBBB ”are arranged side by side.
- a quaternary number can also be obtained by using intermediate-stage authentication information, for example, two intermediate gray levels of black-and-white binary information.
- intermediate-stage authentication information for example, two intermediate gray levels of black-and-white binary information.
- Such a configuration only makes falsification more difficult, and if some of the binary information 0 are used as dummies by half-toning, the puzzle of the forger becomes greater.
- the use of this half-tone is the same even when using quaternary information such as 0, R, G, B, etc., and it is possible to use 3-bit octal number, 4-bit hexadecimal number, etc. can do.
- FIG. 32 digitally processes authentication authentication information digitally recorded in FIG. 32. Indicates the configuration.
- the pattern of the authentication verifying chip shown in (a) is scanned by the paths shown in 132 and 120 using, for example, the authentication verifying chip reader shown in FIG. 25 or FIG.
- the electrical signals shown in b) and (c) are obtained, and by comparing these electrical signal patterns with the stored regular electrical signal patterns, the card authenticity identifier and the authenticity of the card body are authenticated. Be done.
- alignment marks 48 shown in FIG. 33 it is desirable to form alignment marks 48 shown in FIG. 33 on the authentication verifying chip.
- the number of alignment marks may be one in the simplest way, a plurality of alignment marks may be provided for more accurate alignment.
- the alignment mark is also useful for planar reading using an imaging device that is not limited to linear reading.
- some marks may be used on the reading start position and reading end position of the card identifier, for example, moving direction reading start line 49 and moving direction reading end line, in combination with alignment marks. 50, and further, end indication lines 51 and 52 are provided.
- These alignment marks, reading start and ending lines and marks for z or synchronization signals are all made of phosphor particles, and can be formed by an appropriate printing means such as an ink jet printer.
- FIG. 34 to 36 show an embodiment of the card authentication processing flow.
- FIG. 34 shows Embodiment 1 of the basic configuration.
- a sensor at the entrance of the card senses that and takes the card into the device.
- the terminal When loading a card, the terminal reads the magnetic recording unit power card information of the card.
- the terminal determines whether the inserted card is a card that can be handled by the terminal.
- the terminal device ejects the card as an improper card which can not be handled.
- the terminal device reads mechanical authentication using movement of the card at the time of card loading, or reads the authentication information written in the authentication chip when the card is stopped.
- the terminal device determines whether the read authentication information is valid.
- the terminal determines that the authentication information is not correct, it is determined that the inserted card is not legitimate, the card is discharged, and the process is terminated. In addition, judgment of the legitimacy of the authentication information and subsequent processing of the card can be performed in parallel with other processing.
- the terminal device determines that the authentication information is valid, the terminal device requests the user to perform further input operation such as withdrawal amount. (9) The user performs the input operation of the withdrawal amount and the like according to the request.
- the host computer determines whether or not the content of the input operation such as the withdrawal amount is appropriate.
- the host computer determines that the contents of the input operation such as the withdrawal amount are appropriate, the host computer outputs it by withdrawal, ejects the card from the terminal device, and ends the processing.
- FIG. 35 shows a second embodiment of the card authentication processing flow.
- this card authentication processing flow ejects the card from the terminal device when the card authentication information is not correct, whereas when the card authentication information is not correct, the card is processed by the terminal device. Capture and issue an alert. By doing this, it is easy to detect fraudulent cards.
- a sensor at the entrance of the card senses that and takes the card into the device.
- the terminal When loading a card, the terminal reads the magnetic recording unit power card information of the card.
- the terminal device determines whether the inserted card is a card that can be handled by the terminal device.
- the terminal device ejects the card as an improper card which can not be handled.
- the terminal device reads mechanical authentication using movement of the card at the time of card loading, or reads the authentication information written in the authentication chip when the card is stopped.
- the terminal device determines whether the read authentication authentication information is positive or not. (7) If the terminal device determines that the authentication information is not valid, it is determined that the inserted card is not legitimate, and the card is stored in the terminal device and an alarm is issued.
- judgment of the legitimacy of the authentication information and subsequent processing of the card can be performed in parallel with other processing.
- the terminal device determines that the authentication information is legitimate, it requests the user to perform further input operation such as withdrawal amount.
- the host computer determines whether or not the content of the input operation such as the withdrawal amount is appropriate.
- the host computer determines that the contents of the input operation such as the withdrawal amount are appropriate, the host computer outputs it by withdrawal etc., discharges the card from the terminal device, and ends the processing.
- FIG. 36 shows a third embodiment of the card authentication processing flow.
- this second embodiment of the card authentication processing flow shown in FIG. 35 when the authentication information is not correct, in the second embodiment of the card authentication processing flow of FIG. Have the person perform the operation. This will ensure that fraudulent cards are caught
- a sensor at the entrance of the card senses that and takes the card into the device.
- the terminal When loading a card, the terminal reads the magnetic recording unit power card information of the card.
- the terminal device is a card that the inserted card can be handled by the terminal device It is determined whether or not
- the terminal device ejects the card as an improper card which can not be handled.
- the terminal device reads mechanical authentication using movement of the card at the time of card loading, or reads the authentication information written in the authentication chip when the card is stopped.
- the terminal device determines whether the read-in authentication information is positive or negative.
- the terminal device determines that the authentication information is not correct, it requests the user to perform further input operation such as withdrawal amount.
- judgment of the legitimacy of the authentication information and subsequent processing of the card can be performed in parallel with other processing.
- the card is stored in the terminal device and an alarm is issued.
- the terminal device determines that the authenticity authentication information is valid, the terminal device requests the user to perform further input operation such as withdrawal amount.
- the host computer determines whether or not the content of the input operation such as the withdrawal amount is appropriate.
- the authentication verifying chip and the card having the authentication verifying chip described above can be adopted as a bank cash card, a credit card, a prepaid card, a point card, a securities, an ID card, an entrance certificate, a certificate, and the like.
Landscapes
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Toxicology (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Credit Cards Or The Like (AREA)
- Holo Graphy (AREA)
- Control Of Vending Devices And Auxiliary Devices For Vending Devices (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
- Inspection Of Paper Currency And Valuable Securities (AREA)
- Diffracting Gratings Or Hologram Optical Elements (AREA)
- Editing Of Facsimile Originals (AREA)
Abstract
Description
Claims
Priority Applications (6)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US12/097,971 US8146808B2 (en) | 2005-12-19 | 2006-12-19 | Card which can be authenticated by hologram chip |
JP2007551082A JPWO2007072794A1 (ja) | 2005-12-19 | 2006-12-19 | ホログラムチップにより真贋判別可能なカード |
EP06834935A EP1970841A4 (en) | 2005-12-19 | 2006-12-19 | CARD THAT CAN BE AUTHENTICATED BY A HOLOGRAM CHIP |
CN2006800476488A CN101405753B (zh) | 2005-12-19 | 2006-12-19 | 能够由全息图芯片进行真伪判别的卡 |
HK09108270.5A HK1132351A1 (en) | 2005-12-19 | 2009-09-09 | Card which can be authenticated by hologram chip |
US13/298,984 US8397987B2 (en) | 2005-12-19 | 2011-11-17 | Card which can be authenticated by hologram chip |
Applications Claiming Priority (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP2005365416 | 2005-12-19 | ||
JP2005-365416 | 2005-12-19 | ||
JP2006200823 | 2006-07-24 | ||
JP2006-200823 | 2006-07-24 |
Related Child Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US12/097,971 A-371-Of-International US8146808B2 (en) | 2005-12-19 | 2006-12-19 | Card which can be authenticated by hologram chip |
US13/298,984 Continuation US8397987B2 (en) | 2005-12-19 | 2011-11-17 | Card which can be authenticated by hologram chip |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2007072794A1 true WO2007072794A1 (ja) | 2007-06-28 |
Family
ID=38188571
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/JP2006/325225 WO2007072794A1 (ja) | 2005-12-19 | 2006-12-19 | ホログラムチップにより真贋判別可能なカード |
Country Status (7)
Country | Link |
---|---|
US (2) | US8146808B2 (ja) |
EP (1) | EP1970841A4 (ja) |
JP (2) | JPWO2007072794A1 (ja) |
HK (1) | HK1132351A1 (ja) |
RU (2) | RU2427913C2 (ja) |
TW (1) | TWI470561B (ja) |
WO (1) | WO2007072794A1 (ja) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2009072387A1 (ja) | 2007-12-03 | 2009-06-11 | International Frontier Technology Laboratory, Inc. | 真贋証明部材 |
WO2010058809A1 (ja) * | 2008-11-19 | 2010-05-27 | 国際先端技術総合研究所株式会社 | エンボスホログラムチップ及びその製造方法 |
CN102597396A (zh) * | 2009-05-29 | 2012-07-18 | 国际先端技术综合研究所株式会社 | 卡式钥匙及卡式锁 |
JP2012185497A (ja) * | 2011-02-16 | 2012-09-27 | Ushio Inc | 盗撮防止シート |
Families Citing this family (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101743130B (zh) * | 2007-05-14 | 2013-10-02 | 国际先端技术综合研究所株式会社 | 真伪认证对象物、真伪认证芯片读取装置以及真伪判定方法 |
DE102011121588A1 (de) * | 2011-12-20 | 2013-06-20 | Giesecke & Devrient Gmbh | Sicherheitselement für Sicherheitspapiere, Wertdokumente oder dergleichen |
RU2505862C2 (ru) * | 2012-04-09 | 2014-01-27 | Общество с ограниченной ответственностью "Конструкторское бюро специального приборостроения" (ООО "КБСП") | Способ функционирования кардридера для программно-аппаратного средства, кардридер для реализации способа и оптоэлектронный сенсор для кардридера |
WO2015089514A2 (en) * | 2013-12-13 | 2015-06-18 | Colorado State University Research Foundation | Nano-stamp and matched reader for anti-counterfeiting applications |
RU2667373C1 (ru) * | 2017-06-06 | 2018-09-19 | Наиль Рафкатович Музафаров | Биометрическая система формирования 3D изображения поверхности объекта или его частей |
RU2667371C1 (ru) * | 2017-06-06 | 2018-09-19 | Наиль Рафкатович Музафаров | Биометрическая система формирования изображения вен |
US20210086540A1 (en) * | 2018-04-26 | 2021-03-25 | Hewlett-Packard Development Company, L.P. | Microembossed print media |
Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPH06281425A (ja) * | 1993-03-29 | 1994-10-07 | Toppan Printing Co Ltd | パターン穴検査方法及び装置 |
JPH0811473A (ja) * | 1994-07-04 | 1996-01-16 | Dainippon Printing Co Ltd | Icカード及びicカードの不正使用防止方法 |
JPH1125507A (ja) * | 1997-06-27 | 1999-01-29 | Victor Co Of Japan Ltd | 光学的記録媒体及びその読み取り再生装置並びに光学的記録媒体の偽造防止方法 |
JP2000163530A (ja) * | 1998-11-25 | 2000-06-16 | Victor Co Of Japan Ltd | 記録媒体及びその記録再生装置 |
JP2000514581A (ja) * | 1996-07-15 | 2000-10-31 | オーストリア カード プラスティッカルテン ウント アウスヴァイスジステーム ゲゼルシャフト ミット ベシュレンクテル ハフツング | モジュール及びホログラムを有しているデータキャリヤ |
JP2002008245A (ja) * | 2000-06-20 | 2002-01-11 | Victor Co Of Japan Ltd | 光記録媒体及びその再生装置 |
JP2002531880A (ja) * | 1998-11-27 | 2002-09-24 | オプティリンク アクティエボラーグ | ホログラフィックチップおよびホログラフィックチップのための光学系 |
JP2005053091A (ja) * | 2003-08-05 | 2005-03-03 | Oike Ind Co Ltd | 転写箔 |
JP2005338638A (ja) * | 2004-05-28 | 2005-12-08 | Ricoh Co Ltd | 偏光ホログラム素子、その製造方法、および偏光ホログラム素子を用いた光ピックアップ装置、および光ディスクドライブ装置 |
Family Cites Families (50)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPS63104222A (ja) * | 1986-10-21 | 1988-05-09 | Kyodo Printing Co Ltd | 光記録カードの読取り方法 |
JPS63183626A (ja) * | 1987-01-26 | 1988-07-29 | Olympus Optical Co Ltd | カ−ド駆動装置 |
JPS63197067A (ja) * | 1987-02-12 | 1988-08-15 | Olympus Optical Co Ltd | 光カ−ド |
JPS63231743A (ja) * | 1987-03-20 | 1988-09-27 | Canon Inc | 光カ−ド及びその記録再生方法 |
JPH01191388A (ja) * | 1988-01-26 | 1989-08-01 | Ricoh Co Ltd | 光カード記録再生装置 |
JPH01114703A (ja) * | 1987-10-29 | 1989-05-08 | Hitachi Ltd | 結像型変位計 |
DE3827541A1 (de) * | 1988-08-13 | 1990-02-15 | Mtu Muenchen Gmbh | Verfahren zum automatischen ablesen binaer verschluesselter informationen |
JPH0675186A (ja) * | 1991-07-19 | 1994-03-18 | Hitachi Ltd | レーザ光走査装置 |
JP3146568B2 (ja) | 1991-10-09 | 2001-03-19 | 株式会社ニコン | パターン認識装置 |
JPH05345493A (ja) * | 1992-06-16 | 1993-12-27 | Toppan Printing Co Ltd | 情報記録媒体の製造方法および装置 |
DE4227613A1 (de) | 1992-08-20 | 1994-02-24 | Gao Ges Automation Org | Verfahren und Vorrichtung zur Erkennung von Druckbildern auf Dokumenten |
JP3490490B2 (ja) | 1994-01-28 | 2004-01-26 | 株式会社東芝 | パターン画像処理装置及び画像処理方法 |
JPH07272317A (ja) * | 1994-03-30 | 1995-10-20 | Hitachi Ltd | 情報記録媒体及びその製造方法 |
DE4438460B4 (de) * | 1994-10-27 | 2009-04-09 | Giesecke & Devrient Gmbh | Datenträger mit maschinell lesbarer Codierung |
JP3013524U (ja) * | 1994-12-26 | 1995-07-18 | 東京アルテック有限会社 | 光記録プリペイドカード |
US5946288A (en) * | 1995-03-31 | 1999-08-31 | Nec Corporation | Optical recording medium having recording pits of different shapes |
TW388028B (en) * | 1995-08-29 | 2000-04-21 | Philips Corp | Manufacturing and assembling method for an integrated circuit card, and card obtained thereby |
JP3512081B2 (ja) | 1996-06-03 | 2004-03-29 | 富士電機ホールディングス株式会社 | カードとその読取装置 |
JPH1044650A (ja) | 1996-08-05 | 1998-02-17 | Otax Kk | データキャリア |
JPH10143621A (ja) | 1996-10-29 | 1998-05-29 | American Bank Note Holographic Inc | カードセキュリティシステム及びセキュリティ向上方法及びカード読取装置及びカード発行装置及びホログラム読取装置 |
DE19717488C2 (de) * | 1997-04-25 | 2003-05-15 | Baumer Optronic Gmbh | Vorrichtung zur Inspektion der Oberfläche von Objekten |
JPH113412A (ja) * | 1997-06-11 | 1999-01-06 | Toppan Printing Co Ltd | データ記録媒体およびデータ記録媒体製造用転写体 |
JPH11180079A (ja) | 1997-12-25 | 1999-07-06 | Dainippon Printing Co Ltd | 情報記録媒体及びその認証方式 |
US20020177144A1 (en) * | 1997-12-30 | 2002-11-28 | Jose Remacle | Detection and/or quantification method of a target molecule by a binding with a capture molecule fixed on the surface of a disc |
JP3393064B2 (ja) * | 1998-02-27 | 2003-04-07 | 株式会社オプトウエア | 光情報記録媒体 |
JP3964536B2 (ja) | 1998-03-18 | 2007-08-22 | 大日本印刷株式会社 | 情報記録媒体 |
JP2000047557A (ja) | 1998-07-31 | 2000-02-18 | Victor Co Of Japan Ltd | 光記録媒体及び光記録媒体用情報読取り装置 |
JP2000048146A (ja) | 1998-07-31 | 2000-02-18 | Victor Co Of Japan Ltd | 光記録媒体記録再生装置及び光記録媒体 |
JP2000066567A (ja) | 1998-08-25 | 2000-03-03 | Victor Co Of Japan Ltd | カード型ホログラム記録媒体とその再生装置 |
JP2000123109A (ja) | 1998-10-09 | 2000-04-28 | Victor Co Of Japan Ltd | 光記録媒体及び光記録媒体書き込み・読み取り装置 |
US6810002B1 (en) * | 1999-01-12 | 2004-10-26 | Matsushita Electric Industrial Co., Ltd. | Information storing medium with guide tracks and information tracks |
JP4114760B2 (ja) | 1999-04-14 | 2008-07-09 | 大日本印刷株式会社 | 光情報記録ディスク |
HUP0000518D0 (en) * | 2000-02-04 | 2000-04-28 | Method of placing data signals onto a carrier; method and apparatus for the holographic recording and read-out of data | |
JP2001236006A (ja) * | 2000-02-22 | 2001-08-31 | Victor Co Of Japan Ltd | 記録媒体記録装置、記録媒体 |
JP4226182B2 (ja) * | 2000-02-28 | 2009-02-18 | パナソニック株式会社 | 光ディスク装置 |
CN1127431C (zh) | 2000-04-14 | 2003-11-12 | 吴德明 | 全息图像定位包装膜及制造工艺和用途 |
EP2506090B1 (en) * | 2000-05-30 | 2016-12-07 | Dai Nippon Printing Co., Ltd. | Computer-generated hologram, reflector using a computer-generated hologram, and reflective liquid crystal display |
JP2002040219A (ja) | 2000-07-19 | 2002-02-06 | Dainippon Printing Co Ltd | 計算機ホログラム、計算機ホログラムを用いた反射板、並びに計算機ホログラムを用いた反射型液晶表示装置 |
WO2002010721A2 (en) * | 2000-08-01 | 2002-02-07 | Board Of Regents, The University Of Texas System | Methods for high-precision gap and orientation sensing between a transparent template and substrate for imprint lithography |
JP2002074283A (ja) | 2000-08-29 | 2002-03-15 | Victor Co Of Japan Ltd | 光記録媒体、光記録媒体情報読取装置 |
JP2002279480A (ja) | 2001-03-19 | 2002-09-27 | Dainippon Printing Co Ltd | 画像形成体、およびその真贋判定装置 |
JP4677683B2 (ja) | 2001-05-15 | 2011-04-27 | 凸版印刷株式会社 | 表示体およびそれからの情報再生方法 |
JP2003029636A (ja) | 2001-07-16 | 2003-01-31 | Yatsuka Nakamura | 識別用タグ |
US20050084801A1 (en) * | 2001-07-20 | 2005-04-21 | Idriss El-Hafidi | Photonics data storage system using a polypeptide material and method for making same |
US20080094974A1 (en) * | 2001-11-09 | 2008-04-24 | Burstein Technologies, Inc. | Optical disc system and related detecting methods for analysis of microscopic structures |
JP2003223629A (ja) * | 2002-01-28 | 2003-08-08 | Koun Kigyo Kofun Yugenkoshi | 多用途マルチカード |
FR2859035B1 (fr) * | 2003-08-22 | 2005-11-18 | Memscap | Dispositif de marquage, article integrant un tel dispositif et appareil de detection de marquage |
JP4722705B2 (ja) * | 2003-12-10 | 2011-07-13 | 日本電信電話株式会社 | 積層ホログラム情報記憶媒体の製造方法および積層ホログラム情報記憶媒体 |
JP4374446B2 (ja) | 2003-12-25 | 2009-12-02 | 独立行政法人 国立印刷局 | 偽造防止形成体 |
US20050200926A1 (en) * | 2004-03-09 | 2005-09-15 | Samsung Electronics Co., Ltd | Optical recording medium |
-
2006
- 2006-12-19 TW TW95147690A patent/TWI470561B/zh active
- 2006-12-19 RU RU2008129713/08A patent/RU2427913C2/ru not_active IP Right Cessation
- 2006-12-19 WO PCT/JP2006/325225 patent/WO2007072794A1/ja active Application Filing
- 2006-12-19 RU RU2008129804/08A patent/RU2435218C2/ru not_active IP Right Cessation
- 2006-12-19 JP JP2007551082A patent/JPWO2007072794A1/ja active Pending
- 2006-12-19 US US12/097,971 patent/US8146808B2/en active Active - Reinstated
- 2006-12-19 EP EP06834935A patent/EP1970841A4/en not_active Withdrawn
-
2009
- 2009-09-09 HK HK09108270.5A patent/HK1132351A1/xx unknown
-
2011
- 2011-11-17 US US13/298,984 patent/US8397987B2/en active Active
-
2013
- 2013-11-27 JP JP2013245443A patent/JP2014130342A/ja active Pending
Patent Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPH06281425A (ja) * | 1993-03-29 | 1994-10-07 | Toppan Printing Co Ltd | パターン穴検査方法及び装置 |
JPH0811473A (ja) * | 1994-07-04 | 1996-01-16 | Dainippon Printing Co Ltd | Icカード及びicカードの不正使用防止方法 |
JP2000514581A (ja) * | 1996-07-15 | 2000-10-31 | オーストリア カード プラスティッカルテン ウント アウスヴァイスジステーム ゲゼルシャフト ミット ベシュレンクテル ハフツング | モジュール及びホログラムを有しているデータキャリヤ |
JPH1125507A (ja) * | 1997-06-27 | 1999-01-29 | Victor Co Of Japan Ltd | 光学的記録媒体及びその読み取り再生装置並びに光学的記録媒体の偽造防止方法 |
JP2000163530A (ja) * | 1998-11-25 | 2000-06-16 | Victor Co Of Japan Ltd | 記録媒体及びその記録再生装置 |
JP2002531880A (ja) * | 1998-11-27 | 2002-09-24 | オプティリンク アクティエボラーグ | ホログラフィックチップおよびホログラフィックチップのための光学系 |
JP2002008245A (ja) * | 2000-06-20 | 2002-01-11 | Victor Co Of Japan Ltd | 光記録媒体及びその再生装置 |
JP2005053091A (ja) * | 2003-08-05 | 2005-03-03 | Oike Ind Co Ltd | 転写箔 |
JP2005338638A (ja) * | 2004-05-28 | 2005-12-08 | Ricoh Co Ltd | 偏光ホログラム素子、その製造方法、および偏光ホログラム素子を用いた光ピックアップ装置、および光ディスクドライブ装置 |
Non-Patent Citations (1)
Title |
---|
See also references of EP1970841A4 * |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2009072387A1 (ja) | 2007-12-03 | 2009-06-11 | International Frontier Technology Laboratory, Inc. | 真贋証明部材 |
US9202328B2 (en) | 2007-12-03 | 2015-12-01 | International Frontier Technology Laboratory, Inc. | Authentication verifying method, authentication verifying member and authentication verifying member producing method |
WO2010058809A1 (ja) * | 2008-11-19 | 2010-05-27 | 国際先端技術総合研究所株式会社 | エンボスホログラムチップ及びその製造方法 |
CN102597396A (zh) * | 2009-05-29 | 2012-07-18 | 国际先端技术综合研究所株式会社 | 卡式钥匙及卡式锁 |
JP2012185497A (ja) * | 2011-02-16 | 2012-09-27 | Ushio Inc | 盗撮防止シート |
Also Published As
Publication number | Publication date |
---|---|
US20120062966A1 (en) | 2012-03-15 |
EP1970841A1 (en) | 2008-09-17 |
JPWO2007072794A1 (ja) | 2009-05-28 |
RU2008129804A (ru) | 2010-01-27 |
RU2427913C2 (ru) | 2011-08-27 |
HK1132351A1 (en) | 2010-02-19 |
US20090250520A1 (en) | 2009-10-08 |
EP1970841A4 (en) | 2010-04-28 |
RU2008129713A (ru) | 2010-01-27 |
US8146808B2 (en) | 2012-04-03 |
TWI470561B (zh) | 2015-01-21 |
JP2014130342A (ja) | 2014-07-10 |
TW200732979A (en) | 2007-09-01 |
RU2435218C2 (ru) | 2011-11-27 |
US8397987B2 (en) | 2013-03-19 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2007072794A1 (ja) | ホログラムチップにより真贋判別可能なカード | |
US8408470B2 (en) | Object for authentication verification, authentication verifying chip reading device and authentication judging method | |
JP5274020B2 (ja) | 真贋判別可能なカード | |
EP0644508B1 (en) | Secure optical identification method and means | |
US6328209B1 (en) | Card security system | |
US9058535B2 (en) | Security barcode | |
JP2004171109A (ja) | デバイス認証システム | |
JPWO2009072387A1 (ja) | 真贋証明方法、真贋証明部材及び真贋証明部材の製造方法 | |
JPWO2007072795A1 (ja) | 蛍光体粒子チップにより真贋判別可能なカード | |
CN101405753B (zh) | 能够由全息图芯片进行真伪判别的卡 | |
JP2004021398A (ja) | プリペイドカード | |
JPH10143621A (ja) | カードセキュリティシステム及びセキュリティ向上方法及びカード読取装置及びカード発行装置及びホログラム読取装置 | |
WO2007072796A1 (ja) | 放射性物質チップにより真贋判別可能なカード | |
JP2005193584A (ja) | 偽造防止情報担体およびその認証方法 | |
JP5674127B2 (ja) | エンボスホログラムチップ及びその製造方法 | |
JP2023177613A (ja) | セキュリティ文書及びセキュリティ文書の検証方法 | |
JPH03212790A (ja) | カードの正当性チェック方式 | |
JPS61137273A (ja) | 磁気カ−ドの記録読出装置 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
WWE | Wipo information: entry into national phase |
Ref document number: 200680047648.8 Country of ref document: CN |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
WWE | Wipo information: entry into national phase |
Ref document number: 2007551082 Country of ref document: JP |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2006834935 Country of ref document: EP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2008129713 Country of ref document: RU |
|
WWE | Wipo information: entry into national phase |
Ref document number: 12097971 Country of ref document: US |