WO2014175780A1 - Procédé permettant de déterminer l'authenticité de documents - Google Patents
Procédé permettant de déterminer l'authenticité de documents Download PDFInfo
- Publication number
- WO2014175780A1 WO2014175780A1 PCT/RU2014/000272 RU2014000272W WO2014175780A1 WO 2014175780 A1 WO2014175780 A1 WO 2014175780A1 RU 2014000272 W RU2014000272 W RU 2014000272W WO 2014175780 A1 WO2014175780 A1 WO 2014175780A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- graphic image
- randomly distributed
- authenticity
- identification
- decoder
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07D—HANDLING OF COINS OR VALUABLE PAPERS, e.g. TESTING, SORTING BY DENOMINATIONS, COUNTING, DISPENSING, CHANGING OR DEPOSITING
- G07D7/00—Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency
- G07D7/20—Testing patterns thereon
- G07D7/202—Testing patterns thereon using pattern matching
- G07D7/2033—Matching unique patterns, i.e. patterns that are unique to each individual paper
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07D—HANDLING OF COINS OR VALUABLE PAPERS, e.g. TESTING, SORTING BY DENOMINATIONS, COUNTING, DISPENSING, CHANGING OR DEPOSITING
- G07D7/00—Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency
- G07D7/004—Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency using digital security elements, e.g. information coded on a magnetic thread or strip
- G07D7/0043—Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency using digital security elements, e.g. information coded on a magnetic thread or strip using barcodes
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07D—HANDLING OF COINS OR VALUABLE PAPERS, e.g. TESTING, SORTING BY DENOMINATIONS, COUNTING, DISPENSING, CHANGING OR DEPOSITING
- G07D7/00—Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency
- G07D7/004—Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency using digital security elements, e.g. information coded on a magnetic thread or strip
- G07D7/0047—Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency using digital security elements, e.g. information coded on a magnetic thread or strip using checkcodes, e.g. coded numbers derived from serial number and denomination
Definitions
- the invention on one side, relates to methods for reading and recognizing object data, and more particularly, to methods for determining the authenticity of documents, banknotes, valuable items having randomly distributed identification elements, and having a graphic image with identification information printed on the object being inspected or accompanied its certificate, and can be used to verify the authenticity of valuable documents, securities, banknotes, expensive goods, such as jewelry Cereal.
- the device implements the specified method.
- the other side of the invention relates to devices for implementing the above method.
- An asymmetric key or cipher is the same as a cryptographic system with a public key, as well as a system with ciphers based on public keys.
- Asymmetric they are called here because instead of one key used for both encryption and decryption, they have two - conditionally called here open and closed.
- One - private - can be encrypted, and the other - open - decrypted - it is impossible to carry out two actions with the same key.
- the public key is provided to users, and only the issuer of securities, the manufacturer of valuable goods, the owner of relics or other objects whose authenticity needs to be confirmed, use the private key.
- SUBSTITUTE SHEET (RULE 26) identification elements, and having a graphic image with identification information deposited on the object to be checked, in which the above graphic images are scanned, the identification information contained in the graphic image is read using a decoder, the parameters of randomly distributed identification elements are read using a sensor, compared using a module comparing the signals from the decoder corresponding to the identification information contained in the graphic image and with the sensor needles corresponding to the parameters of randomly distributed identification elements, when the signals coincide, make a conclusion about the authenticity of the inspected object, see the description of patent EP 2485178 A1, D21 H15 / 06; G06K9 / 00, 08/08/2012
- the prior art also knows a method for determining the authenticity of documents, banknotes, valuable items having randomly distributed identification elements and having a graphic image with identification information printed on the object being checked or its certificate accompanied by which the above graphic images are scanned, read from using a decoder, the identification information contained in the graphic image is read out the parameters of randomly distributed identification x elements using a sensor, using a comparison module, the signals from the decoder corresponding to the identification information contained in
- SUBSTITUTE SHEET (RULE 26) the graphic image and the sensor signals corresponding to the parameters of randomly distributed identification elements, when the signals coincide, make a conclusion about the authenticity of the inspected object, see the description of patent US 2007170265 A1, B42D15 / 00; G06K19 / 06; G07D7 / 12; G07D7 / 20, 07.26.2007.
- the present invention mainly aims to propose a method for determining the authenticity of documents, banknotes, valuable items having randomly distributed identification elements and having a graphic image with identification information printed on the object being checked or on its accompanying certificate, allowing at least smooth out the above drawback, namely, to provide the ability to determine the authenticity of documents, banknotes, price GOVERNMENTAL subjects having randomly distributed identification elements, when the data for these elements are not only made in the form of graphic images to the identification information adapted for reading scanner, but additionally encoded.
- the method further includes the step of obtaining from the issuer a document, banknote or manufacturer of a valuable item of an asymmetric key for decoding information contained in a graphic image applied to the object being checked or to its accompanying certificate.
- the method further includes the step of additional decoding, using the obtained asymmetric key, the identification information applied to the object being verified or its certificate, so that the signals corresponding to the decoded information from the scanner decoder and the information from the sensor are compared in the comparison module.
- a device for verifying the authenticity of documents, banknotes, valuable items having randomly distributed identification elements and having a graphic image with identification information deposited on the object being checked or its certificate including a scanner of the above graphic image connected to the identification decryptor information contained in the graphic image, the sensor is randomly distributed identification elements, while the sensor and ifrator comparison module connected with the identification information received from the decoder and from the sensor of randomly distributed identification elements, refer to the description EP 2485178 A1, D21 H15 / 06.; G06K9 / 00, 08/08/2012
- the prior art also knows a device for verifying the authenticity of documents, banknotes, valuable items having randomly distributed identification elements and having a graphic image with identification information printed on the object being checked or its certificate, including a scanner of the above graphic image, connected to the decoder of the identification information contained in the graphic image,
- SUBSTITUTE SHEET (RULE 26) a sensor of randomly distributed identification elements, wherein the sensor and decoder are connected to a module for comparing identification information received from the decoder and from the sensor of randomly distributed identification elements, and electrically connected to the authenticity indicator of the object being checked, see the description of patent US 2007170265 A1, B42D15 / 00; G06K19 / 06; G07D7 / 12; G07D7 / 20, 07.26.2007.
- the present invention mainly aims to provide a device for verifying the authenticity of documents, banknotes, valuable items having randomly distributed identification elements and having a graphic image with identification information printed on the object being checked or on its accompanying certificate, allowing at least to smooth out the above drawback, namely to provide the ability to determine the authenticity of documents, money c) valuable items having randomly distributed identification elements, when the data on these elements is not only made in the form of a graphic image with identification information adapted for reading by the scanner, but also additionally encoded.
- the authentication device further comprises a decoding module associated with a decoder and a comparison module, and said graphic image includes key-encoded identification information of a random distribution of said identification elements.
- a decoding module is adapted for decoding based on an asymmetric key.
- FIG. 1 schematically depicts a functional diagram of a device for verifying the authenticity of documents, banknotes, valuable items having randomly distributed identification elements, and having a graphical image with identification information printed on the object being verified or its accompanying certificate that implements the method according to the invention.
- SUBSTITUTE SHEET (RULE 26) - figure 2 depicts a sequence of steps in the proposed method according to the invention.
- a device for verifying the authenticity of documents, banknotes, valuable items having randomly distributed identification elements and having a graphic image with identification information printed on the object being checked or its certificate accompanied by an illustrative method includes a scanner 1 of the above graphic image, connected to the decryptor 2 of the identification information contained in the graphic image, the sensor 3 randomly distributed identification e elements, wherein the sensor 3 and the decoder 2 are connected to the comparison module 4 of the identification information received from the decoder 2 and from the sensor 3 of randomly distributed identification elements, and electrically connected to the authenticity indicator 5 of the checked object.
- the authentication device further comprises a decoding module 6, associated with the decoder 2 and the comparison module 4.
- the decoding module is adapted for decoding based on an asymmetric key.
- the checked object is designated as 7.
- the field with the applied graphic information is conventionally shown as 8, the graphic information itself is shown as a bar code.
- a field with randomly distributed identification elements is conventionally shown as 9.
- the broken arrows conventionally show the process of scanning and reading information by the sensor 3.
- any set of graphic symbols can be used, mainly a bar code, a bar code, a QR code, that is, widespread options for applying information to an object.
- scanners of a bar code, bar code, QR code including mobile devices having a camera, for example, cell phones, can be used.
- identification elements various as specially created, for example, colored hairs in banknotes, and elements of natural origin, for example, paper fibers, can be used.
- SUBSTITUTE SHEET As the sensor 3 of randomly distributed identification elements, both image scanners having a special computing unit processing the information received and other devices depending on the choice of randomly distributed identification elements can be used. For example, a device for X-ray fluorescence or an ultrasonic flaw detector (see example below).
- GOST R 34.10-2001
- the method for determining the authenticity of documents, banknotes, valuable items that have randomly distributed identification elements and have a graphic image with identification information printed on the object being checked or on the certificate accompanied by it works consists of the following steps (See. Fig. 2).
- SUBSTITUTE SHEET (RULE 26) The facility uses museum value. As a graphic image, a barcode or a QR code can be selected.
- the scanner reads the above bar code or QR code, - Step A2.
- the decoder of the identification information contained in this graphic image recognizes it;
- the decoding module is decrypted, and for this the asymmetric encoding public key is used.
- the sensor randomly distributed identification elements read the location of randomly distributed identification elements on the object.
- step A5 The information obtained in step A4 is converted into a sequence of numbers.
- the comparison module correlates the numerical sequence corresponding to the identification information received from the sensor randomly distributed identification elements, and from the decoder.
- the sequence of steps is approximate and allows you to rearrange, add or perform some operations at the same time without losing the ability to verify the authenticity of the object. Modifications to the method include others. authentication indication options; various identification element selection methods; various asymmetric encoding methods.
- NFC technology near field communication
- RFID a method for automatically identifying objects in which data is read or written using radio signals stored in the so-called transponders.
- the encoding process can be attributed to modifications, since the data themselves can be encoded with an asymmetric key directly or indirectly, for example, encoding a hash and / or checksum (say SHA256) of the data.
- a hash and / or checksum say SHA256
- it is an electronic signature method.
- the coordinates of colored hairs interspersed in banknote paper can be used. For example, a sequence of coordinates of the ends of these colored hairs can be taken. With arbitrarily selected and assigned to the paper banknote coordinate system.
- this sequence of digits can be encoded using an asymmetric key. To do this, use the asymmetric coding private key. Already this new coded sequence of numbers and letters is converted into a graphic image and applied directly to the banknote. As a graphic image, a barcode or a QR code can be selected.
- the proposed method can now easily verify the authenticity of such banknotes having randomly distributed identification elements, namely, in this example, colored hairs, and having a graphic image with identification information printed on a banknote in the form of a bar code or QR code.
- the decoding module is decrypted, and for this, an asymmetric encoding public key is used.
- this sensor can be the same or a similar scanner, read the location of the colored hairs on the banknote,
- the comparison module correlates the numerical sequence corresponding to the identification information received from the sensor randomly distributed identification elements, namely the location of the colored hairs on the banknote and from the decoder.
- the device indicator lights up, for example, a green light; if the numerical sequences do not match, counterfeit a banknote, the device indicator in another mode lights up, for example, a red light.
- a device As randomly distributed identification elements of the picture can be used levels or intensities of the glow of the paint in x-ray radiation.
- a device As a sensor, a device is used, which is a flatbed scanner, combined with an x-ray source. Since under the influence of x-ray radiation on the surface of the paint the electrons from the beam pass from one energy level to another, the paint begins to glow, and it shines differently, gives different spectra and intensity.
- the specified sensor takes data
- the decoding module is decrypted, and for this, an asymmetric encoding public key is used.
- SUBSTITUTE SHEET (RULE 26) - the scanner reads the identification bar code or QR code printed on the back of the picture or on a certificate for it;
- the decoder of the identification information contained in this graphic image recognizes it.
- the comparison module correlates the numerical sequence corresponding to the identification information received from the sensor randomly distributed identification elements, and from the decoder.
- the device indicator lights up, for example, a green light; if the numerical sequences do not match, a fake picture is detected, the device indicator in another mode lights up, for example, a red light.
- Example 3 Validation of valuable goods or museum relics.
- Defects of their material are used as randomly distributed identification elements of valuable goods or museum relics, for example, a collection knife, precious weapons.
- the sensor is then a flaw detector, which is adapted for, for example, ultrasonic flaw detection.
- a flaw detector which is adapted for, for example, ultrasonic flaw detection.
- everything else is similar to example 2.
- the proposed method and device for determining the authenticity of documents, banknotes, valuable items having randomly distributed identification elements have a clear purpose can be carried out by a specialist in practice and, when implemented, ensure the implementation of the declared purpose.
- the possibility of being implemented by a specialist in practice follows from the fact that for each feature included in the claims on the basis of the description, the material equivalent is known, which allows us to conclude that the criterion of "industrial applicability" for inventions is met.
- the method further includes the step of obtaining from the issuer a document, a banknote or a manufacturer of a valuable item of an asymmetric key for decoding information contained in
- SUBSTITUTE SHEET (RULE 26) a graphic image applied to the object being checked or its certificate accompanied by the fact that before comparing the signals, the method further includes the step of additional decoding with the help of the obtained asymmetric key the identification information applied to the object being checked or its certificate accompanied, so that in the comparison module comparing the signals corresponding to the decoded information from the scanner decoder and information from the sensor and the set technical result is achieved, namely, the possibility of determining the authenticity of documents, banknotes, valuable items having randomly distributed identification elements, when the data on these elements is not only made in the form of a graphic image with identification information adapted for reading by the scanner, but also additionally encoded.
- An additional unexpected useful effect of the claimed invention is the ability to provide additional protection for the authenticity of documents, banknotes, valuable items with randomly distributed identification elements, in the form of just encoding with an asymmetric key and applying graphic information to the protected object.
- this object is encoded by an authorized person and is authentic.
- the very stage of successful application of the asymmetric key to the graphic image printed on the banknote for example, a bar code, indicates that the banknote is encoded by an authorized issuer, for example, Central Bank.
Landscapes
- Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computer Security & Cryptography (AREA)
- Computer Vision & Pattern Recognition (AREA)
- Inspection Of Paper Currency And Valuable Securities (AREA)
Abstract
L'invention concerne des procédés pour déterminer l'authenticité de documents possédant des éléments d'identification distribués de façon aléatoire et une image graphique avec des informations d'authentification appliquées à l'objet à vérifier. On obtient de l'émetteur d'un document ou du fabricant d'un objet de valeur une clé asymétrique pour déchiffrer les informations comprises dans l'image graphique appliquée à l'objet à vérifier. Avant la comparaison de signaux, on déchiffre aussi au moyen d'une clé asymétrique reçue des informations d'authentification appliquées à l'objet à vérifier, de manière à ce que le module compare les signaux correspondant aux informations décodées provenant du dispositif de déchiffrement, du scanner ou des informations provenant d'un capteur. On assure la possibilité de déterminer l'authenticité de documents possédant des éléments d'identification distribués de façon aléatoire lorsque les données portant sur ces éléments ne se présentent pas seulement sous la forme d'une image graphique avec des informations d'authentification conçues pour être lues par un scanner mais sont aussi soumises à un chiffrement supplémentaire.
Applications Claiming Priority (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
RU2013118835 | 2013-04-24 | ||
RU2013118835 | 2013-04-24 | ||
RU2013118837 | 2013-04-24 | ||
RU2013118837/08A RU2536367C1 (ru) | 2013-04-24 | 2013-04-24 | Способ определения подлинности документов, денежных знаков, ценных предметов |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2014175780A1 true WO2014175780A1 (fr) | 2014-10-30 |
Family
ID=51792197
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/RU2014/000272 WO2014175780A1 (fr) | 2013-04-24 | 2014-04-15 | Procédé permettant de déterminer l'authenticité de documents |
Country Status (1)
Country | Link |
---|---|
WO (1) | WO2014175780A1 (fr) |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
RU2088971C1 (ru) * | 1994-01-11 | 1997-08-27 | Юрий Дмитриевич Карякин | Способ защиты ценных бумаг от подделки |
US20070160814A1 (en) * | 2005-06-20 | 2007-07-12 | Mercolino Thomas J | Methods for quality control |
RU2346395C2 (ru) * | 2002-10-16 | 2009-02-10 | Майкрософт Корпорейшн | Криптографически защищенная идентификация личности |
RU2370377C2 (ru) * | 2004-02-27 | 2009-10-20 | Майкрософт Корпорейшн | Не поддающиеся подделке и фальсификации этикетки со случайно встречающимися признаками |
-
2014
- 2014-04-15 WO PCT/RU2014/000272 patent/WO2014175780A1/fr active Application Filing
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
RU2088971C1 (ru) * | 1994-01-11 | 1997-08-27 | Юрий Дмитриевич Карякин | Способ защиты ценных бумаг от подделки |
RU2346395C2 (ru) * | 2002-10-16 | 2009-02-10 | Майкрософт Корпорейшн | Криптографически защищенная идентификация личности |
RU2370377C2 (ru) * | 2004-02-27 | 2009-10-20 | Майкрософт Корпорейшн | Не поддающиеся подделке и фальсификации этикетки со случайно встречающимися признаками |
US20070160814A1 (en) * | 2005-06-20 | 2007-07-12 | Mercolino Thomas J | Methods for quality control |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
ES2582346T3 (es) | Uso de una firma digital obtenida a partir de por lo menos una característica estructural de un elemento material para proteger informaciones sensibles contra la lectura directa, y procedimiento de lectura de esta información protegida | |
EP2659413B1 (fr) | Système fournissant une résistance améliorée contre le vol de données pour un document d'identité électronique | |
US20090282259A1 (en) | Noisy low-power puf authentication without database | |
CA3194491A1 (fr) | Authentification d'identite biometrique | |
JP2008541260A (ja) | 紙幣またはその他の物理的オブジェクトの認証 | |
WO2007072793A1 (fr) | Carte permettant une authentification | |
RU2435218C2 (ru) | Карта с возможностью аутентификации | |
JP2015525386A (ja) | 支払い装置、支払いシステムおよび支払い方法 | |
JP2015088080A (ja) | 認証システム、認証方法、及びプログラム | |
WO2015154647A1 (fr) | Système d'authentification de devise ou de valeur basé sur une théorie d'authentification à boucle fermée | |
CN110517049A (zh) | 一种基于二维码及区块链的票据防伪识别方法与装置 | |
KR20140126976A (ko) | 모바일 신분증 관리 장치 및 사용자 단말기 | |
RU2088971C1 (ru) | Способ защиты ценных бумаг от подделки | |
CN108416414B (zh) | 自校验防伪二维码及制作方法和装置、自校验方法和装置 | |
ES2627630T3 (es) | Procedimiento para el desbloqueo de una instalación de bloqueo de vehículo | |
RU2536367C1 (ru) | Способ определения подлинности документов, денежных знаков, ценных предметов | |
Nithyanand | A Survey on the Evolution of Cryptographic Protocols in ePassports | |
KR101242684B1 (ko) | 2차원바코드를 이용한 사용자 인증 시스템 및 방법 | |
RU2684498C2 (ru) | Способ сертификации и аутентификации защищенных документов на основании результата измерения отклонений относительного положения в различных процессах, вовлеченных в изготовление таких защищенных документов | |
EP2766860A1 (fr) | Vérification d'identité | |
WO2014175780A1 (fr) | Procédé permettant de déterminer l'authenticité de documents | |
US20090037744A1 (en) | Biometric pin block | |
RU133953U1 (ru) | Устройство для проверки подлинности документов, денежных знаков, ценных предметов | |
RU2647375C2 (ru) | Денежная купюра, способ ее изготовления и способ подтверждения ее истинности и индивидуальности | |
Kevenaar et al. | A reference framework for the privacy assessment of keyless biometric template protection systems |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 14788572 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
32PN | Ep: public notification in the ep bulletin as address of the adressee cannot be established |
Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205N DATED 11/01/2016) |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 14788572 Country of ref document: EP Kind code of ref document: A1 |