摘要:
An identification card (C) as for supporting commercial or other significant transactions involving a designated subject. The card incorporates a machine-readable record (116, 118) and includes a composition (15, 120) to characteristically modulate a light beam for individual card identification. In one embodiment, the card incorporates light-changing crystals (120) (e.g. polaroid) to modulate a light beam. The machine-readable record (116, 118) on the card indicates: the light beam modulation, a coded personal identification for the subject card bearer, and a time-related value criterion involving use for the card. Systems (Figs. 10, 11 and 12) are disclosed for variously sensing card characteristics by modulated light including polarized light techniques and from different aspects. A system (Figs. 5 and 6) for processing the cards is also disclosed including apparatus for sensing recorded signals representative of: a modulated light beam characteristic, a personal identification for the card holder, and a time-related use limitation. Computer structure (102) is provided for comparing such signals with developed signals provided from the card and the user to verify that: the card is genuine, the user is proper, and the use is appropriate. A multiple-terminal system (Fig. 4) is disclosed wherein terminal inquiries are channeled to one of several processors (SC) for flexibility and reliability. The system incorporates apparatus (68) for conditionally refreshing a card.
摘要:
An authenticator device, e.g. card, of verifiable composition substance and informational content with a system of production and verification. Character uniqueness signals identifying the composition of the device are recorded on the card in an encrypted form combined with statistical data signals representative of information on the card. Testing the card involves freshly sensing the character uniqueness data and entering the statistical data. Such fresh data is then compared with the recorded values after decoding. Favorable comnparisons manifest approval and enter the statistical data for processing.
摘要:
The invention discloses an authenticatordevice for verifying authenticity comprising a sheet medium (210); a reflective layer (218) disposed on one side of said sheet over at least a part of the area of said sheet; an array of sand-like particles fixed on said reflective layer whereby to provide a varying characteristic (D1-D6) of light reflective layer whereby to provide a varying characterstic of light reflectivity over the space of said reflective layer; and machine-readable indicia (216) on said sheet of medium, said indicia being decodable to specify said characteristic at said specific area location (Dl-D6). The invention also refers to methods and apparatuses for producing an authenticator and for verifying an authenticator.
摘要:
Un système permet de suivre des unités de marchandises à l'aide de dispositifs d'autentification ou étiquettes (10) lorsque ces étiquettes (avec les articles de marchandises) empruntent des circuits commerciaux. Le système complet comporte une étiquette de vérification ou d'autentification non-flasifiable (10) qui porte un numéro d'identification (26, 36, 38) pouvant être lu par une machine et qui comprend, dans une forme de réalisation, des sections de détachement par déchirement (14, 18) portant le numéro d'identification et qui, dans une autre forme de réalisation (Fig. 5) est intégrée par adhésion à l'emballage d'un produit. Lorsqu'il fonctionne avec les étiquettes, le système comprend un processeur central (40) ayant une mémoire adressable en utilisant le numéro d'identification de l'étiquette. Un lecteur (106) d'étiquette détecte le numéro d'identification pouvant être lu par la machine (le lecteur peut également vérifier l'étiquette) et adresse la mémoire à des fins d'informations d'enregistrement pour identifier de manière spécifique l'étiquette et indiquer des informations par lots (80). Lorque l'étiquette (et l'article de marchandise) empruntent un réseau commercial, les informations en mémoire sont complétées pour élaborer un historique (Fig. 4) d'un tel mouvement. Dans des opérations ultérieures, la mémoire peut alors être testée pour obtenir des informations utiles concernant la marchandise. Comme moyen d'utilisation de ce procédé pour obtenir des données significatives, le système comporte un appareil (64) permettant de tester le contenu de la mémoire pour établir l'identification d'étiquettes spécifiques qui sont en relation les unes par rapport aux autres et correspondant à un sous-ensemble de marchandises présentant un intérêt.
摘要:
The system incorporates a random number generator (24) for generating a specific key to be used during a specific interval of communication and which key is effective only after the verification of proper security data. Verification is accomplished during a preliminary operation of coding security data and a random number at one station and transmitting such data to another station for verification. In the operating sequence of the disclosed system, security data, as from a identification card (52) or tag, along with a random number, is initially coded at a remote station and transmitted as preliminary data signals to a central station for decoding and verification. The random number is developed at the remote station and transmitted to the central station as part of the preliminary data signals for decoding and temporary registration. Upon verification of the security data, the random number functions as a key for coding means at both the remote and central stations for processing message data.
摘要:
System for authenticating an object on the basis of certain physical phenomena or character, specifically, measurable, but not practicably duplicable random variations in the object. In one form, the object (authenticator (T)) is a paper tag having a reference space (14), the varying translucency pattern of which is a measurable but practicably unduplicable characteristic of the paper. The reference space (14) is sensed to provide reference signals indicative of the varying translucency. A reference numeral (10) is then provided from some registered form, as on the tag or in a list. If the numeral (10) is readily accessible, it likely will be cryptographically encoded. Note the value of putting encoded information on the tag to avoid the need for large reference files. For verification, freshly sensed reference signals, as from the tag (T) (actually characteristic of the tag) are compared with signals that previously were sensed as characteristic of the tag (T). Structures are disclosed as specific forms of the authenticator (T), along with apparatus for authenticator production, detection and manipulation. Different forms of tags (210) are disclosed, the measurable characteristic of which involves light transmissivity and reflectivity. Apparatus (111) for spectrographic confirmation of tag material is also disclosed. In an illustrative form of a tag (T) as an identification means, tags and processing apparatus utilize magnetic medium (218) and printed images (214). The magnetic medium (218) is also disclosed to be recorded as for developing information on shelf life and sales channels.
摘要:
Authenticity of a paper document (10) is tested by sensing (40) its transparency and comparing (32) the sequence of representations produced, with a sequence of reference representations read (39) from a record of an earlier-made sensing written (38) on the document (10) in an offset-printed (and therefore non-uniform) magnetic stripe (18). The reference sequence is written on the stripe (18) in the form of an encrypted identifier (156, Figure 4) within a bit string (Figure 4) that is interspersed with framing characters (155) and includes a public encryption key (158) and an error-correction code (162). Each data and control bit of the bit-string format is written as an eight-bit character enabling ready distinction between data and control bits and enhancing error detection and correction of the string when read (39) from the non-uniform stripe (18); the relative timings and the polarities of peaks of the analogue signal from the magnetic reading head 939) determine the data value ("0" or "1" according to timing interval t or t/2) or the control nature (interval 3t/2) or each read bit. The error-correction code is applied to reduce errors and enable decryption of the recorded identifier using the public key, whereby an appropriate degree of correlation for authenticity confirmation, can be achieved with the fresh transparency output (40).
摘要:
Verification of a card C involves moving it through a slot S of a terminal T to derive test signals representative of pixels of a sensed card-area 12 that includes a likeness 24 (FIG 2) of the cardholder together with part 26 (FIG 2) of his alpha-numeric identifier 10. The test signals, after sampling, are quantized (94 FIG 4) against two controlled thresholds which identify each pixel of the area 12 as being darker than, lighter than, or about the same as the detected average optical density (80 FIG 4) of the sensed area 12. When digitized (96 FIG 4), the quantized signals are compared (86 FIG 4) with digital-data signals read (78 FIG 4) from a magnetic recording 14 that was made during earlier (FIG 5) sensing of the area 12. Lamps L indicate the existence of acceptable (40; 90 FIG 4), unacceptable (42; 88 FIG 4) or uncertain (44; 92 FIG 4) overall correlation between the compared signals. A two-dimensional liquid-crystal display D shows the correlation results graphically in binary pixel form (black/white), with pixel-to-pixel correspondence with the sensed area; operation of a button 53 expands the display D to show sub-pixels.
摘要:
The authenticity of a document (D) is tested by sensing (14) its translucency throughout an area (12) and correlating the sequence of representations (20 Figure 2) produced, with a sequence of reference representations (18 Figure 2) read (16) from a magnetic recording (10) of an earlier-made sensing. Correlation is carried out by relating successive overlapping parts (L Figure 2) of the freshly-derived and digitized sequence with corresponding overlapping parts (L) respectively, of the digitized reference sequence. The overlapping parts (L) are of the same length (N), and overlap with one another equally, throughout both sequences (20,18), the extent (M) of overlap being such that all individual representations in each sequence (20;18) occur in three successive parts of that respective sequence. Assembler circuits (44,46; Figure 1) supply signals (SUM R, SUM R², SUM RS) in accordance with functions of the successive parts (S;R) of the two sequences, to an arithmetic unit (50) for generation of correlation scores (C) that are then analyzed (56) to produce an indication (42) of the degree of authenticity. A preliminary, independent check on the maxima, minima, and/or average value of the freshly-derived sequence is carried out by a test unit (38) to signal rejection of the document (D) if the check is not satisfied.
摘要:
Operator-interactive verification of a card-based transaction involves reading a magnetic stripe (24) on the card (C) to derive test data (T) representing an arithmetical combination of a uniqueness characteristic of the card (derived from its translucency at defined locations D1-D6) and the assigned- users personal-identification data (PIN). The test data (T) is arithmetically-combined with the personal-identification data (PIN) entered by the user, to produce a decoded representation of the uniqueness characteristic (D') which is compared with a fresh sensing (D) of that characteristic as a basis for verification of both the card (C) and the user-entered data (PIN). The user can choose to alter his operative personal-identification data (PIN), and does this, after first achieving verification using the existing data, by entering the new, chosen data for re-calculation with the decoded uniqueness characteristic (D') to produce new test data (T) which is then recorded on the card (C) in place of the old (T).