摘要:
The invention concerns a device which consists in affixing on the smallest possible surface (of the order of a few square centimeters) of an object, a characteristic shape (such as a double-edged rectangle) containing structured data so as to enable reconstruction of the traceability procedure of different operations to which an object or a product is subjected. Said characteristic shape is called traceability frame . Some of said data are designed to be read by humans (conventional writing, pictures and images). Other so-called coded data are designed to be read by optical scanning (two-dimensional codes, ECO, DOT writing and the like). The latter can be sealed and encrypted for secure use. The part consisting of coded writing comprises an identifier particular to each object and one or several tracers, which enable to locate straightaway the essential characteristics and, by means of links, detailed data from successive operators. Each marking (or label) comprises an individual encrypted reference guaranteeing its authenticity. Tables specific to each field of application (traceability tables) enable to reduce the number of coded characters contained in each traceability frame placed on each object. They also contain addresses of general operators of the field, such as certifiers. Said tables designated in the identifier can be loaded in the code scanners and the computerized servers of the operators.
摘要:
The invention concerns a method for identifying an image or a document which consists in inserting into said image or affixing on said document the graphic representation of a code in matrix form, the code comprising consecutive sequences each containing an information concerning the serial number of the sequence and an information concerning the sequence number.
摘要:
Procédé et tête de lecture de texte imprimé au moyen d'une tête mosaïque. La tête comporte un réseau aligné de photoidiodes adjacentes (4), des éléments optiques tels qu'une image d'une bande de support de texte et des moyens d'exploration séquentielle du réseau, pilotés par une horloge.
摘要:
Procédé et machine pour la frappe conjointe en graphique et en code. La machine comporte un clavier (1) émettant des signaux numériques codés qui s'enregistrent successivement dans la mémoire (3), avec visualisation simultanée en (4). En fin de ligne, l'appui sur la touche (2) transfère le contenu de la mémoire (3) dans la mémoire (6). Lorsque celle-ci est pleine, le jeu du compteur cyclique (7) assure une première lecture en direction de la tête graphique (17a) à travers la porte (8), suivie d'une seconde lecture en direction de la tête d'impression (17b) à codage A S C II, en sorte que la ligne graphique imprimée est suivie de sa correspondance codée, exploitable par lecture optique ultérieure. Application à l'impression de documents commerciaux.
摘要:
The invention relates to a method, implemented by computer, for encoding information described by means of a set of physical character structures and data structures. The set of structures consists of information-bearing elements. Each physical character structure comprises at least one real or virtual column, each column including at least one dot, a dot making up the physical representation of at least one data bit, a real column of dots being displayable on a display medium, a virtual column of dots not being displayable on a display medium, and each data structure comprises bytes, the columns of the physical character structures representing the bytes of the data structures. Each column of dots makes up a unit element of information that is represented physically. The method comprises a writing step during which at least one dot from each column of dots is assigned with a value that depends on the position or area occupied thereby on said column. The dots are represented by waves or by streams, contractions, deformations or deposits of material.
摘要:
The invention concerns a personal computer terminal for operating secure applications comprising means for communicating with another computer equipment, including means for authenticating the authorised user and means for transmitting to the computer equipment to which it is connected the outcome of the authenticating step. The invention also concerns a method for authenticating the user previous to a transaction between a computer terminal and a computer equipment, comprising a step displaying at least one image, a step of selecting a zone of said image and a step of comparing the selected zone with data pre-recorded in the memory.
摘要:
The invention relates to the MI2S method which can be used to process and, in particular, secure computer files, physical documents, sounds and chemical compounds. The inventive method mainly involves the insertion of digital signature-type information by means of a universal or canonical alphabet which is used directly via a universal interface or interfaces specific to each peripheral, using a specialised alphabet specific to each application domain and encoding, for example, the 256 values of a byte. Each of the different domains has a particular alphabet. The canonical alphabet is also dedicated to computing. The aforementioned canonical alphabet can be used to write a security computer file (such as a digital signature and authentication data) which corresponds to the file to be secured and in which said alphabet will be inserted so that they cannot be dissociated. Said alphabet enables a general parameterised interface to control all of the peripherals and it serves as a base for all the other dedicated alphabets used by specific simplified interfaces in order to secure the corresponding information in the different application domains. A dedicated acoustic alphabet is defined as well as a real time operating tool. A dedicated chemical alphabet is also defined in order to secure the chemical compounds. Moreover, several alphabets (or fonts) exist that can encode the byte for DOTE, ECO, visual documents, etc.
摘要:
The DOT coding method is based on individual coding of octets. To each of the 256 values of the octet corresponds a specific independent symbol. The DOT method introduces at each symbol intrinsic graphic data which serve to provide secure reading and interpretation of the symbols, such as the number of constituting black elementary graphic dots and the parity of the number of intervals. A so-called inter-character column serves to separate the characters and enables to code, beyond the octet, functions such as indexing or intrinsic specific meanings to the symbol. The various field symbols which have specific meanings are advantageously preceded by the appropriate indexing symbol and can thus be mixed at will without formatting constraints.