WO1997024699A1 - Authentication of articles - Google Patents

Authentication of articles Download PDF

Info

Publication number
WO1997024699A1
WO1997024699A1 PCT/GB1995/003051 GB9503051W WO9724699A1 WO 1997024699 A1 WO1997024699 A1 WO 1997024699A1 GB 9503051 W GB9503051 W GB 9503051W WO 9724699 A1 WO9724699 A1 WO 9724699A1
Authority
WO
WIPO (PCT)
Prior art keywords
article
disk
characteristic
representation
physical
Prior art date
Application number
PCT/GB1995/003051
Other languages
French (fr)
Inventor
Youry D. Kariakin
Original Assignee
S. E. Axis Limited
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by S. E. Axis Limited filed Critical S. E. Axis Limited
Priority to PCT/GB1995/003051 priority Critical patent/WO1997024699A1/en
Priority to AU43118/96A priority patent/AU4311896A/en
Publication of WO1997024699A1 publication Critical patent/WO1997024699A1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • H04L9/3249Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures using RSA or related signature schemes, e.g. Rabin scheme
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07DHANDLING OF COINS OR VALUABLE PAPERS, e.g. TESTING, SORTING BY DENOMINATIONS, COUNTING, DISPENSING, CHANGING OR DEPOSITING
    • G07D7/00Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency
    • G07D7/004Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency using digital security elements, e.g. information coded on a magnetic thread or strip
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B82NANOTECHNOLOGY
    • B82YSPECIFIC USES OR APPLICATIONS OF NANOSTRUCTURES; MEASUREMENT OR ANALYSIS OF NANOSTRUCTURES; MANUFACTURE OR TREATMENT OF NANOSTRUCTURES
    • B82Y10/00Nanotechnology for information processing, storage or transmission, e.g. quantum computing or single electron logic
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06NCOMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N3/00Computing arrangements based on biological models
    • G06N3/12Computing arrangements based on biological models using genetic models
    • G06N3/123DNA computing
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07DHANDLING OF COINS OR VALUABLE PAPERS, e.g. TESTING, SORTING BY DENOMINATIONS, COUNTING, DISPENSING, CHANGING OR DEPOSITING
    • G07D7/00Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency
    • G07D7/004Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency using digital security elements, e.g. information coded on a magnetic thread or strip
    • G07D7/0043Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency using digital security elements, e.g. information coded on a magnetic thread or strip using barcodes
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07DHANDLING OF COINS OR VALUABLE PAPERS, e.g. TESTING, SORTING BY DENOMINATIONS, COUNTING, DISPENSING, CHANGING OR DEPOSITING
    • G07D7/00Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency
    • G07D7/06Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency using wave or particle radiation
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07DHANDLING OF COINS OR VALUABLE PAPERS, e.g. TESTING, SORTING BY DENOMINATIONS, COUNTING, DISPENSING, CHANGING OR DEPOSITING
    • G07D7/00Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency
    • G07D7/14Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency using chemical means
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/08Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/08Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
    • G07F7/0806Details of the card
    • G07F7/0813Specific details related to card security
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/08Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
    • G07F7/12Card verification
    • G07F7/125Offline card verification

Definitions

  • This invention relates to cost-effective authentication of articles and hence assists to protect a wide range of articles from forgery and counterfeiting.
  • Authentication is known as a branch of cryptography for verifying the source of encrypted messages via, for example, electronic signatures.
  • public key cryptosystems provides means not only of encrypting messages using public and secret keys, but also of authenticating the source of the message as discussed in Welsh, D. Codes and Cryptography, Oxford, OOP, 1988, Ch . 12.
  • the object of this invention is to provide a method for cost-effective authentication of a wide variety of articles without requiring special materials, which cannot be replicated by potential forgers or counterfeiters and which can be applied to existing articles and to apparatus for encoding articles for authentication.
  • a method of authenticating articles using the steps of determining a distinguishing physical or chemical characteristic of an article, encoding that physical or chemical characteristic, encrypting the encoded characteristic to form an encrypted representation, applying that encrypted representation to the article, subsequently authenticating the article by redetermining the physical or chemical characteristic, and reading and decrypting the encrypted representation to form a decrypted representation and comparing the decrypted representation of the recorded physical or chemical characteristic with the redetermined physical or chemical characteristic to determine the authenticity of the article.
  • the micro-topography of an area of a surface of the article is scanned while the surface is illuminated from a single direction.
  • micro-topography of an area of a surface of the article is scanned while the surface is illuminated from a first direction and subsequently re- scanned while the surface is sequentially illuminated from at least one further direction and the resultant images are combined to form the encoded characteristic.
  • the micro-topography of an area of a surface of the article is scanned while the surface is illuminated from a first direction and subsequently re-scanned while the surface is illuminated from a second direction, vectors are derived from the resultant two images and the vectors derived from one of the images are subtracted from the vectors derived from the other image to form the encoded characteristic.
  • the characteristic of the article encoded may be, for example: Paper micro-topography (reflection, transparency at different wavelengths, conductivity)
  • Metal microstructure reflection, transparency to different wavelengths, conductivity, crystalline structure
  • Wood microstructure (reflection, transparency to different wavelengths, conductivity)
  • the encoding is encrypted and decrypted using a public key encryption system.
  • the public key encryption system has a plurality of levels of security.
  • the article to be authenticated is a document such as a bank note or other security.
  • the article is optical or magnetic information storage means preferably adapted so that information cannot be recovered from the storage means without authentication.
  • the area or portion of the article to be used in determining the physical or chemical characteristic is indicated by a plurality of reference marks.
  • the encrypted coding marked on the article is formed from a plurality of marks such as dot or bar codes.
  • the article is a laser disk and the characteristic that is encoded is one of a representation of the topography of the disk, a representation of the topography of data on the disk, and a representation of topographical deviation of data on the disk from standardised topography of data, said characteristic being encoded and encrypted to form said encrypted representation which is applied to the disk and the disk is subsequently authenticated by redetermining the encoded data and comparing the decrypted data with the redetermined data, so as to thereby determine the authenticity of the disk.
  • a disk player is enabled to read information data on said disk but if said disk is not authenticated then said disk player is disabled and said disk will not "play" .
  • an apparatus for encoding articles for authentication including means for determining a distinguishing physical or chemical characteristic of an article, means for encoding that physical or chemical characteristic, means for encrypting said encoded characteristic as an encrypted representation and means for applying said encrypted representation to the article.
  • the physical or chemical characteristic encoded is the micro-topography of an area of a surface of the article.
  • scanning means are provided for scanning the micro-topography of an area of a surface of the article while the surface is illuminated from a first direction and subsequently re-scanning while the surface is sequentially illuminated from at least one further direction and means for combining the resultant images to form the encoded characteristic.
  • scanning means are provided for scanning the micro-topography of an area of a surface of the article while the surface is illuminated from a first direction and subsequently re-scanning while the surface is illuminated from a second direction, means for deriving vectors are derived from the resultant two images and subtracting means for subtracting the vectors derived from one of the images from the vectors derived from the other image to form the encoded characteristic.
  • the physical or chemical characteristic encoded is any one of nuclear magnetic resonance, nuclear quadrupole resonance spectrum, electron paramagnetic resonance spectrum, infrared absorption spectrum, optical rotation, DNA code, RNA code, circular dichroism spectrum, spectrum of anomalous dispersion of x-rays, individual combinative dispersion spectrum, gas electronography, oscillatory infrared, electronic or ultraviolet spectrum, the crystalline or lattice structure of the material constituting the article.
  • the encoded characteristic is encrypted and decrypted using a public key encryption system and advantageously the public key encryption system has a plurality of levels of security.
  • the article is a document such as a bank note or other security.
  • means are provided for using reference marks so as to identify on the article the area or portion of the article to be used in determining the physical or chemical characteristic.
  • the representation of the encrypted coding marked on the article is formed from a plurality of dot or bar codes.
  • the apparatus further includes transporting means for orientating and moving an article successively relative to an analytical, measuring or scanning station, holding the article in or moving the article through said station while a physical or chemical characteristic of the article is determined, moving the article relative to a marking station, holding the article in or moving the article through said marking station while the article is marked and subsequently transporting the article out of the apparatus.
  • the apparatus includes transporting means for orientating and moving a document successively relative to a high resolution optical scanning station, for holding the article in or moving the article through said station while the micro-topography of an area of a surface of the document is determined, moving the document relative to a marking station, holding the document in or moving the article through said marking station while the document is marked and subsequently transporting the document out of the apparatus;
  • said determining means is a means for scanning the micro-topography of a portion of a surface of said document;
  • said means for encoding forms an encoded representation of the micro-topography;
  • said means for encrypting said encoded representation uses at least one encryption key to form said encrypted representation, and said means for applying marks the encrypted representation on the document.
  • said means for determining a distinguishing physical or chemical characteristic of an article is a laser reader for reading one of the topography of a laser disk, the topography of information data on the disk, and a representation of topographical deviation of information data on the disk from standardised topography of data, said characteristic being encoded and encrypted to form said encrypted representation, and said means for applying said encrypted representation is a laser writer.
  • comparator means is employed to determine an electrical signal representative of the deviation of the binary 0's and l's from a standard depth for a 0 and 1.
  • an apparatus for authenticating an article characterised in that the apparatus includes means for determining a physical or chemical characteristic of an article, means using one or more public decryption keys for decipering an encoded representation of that physical or chemical characteristic marked on the article, means for comparing the actual physical or chemical characteristic with the deciphered representation and means for indicating therefrom whether the article is authentic.
  • the determining means scans the micro-topography of the article and the comparing means compares the actual topography with the decoded representation.
  • said apparatus further includes secret decryption means, using for higher levels of security, the same secret encryption key to decrypt the representation as that used to encrypt the representation without disclosing said key to an operator.
  • the apparatus further includes error-correcting means to allow for changes in the chemical or physical characteristics subsequent to the encoding of the same, produced, for example, by wear, aging or soiling.
  • the apparatus further includes transporting means for orientating and moving the article relative to an analytical, measuring or scanning station, holding the article in or moving the article through said station while a physical or chemical characteristic of the article is determined and subsequently transporting the article out of the apparatus.
  • the apparatus includes transporting means for orientating and moving a document relative to a high resolution scanning station, holding the article in or moving the article through said station while the micro-topography of a portion of a surface of the document is determined and subsequently transporting the article out of the apparatus; said determining means is a means for scanning the micro-topography of the document; means for reading and, using at least one decryption key, decrypting, an encrypted representation of the micro-topography previously marked on the document; means for comparing compares the encoded representation of the micro- topography so obtained with that determined by the apparatus.
  • said means for determining a distinguishing physical or chemical characteristic is a laser reader
  • said comparing means redetermines the encoded data and compares the decrypted data with the redetermined data
  • said indicating means is arranged to supply a signal to a disk player indicating authenticity of said disk whereby if said disk is judged not to be authentic the disk will not "play” and if it is judged to be authentic the disk will "play” .
  • said means for determining a physical or chemical characteristic of an article is a laser reader and said means for comparing is a decision making means for comparing the deciphered representation with the actual characteristic that is read by said laser reader and said decision making means being adapted to enable or disable means for reading information data on said disk in dependence upon whether said disk is determined to be authentic or not.
  • a method of authenticating a laser disk such as a CD or CD-ROM using the steps of determining a characteristic of said disk that is one of a representation of the topography of the disk, a representation of the topography of data on the disk, and a representation of the topographical deviation of data on the disk from standardised topography of data, encoding the characteristic, encrypting the encoded characteristic to form an encrypted representation, applying the encrypted representation to the disk, subsequently authenticating the disk by redetermining the characteristic, and reading and decrypting the encrypted representation to form a decrypted representation, and comparing the decrypted representation of the recorded characteristic with the redetermined physical characteristic so as to thereby determine the authenticity of the disk.
  • a disk player is enabled to read information data on said disk but if said disk is not authenticated then said disk player is disabled and said disk will not play said information data.
  • an apparatus for encoding laser disks such as CDs or CD-ROMs including a laser reader for reading one of the topography of the disk, the topography of information data on the disk, and a representation of topographical deviation of information data on the disk from standardised topography of data, means for encoding the physical characteristic as an encoded characteristic, means for encrypting said encoded characteristic as an encrypted representation, and means for applying said encrypted representation to the article.
  • an apparatus for authenticating a laser disk such as a CD or CD-ROM including means for determining a physical characteristic of the disk by using laser reading means to read one of the topography of the disk, the topography of information data on the disk, and a representation of topographical deviation of information data on the disk from standardised topography of data, means using one or more public decryption keys for deciphering an encoded representation of that physical characteristic marked on the disk, means for comparing the actual physical characteristic with the deciphered representation, and means for authenticating said disk.
  • Figure 1 shows a USA one hundred dollar bank note having a mark used to define a scanning area
  • FIG. 2 shows a USA one dollar bank note in which an encrypted representation is printed in accordance with an aspect of this present invention
  • Figure 3 is a diagrammatic representation of the micro- topography of the scanned bank note paper
  • Figure 4 is a diagrammatic view of the encrypted representation
  • Figure 5 shows a micrograph of the surface structure illuminated from a right hand side direction
  • Figure 6 shows a micrograph of the surface structure illuminated from a left hand side direction
  • Figure 7 is a depiction of the resultant surface derived from the micrographs in Figures 5 and 6 for a clean bank note
  • Figure 8 shows an encrypted representation derived from and applied to a clean bank note
  • Figure 9 is a graphical representation of the correlation between the scanned surface and the deciphered encrypted representation for a clean bank note
  • Figure 10 shows a depiction of the same area as Figure 7 after the surface has been damaged by wear and soiling
  • Figure 11 shows an encrypted representation as in Figure 8 but after the surface has been damaged by wear and soiling
  • Figure 12 is a graphical representation of the correlation between the deciphered encrypted representation and the re-scanned image for the worn and soiled surface, [please confirm]
  • Figure 13 is a block schematic diagram of the encoding apparatus
  • Figure 14 is a block schematic diagram of the signal processing of the encoding apparatus
  • Figure 15 is a block schematic diagram of the deciphering apparatus
  • Figure 16 is a block schematic diagram of the signal processing performed by the deciphering apparatus
  • Figure 17 is a block schematic of another embodiment of an encoding apparatus particularly useful with a laser disk.
  • Figure 18 is a block schematic diagram of the deciphering and comparison apparatus to be used with the Figure 17 embodiment.
  • the first embodiment is for the protection of paper money and securities from forgery by high resolution digital scanning a predetermined small (say 1 square millimetre) area of the micro-topography of the paper from which the money or security is made and then printing on the paper an encrypted mark representing that topography.
  • a bank note l has a scanning area indicated by some pre-printed mark 2 on the paper; the mark 2 may be used by both the encoding and the authenticating apparatus to locate the precise area to be scanned for encoding and authenticating. Alternatively the deciphering apparatus may detect the location of the encrypted mark and from that position determine the area of paper to be topographically scanned.
  • An encrypted representation 3 is shown on a bank note 4 in Figure 2.
  • M is the number before encryption and after decryption d is the (secret) encrypting key e is the (public) decrypting key mod N means that the modulus of the number it qualifies is taken i.e. the remainder after dividing by N
  • n is the product of two prime numbers p, q then
  • the value 0100110011 (307) which is the encoded characteristic of the topography is encrypted as 1000101 (69) .
  • this encrypted value it may be expressed as a bar code printed onto the bank note, as shown in Figure 4, in which a bar 16 represents the value 1 and the absence of a bar represents a value 0.
  • the binary values 7 are also printed alongside the bar code in Figure 4. Each reading line scanned will then result in a similar bar code which may be printed as a series of bar codes.
  • N has been selected for ease of demonstration. In an actual embodiment a large value of N would be used. Where N is more than 10 300 it is practically infeasible to determine the secret key from the published information.
  • multiple levels of security are incorporated using higher values of mod N for the higher levels of security, because prime factorisation becomes computationally infeasible as N increases in size.
  • the use of high values of N involves increased processing costs so that retailers may, for example, be equipped with apparatus to read the lowest level security coding, high street banks with higher level security apparatus and the issuing bank with the highest level, which may include only secret keys and no public keys.
  • bank notes are protected by digitally combining the images of the micro-topography scanned when sequentially illuminated from two or more directions.
  • Figure 5 shows the surface of a bank note illuminated from a right hand side direction and
  • Figure 6 shows the bank note illuminated from a left hand side direction.
  • an un-printed area of the bank note is scanned to reduce the effect of features common to all notes printed alike.
  • X (x 17 x 2 , ...x which is digitised
  • the second image, shown in Figure 6 is read and represented by • • -y n ) which is also digitised.
  • the scanned bit maps are vectorised into vectors L. Using such a combined image reduces the possibility of fraudulent reproduction of the image while distinguishing between topography and surface markings.
  • n* may be of the order of 900 where n is of the order of 10 4 .
  • this reduction in redundancy increases the efficiency of the encrypting algorithm.
  • the vector L* may be combined with a coded sequence Z representing additional information such as the denomination of the bank note, and/or the date and time of issue etc., to obtain the vector M.
  • the unencrypted vector M is encrypted to produce the cryptotext C.
  • the encrypted code C is transferred to an error correction code C*.
  • the size of C* will depend on the level of error correction required. (The size of C* will be between 2000 and 10000 to correct 200 to 2000 errors (see Reddy S.M., Robinson J.P., Random error and burst correction by iterated codes - IEEE Trans. Information Theory 1970, Vol.IT-16, p452-459 and Chien R.T. Cyclic decoding procedures for Bose-Chaudhuri-Hocquemghem codes - IEEE Trans. Information Theory 1964, Vol.IT-10, p357- 363) .
  • the resulting encrypted image is printed on an area of the bank note, preferably close to the area scanned, as shown in Figure 8.
  • This encrypted representation is shown printed on a bank note in Figure 2.
  • the unencrypted description M is obtained, from which the vectors Z and L* are recovered. From L*, using error correction procedures, the starting vector L is determined.
  • a mechanical transportation device 130 appropriately aligns and orients a bank note (not shown) and moves the bank note to a scanning station 131 having a read head 132, and holds it stationary in, or incrementally or continuously transports it through, the scanning reading station 131 as required for the scanning device to produce an image of the predetermined area of the note.
  • Digital signals X and Y representing images of the micro-topography illuminated from two different directions, are passed via a respective one of lines 133 from the scanning station to digital processing unit 134 where the addition of further information, redundancy reduction, conversion to error correcting code and encryption are performed.
  • the bank note is moved by the transport device 130 to a printing station 135, and held stationary there or transported therethrough for print head 136 to print on a predetermined portion of the note using processed and encrypted signals C* over line 136 from the data processing unit 134.
  • Another outlet 137 from the processor 134 outputs parameter signals such as the value of the public key and the modulus number to be used for subsequently authenticating the bank note.
  • Output from the combiner 142 is input to an encryption device 144 which also has an input from a key generating unit 145.
  • a second output from the key (d) generating block forms one of the outputs 137 of the processor 134.
  • a mechanical transporting device 150 correctly aligns and orients a bank note and moves the bank note to or through a scanning station 151 having a read head 152.
  • Output signals corresponding to images X and ⁇ , from scanning the micro- opography of the bank note illuminated from two directions are input via lines 153 to an authenticating processor 154.
  • an output signal from reading the encrypted representation C is passed via line 155 from the scanner to the processor 154.
  • Output from the digital processing unit on the authenticity of the bank note is passed via line 156 to a display unit 157 and additional information Z on for example the encoded denomination of the note is passed to the display unit 157 via a line 158.
  • the open key e and numbers N are input to the processor 154 via line 159.
  • the decrypting unit 163 then passes the additional information Z to the line 158 and passes L * to an unpacking unit 164 where redundancy is restored to reproduce L.
  • the unpacking unit 164 passes L to the correlator 161 where the correlation coefficient between L and t, is calculated which is then passed to a decision- making unit 165 where a decision on authenticity is made and passed via line 156 to the information display unit 157.
  • the characteristic that is encoded may be representative of the topography of the disk or of the topography of the data on the disk.
  • the data on a laser disk is in binary form and representations of 0's and l's are given by different topographical heights or depths of groove within the disk. In an ideal disk 0's will be at one standardised depth and l's will be at another standardised depth. However, in a practical disk there is deviation from the standard.
  • the present invention preferably, alternatively, determines the deviation from the standard and encodes the deviation for application after encryption to the disk for subsequent authentication purposes.
  • a laser disk 170 has the binary information thereon read by a laser reader 171 to provide encoded information X.
  • the encoded information X is representative of the actual depth of the binary data and this is compared with a standardised binary depth 0 or 1 in a comparator to provide X information that is fed to a processor 173.
  • the processor in similar manner to the processor 134, provides C* data 138 which is fed to a laser writer 174.
  • the laser writer then applies the encrypted representation onto, for example a track, on the disk 170.
  • a laser reader 181 which provides C and X information to a processor 182 which is similar to the processor 154.
  • the processor 182 outputs a signal M representative of the original unencrypted message on line 156.
  • the signal M is applied to a decision making circuit 183 which is similar to the decision making element 165.
  • the decision making circuit 183 determines if the signal that is read from the laser disk is valid and if it is not then the decision making circuit 183 will send a signal to the standard circuitry of the laser disk player not to play the disk, or if it is valid, to permit the disk to be played.
  • laser disks can be checked for authenticity.
  • a physical or chemical characteristic of the material of an article is determined, the characteristic is encoded, and the encoded characteristic is encrypted using a secret key.
  • the encrypted representation is then applied to the article.
  • the article is subsequently authenticated by re-determining the physical or chemical characteristic and reading and decrypting, using a public key or keys, the encrypted representation.
  • the decrypted representation is compared with the redetermined physical or chemical characteristic to determine the authenticity of the article.
  • the authentication code is derived from the nature of the material of the article, merely having encoding means that duplicating the code is of no avail to the potential forger, unless the forger can also duplicate the physical characteristic encoded, which can be made infeasible by an appropriate choice of characteristic and the resolution at which it is determined. For example, the topographic structure of each and every note will be different in the small area that is predeterminedly scanned. Further, the use of a suitable encryption system makes it practically infeasible for a forger to duplicate the process and mark the document or product himself. Therefore, by redetermining the physical characteristic and comparing it with the mark which he has deciphered with a public key, the recipient is able to distinguish between genuine and forged articles.

Abstract

A method and apparatus for authenticating articles using the steps of determining a distinguishing physical or chemical characteristic of an article, encoding that physical or chemical characteristic as an encoded characteristic, encrypting the encoded characteristic so derived to form an encrypted representation using a secret encryption key, applying that encrypted representation to the article, subsequently authenticating the article by redetermining the physical or chemical characteristic and reading and decrypting the encrypted representation and comparing the resulting encoded characteristic of the recorded physical or chemical characteristic with the redetermined physical or chemical characteristic to determine the authenticity of the article.

Description

AUTHENTICATION OP ARTICLES Field of the Invention
This invention relates to cost-effective authentication of articles and hence assists to protect a wide range of articles from forgery and counterfeiting.
Background of the Invention
Protection against forgery and counterfeiting is a requirement in many fields from bank notes and securities to the detection of pirate copies of, for example, drugs, compact discs or perfumes, and the authentication of valuable artifacts. In the case of bank notes and securities protection from forgery and counterfeiting is traditionally performed by the use of special papers, watermarks, embedded metal strips and intricate designs to make accurate copying or forgery as difficult as possible. Authentication of bank notes is then performed by visual inspection of printed designs and verification of the presence of watermarks and metal strips and possibly by inspection under ultraviolet light.
The protection of securities using magnetic inks is known from Japanese patent 58-86677, 24 May 1983, however such inks may also be replicated by a forger.
Another known method, disclosed in Japanese patent 57- 62478, 15 April 1982, is based on the absorption and reflection of light in the visible and infrared spectra but the optical characteristics of documents change as they become worn or soiled resulting in false determinations of authenticity.
The incorporation of conducting strips into bank notes or credit cards and scanning by microwaves to generate a code to mark the document, for example by writing to a magnetic strip, and subsequently re-scanning the document and comparing the mark with the scan is also known from WO 87/01845. However, it is possible for a forger to carry out the same procedure and thereby produce a document or card which is indistinguishable from a genuine article. In addition, the method taught in WO 87/01845 is dependent on the production and use of special materials and is not suitable for protecting existing documents.
The rapid development of high quality, relatively inexpensive, colour copying equipment could shortly lead to a loss of confidence in securities. In fact, in many countries people are already reluctant to use high denomination bank notes and other securities without repeated authentication. This could lead to a complete collapse in the monetary system and economic crisis.
Authentication is known as a branch of cryptography for verifying the source of encrypted messages via, for example, electronic signatures. In particular, the use of public key cryptosystems provides means not only of encrypting messages using public and secret keys, but also of authenticating the source of the message as discussed in Welsh, D. Codes and Cryptography, Oxford, OOP, 1988, Ch . 12.
The object of this invention is to provide a method for cost-effective authentication of a wide variety of articles without requiring special materials, which cannot be replicated by potential forgers or counterfeiters and which can be applied to existing articles and to apparatus for encoding articles for authentication.
Summary of Invention According to a first aspect of this invention there is provided a method of authenticating articles using the steps of determining a distinguishing physical or chemical characteristic of an article, encoding that physical or chemical characteristic, encrypting the encoded characteristic to form an encrypted representation, applying that encrypted representation to the article, subsequently authenticating the article by redetermining the physical or chemical characteristic, and reading and decrypting the encrypted representation to form a decrypted representation and comparing the decrypted representation of the recorded physical or chemical characteristic with the redetermined physical or chemical characteristic to determine the authenticity of the article.
In particular there is disclosed a method of authenticating articles wherein the physical or chemical characteristic is the micro-topography of an area of a surface of the article.
Advantageously, the micro-topography of an area of a surface of the article is scanned while the surface is illuminated from a single direction.
In an embodiment the micro-topography of an area of a surface of the article is scanned while the surface is illuminated from a first direction and subsequently re- scanned while the surface is sequentially illuminated from at least one further direction and the resultant images are combined to form the encoded characteristic.
In a particular embodiment the micro-topography of an area of a surface of the article is scanned while the surface is illuminated from a first direction and subsequently re-scanned while the surface is illuminated from a second direction, vectors are derived from the resultant two images and the vectors derived from one of the images are subtracted from the vectors derived from the other image to form the encoded characteristic. Depending on the nature of the article to be protected, the characteristic of the article encoded may be, for example: Paper micro-topography (reflection, transparency at different wavelengths, conductivity)
Metal microstructure (reflection, transparency to different wavelengths, conductivity, crystalline structure)
Wood microstructure (reflection, transparency to different wavelengths, conductivity)
Organic nuclear magnetic resonance spectrum, materials electron paramagnetic resonance spectrum, infrared absorption
Living DNA and/or RNA structure cells
Gaseous nuclear magnetic resonance spectrum, and liquid electron paramagnetic resonance blends spectrum, infrared absorption
Crystals facets and edges, crystal lattice, and nuclear quadrapole resonance gemstones
Optical irregularities of disc surface and storage thickness media
Complex dispersion of optical rotation of molecular optically active materials, spectrum of structures circular dichroism, spectrum of anomalous dispersion of X-rays, individual spectrum of combinative dispersion, gas electronography, oscillatory infrared, electronic or ultraviolet spectrum
Preferably the encoding is encrypted and decrypted using a public key encryption system.
In a preferred embodiment the public key encryption system has a plurality of levels of security.
Advantageously additional characterising information is encoded together with the representation of the physical or chemical characteristic of the article.
In one application the article to be authenticated is a document such as a bank note or other security.
In another application the article is optical or magnetic information storage means preferably adapted so that information cannot be recovered from the storage means without authentication.
Preferably the area or portion of the article to be used in determining the physical or chemical characteristic is indicated by a plurality of reference marks.
Advantageously the encrypted coding marked on the article is formed from a plurality of marks such as dot or bar codes.
Preferably the article is a laser disk and the characteristic that is encoded is one of a representation of the topography of the disk, a representation of the topography of data on the disk, and a representation of topographical deviation of data on the disk from standardised topography of data, said characteristic being encoded and encrypted to form said encrypted representation which is applied to the disk and the disk is subsequently authenticated by redetermining the encoded data and comparing the decrypted data with the redetermined data, so as to thereby determine the authenticity of the disk.
Advantageously if said comparison determines that the disk is authentic then a disk player is enabled to read information data on said disk but if said disk is not authenticated then said disk player is disabled and said disk will not "play" .
According to a second aspect of this invention there is provided an apparatus for encoding articles for authentication including means for determining a distinguishing physical or chemical characteristic of an article, means for encoding that physical or chemical characteristic, means for encrypting said encoded characteristic as an encrypted representation and means for applying said encrypted representation to the article.
In one form of the apparatus, the physical or chemical characteristic encoded is the micro-topography of an area of a surface of the article.
Advantageously, scanning means are provided for scanning the micro-topography of an area of a surface of the article while the surface is illuminated from a first direction and subsequently re-scanning while the surface is sequentially illuminated from at least one further direction and means for combining the resultant images to form the encoded characteristic. Advantageously, scanning means are provided for scanning the micro-topography of an area of a surface of the article while the surface is illuminated from a first direction and subsequently re-scanning while the surface is illuminated from a second direction, means for deriving vectors are derived from the resultant two images and subtracting means for subtracting the vectors derived from one of the images from the vectors derived from the other image to form the encoded characteristic.
Advantageously, the physical or chemical characteristic encoded is any one of nuclear magnetic resonance, nuclear quadrupole resonance spectrum, electron paramagnetic resonance spectrum, infrared absorption spectrum, optical rotation, DNA code, RNA code, circular dichroism spectrum, spectrum of anomalous dispersion of x-rays, individual combinative dispersion spectrum, gas electronography, oscillatory infrared, electronic or ultraviolet spectrum, the crystalline or lattice structure of the material constituting the article.
Preferably the encoded characteristic is encrypted and decrypted using a public key encryption system and advantageously the public key encryption system has a plurality of levels of security.
Preferably means are also provided for encoding additional characterising information together with the representation of the physical or chemical characteristic of the article.
In one form of the apparatus the article is a document such as a bank note or other security.
Preferably, means are provided for using reference marks so as to identify on the article the area or portion of the article to be used in determining the physical or chemical characteristic.
Advantageously, the representation of the encrypted coding marked on the article is formed from a plurality of dot or bar codes.
Conveniently, the apparatus further includes transporting means for orientating and moving an article successively relative to an analytical, measuring or scanning station, holding the article in or moving the article through said station while a physical or chemical characteristic of the article is determined, moving the article relative to a marking station, holding the article in or moving the article through said marking station while the article is marked and subsequently transporting the article out of the apparatus.
In an adaptation for authenticating documents, the apparatus includes transporting means for orientating and moving a document successively relative to a high resolution optical scanning station, for holding the article in or moving the article through said station while the micro-topography of an area of a surface of the document is determined, moving the document relative to a marking station, holding the document in or moving the article through said marking station while the document is marked and subsequently transporting the document out of the apparatus; said determining means is a means for scanning the micro-topography of a portion of a surface of said document; said means for encoding forms an encoded representation of the micro-topography; said means for encrypting said encoded representation uses at least one encryption key to form said encrypted representation, and said means for applying marks the encrypted representation on the document. Preferably said means for determining a distinguishing physical or chemical characteristic of an article is a laser reader for reading one of the topography of a laser disk, the topography of information data on the disk, and a representation of topographical deviation of information data on the disk from standardised topography of data, said characteristic being encoded and encrypted to form said encrypted representation, and said means for applying said encrypted representation is a laser writer.
Advantageously when the characteristic that is encoded is the topographical deviation, comparator means is employed to determine an electrical signal representative of the deviation of the binary 0's and l's from a standard depth for a 0 and 1.
According to a third aspect of this invention there is provided an apparatus for authenticating an article characterised in that the apparatus includes means for determining a physical or chemical characteristic of an article, means using one or more public decryption keys for decipering an encoded representation of that physical or chemical characteristic marked on the article, means for comparing the actual physical or chemical characteristic with the deciphered representation and means for indicating therefrom whether the article is authentic.
In a particular application, the determining means scans the micro-topography of the article and the comparing means compares the actual topography with the decoded representation.
Advantageously, said apparatus further includes secret decryption means, using for higher levels of security, the same secret encryption key to decrypt the representation as that used to encrypt the representation without disclosing said key to an operator.
Preferably the apparatus further includes error- correcting means to allow for changes in the chemical or physical characteristics subsequent to the encoding of the same, produced, for example, by wear, aging or soiling.
Advantageously the apparatus further includes transporting means for orientating and moving the article relative to an analytical, measuring or scanning station, holding the article in or moving the article through said station while a physical or chemical characteristic of the article is determined and subsequently transporting the article out of the apparatus.
In an adaptation for authenticating documents, the apparatus includes transporting means for orientating and moving a document relative to a high resolution scanning station, holding the article in or moving the article through said station while the micro-topography of a portion of a surface of the document is determined and subsequently transporting the article out of the apparatus; said determining means is a means for scanning the micro-topography of the document; means for reading and, using at least one decryption key, decrypting, an encrypted representation of the micro-topography previously marked on the document; means for comparing compares the encoded representation of the micro- topography so obtained with that determined by the apparatus.
Preferably said means for determining a distinguishing physical or chemical characteristic is a laser reader, said comparing means redetermines the encoded data and compares the decrypted data with the redetermined data, and said indicating means is arranged to supply a signal to a disk player indicating authenticity of said disk whereby if said disk is judged not to be authentic the disk will not "play" and if it is judged to be authentic the disk will "play" .
Preferably said means for determining a physical or chemical characteristic of an article is a laser reader and said means for comparing is a decision making means for comparing the deciphered representation with the actual characteristic that is read by said laser reader and said decision making means being adapted to enable or disable means for reading information data on said disk in dependence upon whether said disk is determined to be authentic or not.
According to a first feature of this invention there is provided a method of authenticating a laser disk such as a CD or CD-ROM using the steps of determining a characteristic of said disk that is one of a representation of the topography of the disk, a representation of the topography of data on the disk, and a representation of the topographical deviation of data on the disk from standardised topography of data, encoding the characteristic, encrypting the encoded characteristic to form an encrypted representation, applying the encrypted representation to the disk, subsequently authenticating the disk by redetermining the characteristic, and reading and decrypting the encrypted representation to form a decrypted representation, and comparing the decrypted representation of the recorded characteristic with the redetermined physical characteristic so as to thereby determine the authenticity of the disk. Preferably if said comparison determines that the disk is authentic then a disk player is enabled to read information data on said disk but if said disk is not authenticated then said disk player is disabled and said disk will not play said information data.
According to a second feature of this invention there is provided an apparatus for encoding laser disks such as CDs or CD-ROMs including a laser reader for reading one of the topography of the disk, the topography of information data on the disk, and a representation of topographical deviation of information data on the disk from standardised topography of data, means for encoding the physical characteristic as an encoded characteristic, means for encrypting said encoded characteristic as an encrypted representation, and means for applying said encrypted representation to the article.
According to a third feature of this invention there is provided an apparatus for authenticating a laser disk such as a CD or CD-ROM including means for determining a physical characteristic of the disk by using laser reading means to read one of the topography of the disk, the topography of information data on the disk, and a representation of topographical deviation of information data on the disk from standardised topography of data, means using one or more public decryption keys for deciphering an encoded representation of that physical characteristic marked on the disk, means for comparing the actual physical characteristic with the deciphered representation, and means for authenticating said disk.
Reference to articles should be understood to include their associated packaging and labelling, particularly in relation to the determination of physical or chemical characteristics and in relation to marking with an encrypted representation. Brief description of drawings
The invention will now be described by way of example with reference to the accompanying drawings, in which:
Figure 1 shows a USA one hundred dollar bank note having a mark used to define a scanning area,
Figure 2 shows a USA one dollar bank note in which an encrypted representation is printed in accordance with an aspect of this present invention,
Figure 3 is a diagrammatic representation of the micro- topography of the scanned bank note paper,
Figure 4 is a diagrammatic view of the encrypted representation,
Figure 5 shows a micrograph of the surface structure illuminated from a right hand side direction,
Figure 6 shows a micrograph of the surface structure illuminated from a left hand side direction,
Figure 7 is a depiction of the resultant surface derived from the micrographs in Figures 5 and 6 for a clean bank note,
Figure 8 shows an encrypted representation derived from and applied to a clean bank note,
Figure 9 is a graphical representation of the correlation between the scanned surface and the deciphered encrypted representation for a clean bank note,
Figure 10 shows a depiction of the same area as Figure 7 after the surface has been damaged by wear and soiling, Figure 11 shows an encrypted representation as in Figure 8 but after the surface has been damaged by wear and soiling,
Figure 12 is a graphical representation of the correlation between the deciphered encrypted representation and the re-scanned image for the worn and soiled surface, [please confirm]
Figure 13 is a block schematic diagram of the encoding apparatus,
Figure 14 is a block schematic diagram of the signal processing of the encoding apparatus,
Figure 15 is a block schematic diagram of the deciphering apparatus,
Figure 16 is a block schematic diagram of the signal processing performed by the deciphering apparatus,
Figure 17 is a block schematic of another embodiment of an encoding apparatus particularly useful with a laser disk, and
Figure 18 is a block schematic diagram of the deciphering and comparison apparatus to be used with the Figure 17 embodiment.
In the Figures like reference numerals denote like parts.
Preferred Embodiments of the Invention
The first embodiment is for the protection of paper money and securities from forgery by high resolution digital scanning a predetermined small (say 1 square millimetre) area of the micro-topography of the paper from which the money or security is made and then printing on the paper an encrypted mark representing that topography.
As illustrated in Figure 1, a bank note l, has a scanning area indicated by some pre-printed mark 2 on the paper; the mark 2 may be used by both the encoding and the authenticating apparatus to locate the precise area to be scanned for encoding and authenticating. Alternatively the deciphering apparatus may detect the location of the encrypted mark and from that position determine the area of paper to be topographically scanned.
An encrypted representation 3 is shown on a bank note 4 in Figure 2.
To understand how the encrypted mark or representation is derived, consider a microstructure represented diagrammatically by Figure 3, in which fibres 7 of the paper are shown as dark strands across a light background 8 of the paper matrix. The scanned area is partitioned by the scanner by the imposition of a grid defined by two orthogonal subdivided groups of reference lines 9, 10 in the y and x direction respectively at a resolution of 10 elements per millimetre square. Scanning along each line 10 of the grid so formed, using a suitable threshold value, each element is read as light or dark. These readings are digitised for x-axis elements 10a to give a digital reading of 0100110011 where 1 represents dark areas and 0 represents light areas, reading from left to right. The decimal equivalent of this binary number is 307 and the topography along this reading line may therefore be depicted by 307.
For this number to be encrypted and deciphered by an RSA public encryption system as described in Rivest, R . L . , Shamir, A. & Adleman, L. A method of obtaining digi tal signatures and public key cryptosys terns . Comm. ACM 21 , 1978, pp 120-6 it is necessary for the operation by a secret key d to be reversible by a public key e to recover the decrypted value.
i.e. if the encrypted
C = Md mod N and the decrypted
M - Ce mod N then substituting for C M - [M*] ° mod N
where C is the encrypted number
M is the number before encryption and after decryption d is the (secret) encrypting key e is the (public) decrypting key mod N means that the modulus of the number it qualifies is taken i.e. the remainder after dividing by N
Now, as discussed in, for example, Beckett, B. Introduction to Cryptology, Blackwell , 1988, Ch . 7 two numbers are said to be relatively prime if they have no common prime factors (other than 1) and the number of integers Φ relatively prime to a number n is given by the Euler totient function:
Φ(n) - nπi-l/p (1-1/Pa) . . . (1-1/p ]
where pL are the prime factors of n.
If n is the product of two prime numbers p, q then
Φ(n) = n(l-l/p) (1-1/q) = pq(p-l) (q-1) pq
= (p-1) (q-1) Now it is known that the required relationship:
M = [M*] * mod N
is equivalent to (see Beckett, B . Introduction to Cryptology, Blackwell , 1988, Ch. 9)
M . Mdβmod*(n) mod N
which is satisfied by
de modΦ(n) = 1 [for M<N]
i.e. we seek values of d which when multiplied by e and divided into Φ(n) leave a remainder of 1.
For the purposes of illustration, let n = N and be the product of the primes p=17, q=31 and choose key e=7
Then N = pq = 527
Φ(N) = (p-1) (q-1) = 480
Then we need to find a value of d such that
7d mod 480 = 1
By evaluation, this is satisfied by d = 343
(since then 7d = 2401, 2401/480 « 5 + rl)
Therefore to encrypt the scanned value M=307 we need to calculate:
C = M mod N
= 307343 mod 527
= 307101010111 mod 527 (expressed in binary) But 101010111 = 2β + 26 + 2* + 22 + 21 + 2°
Therefore
C = 307< 56+ 4*"*4+2+1) mod 527
= (3072SS * 307" * 307" * 307* * 3072 * 307) mod 527
But it can be shown that
3072 mod 527 = 443 mod 527
3074 mod 527 = 205 mod 527 3078 mod 527 = 392 mod 527
30716 mod 527 = 307 mod 527
30732 mod 527 = 443 mod 527
30764 mod 527 = 205 mod 527
30718mod 527 = 392 mod 527 3072S6mod 527 - 307 mod 527
Therefore
C = 307*205*307*205*443*307 mod 527
substituting again 307*307=443 and 205*205 = (3074)2 = 392 for ease of calculation:
C = 443*392*443*307 mod 527 = 23,617,389,656 mod 527 = 69
= 1000101 in binary
Therefore the value 0100110011 (307) which is the encoded characteristic of the topography is encrypted as 1000101 (69) . To form a representation of this encrypted value it may be expressed as a bar code printed onto the bank note, as shown in Figure 4, in which a bar 16 represents the value 1 and the absence of a bar represents a value 0. For the purpose of illustration and clarification only, the binary values 7 are also printed alongside the bar code in Figure 4. Each reading line scanned will then result in a similar bar code which may be printed as a series of bar codes.
To check the authenticity of the bank note the recipient needs to retrieve the original value 307 from the encrypted value 69 using the published key e = 7 and the published modulus mod(527) .
Using
M = Cβ mod(N) = 697 mod(527) = 69 *692*69 mod(527) = 324*18*69 mod(527)
= 307
In this example a small value of N has been selected for ease of demonstration. In an actual embodiment a large value of N would be used. Where N is more than 10300 it is practically infeasible to determine the secret key from the published information.
In a preferred version of this embodiment multiple levels of security are incorporated using higher values of mod N for the higher levels of security, because prime factorisation becomes computationally infeasible as N increases in size. However, the use of high values of N involves increased processing costs so that retailers may, for example, be equipped with apparatus to read the lowest level security coding, high street banks with higher level security apparatus and the issuing bank with the highest level, which may include only secret keys and no public keys.
In a practical embodiment it is necessary to select a physical characteristic of the article being protected which cannot be duplicated by a potential forger and if, for example, a surface is scanned using illumination from only one direction, then a scanner of sufficiently high resolution must be used that details of the topography may be resolved which cannot be replicated by any known technique.
In a second embodiment bank notes are protected by digitally combining the images of the micro-topography scanned when sequentially illuminated from two or more directions. Figure 5 shows the surface of a bank note illuminated from a right hand side direction and Figure 6 shows the bank note illuminated from a left hand side direction. Preferably an un-printed area of the bank note is scanned to reduce the effect of features common to all notes printed alike.
Using an optical scanner the first image shown in Figure 5 is read and represented by X= (x17x2, ...x which is digitised and then the second image, shown in Figure 6, is read and represented by
Figure imgf000022_0001
• • -yn) which is also digitised. These digitised representations are combined, e.g. by subtraction (L = X-Y) , into a composite image L=(llf12, ...ln) to provide an enhanced representation of the micro-topography as illustrated in pictorial form in Figure 7. In a preferred embodiment the scanned bit maps are vectorised into vectors L. Using such a combined image reduces the possibility of fraudulent reproduction of the image while distinguishing between topography and surface markings. Using any suitable known redundancy reduction algorithm the vectors L of size n are transformed into vectors L* of considerably smaller size (n*) than L. In practice n* may be of the order of 900 where n is of the order of 104. Ideally this reduction in redundancy increases the efficiency of the encrypting algorithm.
In a preferred embodiment the vector L* may be combined with a coded sequence Z representing additional information such as the denomination of the bank note, and/or the date and time of issue etc., to obtain the vector M.
Using any public key cryptosystem or electronic signature algorithm the unencrypted vector M is encrypted to produce the cryptotext C.
Preferably, to allow for error correction to accommodate changes in the micro-topography from wear or soiling etc. , the encrypted code C is transferred to an error correction code C*. The size of C* will depend on the level of error correction required. (The size of C* will be between 2000 and 10000 to correct 200 to 2000 errors (see Reddy S.M., Robinson J.P., Random error and burst correction by iterated codes - IEEE Trans. Information Theory 1970, Vol.IT-16, p452-459 and Chien R.T. Cyclic decoding procedures for Bose-Chaudhuri-Hocquemghem codes - IEEE Trans. Information Theory 1964, Vol.IT-10, p357- 363) .
The resulting encrypted image is printed on an area of the bank note, preferably close to the area scanned, as shown in Figure 8. This encrypted representation is shown printed on a bank note in Figure 2. For the example shown, a linear cascade code with parameters (64.64=4096, 36.36=1296, 12x12=144) was used which corrects for a maximum of 71 errors (see the aforementioned IEEE Trans. Information Theory) and the image was encrypted using the RSA public cryptosystem with modulus component N=10310.
Information about the method of protection, the redundancy algorithms and encryption (except the encrypting key) may be published for interested parties such as banks and retailers, to enable them to authenticate the bank notes.
To authenticate the notes, similar procedures are performed to those carried out by the producer to perform encryption, but in addition, allowance must be made for differences introduced both in the scanned area of paper and in the printed encrypted image as a result of wear and soiling. The surface is scanned illuminated from one or more directions as before to derive an image L Similarly the printed encoded image is scanned to produce the image C (which differs from C* by the errors t*) .
Using known error correcting algorithms (see the aforementioned IEEE Trans. Information Theory) it is possible to correct for the t* errors to obtain the original encrypted image C* (unless t* is greater than the design maximum of errors t) .
Using published information about the encryption algorithm and the public decryption key e, the unencrypted description M is obtained, from which the vectors Z and L* are recovered. From L*, using error correction procedures, the starting vector L is determined.
The correlation between L and tl is calculated (as represented graphically in Figure 9) and from the correlation coefficient, a decision can be made on the authenticity of the bank note. The success with which the method accommodates wear and soiling of the bank notes is illustrated by Figures 10, 11 and 12 which relate to soiled notes and correspond to Figures 7, 8 and 9 respectively for clean notes. It can be seen that the correlation between the micro-topography and the decoded encrypted for soiled notes is substantially as good as that for unsoiled notes.
An embodiment of the encryption apparatus will now be described with reference to Figure 13 in which a mechanical transportation device 130 appropriately aligns and orients a bank note (not shown) and moves the bank note to a scanning station 131 having a read head 132, and holds it stationary in, or incrementally or continuously transports it through, the scanning reading station 131 as required for the scanning device to produce an image of the predetermined area of the note. Digital signals X and Y, representing images of the micro-topography illuminated from two different directions, are passed via a respective one of lines 133 from the scanning station to digital processing unit 134 where the addition of further information, redundancy reduction, conversion to error correcting code and encryption are performed.
The bank note is moved by the transport device 130 to a printing station 135, and held stationary there or transported therethrough for print head 136 to print on a predetermined portion of the note using processed and encrypted signals C* over line 136 from the data processing unit 134. Another outlet 137 from the processor 134 outputs parameter signals such as the value of the public key and the modulus number to be used for subsequently authenticating the bank note. The manner of operation of the encryption processor 11 will now be described with reference to the block diagram Figure 14.
The processor 134 unit has inputs via lines 133 from the scanner along which pass signals representing the images X and Y into an arithmetic unit 140 where they are combined to form a derived image L=Y-X. Output from the arithmetic unit 140 is fed to a redundancy reduction unit 141, the output from which is fed to a combiner 142, a second input of which is derived from a storage or input device 143 which holds and adds additional information Z such as denomination, date of issue etc. about the bank note being encoded, to form the image M=L+Z. Output from the combiner 142 is input to an encryption device 144 which also has an input from a key generating unit 145. A second output from the key (d) generating block forms one of the outputs 137 of the processor 134. The output of the encryption device (C=Md mod N) formed from M and the encryption key d passes to the error correction coding unit 146 the outlet of which passes the image C* to form the output 136 of the processor.
An embodiment of the authenticating apparatus will now be described with reference to Figure 15 in which a mechanical transporting device 150 correctly aligns and orients a bank note and moves the bank note to or through a scanning station 151 having a read head 152. Output signals corresponding to images X and Ϋ, from scanning the micro- opography of the bank note illuminated from two directions are input via lines 153 to an authenticating processor 154. Additionally, an output signal from reading the encrypted representation C is passed via line 155 from the scanner to the processor 154. Output from the digital processing unit on the authenticity of the bank note is passed via line 156 to a display unit 157 and additional information Z on for example the encoded denomination of the note is passed to the display unit 157 via a line 158. The open key e and numbers N are input to the processor 154 via line 159.
An embodiment of the authenticating processor 154 will now be described with reference to Figure 16 in which output signals corresponding to images X and Ϋ, from scanning the micro-topography of the bank note illuminated from two directions are input via lines 153 to the arithmetic unit 160 where > - Ϋ-X is calculated, and the output is input to a correlator 161. Output on line 155 from the scanning station, representing a scan of the encrypted printed image C, is input to a decoder 162 which performs error correction and outputs C* = Z+M to a decrypting unit 163 which deciphers M and Z using the open key e and modulus N entered via the input 159 corresponding to the output from outlet 137. The decrypting unit 163 then passes the additional information Z to the line 158 and passes L* to an unpacking unit 164 where redundancy is restored to reproduce L. The unpacking unit 164 passes L to the correlator 161 where the correlation coefficient between L and t, is calculated which is then passed to a decision- making unit 165 where a decision on authenticity is made and passed via line 156 to the information display unit 157.
It is currently envisaged that the invention will also have practical importance with laser read disks, such as CD-ROMs. The characteristic that is encoded may be representative of the topography of the disk or of the topography of the data on the disk. The data on a laser disk is in binary form and representations of 0's and l's are given by different topographical heights or depths of groove within the disk. In an ideal disk 0's will be at one standardised depth and l's will be at another standardised depth. However, in a practical disk there is deviation from the standard. The present invention preferably, alternatively, determines the deviation from the standard and encodes the deviation for application after encryption to the disk for subsequent authentication purposes.
Referring to Figure 17, a laser disk 170 has the binary information thereon read by a laser reader 171 to provide encoded information X. The encoded information X is representative of the actual depth of the binary data and this is compared with a standardised binary depth 0 or 1 in a comparator to provide X information that is fed to a processor 173. The processor, in similar manner to the processor 134, provides C* data 138 which is fed to a laser writer 174. The laser writer then applies the encrypted representation onto, for example a track, on the disk 170.
So as to authenticate the disk 170, it is read by a laser reader 181 which provides C and X information to a processor 182 which is similar to the processor 154. The processor 182 outputs a signal M representative of the original unencrypted message on line 156. The signal M is applied to a decision making circuit 183 which is similar to the decision making element 165. The decision making circuit 183 determines if the signal that is read from the laser disk is valid and if it is not then the decision making circuit 183 will send a signal to the standard circuitry of the laser disk player not to play the disk, or if it is valid, to permit the disk to be played.
In such a manner laser disks can be checked for authenticity. It will therefore be understood that in the present invention a physical or chemical characteristic of the material of an article is determined, the characteristic is encoded, and the encoded characteristic is encrypted using a secret key. The encrypted representation is then applied to the article. The article is subsequently authenticated by re-determining the physical or chemical characteristic and reading and decrypting, using a public key or keys, the encrypted representation. The decrypted representation is compared with the redetermined physical or chemical characteristic to determine the authenticity of the article.
It will now also be understood that in the present invention the fact that the authentication code is derived from the nature of the material of the article, merely having encoding means that duplicating the code is of no avail to the potential forger, unless the forger can also duplicate the physical characteristic encoded, which can be made infeasible by an appropriate choice of characteristic and the resolution at which it is determined. For example, the topographic structure of each and every note will be different in the small area that is predeterminedly scanned. Further, the use of a suitable encryption system makes it practically infeasible for a forger to duplicate the process and mark the document or product himself. Therefore, by redetermining the physical characteristic and comparing it with the mark which he has deciphered with a public key, the recipient is able to distinguish between genuine and forged articles.

Claims

1. A method of authenticating articles using the steps of determining a distinguishing physical or chemical characteristic of an article, encoding that physical or chemical characteristic, encrypting the encoded characteristic to form an encrypted representation, applying that encrypted representation to the article, subsequently authenticating the article by redetermining the physical or chemical characteristic, and reading and decrypting the encrypted representation to form a decrypted representation and comparing the decrypted representation of the recorded physical or chemical characteristic with the redetermined physical or chemical characteristic to determine the authenticity of the article.
2. A method of authenticating articles as claimed in claim 1 wherein the physical or chemical characteristic is the micro-topography of an area of a surface of the article.
3. A method of authenticating articles as claimed in claim 1 or 2 wherein the micro-topography of an area of a surface of the article is scanned while the surface is illuminated from a single direction.
4. A method of authenticating articles as claimed in claim 2 wherein the micro-topography of an area of a surface of the article is scanned while the surface is illuminated from a first direction and subsequently re- scanned while the surface is sequentially illuminated from at least one further direction and the resultant images are combined to form the encoded characteristic.
5. A method of authenticating articles as claimed in claim 2 wherein the micro-topography of an area of a surface of the article is scanned while the surface is illuminated from a first direction and subsequently re- scanned while the surface is illuminated from a second direction, vectors are derived from the resultant two images and the vectors derived from one of the images are subtracted from the vectors derived from the other image to form the encoded characteristic.
6. A method of authenticating articles as claimed in claim 1 wherein the physical or chemical characteristic is the nuclear magnetic resonance spectrum of material constituting the article.
7. A method of authenticating articles as claimed in claim 1 wherein the physical or chemical characteristic is the nuclear quadrupole resonance spectrum of material constituting the article.
8. A method of authenticating articles as claimed in claim 1 wherein the physical or chemical characteristic is the electron paramagnetic resonance spectrum of material constituting the article.
9. A method of authenticating articles as claimed in claim 1 wherein the physical or chemical characteristic is the infrared absorbtion spectrum of material constituting the article.
10. A method of authenticating articles as claimed in claim 1 wherein the physical or chemical characteristic is the dispersion of optical rotation of optically active material which is a constituent of the article.
11. A method of authenticating articles as claimed in claim 1 wherein the physical or chemical characteristic encoded is the DNA code of material constituting the article.
12. A method of authenticating articles as claimed in claim 1 wherein the physical or chemical characteristic encoded is the RNA code of material constituting the article.
13. A method of authenticating articles as claimed in claim 1 wherein the physical characteristic encoded is any one of circular dichroism spectrum, spectrum of anomalous dispersion of x-rays, individual combinative dispersion spectrum, gas electronography, oscillatory infrared, electronic or ultraviolet spectrum, the crystalline or lattice structure of material constituting the article.
14. A method of authenticating articles as claimed in any of the preceding claims wherein the encoding is encrypted and decrypted using a public key encryption system.
15. A method of authenticating articles as claimed in claim 14 wherein the public key encryption system has a plurality of levels of security.
16. A method of authenticating articles as in any of the preceding claims wherein additional characterising information is encoded together with the representation of the physical or chemical characteristic of the article.
17. A method of authenticating articles as claimed in any of the preceding claims wherein the article is a document such as a bank note or other security.
18. A method of authenticating articles as claimed in any of claims 1-16 wherein the article is an optical or magnetic information storage means adapted so that information cannot be recovered from the storage means without authentication.
19. A method for authenticating articles as in any of the preceding claims wherein the area or portion of the article to be used in determining the physical or chemical characteristic is indicated by a plurality of reference marks.
20. A method of authenticating articles as in any of the preceding claims wherein the representations of the encrypted coding marked on the article is formed from a plurality of 'marks such as dot or bar codes.
21. A method of authenticating articles as in claim 1 wherein the article is a laser disk and the characteristic that is encoded is one of a representation of the topography of the disk, a representation of the topography of data on the disk, and a representation of topographical deviation of data on the disk from standardised topography of data, said characteristic being encoded and encrypted to form said encrypted representation which is applied to the disk and the disk is subsequently authenticated by redetermining the encoded data and comparing the decrypted data with the redetermined data, so as to thereby determine the authenticity of the disk.
22. A method of authenticating an article as claimed in claim 21 wherein if said comparison determines that the disk is authentic then a disk player is enabled to read information data on said disk but if said disk is not authenticated then said disk player is disabled and said disk will not "play" .
23. An apparatus for encoding articles for authentication including means (132) for determining a distinguishing physical or chemical characteristic of an article, means (134) for encoding that physical or chemical characteristic, means (134) for encrypting said encoded characteristic as an encrypted representation, and means (136) for applying said encrypted representation to the article.
24. An apparatus for encoding articles for authentication as claimed in claim 23, wherein the physical or chemical characteristic encoded is the micro- topography of an area of a surface of the article.
25. An apparatus for encoding articles for authentication as claimed in claim 24, wherein scanning means (132) are provided for scanning the micro- topography of an area of a surface of the article while the surface is illuminated from a first direction and subsequently re-scanning while the surface is sequentially illuminated from at least one further direction and means for combining the resultant images to form the encoded characteristic.
26. An apparatus for encoding articles for authentication as claimed in claim 25, wherein scanning means (132) are provided for scanning the micro- topography of an area of a surface of the article while the surface is illuminated from a first direction and subsequently re-scanning while the surface is illuminated from a second direction, means for deriving vectors are derived from the resultant two images and subtracting means (140) for subtracting the vectors derived from one of the images from the vectors derived from the other image to form the encoded characteristic.
27. An apparatus for encoding articles for authentication as claimed in claim 23, wherein the physical or chemical characteristic encoded is any one of nuclear magnetic resonance, nuclear quadrupole resonance spectrum, electron paramagnetic resonance spectrum, infrared absorption spectrum, dispersion of optical rotation, DNA code, RNA code, circular dichroism spectrum, spectrum of anomalous dispersion of x-rays, individual combinative dispersion spectrum, gas electronography, oscillatory infrared, electronic or ultraviolet spectrum, and the crystalline structure of the material of the article.
28. An apparatus for encoding articles for authentication as claimed in any of the claims 23-27 wherein the encoded characteristic is encrypted and decrypted using a public key encryption system.
29. An apparatus for encoding articles for authentication as claimed in claim 28, wherein the public key encryption system has a plurality of levels of security.
30. An apparatus for encoding articles for authentication as claimed in any of the claims 23-29, wherein means (142, 143) are provided for encoding additional characterising information together with the representation of the physical or chemical characteristic of the article.
31. An apparatus for encoding articles for authentication as claimed in any of the claims 23-30, wherein the article is a document such as a bank note (1,4) or other security.
32. An apparatus for encoding articles for authentication as claimed in any of the claims 23-31, wherein means are provided for using reference marks (2) so as to identify on the article the area or portion of the article to be used in determining the physical or chemical characteristic.
33. An apparatus for encoding articles for authentication as claimed in any of the claims 23-32, wherein the representation of the encrypted coding marked on the article is formed from a plurality of dot or bar codes (16) .
34. An apparatus as claimed in any of claims 23-33 further including transporting means (130) for orientating and moving an article successively relative to an analytical, measuring or scanning station, holding the article in or moving the article through said station while a physical or chemical characteristic of the article is determined, moving the article relative to a marking station, holding the article in or moving the article through said marking station while the article is marked and subsequently transporting the article out of the apparatus.
35. An apparatus as claimed in claims 23-33 further including transporting means (130) for orientating and moving a document successively relative to a high resolution optical scanning station, for holding the article in or moving the article through said station while the micro-topography of an area of a surface of the document is determined, moving the document relative to a marking station, holding the document in or moving the article through said marking station while the document is marked and subsequently transporting the document out of the apparatus; said determining means (132) is a means for scanning the micro-topography of a portion of a surface of said document; said means for encoding (134) forms a encoded characteristic of the micro-topography; said means (134) for encrypting said encoded characteristic uses at least one encryption key to form said encrypted representation, and said means (136) for applying marks the encrypted representation on the document.
36. An apparatus as claimed in claim 23 wherein said means for determining a distinguishing physical or chemical characteristic of an article is a laser reader (171) for reading one of the topography of a laser disk, the topography of information data on the disk, and a representation of topographical deviation of information data on the disk from standardised topography of data, said characteristic being encoded and encrypted to form said encrypted representation, and said means for applying said encrypted representation is a laser writer (174) .
37. An apparatus for encoding articles as claimed in claim 36 wherein, when the characteristic that is encoded is the topographical deviation, comparator means (172) is employed to determine an electrical signal representative of the deviation of the binary 0's and l's from a standard depth for a 0 and 1.
38. An apparatus for authenticating an article characterised in that the apparatus including means (152) for determining a physical or chemical characteristic of an article, means (154) using one or more public decryption keys for deciphering an encoded representation of that physical or chemical characteristic marked on the article, means (161, 165) for comparing the actual physical or chemical characteristic with the deciphered representation, and means (157) for indicating therefrom whether the article is authentic.
39. An apparatus as claimed in claim 38 wherein the determining means (152) scans the micro-topography of the article and the comparing means (161, 165) compares the actual topography with the decoded representation.
40. An apparatus as claimed in claims 38 or 39 further j including secret decryption means (163) using, for higher levels of security, the same secret encryption key to decrypt the representation as that used to encrypt the representation without disclosing said key to an operator.
41. An apparatus as claimed in claims 38-40 further including error-correcting means (146) to allow for changes in the chemical or physical characteristics subsequent to the encoding of the same, produced, for example, by wear, aging or soiling.
42. An apparatus as claimed in any of claims 38-41 further including transporting means (150) for orientating and moving the article relative to an analytical, measuring or scanning station, holding the article in or moving the article through said station while a physical or chemical characteristic of the article is determined and subsequently transporting the article out of the apparatus.
43. An apparatus as claimed in any of claims 38-41 further including transporting means (150) for orientating and moving a document relative to a high resolution scanning station, holding the article in or moving the article through said station while the micro- topography of a portion of a surface of the document is determined and subsequently transporting the article out of the apparatus; said determining means (152) is a means for scanning the micro-topography of the document; means (152, 162, 163) for reading and, using at least one decryption key, decrypting, an encrypted representation of the micro-topography previously marked on the document; and said means for comparing (161, 165) compares the encoded characteristic of micro-topography so obtained with that determined by the apparatus.
44. An apparatus as claimed in claim 38 wherein said means for determining a distinguishing physical or chemical characteristic is a laser reader (181) , said comparing means (182) redetermines the encoded data and compares the decrypted data with the redetermined data, and said indicating means (157) is arranged to supply a signal to a disk player indicating authenticity of said disk whereby if said disk is judged not to be authentic the disk will not "play" and if it is judged to be authentic the disk will "play" .
45. An apparatus as claimed in claim 38 wherein said means for determining a physical or chemical characteristic of an article is a laser reader (181) and said means for comparing is a decision making means (183) for comparing the deciphered representation with the actual characteristic that is read by said laser reader (181) and said decision making means (183) being adapted to enable or disable means for reading information data on said disk in dependence upon whether said disk is determined to be authentic or not.
46. A method of authenticating a laser disk such as a CD or CD-ROM using the steps of determining a characteristic of said disk that is one of a representation of the topography of the disk, a representation of the topography of data on the disk, and a representation of the topographical deviation of data on the disk from standardised topography of data, encoding the characteristic, encrypting the encoded characteristic to form an encrypted representation, applying the encrypted representation to the disk, subsequently authenticating the disk by redetermining the characteristic, and reading and decrypting the encrypted representation to form a decrypted representation, and comparing the decrypted representation of the recorded characteristic with the redetermined physical characteristic so as to thereby determine the authenticity of the disk.
47. A method of authenticating a disk as claimed in claim 46, wherein if said comparison determines that the disk is authentic then a disk player is enabled to read information data on said disk but if said disk is not authenticated then said disk player is disabled and said disk will not play said information data.
48. An apparatus for encoding laser disks such as CDs or CD-ROMs including a laser reader (171) for reading one of the topography of the disk, the topography of information data on the disk, and a representation of topographical deviation of information data on the disk from standardised topography of data, means (173) for encoding the physical characteristic as an encoded characteristic, means (173) for encrypting said encoded characteristic as an encrypted representation, and means (174) for applying said encrypted representation to the article.
49. An apparatus for authenticating a laser disk such as a CD or CD-ROM including means for determining a physical characteristic of the disk by using laser reading means (181) to read one of the topography of the disk, the topography of information data on the disk, and a representation of topographical deviation of information data on the disk from standardised topography of data, means (182) using one or more public decryption keys for deciphering an encoded representation of that physical characteristic marked on the disk, means (182) for comparing the actual physical characteristic with the deciphered representation, and means (183) for authenticating said disk.
PCT/GB1995/003051 1995-12-29 1995-12-29 Authentication of articles WO1997024699A1 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
PCT/GB1995/003051 WO1997024699A1 (en) 1995-12-29 1995-12-29 Authentication of articles
AU43118/96A AU4311896A (en) 1995-12-29 1995-12-29 Authentication of articles

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/GB1995/003051 WO1997024699A1 (en) 1995-12-29 1995-12-29 Authentication of articles

Publications (1)

Publication Number Publication Date
WO1997024699A1 true WO1997024699A1 (en) 1997-07-10

Family

ID=10769718

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/GB1995/003051 WO1997024699A1 (en) 1995-12-29 1995-12-29 Authentication of articles

Country Status (2)

Country Link
AU (1) AU4311896A (en)
WO (1) WO1997024699A1 (en)

Cited By (47)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
NL1008929C2 (en) * 1998-04-20 1999-10-21 Vhp Ugchelen Bv Substrate made of paper provided with an integrated circuit.
WO2000059917A2 (en) * 1999-03-31 2000-10-12 Hilmar Rauhe Information-carrying and information-processing polymers
WO2000065541A1 (en) * 1999-04-23 2000-11-02 The Escher Group, Ltd. Workpiece authentication based upon one or more workpiece images
EP1107190A1 (en) * 1999-12-06 2001-06-13 Francotyp-Postalia Aktiengesellschaft &amp; Co. Method and machine for franking
WO2001043086A1 (en) 1999-12-08 2001-06-14 Mischenko Valentin Alexandrovi Method and system for authentication of articles
WO2002001513A1 (en) * 2000-06-28 2002-01-03 Sys S.P.A. Method to check the authenticity of the marking of a product
EP1173001A2 (en) * 2000-07-11 2002-01-16 Eastman Kodak Company Authenticatable image with an embedded image having a discernible physical characteristic
WO2003021541A2 (en) * 2001-09-04 2003-03-13 Ip And Innovation Company Holdings (Pty) Limited System and method of authenticating an article
WO2003087991A2 (en) * 2002-04-09 2003-10-23 The Escher Group, Ltd. System and method for authentication of a workpiece using three dimensional shape recovery
GB2391988A (en) * 2002-08-14 2004-02-18 Scient Generics Ltd An identity verification system
FR2846445A1 (en) * 2002-10-29 2004-04-30 Claude Lambert METHOD OF AUTHENTICATION BY CHEMICAL MARKING OR TRACING OF AN OBJECT OR SUBSTANCE.
EP1513112A2 (en) * 2003-09-08 2005-03-09 Hewlett-Packard Development Company, L.P. Printed material verification
EP1585065A2 (en) * 2004-04-07 2005-10-12 Pitney Bowes Inc. Postage indicia including color bar sequence to aid in authentication
DE102004016776A1 (en) * 2004-04-01 2005-10-20 Friedrich Von Rohrscheidt Radio frequency identification system for identifying adulterated goods e.g. cigar, has identification tag for transferring data about characteristic of goods to reader for detection of adulterated goods
FR2869704A1 (en) * 2004-04-28 2005-11-04 Claude Lambert METHOD FOR AUTHENTICATION SECURED BY MARKING OR CHEMICAL TRACING OF AN OBJECT OR SUBSTANCE
US7035428B1 (en) 1999-04-23 2006-04-25 The Escher Group, Ltd. Workpiece authentication based upon one or more workpiece images
DE102004055761A1 (en) * 2004-11-18 2006-05-24 Giesecke & Devrient Gmbh Valuable document, e.g. banknote, has code that cannot be detected in visible spectral region, especially barcode, that gives result of encoding measurable encoded property(ies) and/or encoded property(ies) derivable from measurement values
EP1508879A3 (en) * 2003-08-21 2006-07-12 Pitney Bowes Inc. Postage indicia including encoded ink characteristic data
EP1730675A1 (en) 2004-03-12 2006-12-13 Ingenia Technology Limited Authenticity verification methods, products and apparatuses
WO2007144598A1 (en) * 2006-06-12 2007-12-21 Ingenia Technology Limited Scanner authentication
US20080002243A1 (en) * 2004-03-12 2008-01-03 Ingenia Technology Limited Methods and Apparatuses for Creating Authenticatable Printed Articles and Subsequently Verifying Them
EP1930857A1 (en) 2006-12-05 2008-06-11 Canon Kabushiki Kaisha Image processing apparatus and image processing method, program, and storage medium
WO2009006381A1 (en) * 2007-06-29 2009-01-08 Symbol Technologies, Inc. Method and system for anti-counterfeit barcode label
DE102007060605A1 (en) * 2007-12-13 2009-06-25 Fraunhofer-Gesellschaft zur Förderung der angewandten Forschung e.V. Securing personal identity documents against counterfeiting
US7949148B2 (en) 2006-01-23 2011-05-24 Digimarc Corporation Object processing employing movement
EP2383705A1 (en) * 2010-04-30 2011-11-02 MediSeal GmbH Forgery-proof blister pack
US8194919B2 (en) 2004-11-09 2012-06-05 Digimarc Corporation Authenticating identification and security documents
US8224018B2 (en) 2006-01-23 2012-07-17 Digimarc Corporation Sensing data from physical objects
US8325971B2 (en) 2005-12-23 2012-12-04 Signoptic Technologies Method for extracting random signatures from a material element and method for generating a decomposition base to implement the extraction method
EP2551797A3 (en) * 2011-07-27 2013-10-23 Giesecke & Devrient GmbH Generation and checking of a product identification
WO2013188897A1 (en) 2012-06-18 2013-12-27 Weis Thomas Method for unambiguous marking of an object
US8736908B2 (en) 2007-12-24 2014-05-27 Canon Kabushiki Kaisha Printing and authentication of a security document on a substrate utilizing unique substrate properties
WO2014095737A1 (en) * 2012-12-17 2014-06-26 Philip Morris Products S.A. Method and apparatus for marking manufactured items using physical characteristic
US8892556B2 (en) 2009-11-10 2014-11-18 Ingenia Holdings Limited Optimisation
US8950662B2 (en) 2012-03-01 2015-02-10 Sys-Tech Solutions, Inc. Unique identification information from marked features
DE102014007976A1 (en) 2014-06-04 2015-12-31 Friedrich Kisters Security device and authentication method with dynamic security features
WO2016092328A3 (en) * 2014-12-11 2016-08-04 King's College London Authenticating an article
WO2016202979A1 (en) 2015-06-19 2016-12-22 Fábrica Nacional De Moneda Y Timbre - Real Casa De La Moneda Nanostructured phosphorescent pigment and uses thereof
US9940572B2 (en) 2015-02-17 2018-04-10 Sys-Tech Solutions, Inc. Methods and a computing device for determining whether a mark is genuine
US10061958B2 (en) 2016-03-14 2018-08-28 Sys-Tech Solutions, Inc. Methods and a computing device for determining whether a mark is genuine
US10235597B2 (en) 2015-06-16 2019-03-19 Sys-Tech Solutions, Inc. Methods and a computing device for determining whether a mark is genuine
US10305896B2 (en) 2014-03-27 2019-05-28 Friedrich Kisters Authentication system
US10387703B2 (en) 2012-03-01 2019-08-20 Sys-Tech Solutions, Inc. Methods and system for verifying an authenticity of a printed item
US10482303B2 (en) 2012-03-01 2019-11-19 Sys-Tech Solutions, Inc. Methods and a system for verifying the authenticity of a mark
EP3699856A1 (en) * 2019-02-21 2020-08-26 INL - International Iberian Nanotechnology Laboratory Tagging of an object
WO2021001147A1 (en) * 2019-07-04 2021-01-07 Basf Se New method for pseudo-random number generation for information encryption
EP4102399A1 (en) 2021-06-08 2022-12-14 Université de Genève Object authentication using digital blueprints and physical fingerprints

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4218674A (en) * 1975-09-09 1980-08-19 Dasy Inter S.A. Method and a system for verifying authenticity safe against forgery
US4290630A (en) * 1977-03-01 1981-09-22 Governor & Company Of The Bank Of England Security devices
US4649266A (en) * 1984-03-12 1987-03-10 Pitney Bowes Inc. Method and apparatus for verifying postage
EP0260940A2 (en) * 1986-09-19 1988-03-23 Light Signatures, Inc. Authenticity-verification and identification of documents or other objects
US5319705A (en) * 1992-10-21 1994-06-07 International Business Machines Corporation Method and system for multimedia access control enablement
EP0636962A2 (en) * 1993-07-27 1995-02-01 Software Security, Inc. Method of software distribution protection

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4218674A (en) * 1975-09-09 1980-08-19 Dasy Inter S.A. Method and a system for verifying authenticity safe against forgery
US4290630A (en) * 1977-03-01 1981-09-22 Governor & Company Of The Bank Of England Security devices
US4649266A (en) * 1984-03-12 1987-03-10 Pitney Bowes Inc. Method and apparatus for verifying postage
EP0260940A2 (en) * 1986-09-19 1988-03-23 Light Signatures, Inc. Authenticity-verification and identification of documents or other objects
US5319705A (en) * 1992-10-21 1994-06-07 International Business Machines Corporation Method and system for multimedia access control enablement
EP0636962A2 (en) * 1993-07-27 1995-02-01 Software Security, Inc. Method of software distribution protection

Cited By (100)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
NL1008929C2 (en) * 1998-04-20 1999-10-21 Vhp Ugchelen Bv Substrate made of paper provided with an integrated circuit.
WO1999054842A1 (en) * 1998-04-20 1999-10-28 Vhp Veiligheidspapierfabriek Ugchelen B.V. Substrate which is made from paper and is provided with an integrated circuit
US7032828B2 (en) 1998-04-20 2006-04-25 Vhp Veiligheidspapierfabriek Ugchelen B.V. Substrate which is made from paper and is provided with an integrated circuit
US6830192B1 (en) 1998-04-20 2004-12-14 Vhp Veiligheidspapierfabriek Ugchelen B.V. Substrate which is made from paper and is provided with an integrated circuit
WO2000059917A2 (en) * 1999-03-31 2000-10-12 Hilmar Rauhe Information-carrying and information-processing polymers
WO2000059917A3 (en) * 1999-03-31 2001-02-01 Hilmar Rauhe Information-carrying and information-processing polymers
WO2000065541A1 (en) * 1999-04-23 2000-11-02 The Escher Group, Ltd. Workpiece authentication based upon one or more workpiece images
US7035428B1 (en) 1999-04-23 2006-04-25 The Escher Group, Ltd. Workpiece authentication based upon one or more workpiece images
US7496538B2 (en) 1999-12-06 2009-02-24 Francotyp-Postalia Ag & Co Franking method and apparatus
EP1107190A1 (en) * 1999-12-06 2001-06-13 Francotyp-Postalia Aktiengesellschaft &amp; Co. Method and machine for franking
WO2001043086A1 (en) 1999-12-08 2001-06-14 Mischenko Valentin Alexandrovi Method and system for authentication of articles
WO2002001513A1 (en) * 2000-06-28 2002-01-03 Sys S.P.A. Method to check the authenticity of the marking of a product
EP1173001A2 (en) * 2000-07-11 2002-01-16 Eastman Kodak Company Authenticatable image with an embedded image having a discernible physical characteristic
EP1173001A3 (en) * 2000-07-11 2004-05-06 Eastman Kodak Company Authenticatable image with an embedded image having a discernible physical characteristic
WO2003021541A2 (en) * 2001-09-04 2003-03-13 Ip And Innovation Company Holdings (Pty) Limited System and method of authenticating an article
WO2003021541A3 (en) * 2001-09-04 2003-11-27 Ip And Innovation Company Hold System and method of authenticating an article
US7360081B2 (en) 2001-09-04 2008-04-15 Centralised Authentication Of Products (Pty) Ltd. System and method of authenticating an article
US7251347B2 (en) 2002-04-09 2007-07-31 The Escher Group, Ltd. System and method for authentication of a workpiece using three dimensional shape recovery
WO2003087991A3 (en) * 2002-04-09 2004-02-26 Escher Group Ltd System and method for authentication of a workpiece using three dimensional shape recovery
WO2003087991A2 (en) * 2002-04-09 2003-10-23 The Escher Group, Ltd. System and method for authentication of a workpiece using three dimensional shape recovery
GB2391988A (en) * 2002-08-14 2004-02-18 Scient Generics Ltd An identity verification system
WO2004040504A3 (en) * 2002-10-29 2004-08-12 Claude Lambert Method for authentication by chemical marking or tracing of an object or a substance
WO2004040504A2 (en) * 2002-10-29 2004-05-13 Claude Lambert Method for authentication by chemical marking or tracing of an object or a substance
FR2846445A1 (en) * 2002-10-29 2004-04-30 Claude Lambert METHOD OF AUTHENTICATION BY CHEMICAL MARKING OR TRACING OF AN OBJECT OR SUBSTANCE.
US7605372B2 (en) 2002-10-29 2009-10-20 Jean-Michel Hachin Method for authentication by chemical marking or tracing of an object or a substance
EP1508879A3 (en) * 2003-08-21 2006-07-12 Pitney Bowes Inc. Postage indicia including encoded ink characteristic data
US7299984B2 (en) 2003-08-21 2007-11-27 Pitney Bowes Inc. Postage indicia including encoded ink characteristic data
EP1513112A2 (en) * 2003-09-08 2005-03-09 Hewlett-Packard Development Company, L.P. Printed material verification
EP1513112A3 (en) * 2003-09-08 2005-04-13 Hewlett-Packard Development Company, L.P. Printed material verification
US20080002243A1 (en) * 2004-03-12 2008-01-03 Ingenia Technology Limited Methods and Apparatuses for Creating Authenticatable Printed Articles and Subsequently Verifying Them
US8896885B2 (en) * 2004-03-12 2014-11-25 Ingenia Holdings Limited Creating authenticatable printed articles and subsequently verifying them based on scattered light caused by surface structure
EP1730675A1 (en) 2004-03-12 2006-12-13 Ingenia Technology Limited Authenticity verification methods, products and apparatuses
US9019567B2 (en) 2004-03-12 2015-04-28 Ingenia Holdings Limited Methods and apparatuses for creating authenticatable printed articles and subsequently verifying them
DE102004016776A1 (en) * 2004-04-01 2005-10-20 Friedrich Von Rohrscheidt Radio frequency identification system for identifying adulterated goods e.g. cigar, has identification tag for transferring data about characteristic of goods to reader for detection of adulterated goods
DE102004016776B4 (en) * 2004-04-01 2007-06-06 Friedrich Von Rohrscheidt Procedure for identifying counterfeit cigarettes or cigars
EP1585065A3 (en) * 2004-04-07 2006-11-29 Pitney Bowes Inc. Postage indicia including color bar sequence to aid in authentication
EP1585065A2 (en) * 2004-04-07 2005-10-12 Pitney Bowes Inc. Postage indicia including color bar sequence to aid in authentication
WO2005106779A3 (en) * 2004-04-28 2006-02-09 Claude Lambert Method for securely authenticating an object or a substance by chemical marking or tracing
WO2005106779A2 (en) * 2004-04-28 2005-11-10 Claude Lambert Method for securely authenticating an object or a substance by chemical marking or tracing
FR2869704A1 (en) * 2004-04-28 2005-11-04 Claude Lambert METHOD FOR AUTHENTICATION SECURED BY MARKING OR CHEMICAL TRACING OF AN OBJECT OR SUBSTANCE
US10543711B2 (en) 2004-11-09 2020-01-28 Digimarc Corporation Authenticating identification and security documents and other objects
US9718296B2 (en) 2004-11-09 2017-08-01 Digimarc Corporation Authenticating identification and security documents and other objects
US11548310B2 (en) 2004-11-09 2023-01-10 Digimarc Corporation Authenticating identification and security documents and other objects
US8194919B2 (en) 2004-11-09 2012-06-05 Digimarc Corporation Authenticating identification and security documents
DE102004055761A1 (en) * 2004-11-18 2006-05-24 Giesecke & Devrient Gmbh Valuable document, e.g. banknote, has code that cannot be detected in visible spectral region, especially barcode, that gives result of encoding measurable encoded property(ies) and/or encoded property(ies) derivable from measurement values
US8989500B2 (en) 2005-12-23 2015-03-24 Signoptic Technologies Method for extracting random signatures from a material element and method for generating a decomposition base to implement the extraction method
US8325971B2 (en) 2005-12-23 2012-12-04 Signoptic Technologies Method for extracting random signatures from a material element and method for generating a decomposition base to implement the extraction method
US8224018B2 (en) 2006-01-23 2012-07-17 Digimarc Corporation Sensing data from physical objects
US8923550B2 (en) 2006-01-23 2014-12-30 Digimarc Corporation Object processing employing movement
US8077905B2 (en) 2006-01-23 2011-12-13 Digimarc Corporation Capturing physical feature data
US8126203B2 (en) 2006-01-23 2012-02-28 Digimarc Corporation Object processing employing movement
US8842876B2 (en) 2006-01-23 2014-09-23 Digimarc Corporation Sensing data from physical objects
US7949148B2 (en) 2006-01-23 2011-05-24 Digimarc Corporation Object processing employing movement
US8983117B2 (en) 2006-01-23 2015-03-17 Digimarc Corporation Document processing methods
WO2007144598A1 (en) * 2006-06-12 2007-12-21 Ingenia Technology Limited Scanner authentication
US8059871B2 (en) 2006-12-05 2011-11-15 Canon Kabushiki Kaisha Image processing apparatus and image processing method, program, and storage medium
US8374408B2 (en) 2006-12-05 2013-02-12 Canon Kabushiki Kaisha Image processing apparatus and image processing method, program, and storage medium
EP1930857A1 (en) 2006-12-05 2008-06-11 Canon Kabushiki Kaisha Image processing apparatus and image processing method, program, and storage medium
WO2009006381A1 (en) * 2007-06-29 2009-01-08 Symbol Technologies, Inc. Method and system for anti-counterfeit barcode label
DE102007060605A1 (en) * 2007-12-13 2009-06-25 Fraunhofer-Gesellschaft zur Förderung der angewandten Forschung e.V. Securing personal identity documents against counterfeiting
US8736908B2 (en) 2007-12-24 2014-05-27 Canon Kabushiki Kaisha Printing and authentication of a security document on a substrate utilizing unique substrate properties
US8892556B2 (en) 2009-11-10 2014-11-18 Ingenia Holdings Limited Optimisation
EP2383705A1 (en) * 2010-04-30 2011-11-02 MediSeal GmbH Forgery-proof blister pack
EP2551797A3 (en) * 2011-07-27 2013-10-23 Giesecke & Devrient GmbH Generation and checking of a product identification
US10546171B2 (en) 2012-03-01 2020-01-28 Sys-Tech Solutions, Inc. Method and system for determining an authenticity of a barcode using edge linearity
US10380601B2 (en) 2012-03-01 2019-08-13 Sys-Tech Solutions, Inc. Method and system for determining whether a mark is genuine
US10922699B2 (en) 2012-03-01 2021-02-16 Sys-Tech Solutions, Inc. Method and system for determining whether a barcode is genuine using a deviation from a nominal shape
US10832026B2 (en) 2012-03-01 2020-11-10 Sys-Tech Solutions, Inc. Method and system for determining whether a barcode is genuine using a gray level co-occurrence matrix
US10552848B2 (en) 2012-03-01 2020-02-04 Sys-Tech Solutions, Inc. Method and system for determining whether a barcode is genuine using a deviation from an idealized grid
US8950662B2 (en) 2012-03-01 2015-02-10 Sys-Tech Solutions, Inc. Unique identification information from marked features
US10482303B2 (en) 2012-03-01 2019-11-19 Sys-Tech Solutions, Inc. Methods and a system for verifying the authenticity of a mark
US10387703B2 (en) 2012-03-01 2019-08-20 Sys-Tech Solutions, Inc. Methods and system for verifying an authenticity of a printed item
AT513243A1 (en) * 2012-06-18 2014-02-15 Thomas Dipl Ing Fh Dipl Ing Weiss Method or system for the unique identification of an object
US9548863B2 (en) 2012-06-18 2017-01-17 Authentic Vision Gmbh Method for unambiguous marking of an object
WO2013188897A1 (en) 2012-06-18 2013-12-27 Weis Thomas Method for unambiguous marking of an object
CN104428798B (en) * 2012-06-18 2017-10-13 真视野股份有限公司 Method for clear and definite tagged object
CN104428798A (en) * 2012-06-18 2015-03-18 真视野股份有限公司 Method for unambiguous marking of an object
CN104854642B (en) * 2012-12-17 2017-12-05 英艾克斯图股份有限公司 For the method and apparatus using physical features mark manufacture article
EA034481B1 (en) * 2012-12-17 2020-02-12 Инексто Са Method and apparatus for marking manufactured items
WO2014095737A1 (en) * 2012-12-17 2014-06-26 Philip Morris Products S.A. Method and apparatus for marking manufactured items using physical characteristic
CN104854642A (en) * 2012-12-17 2015-08-19 菲利普莫里斯生产公司 Method and apparatus for marking manufactured items using physical characteristic
KR102194421B1 (en) * 2012-12-17 2020-12-24 아이넥스토 에스.에이. Method and apparatus for marking manufactured items using physical characteristic
AU2013363820B2 (en) * 2012-12-17 2018-01-04 Inexto Sa Method and apparatus for marking manufactured items using physical characteristic
KR20150103029A (en) * 2012-12-17 2015-09-09 필립모리스 프로덕츠 에스.에이. Method and apparatus for marking manufactured items using physical characteristic
US10121151B2 (en) 2012-12-17 2018-11-06 Inexto S.A. Method and apparatus for marking manufactured items using physical characteristic
US10305896B2 (en) 2014-03-27 2019-05-28 Friedrich Kisters Authentication system
US10720003B2 (en) 2014-06-04 2020-07-21 Friedrich Kisters Security device and authentication method with dynamic security features
DE102014007976A1 (en) 2014-06-04 2015-12-31 Friedrich Kisters Security device and authentication method with dynamic security features
US10900914B2 (en) 2014-12-11 2021-01-26 King's College London Authenticating an article
WO2016092328A3 (en) * 2014-12-11 2016-08-04 King's College London Authenticating an article
US9940572B2 (en) 2015-02-17 2018-04-10 Sys-Tech Solutions, Inc. Methods and a computing device for determining whether a mark is genuine
US10235597B2 (en) 2015-06-16 2019-03-19 Sys-Tech Solutions, Inc. Methods and a computing device for determining whether a mark is genuine
WO2016202979A1 (en) 2015-06-19 2016-12-22 Fábrica Nacional De Moneda Y Timbre - Real Casa De La Moneda Nanostructured phosphorescent pigment and uses thereof
US10899960B2 (en) 2015-06-19 2021-01-26 Consejo Superior De Investigaciones Científicas Nanostructured phosphorescent pigment and uses thereof
US10061958B2 (en) 2016-03-14 2018-08-28 Sys-Tech Solutions, Inc. Methods and a computing device for determining whether a mark is genuine
WO2020169359A1 (en) * 2019-02-21 2020-08-27 Inl - International Iberian Nanotechnology Laboratory Tagging of an object
CN113366518A (en) * 2019-02-21 2021-09-07 Inl-国际伊比利亚纳米技术实验室 Marking of objects
EP3699856A1 (en) * 2019-02-21 2020-08-26 INL - International Iberian Nanotechnology Laboratory Tagging of an object
WO2021001147A1 (en) * 2019-07-04 2021-01-07 Basf Se New method for pseudo-random number generation for information encryption
EP4102399A1 (en) 2021-06-08 2022-12-14 Université de Genève Object authentication using digital blueprints and physical fingerprints

Also Published As

Publication number Publication date
AU4311896A (en) 1997-07-28

Similar Documents

Publication Publication Date Title
WO1997024699A1 (en) Authentication of articles
US8943325B2 (en) Use of a digital signature obtained from at least one structural characteristic of a material element to protect the direct reading of sensitive data and method for reading this protected data
US7360081B2 (en) System and method of authenticating an article
US7937588B2 (en) Techniques for detecting, analyzing, and using visible authentication patterns
RU2606056C2 (en) Documents protection and authentication method and device
US6536665B1 (en) Method and apparatus for transaction card security utilizing embedded image data
EP0600646B1 (en) Method and apparatus for producing and authenticating a secure document
EP1514227B1 (en) Visible authentication patterns for printed document
EP2320389A2 (en) Visible authentication patterns for printed document
US20030063772A1 (en) System and method for authentication and tracking of a workpiece that includes an optically active medium
CA2115905C (en) Secure personal identification instrument and method for creating same
CA2374196A1 (en) Legitimacy protection of electronic document and a printed copy thereof
RU2458395C2 (en) Methods and apparatus for ensuring integrity and authenticity of documents
MXPA06008875A (en) Use of a digital signature obtained from at least one structural characteristic of a hardware element in order to protect direct reading of sensitive information and method for reading protected sensitive information.
WO2001091007A1 (en) System and method for production and authentication of original documents
MX2011003119A (en) Method and device for authenticating geometrical codes.
WO2000039953A1 (en) Method and apparatus for protecting the legitimacy of an article
EP1801692B1 (en) Improved techniques for detecting, analyzing and using visible authentication patterns
WO2007072793A1 (en) Card capable of authentication
RU2088971C1 (en) Measures for protecting securities against forgery
Haist et al. Optical detection of random features for high security applications
Shariati et al. Random profiles of laser marks
WO2003030105A2 (en) System and method for authentication and tracking of a workpiece
US20160355043A1 (en) System and method for production and verification of counterfeit-protected banknotes
KR100491649B1 (en) Insertion and detecting system of multi-dimension barcode and the control method

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): AU BB BG BR CA CN CZ EE FI HU IS JP KR KZ LK LT LV MD MX NO NZ PL RO TT UA UG US VN

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): AT BE CH DE DK ES FR GB GR IE IT LU MC NL PT SE

121 Ep: the epo has been informed by wipo that ep was designated in this application
NENP Non-entry into the national phase

Ref country code: JP

Ref document number: 97524086

Format of ref document f/p: F

122 Ep: pct application non-entry in european phase