[go: up one dir, main page]

CN101258511A - Signature for access tokens - Google Patents

Signature for access tokens Download PDF

Info

Publication number
CN101258511A
CN101258511A CNA2006800325401A CN200680032540A CN101258511A CN 101258511 A CN101258511 A CN 101258511A CN A2006800325401 A CNA2006800325401 A CN A2006800325401A CN 200680032540 A CN200680032540 A CN 200680032540A CN 101258511 A CN101258511 A CN 101258511A
Authority
CN
China
Prior art keywords
signature
data
access token
access
article
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CNA2006800325401A
Other languages
Chinese (zh)
Inventor
鲁塞尔·P·考伯恩
詹姆斯·D·R·布坎南
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ingenia Holdings UK Ltd
Original Assignee
Ingenia Technology Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ingenia Technology Ltd filed Critical Ingenia Technology Ltd
Publication of CN101258511A publication Critical patent/CN101258511A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • G06F21/35User authentication involving the use of external additional devices, e.g. dongles or smart cards communicating wirelessly

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Image Input (AREA)
  • Measurement Of The Respiration, Hearing Ability, Form, And Blood Characteristics Of Living Organisms (AREA)

Abstract

A data access system can be provided. The system can comprise a data record associated with a stored access token signature and a signature generator, operable to scan an access token to create a signature for the access token, the signature being based upon an intrinsic property of the access token. The system can also comprise a comparator for comparing the created signature with the stored signature. The system can be operable to make the data record available in the event of a match between the stored signature and the created signature. Thus secure access to sensitive or private data can be controlled using an access token in the possession of an individual or entity described by or in the data record.

Description

The signature that is used for access token
Technical field
The present invention relates to visit, especially (but right and wrong exclusively) relates to sensitive information, such as the authenticity verification techniques of the visit of medical treatment or Financial Information.
Background technology
Be that many users concentrate in many application of preserving data therein, have misgivings described data confidentiality.For example, bank may need to preserve the details of client's general financial condition, and medical institutions need preserve the details of patient's case history, and perhaps company need preserve employee's details.For the personnel of this entity work usually can visit this data according to uncontrolled relatively mode, thus cause such as recently widely report leak problem the Financial Information of the domestic bank client of Britain from being positioned at the external bank call center of Britain.
These and other misgivings of maintaining secrecy makes bank or other financial services provider be difficult to obtain new client, and can cause because of fearing unnecessarily wide dispersion of information quilt, and the patient is concealed the situation of important medical information.
At Gershenfeld, Science 297 (5589): 20026-2030, discussed the packing data technology of utilizing the biometrics signature among the September 202002.Described disclosed technology is used a kind of very special optically transparent three-dimensional access token.
Summary of the invention
Consider the problem and the defective of conventional system to small part, made the present invention.
The present invention results partly from the work of inventor aspect the authentication technique that use to use the token of being made by magnetic material at least, in the token of being made by magnetic material, uniqueness provides (describing in detail among the PCT/GB03/03917 as Cowburn) by the defective of can not reproducing of the magnetic response that influences token in the magnetic material.As this part of work, magnetic material is manufactured into barcode format, promptly manufactures many parallel bands.As by read unique magnetic response of band with the inswept magnetic field of magnetic reader, constituted optical scanner, it is by scan laser light beam on bar code, and utilizes by the bar code band and form the contrast that the reflectivity of continuous variation of the article of bar code band causes on it and read bar code.This information is replenishing magnetic characteristic, because in a kind of known self-authentication schemes, bar code is used to the digital signature of unique magnetic response is encoded, for example as top about as described in the banknote (for example referring to Kravolec " Plastic tag makes foolproof ID ", Tech nology research news, 2October 2002).
Make that the inventor is wide-eyed to be, when utilizing this optical scanner, find to support that the papery background material of magnetic chip produces unique optic response to scanner.Further determine many other and do not do the surface of any preparation, the surface of for example various cardboards and plastics shows identical effect.In addition, the inventor determines that this unique property to small part is caused by speckle, but also comprises non-speckle contribution.
Thereby discovery can obtain all advantages based on speckle technique, and needn't use the article of special token of preparing or special preparation with any alternate manner.Especially, found that paper, cardboard and the plastics of many types produce the scattered signal of unique property because of coherent light beam, so that can be from almost any paper document or carton package article obtain unique digital signature.
The above-mentioned known speckle reader of safety equipment that is used for is based on using the whole token of laser beam irradiation, and form the image (for example referring to GB 2221870 and US 6584214) of the effective solid angle part (significantsolid angle portion) of resulting speckle pattern, thereby obtain the specklegram image of the token that constitutes by big data point array with CCD.
The reader that the inventor uses is not worked in this manner.It uses four single channel detector (four simple phototransistors), and described four single channel detector separate each other angularly, only collects four component of signals from the laser beam of scattering.Laser beam is focused into and only covers the very hot spot on the surface of fraction.When mobile spot in the surface, described four single channel detector are collected signal from lip-deep different regional areas.Thereby the characteristic response from article is made of the independent measurement result from a large amount of (general hundreds of or thousands of) the different regional areas on the article surface.Although use four phototransistors, but only be used to obtain unique characteristic response from this single channel separately from the analysis showed that of data of single phototransistor! But, if comprise more hyperchannel in four passages in the described response, can obtain higher level of security so.
From first aspect, the invention provides a kind of data access system.Described system comprises the data recording related with the access token signature of preserving and scans the signature generator of access token with the signature that produces this access token that described signature is based on the intrinsic property of access token.Described system also comprises relatively the comparer of the signature of the signature that produces and preservation.Under the situation that the signature of signature of preserving and generation conforms to, described system can make data recording use.Thereby, by utilizing individual related or the access token that entity had, can control, such as the secure access that is considered to sensitivity or secret data to data with data recording.Described data can be to describe the data of Financial Information at least, describe the data of medical information, describe the data of employee information and describe one of data of legal information.
In one embodiment, the representative of the signature of access token is to unique access method of respective data record.Thereby the user of system can be guaranteed to obtain data but not open wide for any other people's visit, thereby reduces the worry of data confidentiality.In some instances, other access method is such as the system manager's visit that can replace the access token signature of losing, management access and/or (for example can be criminal investigation arrangement) investigation and interview.Thereby the user still can be guaranteed, and data are inaccessibles except some clear and definite purposes, and without their permission, their data abused or accessed possibility very low.
In some instances, data recording can be written under the situation of the access token signature that does not have coupling.Thereby the entity of preserving data can be increased to data in the data recording of specifying the individual, but under the situation of this user's access token not, can not visit this data once more.
In certain embodiments, the coupling between the signature of definite signature that produces and preservation shows that identical access token has been used to produce this two signatures.Thereby the unique channel of visit data is to use with the user and produces the identical access token of access token that is recorded in the signature in the database.
In one embodiment, the signature generator comprises: the reading space that holds written right token (enlitement-token); Produce the light source of coherent light beam; Collect the detector array of one group of data point from the signal that obtains when reading space scattering when coherent light beam, wherein different data points is relevant with the scattering of the different piece of reading the space certainly; With according to described one group of data point, determine the data acquisition and processing (DAP) module of the signature of written right token.
In some instances, access token can be any article of being selected by its user.Thereby token needs not to be the token of sending for visit data, in fact can be and not obvious be kept at database in the relevant article of data.
In some instances, comparer is divided into the polylith conjoint data to the signature that produces, and carries out each piece and institute and preserve compare operation between the relevant block of signing; The attribute of the comparative result of more described comparison and piece expection attribute relatively, determining offset for the usefulness of determining the checking result, thus compensation non-linear in the infringement of access token and/or the signature production process.
In some instances, signature can be used to utilize the XOR by turn between access key (error correcting code with interpolation) and the signature, encapsulation access key.By the data that receive and signature XOR-this will return the access key of band error correcting code, can obtain access key again at database.Can use error correcting code subsequently and eliminate by packing and the program of unpacking and cause, for example owing to any error of the nonidentity between the signature of access token.Thereby access key can be resumed, and is used to the data recording in the accessing database.
From second aspect, the invention provides a kind of method of visit data record.Described method comprises the scanning access token, and to produce the signature of access token, described signature is based on the database of the signature of the intrinsic property of access token and signature that relatively produces and preservation, and the signature of each preservation has the data recording related with it.In addition, under the signature that described method also is included in described generation and the situation that the signature of preservation conforms to, provide visit to the data recording related with the preservation signature of appointment.Thereby,, can protect the data that are kept in the data recording to exempt to be visited without authorization by utilize forming from the data recording warehouse or database extracts the access token of the search inquiry of data recording.Data can be to be considered to responsive or secret data, and can comprise the data of describing Financial Information, describe the data of medical information, describe one or more in the data of the data of employee information and description legal information.
When detector array only is made up of the single detector passage, can produce the reader that to work.Other embodiment uses detector array, and described detector array comprises angled distribution, and can collect one group of detector element of one group of data point, several detector elements of a best group for each different piece of reading the space.When signature comprises from the same group the contribution of comparison of data point mutually, can strengthen security.Be this simple crosscorrelation that relatively comprises easily.
Although only utilize a probe access just can produce the reader that to work, but preferably have two passages at least.This feasible comparison that can carry out between detector signal, described relatively can be used for and the relevant signal Processing of definite signature.2-10 probe access will be suitable for most the application, and present 2-4 probe access is considered to the optimum balance between equipment simplicity and the security.
Detector element preferably is aligned to and is arranged in and the plane of reading space intersection, and each element is distributed in this plane with respect to the coherent light beam axle angledly, and any side that is preferably in beam axis has one or more detector elements.But, the on-plane surface detector array also is acceptable.
Found to use the simple crosscorrelation of the signal that obtains from different detectors can produce the increase level of security, and allowed the valuable data that can reproduce signature in the past more reliably along with the time.From the viewpoint of science, the effectiveness of cross correlation is somewhat unexpected, because speckle pattern nature uncorrelated (except that the signal from the opposed point in the pattern).In other words,,, between from the signal of different detectors, will there be zero cross correlation, as long as detector is not arranged on and excites in the crossing common plane in position to depart from the angle that excites the identical size in position according to definition for speckle pattern.So, use the value of simple crosscorrelation influence (contribution) to show that the pith of scattered signal is not a speckle.The influence of non-speckle can be counted as from complicated surface, the direct scattering of twisting thread such as the paper fiber, the perhaps result of diffuse scattering influence.At present, the relative importance of speckle and non-speckle scattered signal influence and unclear.But, according to the experiment of carrying out so far, detector is not obviously measured pure speckle pattern, but has the composite signal of speckle composition and non-speckle composition.
Comprise the simple crosscorrelation composition in the signature and also be of value to the raising security.This is because promptly allow to utilize the high resolving power printing to produce the article that the contrast in the surface of reproducing true article changes, and can not mate by scanning the cross-correlation coefficient that true article obtain.
In one embodiment, probe access is made of the discrete detector assembly that is simple optical electric transistor form.Can use other simple discrete component, such as PIN diode or photodiode.Also can use integrated detector assembly, such as detector array, but this can increase the cost and the complicacy of equipment.
According to the initial experiment of revising the illumination angle of laser beam on article to be scanned, in the practice, laser beam is preferably near vertically inciding on the surface that is scanned, even degenerate so that obtain between twice measurement article, also the characteristic that can almost record repeatedly from similar face steadily.At least some known readers use oblique incidence (referring to GB 2221870).In case obtain understanding, it seems that so this effect be significantly, but obviously not as the speckle reader of some prior art, and it is obvious like that to comprise that the designing institute of the speckle reader of GB 2221870 and first prototype reader that the inventor makes up shows.First prototype reader working condition under laboratory condition of utilizing oblique incidence of inventor is quite good, but quite responsive to the degeneration as the paper of article.For example, be enough to cause when remeasuring, occur evident difference with finger friction paper.Second kind of prototype reader uses normal incidence, and find to have degeneration to the paper that causes because of regular job, and more serious incident, such as: by various printers, comprise laser printer, pass through photoprinter, write, print, be intended to toast in the baking oven, and the robustness that rolls and flatten again.
So, light source advantageously is installed, so as coherence-beam guidance to reading the space so that the nearly normal incidence of coherent light beam impinge upon on the article.Nearly normal incidence refers to ± and 5,10 or 20 °.On the other hand, light beam can be directed into oblique being mapped on the article.Under the situation of scanning light beam on the article, this has negative effect usually.
Be also noted that in the reader of in detailed description, describing that detector array is disposed in (in reflection) on the reflection direction, to detect from reading the backscattered radiation in space.But if article are transparent, detector can be disposed on the transmission direction so.
The signature generator can be visited the database of the signature of precedence record, and compares, and whether comprises the match of the signature that places the article of reading the space with the specified data storehouse.Database can be the part of the mass storage device of component part reader device, perhaps can be positioned at remote location, and can be visited by telecommunication link by reader.Described telecommunication link can adopt any conventionally form, comprises Radio Link and fixed link, and available in the Internet.The data acquisition and processing (DAP) module at least can be according to the operation of certain operations pattern, so that allow signature is increased in the database, if do not find any match.
When using database, except preserving signature, database also can be used for the signature in the database with about the out of Memory of article, scanned copy such as file, passport possessor's photo, the place of production of product and the details of date of manufacture, but perhaps the details of the sale by subscription destination of merchandising (for example, to follow the tracks of grey import) connects.
The present invention is convenient to identification by various different materials, for example the article made of paper, cardboard and plastics.
Inherent structure refers to the structure that article innately have because of its manufacturing, thereby the structure that provides specially for security purpose is provided, for example by being included in the structure that token in the article or regenerated fiber produce.
Paper or cardboard refer to any article of being produced by wood pulp or the fibre technology that is equal to.Paper or cardboard can be handled with coating or macerate, perhaps cover with transparent material, such as viscose paper.If the long-time stability on surface are special misgivings, so available acrylic acid spraying clear coat comes treatment paper.
Thereby, can collect data point according to the irradiation position of coherent light beam.This can be by the local coherent light beam of scanning on article, and perhaps by using orientation detector to collect from the scattered light of the different piece of article, perhaps the combination by the two realizes.
In many application, it is digital signature that signature is envisaged as.With regard to present technology, the general size of digital signature in the scope of 8k bit, at present for high security, preferably has the digital signature of about 2k bit size at 200 bits.
Digital signature be not kept in the database, but is using under the situation of the label right token that obtains from signing, can finish another kind of realization of the present invention, wherein said label meets the machine-readable code agreement.
Description of drawings
Illustrate specific embodiments of the invention below with reference to accompanying drawing, wherein:
Fig. 1 is the diagrammatic side view of reader device;
Fig. 2 is the perspective illustration how the reading space of the reader device of presentation graphs 1 is sampled;
Fig. 3 is the schematic block diagram of functional module of the reader device of Fig. 1;
Fig. 4 is the skeleton view of the reader device of Fig. 1, represents the profile of this reader device;
Fig. 5 is the skeleton view of another example of profile of the reader of presentation graphs 1;
Fig. 6 A is the schematic cross section of alternative reader structure;
Fig. 6 B is the skeleton view of another alternative reader structure;
Fig. 6 C is the skeleton view of another alternative reader structure;
Fig. 7 A is based on the diagrammatic side view that the alternative imaging scheme of the reader that shines was collected and covered to directional light;
Fig. 7 B is the schematic plan view of optics areal coverage of another alternative imaging scheme of reader, in this imaging scheme, in conjunction with the local irradiation by elongate light beam, uses orientation detector;
Fig. 8 A is the micrograph that image covers the paper of about 0.5 * 0.2 millimeter area;
Fig. 8 B is the micrograph that image covers the frosting of about 0.02 * 0.02 millimeter area;
Fig. 9 A represents to utilize the reader of Fig. 1, and from the raw data of single photodetector, described raw data is made up of photo detector signal and code device signal;
Fig. 9 B is illustrated in and utilizes code device signal to carry out linearization and ask after the mean value of amplitude the photodetector data of Fig. 9 A;
Fig. 9 C is illustrated in according to average level and carries out after the digitizing data of Fig. 9 B;
Figure 10 is a process flow diagram of representing how to produce from scanning the signature of article;
Figure 11 represents how to contrast the process flow diagram that signature database is examined the signature that scans the article that obtain;
Figure 12 is the non-ideality of representing how to consider in the scanning, the process flow diagram of the verification process of change Figure 11;
Figure 13 A represents from the example of the simple crosscorrelation data of scanning collection;
Figure 13 B is illustrated under the situation that is scanned the article distortion, from scanning the example of the simple crosscorrelation data of collecting;
Figure 13 C is illustrated in nonlinear velocity scanning and is scanned under the situation of article, from scanning the example of the simple crosscorrelation data of collecting;
Figure 14 is the synoptic diagram of the article Gong examining;
Figure 15 is the schematic sectional view of many scanner heads scanner;
Figure 16 is the schematic sectional view of many scanner heads position scanner;
Figure 17 schematically represents the example of the system of visit data;
Figure 18 schematically represents another example of the system of visit data;
Figure 19 schematically represents another example of the system of visit data.
Although the present invention allows various modifications and alterative version, but represented specific embodiment for example in the accompanying drawing, and here described in detail.But, should understand that accompanying drawing and detailed description thereof are not intended the present invention is confined to disclosed particular form, on the contrary, the present invention belongs to covering all modifications, equivalent and the alternatives in the scope of the present invention that is limited by accessory claim.
Embodiment
In order safety and authorization service to be provided, can to use the system that discerns physical articles uniquely, strengthen the reality of e-commerce system and the reliability of perception as the possibility that provider and final user reduce swindle in the environment such as e-commerce environment.
Describe the example of the system be suitable for carrying out this article identification in detail below with reference to Fig. 1-11.
Fig. 1 represents the diagrammatic side view of first example of reader device 1.Optical reader equipment 1 is used for measuring signature from the article (not shown) in the reading space of the equipment of being placed on.Reading the space is formed by the reading fenestra 10 that is a slit in the shell 12.Shell 12 comprises the main optical module of equipment.The main shaft of described slit extends (referring to the insertion coordinate axis among Fig. 3) along the x direction.Main optical module is to be used for producing the lasing light emitter 14 of coherent laser light beam 15 and by k optical detection device (this example, k=4) detector array 16 that constitutes of 16a, 16b, 16c and 16d.Laser beam 15 is focused into along y direction (perpendicular to drawing) by cylindrical lens 18 and extends and be in elongated focus in the plane of reading fenestra.In an illustration reader, the major axis dimension of described elongated focus is about 2 millimeters, and minor axis dimension is about 40 microns.These optical modules are included in the subassembly 20.In this example, four detecting element 16a...d begin mode according to interdigital arrangement from beam axis, and the different angular distribution of setovering is in the both sides of beam axis, so that be collected in from the light that is present in scattering in the reflection of reading the article in the space.In this example, offset angle be-70 ° ,-20 ° ,+30 ° and+50 °.The angle of beam axis both sides is selected to and is unequal, so that the data point that they are collected is independent as much as possible.All four detecting elements are arranged in the common plane.Optical detection device 16a...d survey when coherent light beam during from the reading space scattering from placing the light of the article scattering on the shell.As shown in the figure, lasing light emitter is installed into guide laser beam 15, makes its beam axis on the z direction, thus laser beam 15 with vertical incidence impinge upon the article of reading in the fenestra.
Usually, depth of focus is preferably bigger, so that can not cause reading the marked change of the beam sizes in the fenestra plane along any difference in the article of z direction layout.In this example, depth of focus is about 0.5 millimeter, and this depth of focus is enough big, is enough to bring forth good fruit can controlling to a certain extent under the situation of article with respect to the position of scanner.Depth of focus, these parameters of numerical aperture and operating distance interdepend, and the result forms known the trading off between spot size and the depth of focus.
Driving motor 22 is disposed in the shell 12, and is so that provide the linear movement of optics subassembly 20 by suitable bearing 24 or other device, as shown in arrow 26.Thereby driving motor 22 is used for the dried light beam of the linear mobile phase of x direction in reading fenestra 10 scopes, so that light beam 15 is scanned along the horizontal direction with respect to the major axis of elongated focus.Because coherent light beam 15 is chosen in the size at its focus place, so that has the xsect in xz plane (plane of accompanying drawing), described xsect is far smaller than reads the space perpendicular to the plane of coherent light beam (promptly, plane at the shell wall that the reading fenestra is set) projection in, therefore under the action of driving motor 22, the scanning of driving motor 22 can cause 15 pairs of coherent light beams to read a plurality of different piece samplings in space.
This sampling of Fig. 2 graphic extension is how to represent by crossing over read area scanning elongate light beam, to the perspective illustration of read area sampling n time.Under the action at driving motor, when reading the scanning focused laser beam of fenestra, the sampling location of the laser beam of focusing represented by the adjacent rectangle of numbering 1-n, and described adjacent rectangle is to the area sampling of length " l " and width " w ".When along the slit scan driving motor, carry out data aggregation so that signal is collected in each position in a described n position.Thereby, collect a series of k * n data point, these data points are with relevant from the scattering of the n that reads the space different diagram parts.
Schematic illustration explanation is along the x direction in addition, i.e. direction of scanning, the optional range mark 28 that contiguous slit 10 forms at the downside of shell 12.Illustration on the x direction between the mark is spaced apart 300 microns.These marks are sampled by the afterbody of elongated focus, and under the linearizing situation that requires data on the x direction, provide such linearization, and are following described in more detail.This is measured by other phototransistor 19 and carries out, and described phototransistor 19 is to be used to collect orientation detector from the light in the zone of the mark 28 adjacent with slit.
In alternative example, mark 28 can be read by own coding device transmitter/detector module 19, and described module 19 is parts of optics subassembly 20.Scrambler transmitter/detector module is used in the bar code reader.In an example, can use based on the Agilent HEDS-1500 module that focuses on light emitting diode (LED) and photodetector.Module by signal is sent to the PIC ADC (referring to the explanation of following Fig. 3) as extra probe access.
With regard to 40 microns minimum focal spot size of illustration, and the sweep length on 2 centimetres the x direction, n=500 produces 2000 data points under the situation of k=4.Depend on required level of security, type of items, the exemplary value scope of the k * n of number of probe access " k " and other factors is contemplated to 100<k * n<10000.Found that the number k that increases detector can improve the measurement insensitiveness that the article surface that causes because of touch, printing etc. is degenerated.In practice, with regard to the prototype of using so far, rule of thumb is the sum at independent digit strong point, and promptly k * n should be 500 or bigger, so that produce acceptable high level of security for various surfaces.When scanner is predetermined when only being used on a kind of particular surface or the one group of particular surface, can use other minimum value (bigger or littler).
Fig. 3 is the schematic block diagram of the functional module of reader device.Motor 22 is connected with programmable interrupt controller (PIC) 30 by being electrically connected 23.The detector 16a...d of detector module 16 is connected with analog-digital converter (ADC) by corresponding electric connection line 17a...d, and analog-digital converter (ADC) is the part of PIC 30.Similarly electric connection line 21 linkage flags are read detector 19 and PIC 30.Obviously replace being electrically connected or, can using optics or wireless connections in conjunction with being electrically connected.PIC 30 connects 32 by data and is connected with personal computer (PC) 34.PC 34 can be desktop or laptop computer.As substitute, can use other smart machine, for example personal digital assistant (PDA) or special electronic device to PC.PIC 30 and the PC 34 common data acquisition and processing (DAP) modules 36 that are used for the signature of definite article according to one group of data point of detector 16a...d collection that form.
In some instances, PC 34 can connect 38 accessing databases (dB) 40 by interface.Database 40 can reside in the storer of PC 34, perhaps is kept in its driver.On the other hand, database 40 can be away from PC 34, and by radio communication, for example utilizes the mobile phone service that combines with the Internet, and perhaps WLAN (wireless local area network) (LAN) is visited.In addition, database 40 can be kept on the PC 34 this locality, but regularly downloads from long-range source.Database can be managed by remote entity, and described entity can only provide visit to the part of entire database to specific PC 34, and/or can be according to the security strategy restriction to access of database.
Database 40 can comprise the signature storehouse of the signature of precedence record.PC 34 can be programmed, so that it can accessing database 40 in using, and compares, and whether comprises signature with the signatures match that places the article of reading the space with specified data storehouse 40.PC 34 also can be programmed, and with permission signature is added in the database, if do not find any signature match.
The mode of the streams data between PC and database can be depending on the position of PC, and the relation between PC operating personnel and the database manipulation personnel.For example, if PC and reader just are being used to confirm the authenticity of certain part article, PC will not need and can increase new article to database so, in fact can be direct accessing database, but provide signature for relatively to database.Whether in this arrangement, database can offer PC to the authenticity result, true to indicate these article.On the other hand, if PC and reader just are being used to write down or the authentication data storehouse in a certain project, signature can be provided for database so that be kept at wherein so, and without any need for relatively.But in this case, can compare, be repeated in the input database to avoid unitem.
Fig. 4 is the skeleton view of the profile of expression reader device 1.The reading fenestra 10 of shell 12 and slit is tangible.Auxiliary locator 42 also is significantly, is used for respect to reading fenestra 10 token of true-to-shape being positioned at the fixed position.In this example, the form of auxiliary locator 42 rectangular carriages, one jiao of file or packing box can be positioned at wherein.This guarantees that when the needs scan articles same section of article always can be placed in to be read in the fenestra 10.For the article of corner with sharp outline, such as paper, passport, I.D. and packing box etc., simple right angle carriage or equivalent are just enough.The position guiding apparatus that other shape can be provided such as the circular article that comprise CD and DVD, perhaps is with the article of curved surface to accept difform article such as the cylindricality packing container.In the time will only scanning a kind of article of size and dimension, a slit can be set hold this article.
Thereby, illustrated above to be suitable for for the scanning of the usefulness of the long-range release mechanism of examining the article authenticity and the example of signature generation equipment.Can dispose such system so that in more than one place scan articles, and check, optionally check, to guarantee that between preliminary sweep and follow up scan, these article are not distorted to guarantee that these article all are same article in both cases.
Fig. 5 represents the alternative physics example of structure of reader, and a document feeder wherein is set, and places consistently to guarantee article.In this example, provide a shell 60, article feed tray 61 is thereon attached.Pallet 61 can keep the one or more article 62 for reader scanning.Motor can drive feed rolls 64 and transmit article 62 by this device, and crosses the scanning fenestra of aforesaid optics subassembly 20.Thereby optics subassembly 20 can be according to the mobile generation optics subassembly that passes through article and the method for the relative motion between the article, and scan articles 62 in the above described manner.By using this system, can utilize Motor Control to be scanned the motion of article with enough linearities, and needn't service range mark and linearization process.This equipment can be followed file scanner, any conventional form of photoprinter or file management system.Such scanner can be configured to handle advances to thin slice (a plurality of thin slices are linked together by the perforation closing line) and or replaces and handle single thin slice.
Thereby, the equipment that is suitable for scanning the article in the auto-feed apparatus has been described above.According to the physical configuration of feed arrangement, this scanner can scan one or more single sheet material, the plurality of materials that links together, the perhaps three-dimensional article such as the packing carton box.
Fig. 6 represents another alternative physical arrangement of reader.In this example, the user makes article pass reader.As shown in Fig. 6 A, reader shell 70 can be equipped with the slit 71 that is used to insert for the article of scanning.Optics subassembly 20 can be equipped with a scanning fenestra facing to slit 71, so that can scan the article 62 by slit.In addition, in slit 71, director element 72 can be set, be directed to article apart from the correct focal length of optics subassembly 20 and/or the constant speed passage of the article that pass slit is provided helping.
As shown in Fig. 6 B, reader can be configured to when article are moved along the vertical slit that runs through shell 70 (as shown by arrows), scan articles.On the other hand, as shown in Fig. 6 C, reader can be configured to when the article insertion is extended to the slit in the reader shell 70 or therefrom takes out article (as shown by arrows), scan articles.Such scanner is particularly suitable for being scanned up to the article of small part rigidity, for example card, plastic sheet or sheet metal.This thin slice can be the plastic article such as credit card or other bank card.
Thereby, the scheme of the manual scanning that is used for article has been described above.This can be used for scanning bank card and/or credit card.Thereby, can present card for this card of terminal scanning that uses, the signature that obtains from this card can with the preservation signature comparison of this card, with the authenticity of checking this card and non-by distorting property.In the environment of reading military formula metal ID label (this label is carried by the allergy patient usually, to remind their allergy to other people), also can use this equipment.This can make treatment patient's healthcare givers can guarantee that the patient who is treating is actually the correct possessor of this label.Similarly, under the casualty accident situation, but the label of scanning discovery is to obtain authenticity, to guarantee that injures and deaths person is correctly validated before notifying family members and/or colleague.
Example described above is based on by the local excitation of the coherent light beam of little xsect be received in the detector of the light signal of the bigger regional inscattering that comprises the local excitation zone.Can design a kind of optical system of functional equivalent, this optical system only replaces the orientation detector and the exciting of bigger zone of collecting light from regional area and is the basis.
Fig. 7 A schematically illustrates based on directional light with the form of side view and collects and by a kind of alternative imaging scheme of the reader of the covering irradiation of coherent light beam.Arrange a detector array 48 in conjunction with cylinder microlens array 46, so that only collect from reading the light in the corresponding phase adjacent band in the space in each phase adjacent band of detector array 48.Referring to Fig. 2, each cylindrical microlenses light signal that is arranged to collect from one of n sample strip.Thereby coherent illumination can take place together with the covering irradiation of whole reading space (not shown).
In some cases, also can use commingled system in conjunction with local excitation and partial detection.
Fig. 7 B schematically illustrates this optics areal coverage that is mixed into the picture scheme of reader with the form of planimetric map, in described reader, and in conjunction with local irradiation by elongate light beam, the use orientation detector.This example can be considered to the development of the example of Fig. 1, in the example of Fig. 1, is provided with orientation detector.In this example, provide three to be ranked to detector, every row's purpose is to collect light from the different piece along " l * w " excitation band.Coming from the collecting region with dashed lines circle on the plane of reading the space represents, so that first row's, for example 2 detectors are collected light signal from the top of excitation band, and second row's detector is collected light signal from the middle part of excitation band, and the 3rd row's detector is collected light signal from the bottom of excitation band.Every row's detector is represented as having the circular collection district that diameter is about 1/m, and wherein m is the number of the branch of excitation band, in this example, and m=3.Like this, for given sweep length l, the number at independent digit strong point can be increased to m doubly.As further described below, different a row or multi-row being used to that are ranked in detector except that collecting to other purposes the light signal of speckle pattern sampling more.For example, a row who is ranked in detector can be used to collect light signal according to the mode that is suitable for most bar code scanning more.If situation is like this, so in general, it is just enough that this row's detector only comprises a detector, because when only scanning about contrast, obtains cross correlation without any benefit.
The primary structure assembly and the functional module of various reader devices have been described above, have the following describes the numerical value processing that is used for determining signature.Obviously by some elements that are subordinated to PIC 30, this numerical value is handled the available to a great extent computer program that runs on the PC 34 and is realized.In alternative example, numerical value is handled and can be carried out by the one or more special-purpose numerical value treating apparatus of realizing with hardware or firmware.
Fig. 8 A covers under the situation of about 0.5 * 0.2 millimeter area the micro-image of paper at image.Fig. 8 A graphic extension in many cases, smooth surface on the macroscopic view, for example paper is a highly structural under micro-scale.For paper,, be highly structural on the paper microcosmic as the result of the multiple-limb network of the xylogen that constitutes paper or other fiber.Fig. 8 A also illustrates the characteristic length scales of xylogen, and described characteristic length scales is about 10 microns.The optical wavelength of this size and this routine coherent light beam has the diffraction of causing, thereby produces speckle, but also causes having the correct relation of the diffuse scattering of the distribution plan that depends on the fiber orientation.Thereby, recognize if, can make Wavelength of Laser be suitable for the feature size of these class commodity to be scanned so for specific class I goods design reader.According to Fig. 8 A, the local surfaces structure of every paper obviously also is unique in addition, because it depends on how every xylogen is arranged.Thereby a piece of paper does not differ from the token of special generation, and such as the special resin token or the magnetic material sediment of prior art, it is to be produced by the technological process that is subjected to the natural law domination because it has, thereby particular structure.This is equally applicable to the article of many other types.
Fig. 8 B represents the same sampled images of frosting.This atomic force microscope images is clearly represented the uneven plane of the frosting that macroscopic view is smooth.Can guess that from Fig. 8 B the paper that graphic extension this surface ratio Fig. 8 A is more smooth, but utilize the signature of this example to produce scheme, even the surface undulation of this level also can be discerned uniquely.
In other words, when can be directly when various every-day objects are measured unique characteristic, for the token that produces special preparation require great effort expensive come down to nonsensical.The data aggregation and the numerical value that the following describes the scattered signal of the natural structure that utilizes article surface (under the situation of transmission, article inside) are handled.
Fig. 9 A represents the raw data from the single photodetector 16a...d of the reader of Fig. 1.Fig. 9 A relation curve of signal intensity I (arbitrary unit (a.u.)) that draw to the n that counts (referring to Fig. 2).The higher trace that fluctuates between I=0-250 is the original signal data from photodetector 16a.Low trace is the code device signal that picks up from mark 28 (referring to Fig. 2), and it is near I=50.
Fig. 9 B is illustrated in and utilizes code device signal to carry out after the linearization, the photodetector data of Figure 10 A (noticing that although the ratio of x axle is different from Figure 10 A, but this is unimportant).As mentioned above, article with respect to the enough linear situation of the motion of scanner under, do not need to utilize linearization with respect to alignment mark.In addition, calculate the mean value of intensity, and from intensity level, deducted described mean value.Thereby the data value after the processing fluctuates at 0 upper and lower.
Fig. 9 C represents the data of Fig. 9 B after the digitizing.The digitization program that adopts is simple bifurcation digitization program, wherein any positive intensity level value of being configured to 1, and any negative intensity level is configured to 0.Recognize also and can use polymorphic digitizing, perhaps also can use any in many other possible digitizing solutions.Digitized important principal character only is to use identical digitization program consistently.
Figure 10 is a process flow diagram of representing how to produce from scanning the signature of article.
Step S1 is a data acquisition step, wherein in whole scan period, approximately every the optical strength of 1 millisecond of acquisition at each photodetector.Simultaneously, the function as the time obtains code device signal.If notice that scanning motor has high linearization precision (for example, as stepping motor), can not require the linearization of data so.Described data are obtained by the PIC 30 that obtains data from ADC 31.Data point is passed to PC 34 from PIC 30 in real time.On the other hand, data point can be stored in the storer among the PIC 30, is passed to PC 34 subsequently when the end of scan.Below, the number n of the data point of each probe access of collecting in each scanning is defined as N.In addition, value a k(i) be defined by preserving intensity level from i of photodetector k, i from 1 to N.Illustrate among Fig. 9 A from the example of two raw data sets of such scanning acquisition.
Step S2 uses the numerical value interpolation to come local expansion and dwindles a k(i), thus coder transitions be at interval uniformly in time.This has proofreaied and correct the localized variation of electromotor velocity.Step S2 can be carried out in PC 34 by computer program.
Step S3 is an optional step.If be performed, step S3 carries out numerical differentiation about the time to data so.Preferably data are used weak smooth function in addition.Differential is surperficial useful to highly structural, because it is used for the irrelevant composition with respect to relevant (speckle) composition deamplification.
Step S4 is wherein for each photodetector, obtains the step of the mean value of tracer signal in the scope of N data point.For each photodetector, from all data points, deduct this mean value, so that DATA DISTRIBUTION is around 0 intensity.Referring to Fig. 9 B, the example of the scan data set after Fig. 9 B is illustrated in linearization and deducts calculating mean value.
Step S5 digitized simulation photodetector data, thus the digital signature of representing this scanning calculated.By using following rule: a k(i)>0 be mapped to binary one, a k(i)≤0 be mapped to binary zero and obtain digital signature.Digitized data set is defined by d k(i), wherein i from 1 to N.Except the digitized signature of the intensity data that just illustrated, the signature of article also can comprise other composition.The following describes these other optional signature compositions.
Step S6 is an optional step of wherein creating less " thumbnail " digital signature.This is by asking the mean value of adjacent many groups m reading, perhaps preferably realizing by selecting each c data point (c is the compressibility factor of breviary).The latter is more desirable, can disproportionately amplify noise because average.Same numbers rule to using among the data set applying step S5 that reduces subsequently.The thumbnail digitizing is defined by t k(i), wherein i is 1 to N/c, and c is a compressibility coefficient.
Step S7 is the optional step that is suitable for when having a plurality of probe access.This supplementary element is the simple crosscorrelation composition that calculates between the intensity data that obtains from different photodetectors.With regard to 2 passages, there is a possible cross-correlation coefficient, with regard to 3 passages, there is nearly 3 cross-correlation coefficient, with regard to 4 passages, there is nearly 6 cross-correlation coefficient, or the like.Cross-correlation coefficient is useful, is good indicator of material type because found them.For example, for a kind of file of specific type, such as the passport of specified type, perhaps laser stamping paper, it seems that cross-correlation coefficient always be arranged in predictable scope.At a k(i) and a l(i) can calculate normalized cross correlation between, wherein k ≠ l and k, l changes in all photodetector number of active lanes.Normalized Cross Correlation Function Γ is defined by:
Γ ( k , l ) = Σ i = 1 N a k ( i ) a l ( i ) ( Σ i = 1 N a k ( i ) 2 ) ( Σ i = 1 N a l ( i ) 2 )
Can be saved for the cross correlation function of the usefulness of examining later on be the width of spike in the cross correlation function on the other hand, half maximal value place overall with (FWHM) for example.Further specify the use of cross-correlation coefficient in examining processing below.
Step S8 is another optional step, and step S8 will calculate the simple strength mean value of expression signal intensity profile.This mean value can be the population mean of each mean value of different detectors, perhaps can be the mean value of each detector, for example a k(i) root mean square (rms) value.If as in the above-mentioned reader, detector is arranged in the both sides of normal incidence in couples, can use the mean value of every pair of detector so.Found that this intensity level is the good rough filtercondition about material type, because it is the total reflectivity of sample and the simple indication of roughness.For example, can be removing mean value, promptly the non-normalized rms value after the DC background is as this intensity level.
The signed data that scan articles obtains can contrast the record that is kept in the signature database and compare so that examine, and/or writes in the database increasing a new signature record, thereby expands existing database.
New data-base recording will be included in the digital signature that obtains among the step S5.Optionally, this data-base recording can be by the littler thumbnail that obtains about each photodetector passage in step S6, one or more the replenishing in cross-correlation coefficient that obtains in step S7 and the mean value that obtains in step S8.On the other hand, thumbnail can be stored on their the independent database that is suitable for search fast most, and remaining data (comprising thumbnail) are stored on the master data base.
Figure 11 represents how to contrast signature database to examine from the process flow diagram of the signature that scans the article that obtain.
In a kind of simple realization, search database simply is to find out match objects according to the whole signature data set.But in order to quicken verification process, this process can be used less thumbnail and based on the prescreen of calculating mean value and cross-correlation coefficient, and is as described below.
Examine the first step that step V1 is a verification process, it will promptly carry out scanning step S1-S8 according to process scanning article described above.
Examine step V2 and obtain each thumbnail clauses and subclauses, and assess it and t kThe number of the match bit (i+j), wherein j is that the biased of placement error that is changed with the compensated scanning district moves.The value of j is determined, thereby determines to provide the thumbnail clauses and subclauses of maximum match bit array.This is to be used for further " hitting record " of processing.
Examining step V3 is before the whole number signature of analyzing about this recorded and stored, the optional prescreen test that the digital signature of control scan is carried out.In this prescreen, the corresponding save value in the data-base recording that contrast is hit, relatively the rms value that in scanning step S8, obtains.If mean value is also inconsistent in preset range accordingly, refusal is further handled and is somebody's turn to do " hitting record " so.These article are rejected subsequently, because be not verified (that is, jump to and examine step V6, and send failure result).
Examining step V4 is another optional prescreen test of carrying out before analyzing complete digital signature.In this prescreen,, compare the cross-correlation coefficient that in scanning step S7, obtains to impinging upon the corresponding save value in the data-base recording that hits.If cross-correlation coefficient is also inconsistent in preset range accordingly, refusal is further handled and is somebody's turn to do " hitting record " so.These article are rejected subsequently, because be not verified (that is, jump to and examine step V6, and send failure result).
Examining executable another inspection that utilizes cross-correlation coefficient of step V4 is the width of checking spike in the cross correlation function, value of preserving by the preliminary sweep from scanning step S7 relatively and the value that rescans here, and the assessment cross correlation function:
Γ k , l ( j ) = Σ i = 1 N a k ( i ) a l ( i + j ) ( Σ i = 1 N a k ( i ) 2 ) ( Σ i = 1 N a i ( i ) 2 )
If the width of the spike that rescans obviously greater than the width of preliminary sweep, distorted or suspicious indicator signal so by these article that can be counted as rescaning.For example, this inspection should be defeated and be attempted to have bar code or other pattern that same intensity that photodetector expection obtains from the surface that just is being scanned changes, the fraudster of fraud system by printing.
Examine step V5 and be the main comparison between the corresponding save value in scanning digital signature that in scanning step S5, obtains and the data-base recording that hits.The complete digitized signature d that preserves k Db(i) be divided into q phase ortho position of n piece on k the probe access, promptly every has the qk position.The representative value of q is 4, and the representative value of k is 4, thereby generally obtains 16/piece.The digital signature d that contrast is subsequently preserved k Db(i+j) this qk position of coupling, the qk in corresponding position.If the number of match bit is more than or equal to predetermined threshold z in this piece Thresh, the number of match block is added 1 so.z ThreshRepresentative value be 13.All n piece is repeated this process.To different off-set value j whole process repeated, be scanned the placement error in district with compensation, till the maximum number that finds match block.M is the maximum number of match block by definition, calculates the probability of accidental matches by the assessment following formula:
p ( M ) = Σ w = n - M n s w ( 1 - s ) n - w w n C
Wherein s is that (it depends on z again for the probability of the accidental matches between any two pieces ThresholdSelective value), M is the number of match block, p (M) is the M or the probability of polylith accidental matches more.By scanning according to the different objects of analog material, for example repeatedly scanning of paper document etc., each piece relatively in database is determined the value of s.For q=4, k=4 and z Threshold=13 situation, the representative value of s are 0.1.If the qk position is independent fully, so for z Threshold=13, theory of probability can provide s=0.01.The fact of finding out higher value according to experience is because the correlativity between k probe access, and the cause of the correlativity between the phase ortho position in the piece that is caused by limited laser facula width.When the data base entries of contrast a piece of paper compared, the typical scan of this paper was producing about 314 match block in 510 pieces altogether.Top equation is provided with M=314, n=510, s=0.1 can provide 10 -177The accidental matches probability.
Examine the result that step V6 sends verification process.The probability results that obtains in examining step V5 can be used on by in/failure the test, and wherein reference point is predefined probability threshold value.In this case, probability threshold value can be arranged on a certain rank by system, perhaps can be the variable element that is provided with in a certain rank that the user selects.On the other hand, the primitive form that probability results can probability itself is perhaps to utilize the relative terms (relatively poor/coupling that for example, do not match/mate good/coupling is outstanding) or the improved form of other classification to be exported to the user, as confidence level.
Recognize that many variations are possible.For example, replace cross-correlation coefficient is regarded as the prescreen composition, they can be regarded as the part of main signature together with the digitizing intensity data.For example, cross-correlation coefficient can be digitized, and adds in the digitizing intensity data.Cross-correlation coefficient also can be by independent digitizing, and is used to produce bit string or analog, can search for described bit string according to the same way as of top thumbnail explanation about the digitizing intensity data subsequently, hits record so that find out.
Thereby, illustrated that above scan articles is with the many examples of acquisition based on the scheme of the signature of the intrinsic property of article.Also illustrated how to produce signature according to the data of collecting in scan period, how relatively the follow up scan of this signature and identical or different article is that the possibility of identical items has a great example of measuring to be provided at what scan in the follow up scan.
This system has many application, safety and screen article assuredly and belong to the row of described many application to prevent swindle and item tracing ability.
In some instances, can be optimised from the method that the article extraction of scanning is signed, so that the reliable recognition of article is provided, and no matter for example stretch or shrink the distortion that these article are caused.This stretching, extension of article or contraction can be caused by the infringement of water to papery article or cardboard article.
In addition, if article are non-linear to the relative velocity of the sensor in the scanner, concerning scanner, these article are elongated or shortened seemingly so.For example,, make these article by scanner if perhaps hold the people of article if article move along transfer system, so can this thing happens.Example that may the possible case that this thing happens is that the people utilizes scanner, such as the situation of the top scanner scanning bank card that illustrates with reference to figure 8A, 8B and 8C.
As mentioned above, when scanner is the basis with the scanner head that moves with respect to the article that pasting scanner or be maintained fixed in scanner in scanner unit, optionally range mark 28 can provide the linearization guiding, any non-linear with the motion aspect that solves scanner head.Under the situation that article are moved by the people, these non-linear meetings are amplified greatly.
In order to solve the identification problem that causes by these non-linear effects, can adjust the analysis phase of the scanning of article.Thereby, improved proving program is described below with reference to Figure 12.The process that realizes in this example uses the branch block analysis of data to solve nonlinear problem.
The step that can comprise the level and smooth and differentiated data that illustrates with reference to Figure 10 according to the process of Figure 12 execution, calculate and deduct the step of mean value, with be used for obtaining to sign and some or all of the digitization step of thumbnail, but these steps are not illustrated in Figure 12, so that the content of Figure 12 is thickened.
As shown in Figure 12, by carrying out the scanning of article,, begin to utilize the scanning process of the checking scanning of branch block analysis at step S21 with the data of the intrinsic property that obtains to describe article.Scan-data subsequently step S22 be divided into continuous a plurality of (this can digitizing and any level and smooth/carry out before or after differential or the similar operations).In an example, 54 millimeters sweep length is divided into the piece of 8 equal in length.So each piece representative is scanned a son section that is scanned the district of article.
For each piece, at step S23, the reciprocity piece of each preservation signature that contrast article intention compares with it carries out cross-correlation calculation.This can utilize the thumbnail method to realize, thumbnail of each piece.The result of these cross-correlation calculation of subsequent analysis is with the position of identification simple crosscorrelation spike.Subsequently in the step S24 position of simple crosscorrelation spike relatively, and under the situation that has splendid linear relationship between the preliminary sweep of article and the follow up scan desired location of simple crosscorrelation spike.
This available chart that concerns is represented, as shown in Figure 13 A, 13B and 13C.In the example of Figure 13 A, the simple crosscorrelation spike is just in time in the position of expection, so that scanner head is linear fully with respect to the motion of article always, and article do not experience and stretch or shrink.Thereby the graph of relation of actual peak location and predetermined spike obtains straight line, this straight-line pass initial point, and slope is 1.
In the example of Figure 13 B, the simple crosscorrelation spike is close together than expection, so that the slope of best-fit line is less than 1.Thereby when initial scanning, these article shrink with respect to its physical characteristics.In addition, best-fit line does not pass through the initial point of this figure.Thereby compare with its position when the preliminary sweep, article are moved with respect to scanner head.
In the example of Figure 13 C, the simple crosscorrelation spike does not form straight line.In this example, their approximate fitting to are represented y 2The curve of function.Thereby in this scan period, article are slowed down with respect to moving of scanner head.In addition, because optimum fit curve is by initial point, so the position of article during obviously with respect to its preliminary sweep is moved.
Can be to the point diagram of simple crosscorrelation spike, the various functions of test match are to find out the best-fit function.Thereby, can use and consider elongation, to shrink, misalignment is quickened, the curve of deceleration and their combination.
In case determined the best-fit function at step S25, can determine one group of running parameter at step S26 so, described one group of running parameter represents how many each simple crosscorrelation spikes departs from its desired location.Subsequently at step S27, can be applied to the scan-data that obtains at step S21 to these compensating parameters, so that basic the elimination shunk, to stretch, misalignment is quickened or is slowed down to the influence of scan-data.The best-fit function and the scan-data that obtain at step S25 adapt to more, and compensation effect is just good more.
As among the step S22, the scan-data after step S28 is compensation is divided into continuous polylith subsequently.Subsequently step S29 make each piece individually with the relevant block simple crosscorrelation of the signed data of preserving, thereby obtain cross-correlation coefficient.At this moment, at the value of step S29 analysis simple crosscorrelation spike, to determine the uniqueness coefficient.Thereby can determine whether the article that scan are identical with the article that scanned when producing the signature of preserving.
Therefore, illustrated that above compensation is scanned the physical deformation in the article, and the compensation article are with respect to the non-linear method example of the motion of scanner.Utilize this method, can contrast the preservation signature of these article that obtain from the previous scanning of article, check to be scanned article, thereby determine when carrying out slower scanning, whether there are identical article highly credibly.Thereby, can discern the article that constitute by yielding material reliably.In addition, can use scanner wherein is not linear scanner with respect to the motion of article, thereby allows to use the low-cost scanner of no movement control elements.
In some scanner devices, also may be difficult to determine to be scanned the reference position in district.In the example of Tao Luning, this is the most debatable concerning the example of Fig. 6 B in the above, and in the example of Fig. 6 B, article to be scanned are by slit, so that the scanner head meeting " is seen " than the more article section of predetermined scanning area.A kind of method that overcomes this difficulty is that scanning area is defined as the edge that starts from article.Because when making article by before being the local time of free space, the data that receive at scanner head will experience tangible step variation, therefore the data of fetching at scanner head can be used to determine where scanning starts from.
In this example, before article were applied to scanner, scanner head was exercisable.Thereby at the beginning, scanner head receive with in the corresponding data of the un-occupied space of scanner head front.When article passed through in the scanner head front, the data instant that scanner head receives became the data of describing these article.Thereby, but monitoring data and can abandon all data before this determining where article start from.Can determine position and the length of scanning area according to multiple mode with respect to the article leading edge.The simplest a kind of mode is that to make scanning area be whole article, so that by picking up the end that can detect article corresponding to the scanner head of the data of free space once more.Another kind method is the data that begin and/or stop to write down at the scanning reading place of the described leading edge predetermined number of distance.Suppose that article always pass through scanner head with approximately identical speed, this can form consistent scanning area.Another kind of alternatives is to use the real marking on the article to begin and stop scanning area, but this needs more data to deal with the work to determine which catches data corresponding to scanning area, and which data can be dropped.
Thereby, scan articles has been described above, to collect data based on the intrinsic property of article, compensation is to the infringement of article or non-linear (words that need) in the scanning process, and this article and based on the last time preservation signature of scanning of article relatively, with many technology of determining that twice scan articles be whether identical.
Another characteristic of the article that the branch block analysis of the signature that utilization produces according to the intrinsic property of article can detect is the local lesion to article.For example, this technology can be used to detect the modification to article that produces after original records scanning.
For example, many files comprise possessor's photo such as passport, I.D. and driving license.If the authenticity of this article scanning comprises the part of photo, any change of making of comparison film will be detected so.Be example signature is divided into 10 pieces arbitrarily, the photo on 3 pieces possibility overlay files in these 10 pieces, another part of other 7 piece overlay files is such as background material.If photo is replaced, so for these 7 pieces that any modification does not take place, the follow-up heavy coupling that should provide good of sweeping of file, but the photo of changing will produce the coupling of extreme difference.By understanding these 3 pieces corresponding to photo, the fact of all these 3 pieces generation extreme difference couplings can be used to make automatically the authentication failed of file so, and does not consider the average mark in the whole signature scope.
In addition, many files comprise a people or a plurality of people's written explanation, for example by someone name of passport, driving license or I.D. identification, and perhaps bank account holder's name.Many files also comprise the place of the written signature of filling in possessor or reference.Utilization is from the branch block analysis for the signature of checking that file obtains, and can detect to change the name printing or write on the file or the modification of other important words or numeral.The piece corresponding with the position of reformed printing or written contents should produce the very different coupling of piece that any modification does not take place mass ratio.Thereby, can detect the name or the written signature that are modified, even the whole matching of file is high enough to obtain by the result, this document can not be by validation test.
An example having represented I.D. 300 among Figure 14.I.D. 300 comprises possessor's name 302 of printing, possessor's photo 304, possessor's signature 306 (described signature can write on the I.D., perhaps is printed on the I.D. according to the scanning result of written signature or the signature of catching in the electronics mode) and the I.D. numbering of printing 308.In order to prevent the change of the duplicity of I.D., the scanning area that produces signature according to the intrinsic property of I.D. can comprise one or more in these elements.Marked the scanning area of each illustration among Figure 14, with the various possibilities of graphic extension.The scanning area 321 of illustration comprises part printing name 302 and part photo 304.The scanning area 322 of illustration comprises part printing name.The scanning area 323 of illustration comprises part signature 306.The scanning area 324 of illustration comprises part I.D. numbering 308.
Zone and the element selected for scanning area can be depending on many factors, comprise that the fraudster most possibly attempts the document element of changing.For example, for any file that comprises photo, most probable change target is photo normally, because photo is discerned the possessor intuitively.Thereby the scanning area of this file preferably is selected to the photo that comprises a part.Another element that may be subjected to fraudulent modification is possessor's a signature, because a people is easy to pretend to have other people name, but is difficult to imitate another people's signature.So for documents signed (DS), especially do not comprise the documents signed (DS) of photo, scanning area preferably includes the part signature on the file.
So in the ordinary course of things, the authenticity of article test can comprise with regard to whole signature, the sufficiently high coupling of quality between signature verification and record signature, and the test of the sufficiently high coupling of quality in the scope of selected at least each piece of signature.Thereby, can select important zone concerning the authenticity of assessment article, because they are most important to obtaining sure identification result.
In some instances, can allow each piece except that being chosen as key blocks to present relatively poor matching result.Thereby although be torn or some is partially damaged, as long as key blocks provides good coupling, and signature is whole that good coupling is provided, and file just can be considered really so.
Thereby, the local lesion of identification to article has been described above, refusal exists the system of the false article of local lesion or change, many examples of method and apparatus in its presumptive area.Infringement in other zone or change can be left in the basket, thereby file can be regarded as really.
When using the biometrics technology, when examining the authenticity of article or identity such as the top recognition technology that illustrates with reference to figure 1-14, the difficulty based on the repeatability aspect of the signature of biometric attribute can appear.Especially, in each signature that produces according to article, return slightly different result's tropism as the biological generation system of signing, when article produce equipment and different time during experience signature production process at different signature, the slightly different part that might present article in each case makes reliably to examine to become more difficult.
The following describes the example that overcomes these difficult systems, method and apparatus.At first, with reference to Figure 15, the many scanner head signature generation equipment that are used for database initialize are described.
As shown in Figure 15, reader unit 100 can comprise two optics subassemblies 20, and each optics subassembly 20 produces the signature of the article in the reading space 402 that is present in reader unit.Thereby the usefulness for scanning of presenting so that article of its signature record of generation can be scanned twice in item database (contrast this item database after a while and can examine article), produces two signatures that are offset possible alignment error amount on the space mutually.Thereby, can compare with the signature of these two preservations for the follow up scan of discerning or examine the article of authenticity.In some instances, can be regarded as successfully mating with these two couplings of preserving one of signature.
In some instances, more reading head be can use, so that three, four of each article generations or multi-signature more are.Each scanner head can be biased with respect to other scanner head, so that provide signature from a plurality of positions with predetermined scanning position vicinity.Thereby, can provide examining the out-of-alignment bigger robustness of article in when scanning.
Can be according to various factors, such as the width that is scanned part of article, be scanned the overall dimensions of size and article relation, examine possible amount of mis-alignment and article material of scan period, select the side-play amount between the scanner head.
Thereby, scan articles has been described above, to create the system of a signature database, contrast this signature database and can check article, with identity and/or the authenticity of examining these article.
The example of another system of a plurality of signatures is provided in item database below with reference to Figure 16 explanation.
As shown in Figure 16, reader unit 100 ' can have single optics subassembly 20 and an aligning regulon 404.In the use, aim at regulon 404 and can change the aligning of optics subassembly 20 with respect to the reading space 402 of reader unit.Thereby optics subassembly 20 can repeatedly scan in different positions and place the article of reading the space, so that produce a plurality of signatures of these article.In this example, aim at regulon 404 and can regulate the optics subassembly, thereby read from two different positions.Thereby, can compare with the signature of these two preservations for the follow up scan of discerning or examine the article of authenticity.In some instances, can be regarded as successfully mating with these two couplings of preserving one of signature.
In some instances, more reading head position be can use, so that three, four of each article generations or multi-signature more are.Each scanner head position can be biased with respect to other scanner head position, so that provide signature from a plurality of positions with predetermined scanning position vicinity.Thereby, can provide examining the out-of-alignment bigger robustness of article in when scanning.
Can be according to various factors, such as the width that is scanned part of article, be scanned size and article overall dimensions relevant, examine possible amount of mis-alignment and article material of scan period, select the side-play amount between the scanner head position.
Thereby, scan articles another example with the system of creating a signature database has been described above, contrast this signature database and can check article, with identity and/or the authenticity of examining these article.
Be used for writing scan (promptly although illustrated above, create the scanning of the article of reference signature, contrasting this reference signature after a while can checking article) scanner can use a plurality of scanner heads and/or scanner head position to produce a plurality of signatures of article, but also can be used for after a while checking scanning to similar system.
For example, supply the scanner of the usefulness of checking scanning can have a plurality of reading heads, thereby make it possible to produce a plurality of checking scan signatures.Each signature in these signatures can be compared with the database of record signature, and described database itself may comprise a plurality of signatures of each record article.Although the difference of each article signature may show variation, but because the whole still utmost points of these signatures are different from any signature of any other article, therefore, the coupling between any one writing scan signature and any one checking scan signature should provide enough degree of confidence with regard to the identity and/or the authenticity of article.
Can be with top with reference to the described multiread head checking scanner of arranging of Figure 15 about the samely.Similarly, can be with top with reference to the described multiread head location verification scanner of arranging of Figure 16 about the samely.In addition, for record and checking scanner, the system of many scanner heads of combination and a plurality of scanner heads of each scanner head position can be combined into single equipment.
Under the situation that the data of describing people or other corporate entity are preserved by the third party, existing can be by the misgivings of the personnel of unwarranted or malice visit about described data.For example, bank and other financial services provider can be preserved and their a large amount of clients' the relevant bulk information of debt, credit histories, income and personal data.Law enforcement agency can preserve criminal, witness, informant and secret agent's details.Medical institutions can preserve patient's details, preferentially select such as case history, lifestyle information and treatment.Employer can preserve employee's details, such as salary, discipline as a warning the record and the personal considerations.
Thereby a large amount of mechanisms can preserve the bulk information with a relating to persons, and described individual may wish to make described bulk information to maintain secrecy.In addition, the law that relates to the maintenance of personal record can be protected some information of such preservation.Thereby, incorrect open, carelessness is open or malice openly all can cause this mechanism the user of this information is to the dislike of the mechanism that preserves described data, and constitute can be by the lawsuit charge civil or criminal illegal, and punishment, comprise the payment of compensation, the payment of fine and/or imprisonment.
In the following discussion, provide the system and method that prevents this information of unauthorized access.
Preserve in mechanism under many situations of the data of describing the individual, when the individual did not show up, any member of this mechanism did not need to visit this data usually.In other cases, the individual may not appear in person, but can carry out phone or online transaction or discussion with mechanism.In other cases, a limited number of personnel of mechanism need visit described data fully, exist and other personnel only need watch some data or only understand data, and do not watch data content.
All these situations can wherein be controlled by the access token that the individual has the visit of data by this routine system handles.
Below with reference to Figure 17 explanation access token is used for example to first system of the visit of information.In native system, the information that the user who is positioned at user terminal 100 wishes or requires visit and unique individual to get in touch.User terminal can be any type of conventional computing equipment, for example personal computer, workstation or handheld computer.With the individual of described informational linkage can be described user, perhaps can be the individual who has individual or occupational relation with described user.The example of back one situation can be the Financial Information that employee of bank (user) needs access customer (individual), so that determine whether described client can obtain a certain product or service.Another example is the case history that healthcare givers (user) needs patient access (individual).
In order to visit described information, the access token that can utilize scanner 102 scanning individuals to have.Scanner (may combine with the additional user terminal) produces the signature of access token according to the intrinsic property of access token.Scanner can be the ingredient of user terminal.Can produce described signature according to such as top optical scanning technology with reference to one of any explanation of figure 1-16.Alternatively, can use other suitable scanning technique, for example in the scanning technique described in PCT/GB03/03917 or the PCT/GB03/03938, its full content draws at this and is reference.
In case produced signature, this signature is used to fetch data from the database 106 of preserving information needed so.Described database can be by 108 controls of data base administrator's entity, data base administrator's entity 108 can be endowed database is inquired about, and control is to the task (this entity can be different from the system manager's who appoints as this database human user) of access of database.In this example, by network 104 access database management person's entities, network 104 can be dedicated network, intranet or the Internet.Network can comprise wired and/or radio interconnected.
Signature is sent to data base administrator's entity 108, so that as search inquiry.Thereby data base administrator's entity 108 compares between signature of supplying with and the signature relevant with respective data record in the database.This comparison procedure can be used the search accelerating system, such as above-mentioned thumbnail systems.If between from the signature of access token and the signature in the database, have coupling, can obtain the data recording relevant at user terminal 100 so with this signature.If in database, do not have the signature of supply and preserve coupling between the signature arbitrarily, can not obtain any data so.Undertaken by public network in the example of the communication between data base administrator's entity 108 and the user terminal 100, signature and/or data recording can encryptedly be transmitted, and for example utilize public key encryp.Data link between data base administrator's entity and user terminal is used in the example of html style interface, can set up security socket layer and connect encryption is provided.
In this example, the unique channel of the visit database that Gong reads is the signature that utilizes from the access token generation.Thereby, be not present in access token under the situation of required accessing points, can not visit data.Thereby, be example with top banking, when needs, (for example work as the client and enter bank, when solicited message or certain product or service), the employee of bank can the access customer data.But, in office what it the time, the employee of bank can not access customer information.Thereby the protection client exempts to be consulted his or her details by the employee of bank, and under the situation that does not obtain client's permission his or her details is disclosed.In the superincumbent medical example, patient's details can be by healthcare givers's visit of this patient of treatment, but any other people's visit that can not accessed medical information data storehouse, thereby overcome the potential data confidentiality misgivings of patient to computing machine centralized stores medical data.
In an example, system allows under the situation that does not have access token data to be write in the database.Thereby the user can increase data recording to database for the individual that its access token has been recorded in the database.Under access token signature was not recorded in situation in the database, the individual did not also have any relevant record, thereby needs new record.Thereby in this case, should as described belowly increase new individual to database.Otherwise,, can under the situation that does not have access token, increase more data so if signature has been present in the database.For example, the employee of bank can increase account transfer to user logging and is in arrears with, and perhaps supports the information of loan application to be provided for the fact of bank.Also can increase the information content.For medical record system, but in the result of laboratory test time spent of carrying out away from the patient, described result of laboratory test can be transfused to.Suitable examples is to obtain the usefulness of liquid or tissue samples confession lab analysis after a while from the patient.
On the other hand, in some systems, may require to have only when having access token, data just can be transfused to.For example, in the record of criminal data, situation may be the individual that should only describe in record when showing up, and just may for example import the criminal details arrest, accuse, assure, convict or declare innocent and so on.Thereby, in such system, increase data to database, access token should be provided.
In some instances, it may be essential or appropriate having back door, thus have the people of enough authorities can be under the situation of the access token that does not write down described individual accessing database.This can be by providing extra access token to realize to the record that needs extra access.This extra access token can interrelate with one or more records, so that needs all records of visit to be provided by single access token.If desired to the visit of criminal investigation, so extra access token can be subjected to time restriction, so that in the past after the predetermined period, these data no longer can be accessed.Also can utilize user's discriminating of other form that the back door visit is provided, thereby avoid the access token system fully.
System manager's visit to certain form of database may preferably also be provided so that the signature of new access token is included in the database, with replacement lose, impaired or stolen access token.
Being used to provide the access token to the secure access of database can be any article that can produce necessary signature from it.This can comprise the specific information access token, such as medical science label type article, those medical science labels of often wearing of diabetic and serious abnormal disease patient for example, even so that this patient can not describe their illness, the healthcare givers also can implement appropriate treatment.So this label type article are particularly suitable for medical information access.Also can use other label type article, different label type article may more or less be suitable for various may the application.For example, the article such as bank card or credit card that carry usually can be used as access token, and no matter whether information related with banking information.Alternatively, can use complete unconspicuous access token.Example can comprise business card or other similar articles.The people that the use of this unconspicuous access token can reduce stealing or searching access token uses it to visit the chance of possessory data.Thereby, can avoid usually and obvious important article and " steal me " problem of file association (for example parcel of bank card and mark " secret ").
Thereby, the system, equipment and the method that provide the secure access that is kept at the sensitive information in the database have been described above.This secure access provides the reliable access to information, reduces the misgivings to data visit and data confidentiality simultaneously.
Represented to use another example of the system of access token visit information among Figure 18.In this example, the access token scanner is away from checking thereon or the user terminal of visit information.
In this routine system, be positioned at the information that the user may wish or needs are visited and specific people gets in touch of user terminal 100.User terminal can be any type of conventional computing equipment, such as personal computer, workstation or handheld computer.In this example, the people with described informational linkage is not positioned at user terminal 100.The possibility example that this thing happens is to wish to obtain loan or other bank service when bank client, and the situation of not going to subbranch of bank in person.This transaction can relate to the telephone talk between client and the bank clerk.Thereby in this example, user terminal 100 should be present in the bank premises, and the user should be an office worker of bank.
For visit information, the access token that can utilize the scanner related 102 scanning individuals (for example bank client) to have with scanner terminal 101, scanner terminal 101 is in the same place with described individual (for example bank client).Scanner (may combine with additional scanning instrument terminal) according to the intrinsic property of access token, produces the signature of this access token.Scanner can be the ingredient of scanner terminal.Can produce described signature according to such as top optical scanning technology with reference to one of any explanation of figure 1-16.Alternatively, can use other suitable scanning technique, for example the scanning technique of in PCT/GB03/03917 or PCT/GB03/03938, stating.
In case produced signature, this signature is used to fetch data from the database 106 of preserving information needed so.Described database can be by 108 controls of data base administrator's entity, data base administrator's entity 108 can be endowed database is inquired about, and control is to the task (this entity can be different from the system manager's who appoints as this database human user) of access of database.In this example, by network 104 access database management person's entities, network 104 can be dedicated network, intranet or the Internet.Network can comprise wired and/or radio interconnected.
Be used to connect the network of scanner terminal and user terminal, and the network that connects user terminal and database can be a network independently.For example, scanner terminal and user terminal can be by Internet traffics, and user terminal and database can pass through dedicated network communication.
Signature is sent to data base administrator's entity 108, so that as search inquiry.Thereby data base administrator's entity 108 compares between signature of supplying with and the signature relevant with respective data record in the database.This comparison procedure can be used the search accelerating system, such as above-mentioned thumbnail systems.If between from the signature of access token and the signature in the database, have coupling, can obtain the data recording relevant at user terminal 100 so with this signature.If in database, there is not the signature of supply and preserves coupling between the signature arbitrarily, can not obtain any data so.Undertaken by public network in the example of the communication between data base administrator's entity 108, user terminal 100 and the scanner terminal 101, signature and/or data recording can encryptedly be transmitted, and for example utilize public key encryp.Data link between data base administrator's entity, user terminal and/or scanner terminal is used in the example of html style interface, can set up security socket layer and connect encryption is provided.
In the environment of the professional example of remote bank, system allows employee of bank's visit private data relevant with the client, described private data be make this client can obtain certain service or product necessary, the client needn't go to bank in person.Other example application of this scheme comprises that the permission patient receives the result of medical inspection, and needn't go to hospital.
Above-mentioned about information is write in the database, back door system manager, the variety of option of management or investigation and interview and dissimilar access token and the example that alternatives is equally applicable to Figure 15.
Referring to Figure 19, another example of the system of access token visit information is used in explanation now.In this example, the user uses the information in the access token accessing database, and not with the representative interaction of preserving or use the entity of described information.
In this routine system, the information that the access token that the user who is positioned at scanner terminal 101 may wish or require visit and user to have is got in touch.In general, this information is related with the user.Scanner terminal 101 can be any type of conventional computing equipment, such as personal computer, workstation or handheld computer.The example that may require to visit the information of getting in touch with the access token that the user has is if the user wishes to check the relevant information with them of preservation.In the environment of banking, the user may wish to check account balance, checks and transfers accounts history or check other banking information.In some cases, bank also may allow the client to change money, the payment of perhaps keeping accounts, and needn't be directly and the bank clerk get in touch.Thereby such trade fair causes data to be written in the database and reading of data from database.
For visit information, the access token that can utilize the scanner related 102 scanning individuals (for example bank client) to have with scanner terminal 101.Scanner (may combine with additional scanning instrument terminal) according to the intrinsic property of access token, produces the signature of this access token.Scanner can be the ingredient of scanner terminal.Can produce described signature according to such as top optical scanning technology with reference to one of any explanation of figure 1-16.On the other hand, can use other suitable scanning technique, for example the scanning technique of in PCT/GB03/03917 or PCT/GB03/03938, stating.
In case produced signature, this signature is used to fetch data from the database 106 of preserving information needed so.Described database can be by data base administrator's entity 108 control, and data base administrator's entity 108 can be endowed inquires about and control task (this entity can be different from the system manager's who appoints as this database human user) to access of database to database.In this example, by network 104 access database management person's entities, network 104 can be dedicated network, intranet or the Internet.Network can comprise wired and/or radio interconnected.
Signature is sent to data base administrator's entity 108, so that as search inquiry.Thereby data base administrator's entity 108 compares between signature of supplying with and the signature relevant with respective data record in the database.This comparison procedure can be used the search accelerating system, such as above-mentioned thumbnail systems.If between from the signature of access token and the signature in the database, have coupling, can obtain the data recording relevant in scanner terminal 101 so with this signature.If in database, there is not the signature of supply and preserves coupling between the signature arbitrarily, can not obtain any data so.Undertaken by public network in the example of the communication between data base administrator's entity 108 and the scanner terminal 101, signature and/or data recording can encryptedly be transmitted, and for example utilize public key encryp.Data link between data base administrator's entity and scanner terminal is used in the example of html style interface, can set up security socket layer and connect encryption is provided.
In the environment of the professional example of remote bank, the private data relevant with them that this system allows the bank client access bank to preserve visited the data that this client needs, and the client needn't go to bank in person or the bank clerk is talked.Other example application of this scheme comprises that the permission patient receives the result of medical inspection, and needn't go to hospital.
Above-mentioned about information is write in the database, back door system manager, the variety of option of management or investigation and interview and dissimilar access token and the example that alternatives is equally applicable to Figure 15.
In some instances, may preferably signature itself be used for database access.On the contrary, can use the signature of access token to encrypt another access key.Can use and have certain inherent redundancy the access key of (perhaps can increase redundancy), and can increase error correcting code to it to the nonredundancy key.This " filling (the padded) " key of error correcting code that comprises can carry out XOR with the signature that comes from access token.Described redundancy and error correcting code hold out against the XOR of (survive) and biometrics signature.In order to produce this access key again, can carry out the XOR second time of signing with the biometrics of expection at database.Utilize error correcting code can compensate any low-level mistake of introducing by the imperfect biometrics signature that reads, thereby obtain the access key of perfect reorganization.
In a word, this process relates to following step:
1. acquisition access key
2. increase certain redundancy and error correction bit
3. carry out XOR with the biometrics signature
4. (pass through the Internet) and pass to database
5. the biometrics signature with expection carries out XOR
6. utilize redundancy and error correction bit to carry out error correction
7. obtain can be used for finding out the access key of the information in the database.
Utilize an advantage of this system to be and to pay faultless access key to database.Many databases are preferred or are required perfect inerrancy access key, although in superincumbent other example, by using signatures match as access key, so that on behalf of perfect inerrancy access key, the signatures match result can avoid this point.
Thereby having illustrated above provides information, such as the various examples of system, equipment and method that can be considered as reliable, safety, the limited accass of secret or responsive information by the described people of data or mechanism.Thereby this data can be preserved by the mechanism that needs be visited it, but have only when being provided by described information description or the not reproducible access token of entity utilization described in described information when permitting, this mechanism can visit this data.
In a single day although understand embodiment above quite in detail, but fully understand top disclosure, numerous variations and modification will become apparent for a person skilled in the art.Following claim intention is interpreted into and comprises all such variation and modifications, and their equivalent.

Claims (31)

1, a kind of method of visit data record, described method comprises:
The scanning access token, to produce the signature of access token, described signature is based on the intrinsic property of access token;
The database of the signature of signature of Chan Shenging and preservation relatively, the signature of each preservation has the data recording related with it; With
Under the signature of described generation and situation that the signature of preservation conforms to, provide visit to the data recording related with the preservation signature of appointment.
2, in accordance with the method for claim 1, wherein data recording is described sensitive information.
3, according to claim 1 or 2 described methods, wherein data recording comprises the data of describing Financial Information, describes the data of medical information, at least one in the data of the data of description employee information and description legal information.
4, according to claim 1,2 or 3 described methods, wherein the representative of the signature of access token is to unique access method of respective data record.
5, according to each described method in the aforesaid right requirement, wherein the signature of each preservation is the signature from the generation of scanning formerly of access token.
6, in accordance with the method for claim 5, the coupling between the signature of the signature that wherein determine to produce and preservation shows that identical access token has been used to produce this two signatures.
7, according to each described method in the aforesaid right requirement, the step that wherein produces signature comprises:
Access token is exposed under the coherent radiation;
Collect one group of data point, described one group of data point is measured the scattering of coherent radiation from the inherent structure of access token; With
Determine the signature of access token according to described one group of data point.
8, according to each described method in the aforesaid right requirement, wherein access token is any article.
9, according to each described method in the aforesaid right requirement, wherein access token is the article that its user selects.
10, in accordance with the method for claim 9, wherein data recording be about or the data recording of the subscriber-related information of description and access token.
11, require according to aforesaid right in each described method, wherein saidly relatively comprise: the signature of described generation is divided into the polylith conjoint data, and carries out each piece and the compare operation between the relevant block of signing of preserving; The attribute of the comparative result of more described comparison and piece expection attribute relatively, determining the offset for the usefulness of determining the checking result, thereby compensation is to the infringement of access token and/or catch non-linear in the step.
12, according to each described method in the aforesaid right requirement, wherein data recording can be written under the situation of the access token signature that does not have coupling.
13, require according to aforesaid right in each described method, wherein relatively signature comprises the database of the signature of the data that relatively receive and preservation so that find out coupling, this coupling is represented by the access key that returns.
14, in accordance with the method for claim 13, wherein said signature is used to pack access key, to produce the data that receive for database.
15, according to claim 13 or 14 described methods, the wherein said data that relatively receive are included between the data of described signature and reception carries out XOR.
16, a kind of data access system comprises
With the related data recording of access token signature of preserving;
Operationally scan the signature generator of access token with the signature that produces this access token, described signature is based on the intrinsic property of access token; With
The comparer of the signature of signature of Chan Shenging and preservation relatively;
Under the situation that the signature of signature of preserving and generation conforms to, described system operationally makes data recording use.
17, according to the described system of claim 16, wherein data recording is described sensitive information.
18, according to claim 16 or 17 described systems, wherein data recording comprise the data of describing Financial Information, describe medical information data, describe the data of employee information and describe in the data of legal information at least one.
19, according to claim 16,17 or 18 described systems, wherein the representative of the signature of access token is to unique access method of respective data record.
20, according to each described system among the claim 16-19, wherein the signature of each preservation is the signature from the generation of scanning formerly of access token.
21, according to the described system of claim 20, the signature of wherein determining described generation shows that with coupling between the signature of preservation identical access token has been used to produce this two signatures.
22, according to each described system among the claim 16-21, the generator of wherein signing comprises:
The reading space that holds access token;
Produce the light source of coherent light beam;
Collect the detector array of one group of data point from the signal that obtains when reading space scattering when coherent light beam, wherein different data points is relevant with the scattering of the different piece of reading the space certainly; With
According to described one group of data point, operationally determine the data acquisition and processing (DAP) module of the signature of access token.
23, according to each described system among the claim 16-22, wherein access token is any article.
24, according to each described system among the claim 16-23, wherein access token is the article that its user selects.
25, according to the described system of claim 24, wherein data recording be about or the data recording of the subscriber-related information of description and access token.
26, according to each described system among the claim 16-25, wherein said comparer operationally is divided into the polylith conjoint data to the signature of described generation, and carry out each piece and preserve the signature relevant block between compare operation; The attribute of the comparative result of more described comparison and piece expection attribute relatively, determining offset for the usefulness of determining the checking result, thus compensation non-linear in the infringement of access token and/or the signature production process.
27, according to each described system among the claim 16-26, wherein data recording can be written under the situation of the access token signature that does not have coupling.
28, a kind of data access system comprises:
Can utilize the data recording of a plurality of preservations of corresponding access key visit;
The access token signature of preserving;
Operationally scan the signature generator of access token with the signature of generation access token, described signature is based on the intrinsic property of access token;
Operationally utilize the packaging unit of described signature packing data access key;
The unpack unit of unpacking of access key of the signature of operationally utilize preserving; With
Operationally fetch the data access unit of the data recording related with the access key of unpacking.
29, a kind of method of visit data comprises:
The biometrics signature packing data access key of access token is come from utilization;
The key of packing is passed to the database of data recording, each record and corresponding data access cipher key associated;
Utilize the biometrics signature of preserving that comes from access token, the data access key of unpacking; With
The data recording of the data access cipher key associated of fetching and unpacking.
30, a kind of foregoing in fact data access system.
31, a kind of foregoing in fact data access method.
CNA2006800325401A 2005-07-27 2006-07-19 Signature for access tokens Pending CN101258511A (en)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
GB0515465A GB2429092B (en) 2005-07-27 2005-07-27 Token Signature Based Record Access
US60/702,897 2005-07-27
GB0515465.3 2005-07-27

Publications (1)

Publication Number Publication Date
CN101258511A true CN101258511A (en) 2008-09-03

Family

ID=34976727

Family Applications (1)

Application Number Title Priority Date Filing Date
CNA2006800325401A Pending CN101258511A (en) 2005-07-27 2006-07-19 Signature for access tokens

Country Status (2)

Country Link
CN (1) CN101258511A (en)
GB (1) GB2429092B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102770889A (en) * 2009-11-10 2012-11-07 英根亚控股有限公司 Optimisation

Families Citing this family (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7349557B2 (en) 1998-06-19 2008-03-25 Solidus Networks, Inc. Electronic transaction verification system
US8171567B1 (en) 2002-09-04 2012-05-01 Tracer Detection Technology Corp. Authentication method and system
RU2380750C2 (en) 2004-03-12 2010-01-27 Инджениа Текнолоджи Лимитед Methods and devices for creation of printing products with possibility of their identification and their subsequent verification
EP1730675B1 (en) 2004-03-12 2015-05-20 Ingenia Holdings Limited Authenticity verification methods, products and apparatuses
GB2417592B (en) 2004-08-13 2006-07-26 Ingenia Technology Ltd Authenticity verification of articles
JP5123181B2 (en) 2005-07-27 2013-01-16 インジェニア・テクノロジー・(ユーケイ)・リミテッド Authenticity verification
CN101923647B (en) 2005-12-23 2013-01-09 英根亚控股有限公司 Optical authentication
GB2450131B (en) 2007-06-13 2009-05-06 Ingenia Holdings Fuzzy Keys
GB2461253B (en) 2008-05-23 2012-11-21 Ingenia Holdings Ltd Linearisation of scanned data
GB2466465B (en) 2008-12-19 2011-02-16 Ingenia Holdings Authentication
GB2466311B (en) 2008-12-19 2010-11-03 Ingenia Holdings Self-calibration of a matching algorithm for determining authenticity
US8485442B2 (en) 2009-07-02 2013-07-16 Biometric Payment Solutions Electronic transaction verification system with biometric authentication

Family Cites Families (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4218674A (en) * 1975-09-09 1980-08-19 Dasy Inter S.A. Method and a system for verifying authenticity safe against forgery
CA1160749A (en) * 1980-06-23 1984-01-17 Robert N. Goldman Non-counterfeitable document system
US4810868A (en) * 1985-08-06 1989-03-07 Drexler Technology Corporation Frasable optical wallet-size data card
GB2228821B (en) * 1986-01-24 1990-11-28 Drexler Tech Method of forming data cards
US5325167A (en) * 1992-05-11 1994-06-28 Canon Research Center America, Inc. Record document authentication by microscopic grain structure and method
GB9513361D0 (en) * 1995-06-30 1995-09-06 Farrall Andrew J A security device
WO2005027032A1 (en) * 2003-08-29 2005-03-24 Translucent Technologies, Llc Media verification system
GB2411954B (en) * 2004-03-12 2006-08-09 Ingenia Technology Ltd Authenticity verification methods,products and apparatuses
GB2417592B (en) * 2004-08-13 2006-07-26 Ingenia Technology Ltd Authenticity verification of articles
GB2426100B (en) * 2005-05-11 2007-08-22 Ingenia Technology Ltd Authenticity vertification

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102770889A (en) * 2009-11-10 2012-11-07 英根亚控股有限公司 Optimisation

Also Published As

Publication number Publication date
GB0515465D0 (en) 2005-08-31
GB2429092B (en) 2007-10-24
GB2429092A (en) 2007-02-14
GB2429092A8 (en) 2007-02-28

Similar Documents

Publication Publication Date Title
CN101258511A (en) Signature for access tokens
EP1907986B1 (en) Signature for access tokens
US7812935B2 (en) Optical authentication
CN100527152C (en) Methods and apparatuses for authenticatable printed articles and subsequently verifying them
CN100555319C (en) Authenticity verification methods, product and device
US20070113076A1 (en) Keys
CN101645133B (en) Methods and apparatuses for verifying and creating safe articles
US20070027819A1 (en) Authenticity Verification
CN101297306A (en) Copying
KR20080008417A (en) Authenticity check by light scattering
JP5253463B2 (en) Optical authentication
JP2009503672A (en) Prescription authentication using speckle patterns
CN101258528B (en) Authenticity verification
CN101258502A (en) Prescription authentication using speckle patterns
CN101385037A (en) Optical authentication
CN101263533A (en) Authenticity verification
HK1139901B (en) Methods and apparatuses for creating authenticatable printed articles and subsequently verifying them

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
ASS Succession or assignment of patent right

Owner name: ENGENYA HOLDINGS CO., LTD.

Free format text: FORMER OWNER: ENGENYA TECHNOLOGY CO., LTD.

Effective date: 20100413

C41 Transfer of patent application or patent right or utility model
COR Change of bibliographic data

Free format text: CORRECT: ADDRESS; FROM: LONDON, UNITED KINGDOM TO: TOTORA ISLAND, BRITISH VIRGIN ISLANDS

TA01 Transfer of patent application right

Effective date of registration: 20100413

Address after: The British Virgin Islands of Tortola

Applicant after: Ingenia Holdings UK. Ltd.

Address before: London, England

Applicant before: Ingenia Technology Ltd.

C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication

Open date: 20080903