专利摘要:
HIGH VALUE DOCUMENT AUTHENTICATION SYSTEM AND METHOD. Systems and methods for providing certification and authentication of documents using 2D barcodes are provided here.
公开号:BR112014000919B1
申请号:R112014000919-8
申请日:2012-07-16
公开日:2021-05-18
发明作者:RanDair Porter;Takahiro Gotanda
申请人:Pagemark Technology, Inc.;
IPC主号:
专利说明:

FIELD
[001] The present disclosure relates to secure document publication and more specifically to systems and methods for providing certification and authentication of documents. FUNDAMENTALS
[002] As the publishing tools and technology available to a potential counterfeiter improve, the problems associated with counterfeiting become an ever-increasing challenge for government, consumer and commercial organizations. Nearly half of all identity theft is directly related to replicating information obtained from stolen wallets and physical paperwork. Modern publishing tools make the process of creating or adapting bogus high-value documents using stolen information easier for the skilled identity thief, and hence make detection of forgery difficult. However, creating a forged document is often just the first step. Typically, the false, forged, altered or forged record, deed, instrument or other document must then be put into circulation and published (approved) before significant damage can be done. Unfortunately, the individual who receives the forged document is rarely a trained specialist and is likely unable to do a thorough investigation into the authenticity of the document before completing the transaction. BRIEF DESCRIPTION OF THE DRAWINGS
[003] Figure 1 illustrates a suitable operating environment for certification systems and publication of high value documents according to at least one modality.
[004] Figure 2 illustrates several components of a high-value document editor according to a modality.
[005] Figure 3 illustrates a suitable operating environment for high-value document scanning systems according to at least one modality.
[006] Figure 4 illustrates various components of a scanner / high-value document reader according to a modality.
[007] Figure 5 illustrates several components of a high-value document authentication server according to a modality.
[008] Figure 6 illustrates a screen image that identifies open/hidden data for inclusion in barcode according to a modality.
[009] Figures 7A-7C illustrate bar code data according to various embodiments.
[010] Figure 8 illustrates a series of communications between several devices that generate a barcode for a high-value document according to a modality.
[011] Figure 9 illustrates a flowchart of a reception routine for the high-value document editor shown in Figure 2 according to a modality.
[012] Figure 10 illustrates a flowchart of a barcode generation subroutine according to a modality of the reception routine shown in Figure 9.
[013] Figure 11 illustrates a series of communications between several devices that read a bar code for a high-value document according to a modality.
[014] Figure 12 illustrates a series of communications between various devices that capture a bar code for a high-value document according to a modality.
[015] Figure 13 illustrates a flowchart of a scanning routine for a high-value document reader shown in Figure 4 according to an embodiment.
[016] Figure 14 illustrates a flowchart of an authentication subroutine according to a modality of the scanning routine shown in Figure 13.
[017] Figure 15 illustrates a flowchart of a remote authentication subroutine of the scanning routine shown in Figure 13 for use by the high value document server shown in Figure 5 according to an embodiment.
[018] Figure 16 illustrates a flowchart of a document tracking routine for a high value document server shown in Figure 5 according to a modality. DESCRIPTION
[019] According to several modalities, a document authentication service can provide consumers with certificate high value document authentication. A high value document can be certified after a document authentication code is encoded into a two-dimensional (2D) barcode and embedded in the document. Subsequently, the certified high value document can be authenticated by reading the authentication code of the document contained in the 2D barcode and comparing it with the document. If a match exists, the certified high-value document can be authenticated. Pagemark Technology, Inc. (http://www.pagemarktechnology.com) provides commercial services based on PeltaTM Barcodes that include a modality of such document certification and authentication service.
[020] The detailed description that follows is represented primarily in terms of processes and symbolic representations of operations by conventional computer components, including a processor, memory storage devices for the processor, connected display devices, and input devices. Furthermore, these processes and operations can utilize conventional computer components in a heterogeneous distributed computing environment including remote file servers, computer servers, publishing facilities, and/or memory storage devices. Each of these conventional distributed computing components is accessible by the processor via a communication network. In a heterogeneous distributed computing environment, clients, servers, and clients/servers can be, for example, central units, minicomputers, workstations, or personal computers. Most services in a heterogeneous distributed computing environment can be grouped into one of these main categories: distributed file system, distributed computing resources, and messaging. A distributed file system gives the client transparent access to the mass storage portion of a remote network device, such as a server. Distributed computing resources provide the customer with access to computing or processing power from remote network devices, such as a cloud server. In one embodiment, distributed computing resources also provide the customer with access to remote resources, such as print/publish assets associated with remote network devices.
[021] The phrases "in one mode", "in several modes", "in some modes", and the like are used repeatedly. Such phrases do not necessarily refer to the same modality, but they can, unless the context dictates otherwise. The terms "comprising", "having" and "including" are synonymous, unless the context dictates otherwise. The terms "2-D barcode", "2D barcode" and "matrix barcode" are synonymous and generally refer to a two-dimensional barcode with encoded information that a scanner can read both horizontally and vertically. There are a variety of different 2D barcodes including Quick Response Codes (hereinafter "QR code"), Data Matrix codes, Aztec codes, MaxiCode, Semacode labels, Cauzin Softstrip codes, EZcode, High Capacity Color Barcodes ( HCCB), CyberCode, Mobile Multicolor Composite (MMCC), Point codes, PDF417 symbols, ShotCode, SPARQCode, WaterCode, Trusted Paper Key (TPK), and the like, but not limited to these. Of course, some 2D barcodes can contain information in an encrypted form. In addition, many 2D barcodes have been optimized for use with smart phones and other mobile phones so that they can be read quickly and accurately with or without an auto focus camera.
[022] Reference is now made in detail to the description of the modalities as illustrated in the drawings. Specific modalities described in this patent application provide implementations of specific cases of document certification by affixing a 2D barcode to the document and document authentication by scanning barcode labels affixed to a specific document. Although the modalities are described in connection with the drawings and related descriptions, it is not intended to limit the scope of the modalities disclosed herein. Rather, the intention is to cover all alternatives, modifications and equivalents. In alternative embodiments, additional devices, or combinations of devices illustrated, can be added, or combined, without limiting the scope of the embodiments disclosed herein.
[023] Several aspects of the illustrative modalities will be described using terms commonly used by those skilled in the art to transfer the substance of their work to others skilled in the art. However, the modalities described here can be embodied with only some of the aspects described. For purposes of explanation, specific numbers, materials and configurations may be presented to provide a broad understanding of the illustrated modalities. However, the modalities described here can be carried out without the specific details. In other cases, well-known features are omitted or simplified in order not to obscure the illustrative modalities.
[024] In addition, several operations and/or communications can be described as multiple operations and/or discrete communications, in turn, in a way that can be useful in understanding the modalities described here; however, the order of description should not be considered to imply that these operations and/or communications are necessarily order-dependent. In particular, these operations and/or communications need not be carried out in the order of presentation.
[025] Referring now to Figure 1, a suitable operating environment 100 for certification systems and publication of high value documents according to at least one modality is shown. Environment 100 may include a remote device 105 coupled via communications network 110 to a publisher 200. In one embodiment, the remote device 105 may transmit a document certification request with document data. Document data can include open data and hidden data. Alternatively, publisher 200 may receive a document to be certified from remote device 105 and automatically assign open data and hidden data based on the received document.
[026] The editor 200 uses the open data and the hidden data to generate a bar code 700 with an openly readable bar code portion based on the open data and a covertly readable bar code portion based on the hidden data. The covertly readable bar code portion of bar code 700 is unreadable to a conventional bar code reader suitable for reading the openly readable bar code portion. In many embodiments, the editor 200 can be operated by a person or entity that has actually developed and/or published the certified high-value document. In other modalities, a third party may be able to certify a document with a barcode for further authentication, with or without the knowledge of the actual author, developer, or publisher of the document, by performing operations similar to those assigned here to the editor 200 .
[027] As illustrated, publisher 200 may also include a printer 115 and a database of high value documents 120. Publisher 200 may embed barcode 700 into the document to form a certified high value document 170. A Placing a bar code 700 on the high value document 170 provides a machine readable way to uniquely identify, certify and authenticate the high value document 170. The high value documents 170 can include any material bearing marks, signs or symbols intended to transfer a message or meaning to anyone whose authenticity needs to be verified. For example, an official record, deed, certificate, prescriptions and other medical forms, patient records, travel documents, tax stamps/labels, contracts, instruments, coupons, meal tickets, identification cards, voters' cards, receipts, tickets of events, or other documents.
[028] In an alternative modality, the 700 barcode does not need to be incorporated directly into the document, but can instead be printed on a stamp, label or tag and then placed on the document or item to be authenticated. For example, barcode 700 can be printed on a holographic vehicle registration label which can then be affixed to a registered vehicle's license plate. The holographic tag can later be scanned to confirm the make, model, and/or Vehicle Identification Number (VIN) of the registered vehicle.
[029] Alternatively, a barcode seal can be placed on a will or deed to provide additional authentication. Open information may include information regarding the author or signer of the document, while hidden information may include a hodgepodge or message summary of something that represents a larger collection of information about the page. In one embodiment, a certification barcode seal can be added to a product to allow the consumer to verify the authenticity of the product. In one embodiment, the barcode can even be used to track a specific high-value asset or product both to verify the authenticity of the product and to help prevent counterfeiting.
[030] In one embodiment, the 700 barcode is a 2D barcode that uses a public domain barcode standard such as ISO/IEC 18004. Yet powerful, to ensure that important documents such as civil records, certificates of origin, identification badges, travel documents, registration documents and packaging materials are authentic.
[031] In one embodiment, barcode 700 includes a single hidden layer that is secretly encoded on top of a standard barcode. The hidden layer includes encrypted hidden information. Despite this hidden layer, barcode 700 generated by editor 200 is displayed in all respects as a standard machine readable barcode. In one embodiment, bar code 700 includes an overtly readable bar code portion based on the open encoded data and a covertly readable bar code portion based on the scrambled encoded data. While the overtly readable bar code portion is readable by a conventional bar code reader configured to read a designated 2D bar code, the covertly readable bar code portion is unreadable. In one embodiment, the encrypted open message may be linked to other visible information in document 170 providing another method to validate the authenticity of document 170. Consequently, it is extremely difficult for a counterfeiter to replicate the creation of information hidden within barcode 700. To this end, barcode 700 also contains standard messages that would be readable by any standard barcode reader. This information is contained in a payload of open data messages, which can be read by most smart phones, web cameras or desktop cameras. In contrast, one modality provides that the hidden information can only be read by a scanner using a secret scan key, which can be obtained from the authentication server. In one embodiment, supplementary software applications configured to read hidden data can also be implemented for use with smart phones, web cameras or desktop cameras.
[032] Referring now to Figure 2, several components of a high value document editor 200 are shown according to a modality. In some embodiments, editor 200 may include many more components than those shown in Figure 2. However, it is not necessary that all of these generally conventional components be shown for the purpose of revealing an illustrative embodiment.
[033] As shown in Figure 2, the editor 200 includes an Input/Output (I/O) communication interface 230 for connecting to a communications network 110, eg, the Internet. The I/O 230 communication interface can also include several Input/Output ports that individually serve as a potential interface between the editor 200 and other computers or peripheral devices and can include Ethernet, FireWire, Serial, Parallel, coaxial cable, and Serial Bus ports Universal (USB).
[034] The editor 200 also includes a processing unit 210, a memory 250 and an optional display 240, all interconnected, together with the I/O communication interface 230, via a bus 220. The memory 250 generally comprises a random access memory ("RAM"), a read-only memory ("ROM"), and a permanent mass storage device such as a disk drive.
[035] Memory 250 can store program code for a receive routine 900 (see Figure 9, discussed below), a barcode generation subroutine 1000 (see Figure 10, discussed below), and an optional routine 260. In addition, memory 250 also stores an operating system 255. These software components can be loaded from a non-transient computer-readable storage medium 295, in which the software components are concretely embodied, into. of memory 250 from the server 200 using a drive mechanism (not shown) associated with a computer-readable storage medium, such as a floppy disk, tape, DVD/CD-ROM drive, memory card, or the like. In some embodiments, software components may also be loaded via the I/O communication interface 230, rather than via the computer-readable storage medium 295.
[036] In some embodiments, editor 200 may also communicate via bus 220 with a database (not shown) or other local or remote data storage. In various embodiments, bus 220 may comprise a storage area network ("SAN"), a high-speed serial bus, and/or other suitable communication technology.
[037] Referring now to Figure 3, a suitable operating environment 300 for high value document authentication systems according to at least one modality is shown. Environment 300 may include dynamic matrix or 2D barcode 700 embedded or affixed to a certified high value document 170, document scanner/reader 400, and authentication server 500. In various embodiments, reader 400 transmits a scan request to authentication server 500 via communications network 110 and obtains a secret scan key associated with the certified document 170. Reader 400 uses the scan key to scan and decrypt the covertly readable barcode portion of the certified document. In one embodiment, decrypting the covertly readable barcode portion provides data that may include appropriate authentication information to authenticate the certified document 170. For example, the covert data may provide a message summary of the entire page, such as a miscellany or summary of something that represents a larger collection of information about the page. Consequently, if the current collection of information about the page of the certified document 170 matches the message summary of the hidden data, the reader 400 may consider the certified document 170 to be a valid document or a legitimate copy of it. Simpler modalities, such as those used for tax stamps or registration labels, may correspond to other data found in the rest of the certified document 170, such as date of issue or identification number.
[038] In one embodiment, the authentication server 500 maintains a high value document database 120 accessible by a document editor 200, reader 400, and/or other authorized third parties. The 2D 700 barcode label can implement a variety of different encoding mechanisms, including QR code, Data Matrix code, Aztec code, MaxiCode, Semacode label, Cauzin Softstrip code, EZcode, High Capacity Color Barcode (HCCB), CyberCode, Mobile Multicolor Composite (MMCC), Point codes, PDF417 symbols, ShotCode, SPARQCode, WaterCode, Trusted Paper Key (TPK), and the like.
[039] Referring now to Figure 4, various components of a high value document scanner/reader 400 are shown according to an embodiment. In some embodiments, reader 400 may include many more components than those shown in Figure 4. However, it is not necessary that all of these generally conventional components be shown for the purpose of revealing an illustrative embodiment. As shown in Figure 4, reader 400 includes an I/O communication interface 430 for connection to communications network 110.
[040] The reader 400 also includes a processing unit 410, a memory 450 and an optional display interface 440, all interconnected together with the I/O communication interface 430 via a bus 420. The memory 450 generally comprises a random access memory ("RAM"), a read-only memory ("ROM"), and a permanent mass storage device such as a disk drive, flash device, or the like. Memory 450 stores program code for various applications, which includes executable instructions for scan routine 1300 (see Figure 13, discussed below) and authentication routine 1400 (see Figure 14, discussed below). In addition, memory 450 also stores an operating system 455. These software components can be loaded from a computer-readable storage medium 495 into memory 450 of reader 400 using a read mechanism (not shown) associated with a non-transient computer-readable storage medium 495, such as a floppy disk, tape, DVD/CD-ROM drive, memory card, or the like. In some embodiments, software components may also be loaded via the I/O communication interface 430, rather than via the computer-readable storage medium 495.
[041] Although a reader 400 has been described that generally conforms to conventional general purpose computing devices, a reader 400 can be any of a large number of mobile client devices capable of communicating with the communications network 110 and of obtaining applications, for example, a personal gaming console, a laptop, a cell phone, or any other suitable mobile device. In some embodiments, some or all of the systems and methods disclosed herein may also be applicable to non-mobile client devices, such as a personal computer, decoder, television, and the like.
[042] Referring now to Figure 5, several components of an authentication server 500 for high value documents are shown according to a modality. In some embodiments, authentication server 500 may include many more components than those shown in Figure 5. However, it is not necessary that all of these generally conventional components be shown for the purpose of revealing an illustrative embodiment. As shown in Figure 5, authentication server 500 includes an I/O communication interface 530 for connecting to communications network 110. Authentication server 500 also includes a processing unit 510, a memory 550, and an optional display interface 540, all interconnected together with the I/O communication interface 530 via a bus 520. The memory 550 generally comprises a random access memory ("RAM"), a read-only memory ("ROM"), and a permanent mass storage device, such as a disk drive, flash device, or the like. Memory 550 stores program code for various applications, which includes executable instructions for a remote document authentication routine 1500 (see Figure 15, discussed below) and document tracking routine 1600 (see Figure 16, discussed below). In one embodiment, memory 550 may also store a document alert routine 560 to identify and/or set multiple alerts associated with a document. In addition, memory 550 also stores an operating system 555. These software components can be loaded from a computer-readable storage medium 595 into memory 550 of authentication server 500 using a read mechanism (not shown) associated with a non-transient computer-readable storage medium 595, such as a floppy disk, tape, DVD/CD-ROM drive, memory card, or the like. In some embodiments, software components may also be loaded via the I/O communication interface 530, rather than via a computer-readable storage medium 595.
[043] Although an authentication server 500 that generally conforms to conventional general purpose computing devices has been described, the authentication server 500 can be any of a large number of network devices capable of communicating with the communications network. 110 and obtaining applications, for example, central units, minicomputers, workstations, personal computers, or any other suitable mobile device. In some embodiments, some or all of the systems and methods disclosed herein may also be applicable to distributed network devices, such as cloud computing, and the like. Available cloud resources can include applications, processing units, databases and file services. In this way, authentication server 500 allows convenient on-demand network access to a shared set of configurable high-value document certification, authentication, monitoring and tracking relating to computing resources and services (eg, networks, servers, storage, applications and services) that can be quickly provided and released with minimal management effort or service provider interaction. These services can be configured so that any computer connected to the communications network 110 is potentially connected to the group of high-value document authentication applications, processing units, databases and files, that is at least capable of submitting requests for certification, authentication scans, and/or accessing information collected from document alerts. Thus, the bar code data held by the authentication server 500 can be accessible in various ways by a client device 400, for example, a personal computer, a handheld scanner, a laptop computer, a cell phone, or any other. device that is capable of accessing the Internet 110.
[044] Referring now to Figure 6, a screen image is shown identifying open data 615A, 625A, 635A, 645A and/or hidden data 615B, 625B, 635B, 645B for inclusion in barcode according to a modality . Specifically, the illustrated barcode generation program 660 includes several document elements and associated custom document data fields, such as Employee Name/Badge Number 610, Firearm Clearance Level 620, Boss Providing Authorization 630, an Authorization ID 640, and a source acknowledgment link 650. Each custom document data field may be designated as open data 615A, 625A, 635A, 645A and/or hidden data 615B, 625B, 635B, 645B.
[045] Barcode data may originate from a variety of sources including but not limited to remote device 105, editor 200, or other third party. Similarly, the potential components of a composite bar code, which consists of both open data and hidden data, can also be identified in a variety of different ways. For example, Figure 6 illustrates a composite document 660 barcode generation program that identifies multiple document elements with associated document data fields in a potentially high-value document. Each document data field can be individually identified for selective inclusion as open/hidden data in a composite barcode. Selecting open data and hidden data from the document's custom data fields allows each composite barcode to include information relatively unique to the source document.
[046] Although the modality illustrated in Figure 6 allows visually available document-specific information to be selected as open/hidden data, other modalities can automatically select and assign barcode. In one embodiment, barcode data includes a hodgepodge or summary of messages that represent a larger collection of information about the page. Other modalities may incorporate additional data to authenticate the document taken from outside the "four corners" of the high value document. For example, an identification document that uses a composite bar code, such as a passport or driver's license, may also request additional security information from the individual presenting the identification document. For example, in one modality, open data might indicate that a specific security question should be asked or provide a link to the security question, such as "What's your mother's maiden name " or "What's your address " email or phone number ". Hidden data can provide the answer or a link to the appropriate answer. Alternatively, open data and hidden data may not be correlated to reduce the likelihood of being accidentally discovered.
[047] Referring now to Figure 7A, there is shown a block diagram of a barcode 700 for a high value document according to an embodiment. In one embodiment, barcode 700 includes barcode data 740 with open data 750 and/or hidden data 760.
[048] Referring now to Figure 7B, there is shown a graphical illustration of a 700B barcode with encoded data from barcode 740B. The QR code illustrated in Figure 7b only includes open data 750 encoded in an openly readable barcode portion 750B. By comparison, Figure 7C is a graphical illustration of the 700C barcode with encoded data from the 740C barcode. More specifically, the QR code illustrated in Figure 7C includes both an overtly readable barcode portion 750C based on the same open data 750 used in Figure 7B and a covertly readable bar code portion 760C based on the open data 760. 700C barcode incorporates the covertly readable barcode portion 760C in redundant space associated with the covertly readable barcode portion 750C. In one embodiment, the redundant space associated with the openly readable barcode portion 750C is reserved by an error correction code configured to detect and correct the encoding of graphic/symbolic errors in the barcode of the readable barcode portion openly 750C. The error correction code can be any multi-burst bit error correction code, such as a Reed-Solomon code. Other types of acceptable error correction codes that can be used in conjunction with a 2D barcode symbolic encoder include turbo code varieties, LDPC (Low Density, Parity Check) codes, Convolution codes, ECC, AN codes, BCH codes. Fountain codes, Golay codes, Goppa codes, Group codes, Hadamard code, Hagelbarger code, Hamming codes, Latin square based codes, Lexicographic codes, Long codes, LT codes, constant weight codes, RA codes, Raptor codes, Reed- Muller, Tornado codes, Walsh-Hadamard codes, and other FEC codes.
[049] Once encoded and/or encrypted, the 700C barcode includes two types of readable data, an overtly readable barcode portion 750C and a covertly readable barcode portion 760C. While the overtly readable barcode portion 750C remains readable by a conventional barcode reader configured to read a designated QR barcode, the covertly readable barcode portion 760C is unreadable without additional detection software/service such as such as those provided by Pagemark Technology, Inc. (http://www.pagemarktechnology.com) . In one embodiment, the covertly readable barcode portion 760C includes hidden encrypted data 760 that can only be read by a barcode reading device using a suitable secret scanning key. In one embodiment, the secret scan key can be obtained from a remote device, such as an authentication server 500.
[050] Referring now to Figure 8, a series of communications between remote device 105, publisher 200 and authentication server 500 is shown according to an embodiment. The illustrated communications series shows a scenario in which the editor 200 generates a barcode for a high-value document. The illustrated sequence of events is provided as an example for illustrative purposes. In other embodiments, a similar barcode publishing process can be achieved through a different sequence of events.
[051] Beginning the illustrated sequence of operations, the remote device 105 submits 810 to an editor 200 data for inclusion in a barcode. Typically, the submission process also includes the transmission of at least one of the open data and the hidden data, which will eventually be used to generate a barcode. The submission process may also include selecting a 2D barcode type to encode the open/hidden data. In one embodiment, data submission also includes identifying a suitable encryption key to be used to encrypt the hidden data.
[052] After receiving the data for incorporation in the barcode, the editor 200 analyzes 820 the open data and the hidden data. Typically, the analysis process includes identifying both open data and hidden data. As previously illustrated in Figure 6, the open data and the hidden data may already have been identified by the remote device 105 and need only be separated by the editor 200. Alternatively, the editor 200 can independently identify and select the open data and the hidden data. For example, editor 200 can select open data and hidden data based on the content of the high-value document to be published.
[053] After analyzing the data, the editor 200 generates 830 a barcode based on the open data and the hidden data. In particular, the editor 200 encodes the open data into an overtly readable barcode portion and the hidden data into a covertly readable barcode portion. The covertly readable portion of the barcode being unreadable by a standard configuration of a 2D barcode scanner. An illustrative example of the barcode generation process is described in more detail in Figure 10 below.
[054] After generating the barcode, editor 200 embeds the generated barcode with other content from a high value document and prints 840 a certified high value document representing the combination of the barcode and the document content of high value. In one modality, printing includes physical publishing and electronic publishing. After printing, publisher 200 provides 850 a copy of the certified high-value document to authentication server 500.
[055] After obtaining a certified high-value document, the authentication server 500 records 860 the document's identification information in an authentication database. The authentication database can track a variety of document identification information including open data and hidden data extracted from the barcode. In one embodiment, a copy of the barcode is also included in the authentication database. In one modality, the document information includes, among other items, a complete copy of the certified high value document.
[056] Referring now to Figure 9, there is shown a flowchart of a receive routine 900 as may be performed by an editor 200 according to an embodiment. In some embodiments, routine 900 may be performed by a remote publisher application installed on either a remote client device 105 or authentication server 500.
[057] In block 910, routine 900 obtains data for the barcode. For example, in one embodiment, routine 900 receives bar code information such as 2D bar code type, encryption and encryption keys, and message payload.
[058] In subroutine 1000 block (see Figure 10, discussed below), routine 900 generates a barcode. In one embodiment, the bar code generation process may include obtaining document data, analyzing the document data into a combination of open data and hidden data, generating an overtly readable bar code portion based on the open data and insertion of a blind readable barcode based on the hidden data in redundant space of the open readable barcode portion.
[059] In query block 920, routine 900 determines whether the generated barcode should be printed. If not, routine 900 continues to query block 930. Otherwise, routine 900 prints the barcode at block 925. In one embodiment, a certified document is printed representing a combination of barcode and data from the document. high value. The resulting combination can be "fixed" in a variety of tangible media that are sufficiently permanent or stable to allow the certified high value document to be perceived, reproduced, or otherwise communicated to others for a period greater than the transitional duration.
[060] In query block 930, routine 900 determines whether the generated barcode should be published electronically. If not, routine 900 continues to block 990 and ends. Otherwise, routine 900 electronically publishes the barcode in block 935. In one embodiment, a certified document is electronically published as an electronic document or image that represents the combination of the barcode and high-value document data. The resulting combination can then be electronically transmitted and/or maintained to allow the certified high value document to be perceived, reproduced, or otherwise communicated to others over a period of time. In one embodiment, routine 900 ends after publication in block 999.
[061] Referring now to Fig. 10, there is shown a flowchart of a barcode generation subroutine 1000 as may be performed by an editor 200 according to an embodiment. In some embodiments, routine 700 may alternatively be performed by a remote generating application installed on either a remote client device 105 or authentication server 500.
[062] In block 1010, subroutine 1000 performs lexical analysis on the data obtained for the creation of a barcode. In one embodiment, subroutine 1000 initially parses the document data into at least one packet of document messages and barcode data. Barcode data includes 2D barcode parameters that include barcode type, message load, and error correction level. The error correction level often sets the amount of redundant space included when creating a 2D barcode. For example, QR codes set an ECLevel parameter to one of four levels (eg L, M, Q, H), where each level represents how much redundant information can be used to recover errors in data (eg L=7% , M=15%, Q=25%, H=30%). At block 1020, the routine identifies open data and hidden data within the bar code data. As previously illustrated in Figure 6, open data and hidden data may have already been identified by a remote device 105. Alternatively, subroutine 1000 may independently identify and select open data and hidden data from the document data. For example, stanza 1000 can select and assign open data and/or closed data based on document content, a miscellany, or a message summary.
[063] In block 1030, subroutine 1000 generates a 2D barcode. In one embodiment, the generated 2D barcode is open data encoded in a 2D barcode graphical or symbolic representation, thereby creating an overtly readable portion of the barcode. In query block 1040, subroutine 1000 determines whether there is sufficient redundant space for embedding a portion of the hidden 2D barcode based on the hidden data within the generated hidden 2D barcode. If not, subroutine 1000 increases the redundant space available in block 1050. In one modality, subroutine 1000 can increase the redundant space available by increasing the size of the 2D barcode. In one modality, subroutine 1000 can increase the redundant space available by changing the error correction level. For example, if the 2D barcode is a QR code, then subroutine 1000 could increase an ECLevel parameter associated with the QR code from L to M or from M to Q or from Q to H.
[064] Otherwise, when sufficient redundant space is available in query block 1040, subroutine 1000 generates at block 1060 a 2D barcode that includes a hidden barcode portion and an open barcode portion. In one embodiment, the hidden data can be encrypted and encoded into a 2D bar code graphical or symbolic representation creating the covertly readable bar code portion. The covertly readable portion being unreadable by a standard barcode reader capable of reading the overtly readable portion of the barcode. In one embodiment, the hidden barcode portion is hidden within the available redundant space associated with the open 2D barcode. Alternatively, the covertly readable portion is inserted over the covertly readable portion in order to allow the open data to be retrieved using error correction.
[065] In one embodiment, the covertly readable bar code portion is inserted as a burst of errors in the covertly readable bar code portion so that said covertly readable bar code portion is corrected by said code reader. bars using the redundant data. Each error burst represents a contiguous sequence of symbols associated with the covertly readable bar code portion, so that the first and last symbols are in error with respect to the openly readable bar code portion and there is no contiguous subsequence of associated correct symbols to the openly readable portion of the barcode within the error burst.
[066] In one modality, the resulting generated barcode is a QR code based on the identified open data. Typically, the QR code will include version information, format information, at least one data key, at least one error correction key, position pattern, alignment pattern, and a timing pattern. As previously indicated, the QR code generator can also assign an error correction level that determines how much redundant information can be used to recover errors. In one embodiment, subroutine 1000 generates an openly readable QR code barcode portion based on the open data and inserts a covertly readable QR code barcode portion based on the hidden data into the redundant space of the code portion. Openly readable QR code bars. Alternatively, subroutine 1000 could directly insert the covertly readable QR code barcode portion into the overtly readable QR code barcode portion and rely on the respective QR code error correction mechanisms to restore/maintain the data open. Subroutine 1000 returns to the calling routine in block 1099.
[067] Referring now to Figure 11, a series of communications between the barcode reader 400 and the authentication server 500 is shown according to an embodiment. The illustrated communications series shows a scenario in which reader 400 reads a barcode associated with a high-value document and the combination of reader 400 and authentication server 500 authenticates the high-value document based on the data retrieved from the barcode. bars. The illustrated sequence of events is provided as an example for illustrative purposes. In other modalities, a similar barcode scanning and document authentication process can be achieved through a different sequence of events.
[068] Beginning the illustrated sequence of operations, barcode reader 400 submits 1110 a document scan request to authentication server 500. Depending on the configuration of reader 400, this document scan request may occur during a single stage setup, a periodic initialization stage, or be done regularly with each different document scan.
[069] Upon receiving the document scan request, the authentication server 500 identifies 1113 hidden scan codes associated with the requested document scan and transmits 1115 the hidden scan codes to reader 400. In one embodiment, reader 400 can obtain a hidden scan key associated with a specific certified document. Reader 400 can use the scan key in combination with traditional scan keys to scan 1120 the certified document. Reader 400 processes 1130 the scanned barcode information to identify, decode and, when necessary, decrypt the overtly readable barcode portion into open data and the covertly readable barcode portion into hidden data. In one embodiment, the decryption of the covertly readable barcode portion provides hidden data that may include authentication information suitable for reader 400 to authenticate 1140 the certified document. For example, hidden data can provide a summary of messages, such as a hodgepodge or summary that represents a larger collection of information about the page. In one embodiment, reader 400 reveals an authentication code that must be present somewhere on the face of the document being scanned. Alternatively, reader 400 can discover a password or passphrase that should be known to the holder of the document.
[070] Reader 400 may also submit 1150 a copy of the scanned barcode to authentication server 500 for further remote authentication. Remote authentication can be useful in a variety of circumstances, especially making spoofing even more challenging when authentication information is not revealed locally. Thus, a potential forger would have to have control of both the reader 400 and an authentication server 500 to obtain all authentication information. Upon receipt of the barcode information, the authentication server 500 identifies 1160 and 1170 authenticates the document. Authentication server 500 can also register 1180 document scanning to track transactions for a specific document. If remote authentication fails or scanning triggers a notification, the authentication server submits 1190 a document alert to reader 400. Otherwise, the authentication server submits 1190 a document validation to reader 400.
[071] Referring now to Figure 12, a series of communications between the barcode reader 400 and the authentication server 500 is shown according to an embodiment. The illustrated communications series shows a scenario in which reader 400 captures an image of a barcode for a high value document and the combination of reader 400 and authentication server 500 reads the barcode image to authenticate the document. high value based on the information collected from the barcode. The illustrated sequence of events is provided as an example for illustrative purposes. In other embodiments, a similar barcode capture process and document authentication can be achieved through a different sequence of events.
[072] Beginning the illustrated sequence of operations, barcode reader 400 captures 1210 a barcode image. Reader 400 processes 1220 the captured barcode image to identify, decode and, when necessary, decrypt the overtly readable barcode portion into open data and the covertly readable barcode portion into hidden data. Open data and hidden data may include authentication information suitable for reader 400 to locally authenticate 1230 the certified document. In one embodiment, reader 400 reveals a local interpellation query that may be issued 1233 to the operator of reader 400 and/or to the holder of the document to be authenticated. The local interpellation query may include an authentication password or passphrase that should be known to the document holder or found by the reader operator within the document. Reader 400 obtains 1235 the local query response and checks 1238 for a local query match. In one embodiment, if local matching fails a document alert is established and notification is provided to the operator of reader 400. Otherwise, reader 400 submits 1240 a copy of the image data to authentication server 500.
[073] Authentication server 500 identifies 1250 the document associated with the barcode image. In one embodiment, authentication server 500 authenticates 1260 the barcode image and determines whether remote authentication is required. Authentication server 500 issues a remote interpellation inquiry 1263 to the reader 400. The remote interpellation inquiry may include an authentication password or passphrase that should be known to the document holder or found by the reader operator within the document. Alternatively, the remote interpellation query can provide a message digest, such as a hodgepodge or summary that represents a larger collection of information about the page that the scanned document should match. It is anticipated that a variety of other local and remote interpellation queries can be made to validate and authenticate the scanned document. For example, in one modality, a document interpellation query might actually be a combination of a local interpellation query and a remote interpellation query.
[074] After obtaining 1265 of a remote interpellation query response, reader 400 submits 1268 the remote interpellation query response to authentication server 500. Authentication server 500 checks 1270 for a match of the received remote interpellation query response with the expected response. In one embodiment, authentication server 500 may also set up for the identified document. Authentication server 500 records 1280 the validation/invalidation of the document and submits 1290 any resulting document or document validation alerts to reader 400. Having been notified (or otherwise determined) of the document's authenticity, reader 400 may instruct the operator properly.
[075] Referring now to Figure 13, there is shown a flowchart of a scanning routine 1300, as can be performed by the high value document reader 400 shown in Figure 4 according to an embodiment. Starting at block 1310, routine 1300 scans a barcode. Routine 1300 obtains open barcode data from the scanned barcode at block 1320. At lookup block 1330, routine 1300 determines whether the scanned barcode includes hidden data. If no hidden data is detected, routine 1300 continues to block 1340. Otherwise, routine 1300 obtains the detected hidden data from the bar code scanned at block 1335.
[076] Routine 1300 determines, based on open and/or hidden data, whether the scanned barcode also indicates that the document must be authenticated in query block 1340. If authentication is not required, routine 1300 continues to the block 1350. Otherwise, in subroutine block 1400 (see Figure 14, discussed below), or, alternatively, in subroutine 1500 (see Figure 15, discussed below), routine 1300 authenticates the document.
[077] At block 1350, routine 1300 transmits the barcode data to an authentication server. In one embodiment, the transmitted barcode data can be used for remote authentication and/or certificate document registration. At block 1360, routine 1300 records the bar code data. Barcode data can be stored in memory locally, remotely, or both. Document activity can be tracked by periodically scanning a 2D barcode affixed to a specific document. For example, by recording information available to the reader, it may also be possible to determine both the current location and previous locations of a document. In one embodiment, a document scan may also include environmental information not associated with the bar code being scanned including GPS coordinates, zip code information, area code information, network information, and/or other relative geographic information that may be obtained from the barcode scanner/reader. After finishing the barcode reading process, routine 1300 continues to block 1399 and ends.
[078] Referring now to Figure 14, a flowchart of an authentication routine 1400 according to an embodiment is shown. Beginning at block 1410, routine 1400 issues an interpellation query based on the available open and hidden data obtained from the bar code. Routine 1400 obtains a response to the query query at block 1415. In one embodiment, the response is received from an operator of the bar code scanner. Alternatively, the response can be a result obtained from a property of the document, such as an embedded message digest, author of the document, or bearer of the document. In yet another modality, the response may represent data stored in memory associated with the document identified in the initial scan.
[079] In query block 1420, routine 1400 determines whether an adequate response has been received. If not, routine 1400 continues to block 1430. Otherwise, routine 1400 authenticates the document at block 1440 and returns at block 1499. At query block 1430, routine 1400 determines whether further responses are allowed. If allowed, routine 1400 returns to block 1410 and issues an interpellation query, which may or may not be the same as the original interpellation query. Otherwise, routine 1400 continues to block 1450 where a document authentication failure notification is made for the document being scanned and a document alert is issued for the document associated with the barcode. Routine 1400 continues to block 1499 and ends/returns.
[080] Referring now to Figure 15, there is shown a flowchart of a remote authentication subroutine 1500 of the scanning routine shown in Figure 13 for use by the high value document server shown in Figure 5 according to an embodiment. Starting at block 1510, subroutine 1500 obtains a barcode with embedded open and hidden information. In query block 1520, stanza 1500 determines whether information regarding a certified high-value document can be located in a database based on the barcode information. If not, subroutine 1500 continues to block 1560. Otherwise, subroutine 1500 continues to block 1530 and issues a remote interpellation query associated with the certified high-value document. Subroutine 1500 obtains a response to the query at block 1535.
[081] In query block 1540, subroutine 1500 determines whether an adequate response has been received. If not, subroutine 1500 continues to query block 1550. Otherwise, subroutine 1500 continues to query block 1570. In query block 1550, subroutine 1500 determines whether another response is allowed. If not, subroutine 1500 continues to 1560. Otherwise, subroutine 1500 returns to block 1530. At block 1560, subroutine 1500 assigns a remote document alert to any document associated with the displayed barcode , including the document presented for authentication.
[082] In query block 1570, stanza 1500 looks for any exceptional document alerts associated with the displayed barcode. If none are found, stanza 1500 issues a remote document validation at block 1580. Otherwise, stanza 1500 issues a remote document alert at block 1590. In either case, stanza 1500 continues to block 1599 and returns.
[083] Referring now to Figure 16, there is shown a flowchart of a document tracking routine 1600 for a high value document server shown in Figure 5 according to an embodiment. Starting at block 1610, routine 1600 receives a barcode scan request for a certified document. Routine 1600 identifies the cryptography associated with the bar code at block 1615 and transmits a hidden decryption code at block 1620.
[084] In block 1630, routine 1600 obtains a barcode with open and hidden information. In query block 1640, routine 1600 determines whether document information for a certified high-value document can be located based on the bar code obtained. If not, routine 1600 continues to query block 1650. Otherwise, routine 1600 continues to block 1680 to optionally record document scanning activity along with other available scanning information and continues to block 1699 to terminate.
[085] In query block 1650, routine 1600 determines if a new high value document barcode has been presented. If not, the routine continues to block 1670 and generates a document alert for the document associated with the barcode. Otherwise, routine 1600 creates a record for the new barcode and associates the barcode with the high-value document presented in block 1660. At block 1680, routine 1600 optionally records the barcode scanning activity. Routine 1600 ends at block 1699.
[086] While specific embodiments have been illustrated and described herein, a variety of alternative and/or equivalent implementations may replace the specific embodiments shown and described without departing from the scope of the present disclosure. This patent application is intended to cover any adaptations or variations of the modalities discussed here.
权利要求:
Claims (19)
[0001]
1. Computer-implemented method for generating a certified version of a document, the method characterized by comprising: receiving a request to publish a certified document; receiving, by a document generator, document data from a remote device, the document data comprising document identification data and encrypted document authentication data; generating, by said document generator, a two-dimensional barcode with the authentication data of encrypted documents incorporated as errors in the document identification data by: generating a first barcode portion with the first data elements, the first elements of data formatted to include the encrypted document identification data and error correction data, and inserting errors in non-contiguous subsections of the first data elements to encode a secret data layer within the first barcode portion, the layer of hidden data forming a second barcode portion with second data elements embedded as errors in the first data elements of the first barcode portion, the second data elements based on the authentication data of encrypted documents, in which the document identification data is readable by a first barcode reader using the error correction data to restore the first data elements of the first part of the barcode, and where the encrypted document authentication data is readable by a second barcode reader configured to identify and match errors in the non-contiguous subsections of the first data elements to form the encrypted document authentication data; and affixing the two-dimensional barcode to the document to form a certified document, the second part of the barcode providing document authentication data to barcode readers configured to verify the authenticity of the certified document and in which said document has separate data from document identification data and encrypted document authentication data; storing, by an authentication server, an encryption key for the encrypted document authentication data associated with the certified document receiving a document authentication request from a remote device for the certified document; identify the encryption key associated with the certified document; transmit the encryption key or encrypted document authentication data to the remote device.
[0002]
2. Method according to claim 1, characterized in that the generation further comprises incorporating the second bar code portion in the redundant space associated with said clearly readable bar code portion.
[0003]
3. Method according to claim 1, characterized in that the barcode is a 2D barcode.
[0004]
4. Method according to claim 3, characterized in that the 2D barcode is selected from the group consisting of QR code, Data Matrix code, Aztec code, MaxiCode, Semacode tag, Cauzin Softstrip code, EZcode , HCCB, CyberCode, MMCC, Point codes, PDF417 symbols, ShotCode, SPARQCode, WaterCode and TPK.
[0005]
5. Method according to claim 1, characterized in that the certification includes printing the document with the bar code generated.
[0006]
6. Method, according to claim 1, characterized in that the certification includes publishing the document with the bar code generated affixed.
[0007]
7. Non-transient computer-readable medium characterized by having instructions stored in it in a tangible way that, when executed by a processor, perform the method defined in claim 1.
[0008]
8. Computer equipment characterized by comprising a processor and a memory that has instructions stored in it that, when executed by the processor, perform the method defined in claim 1.
[0009]
9. Computer-implemented method for authenticating a certified version of a document, the method characterized by comprising: requesting, by a bar code reader, the scanning of the certified document that has a bar code with a portion of the bar code readable, said barcode including first data elements with error correction data based on first and second data elements based on second data entered as errors within the first data elements, wherein the second data is different from that the former, wherein the first data elements are readable by a first barcode reader using the error correction data to restore the first barcode data elements, and wherein the second data elements are readable to a second barcode reader configured to identify and combine errors in the first data elements to form the second ones. data collections; obtaining, by said barcode reader from an authentication server, a scanning key associated with the certified document; digitizing, by said barcode reader using said scanning key, said second barcode data elements in the certified document; identifying said second data in said second digitized bar code data elements; and authenticating the certified document based on at least said second data and the digitization key, and wherein said document has data separate from said second data and said first data.
[0010]
10. Method according to claim 9, characterized in that said scanning comprises capturing a barcode image.
[0011]
11. Method according to claim 10, characterized in that said captured barcode image is decoded and decrypted into first data and second data by a remote device.
[0012]
12. Method according to claim 9, characterized in that said second data elements are inserted into said first data elements in at least one burst of errors and correcting the second data elements by said barcode reader using Redundant data.
[0013]
13. Method according to claim 12, characterized in that the second data elements appear as a burst of errors within said first data elements to said bar code reader and are discarded.
[0014]
14. Method according to claim 12, characterized in that the second data elements are extracted from the first data elements and decrypted using said secret scanning key.
[0015]
15. Method according to claim 9, characterized in that said authentication further includes: issuing, by said bar code reader, a local interpellation query; obtaining, by said bar code reader, a response to the local query; and verifying, by said bar code reader, a correspondence of said local inquiry query and said local inquiry response.
[0016]
16. Method according to claim 9, characterized in that said authentication further includes: issuing, by said authentication server, a remote interpellation query; obtaining, by said bar code reader, a response to the remote inquiry; and verifying, by said authentication server, a correspondence of said remote query response and said remote query response.
[0017]
17. Computer-implemented method for tracking a certified version of a document, the method characterized by comprising: obtaining, by an authentication server, a document authentication request from a remote scanning device for the certified document, where the certified document includes encrypted document data encoded in a barcode, said barcode having first data elements based on document identification data and second data elements inserted in the first data elements as errors, the second elements data based on an encrypted document authentication data, where the document identification data is readable by a first barcode reader using the error correction data, and where the encrypted document identification data is readable by a second barcode reader configured to identify and match errors in the first data elements to form the authentication data of encrypted documents; identifying, by said authentication server, an encryption key associated with the second encrypted data elements of said bar code and responsive to said document authentication request, transmitting said identified encryption key to said remote scanning device; obtaining, by said authentication server from said remote scanning device, said barcode with document data; identifying, by said authentication server, the certified document based on said obtained document data; recording said document authentication request by said remote scanning device in a tracking record associated with the electronically certified document stored in the authentication server, and wherein said document has data separate from said second data and said first data.
[0018]
18. Method according to claim 17, characterized in that said identification includes associating said bar code to the certified document.
[0019]
19. Method according to claim 17, characterized in that the identification further includes determining whether said tracking record associated with the certified document includes a document alert.
类似技术:
公开号 | 公开日 | 专利标题
BR112014000919B1|2021-05-18|high value document authentication system and method
US11186111B1|2021-11-30|Digitally encoded seal for document verification
US7519825B2|2009-04-14|Electronic certification and authentication system
CN103679436B|2018-08-14|A kind of electronic contract security system and method based on biological information identification
CA2594018C|2016-02-16|Method and process for creating an electronically signed document
US20140254796A1|2014-09-11|Method and apparatus for generating and/or processing 2d barcode
US20110231645A1|2011-09-22|System and method to validate and authenticate digital data
US20070277040A1|2007-11-29|Electronically Signing a Document
US20180278423A1|2018-09-27|Computer implemented method for automatically certifying documents with integrity and authenticity guarantees and computer programs thereof
US20050132194A1|2005-06-16|Protection of identification documents using open cryptography
US20080301464A1|2008-12-04|Two-dimensional bar code for ID card
Singhal et al.2015|Degree certificate authentication using QR code and smartphone
US9729326B2|2017-08-08|Document certification and authentication system
US7548665B2|2009-06-16|Method, systems, and media for identifying whether a machine readable mark may contain sensitive data
JP4923388B2|2012-04-25|Content certification system
KR20140108749A|2014-09-15|Apparatus for generating privacy-protecting document authentication information and method of privacy-protecting document authentication using the same
Tariq et al.2019|Cerberus: A blockchain-based accreditation and degree verification system
EP1688891B1|2010-03-31|Electronic certification and authentication system
TWM520159U|2016-04-11|Device for generating and identifying electronic document containing electronic authentication and paper authentication
Yahya et al.2017|A new academic certificate authentication using leading edge technology
Najera et al.2009|Security mechanisms and access control infrastructure for e-passports and general purpose e-documents
TWI595380B|2017-08-11|Device for generating or verifying authenticate electronic document with electronic and paper certification and method thereof
KR20040027649A|2004-04-01|The electronic management system of ledger based on the biometrics data for issuing the documents
EP3491575B1|2020-05-27|Method and system for the authentic determination of the identity of an electronic document with itself at a later date or with a copy thereof
Vinnari2021|Potential use cases for non-fungible tokens in combination with physical art
同族专利:
公开号 | 公开日
WO2013012794A2|2013-01-24|
BR112014000919A2|2017-02-14|
US9716711B2|2017-07-25|
MX2013007923A|2013-11-05|
WO2013012794A3|2013-03-14|
US20130015236A1|2013-01-17|
引用文献:
公开号 | 申请日 | 公开日 | 申请人 | 专利标题

US5548110A|1986-04-18|1996-08-20|Cias, Inc.|Optical error-detecting, error-correcting and other coding and processing, particularly for bar codes, and applications therefor such as counterfeit detection|
US4813912A|1986-09-02|1989-03-21|Pitney Bowes Inc.|Secured printer for a value printing system|
US5710417A|1988-10-21|1998-01-20|Symbol Technologies, Inc.|Bar code reader for reading both one dimensional and two dimensional symbologies with programmable resolution|
GB9019784D0|1990-09-10|1990-10-24|Amblehurst Ltd|Security device|
US5490217A|1993-03-05|1996-02-06|Metanetics Corporation|Automatic document handling system|
US7073720B2|1994-06-22|2006-07-11|Scientific Gaines International, Inc.|Lottery ticket bar code|
US5602382A|1994-10-31|1997-02-11|Canada Post Corporation|Mail piece bar code having a data content identifier|
US5502304A|1994-12-01|1996-03-26|Pitney Bowes Inc.|Bar code scanner for reading a visible ink and a luminescent invisible ink|
US6032861A|1995-01-03|2000-03-07|Lemelson; Jerome H.|Method and apparatus for encoding and decoding bar codes with primary and secondary information and method of using such bar codes|
US5773806A|1995-07-20|1998-06-30|Welch Allyn, Inc.|Method and apparatus for capturing a decodable representation of a 2D bar code symbol using a hand-held reader having a 1D image sensor|
US6308991B1|1995-10-16|2001-10-30|Oberthur Gaming Technologies, Inc.|Printed document including bar code authentication system|
US5768384A|1996-03-28|1998-06-16|Pitney Bowes Inc.|System for identifying authenticating and tracking manufactured articles|
US5970140A|1996-05-08|1999-10-19|The Regents Of The University Of California|Modular error embedding|
US6102289A|1996-06-28|2000-08-15|Intermec Ip Corp.|1D finder pattern for 2D bar codes|
US5920062A|1997-04-30|1999-07-06|Uniform Code Council, Inc.|Combined linear and two-dimensional bar code structure|
US6523741B1|1997-09-05|2003-02-25|Dimaria Peter C.|Apparatus for controlling the rental and sale of age-controlled merchandise and for controlling access to age-controlled services|
AUPP053597A0|1997-11-25|1997-12-18|Canon Information Systems Research Australia Pty Ltd|Device and method for authenticating and certifying printed documents|
US6354501B1|1998-11-18|2002-03-12|Crossoff Incorporated|Composite authentication mark and system and method for reading the same|
US8301893B2|2003-08-13|2012-10-30|Digimarc Corporation|Detecting media areas likely of hosting watermarks|
US6177683B1|1998-11-25|2001-01-23|C2It, Inc.|Portable viewer for invisible bar codes|
GB2348343A|1999-03-26|2000-09-27|Int Computers Ltd|Authentication of MOT certificate using encryption|
US6735575B1|1999-06-02|2004-05-11|Kara Technology Incorporated|Verifying the authenticity of printed documents|
US6457651B2|1999-10-01|2002-10-01|Xerox Corporation|Dual mode, dual information, document bar coding and reading system|
US20020023955A1|1999-11-29|2002-02-28|Leonard Frank|Electronic delivery of admission tickets direct to a purchaser|
US6398117B1|2000-01-14|2002-06-04|Hewlett-Packard Co.|Method and system for combining bar codes of different encoding dimensions|
US6631843B2|2000-02-18|2003-10-14|Symbol Technologies, Inc.|Composite code symbology|
US6572025B1|2000-05-10|2003-06-03|Japan Gain The Summit Co., Ltd.|Information code product, manufacturing device and method for manufacturing the same, information code reading device, authentication system, authentication terminal, authentication server, and authentication method|
US6540143B1|2000-05-19|2003-04-01|Fujitsu Limited|System and method for recovering bar code errors|
US6948068B2|2000-08-15|2005-09-20|Spectra Systems Corporation|Method and apparatus for reading digital watermarks with a hand-held reader device|
JP4317334B2|2000-09-08|2009-08-19|株式会社リコー|Image forming apparatus and document management system|
US20020067827A1|2000-12-04|2002-06-06|Kargman James B.|Method for preventing check fraud|
US20030004792A1|2001-06-29|2003-01-02|Townzen Conn L.|System and method to remotely control and monitor a parking garage revenue system and gate via an open network connection|
US20030035539A1|2001-08-17|2003-02-20|Thaxton Daniel D.|System and method for distributing secure documents|
DE10149265A1|2001-10-05|2003-04-17|Giesecke & Devrient Gmbh|Security marking for goods or packages, used in authentication or logistics tracking, comprises overprinting with inks having different spectral properties|
US20060118631A1|2001-10-26|2006-06-08|Allen Lubow|Method and apparatus for applying bar code information to products during production|
US6999480B2|2001-11-26|2006-02-14|Applied Micro Circuits Corporation|Method and apparatus for improving data integrity and desynchronizer recovery time after a loss of signal|
ES2424480T3|2002-05-14|2013-10-02|Schreiner Group Gmbh & Co. Kg|Authentication patterns visible for printed document|
US6902265B2|2002-06-28|2005-06-07|Pitney Bowes Inc.|Method for printing high information density machine-readable composite images|
EP1408433A1|2002-10-09|2004-04-14|Sap Ag|Hybrid digital signatures|
EP1551644A4|2002-10-15|2008-01-02|Digimarc Corp|Identification document and related methods|
KR100414524B1|2002-10-31|2004-01-16|주식회사 아이콘랩|Two-dimensional Code having superior decoding property which is possible to control the level of error correcting codes, and method for encoding and decoding the same|
GB0228303D0|2002-12-04|2003-01-08|Rue De Int Ltd|Security device and method|
US7197644B2|2002-12-16|2007-03-27|Xerox Corporation|Systems and methods for providing hardcopy secure documents and for validation of such documents|
US6886863B1|2002-12-19|2005-05-03|The Standard Register Company|Secure document with self-authenticating, encryptable font|
US7025269B2|2003-04-24|2006-04-11|Watson Label Products Corp.|Barcodes including embedded security features and space saving interleaved text|
US8294923B2|2003-07-25|2012-10-23|Carlos Gonzalez Marti|Printing of electronic documents|
US20050077346A1|2003-09-12|2005-04-14|Rana Dutta|Permit mail, payment system and postal infrastructure thereof|
US7278084B2|2003-10-29|2007-10-02|Nokia Corporation|Method and system for providing communications security|
US20050097335A1|2003-10-31|2005-05-05|Hewlett-Packard Development Company, L.P.|Secure document access method and apparatus|
US7267280B2|2004-03-01|2007-09-11|International Barcode Coporation|Diffractive optical variable image including barcode|
KR100560330B1|2004-04-21|2006-03-30|에이디정보통신 주식회사|A bar code perfect virtue coding and decoding system for largeness a volume the two dimension color which a color revision is possible and method thereof|
US7150400B2|2004-05-18|2006-12-19|Tripletail Ventures, Inc.|Method and apparatus for capturing and decoding an image of a remotely located bar code|
US7573594B2|2004-05-28|2009-08-11|Sharp Laboratories Of America, Inc.|Methods and systems for document reproduction management|
US7229025B2|2004-06-07|2007-06-12|Pitney Bowes Inc.|Barcode with enhanced additional stored data|
US20060157559A1|2004-07-07|2006-07-20|Levy Kenneth L|Systems and methods for document verification|
US7264169B2|2004-08-02|2007-09-04|Idx, Inc.|Coaligned bar codes and validation means|
US8037310B2|2004-11-30|2011-10-11|Ricoh Co., Ltd.|Document authentication combining digital signature verification and visual comparison|
US7616332B2|2004-12-02|2009-11-10|3M Innovative Properties Company|System for reading and authenticating a composite image in a sheeting|
US7168614B2|2004-12-10|2007-01-30|Mitek Systems, Inc.|System and method for check fraud detection using signature validation|
US8640259B2|2005-01-20|2014-01-28|The Invention Science Fund I, Llc|Notarizable electronic paper|
US7748748B2|2005-04-12|2010-07-06|International Business Machines Corporation|Method and system for generating and authenticating documents having stored electrostatic pattern information|
US7739510B2|2005-05-12|2010-06-15|The Invention Science Fund I, Inc|Alert options for electronic-paper verification|
JP4497052B2|2005-08-12|2010-07-07|富士ゼロックス株式会社|Image processing apparatus and program|
EP1804195A1|2005-12-29|2007-07-04|Montres Breguet S.A.|Procedure for coded marking of a small-size product, and marked product obtained from said procedure|
FR2900481B1|2006-04-27|2009-04-24|Arjowiggins Soc Par Actions Si|SYSTEM FOR READING AT LEAST ONE BARCODE|
US8249350B2|2006-06-30|2012-08-21|University Of Geneva|Brand protection and product autentication using portable devices|
US20100020970A1|2006-11-13|2010-01-28|Xu Liu|System And Method For Camera Imaging Data Channel|
US7552863B2|2007-02-28|2009-06-30|Hand Held Products, Inc.|Method for updating indicia readers|
WO2009063465A2|2007-11-14|2009-05-22|Varcode Ltd.|A system and method for quality management utilizing barcode indicators|
GB0714534D0|2007-07-26|2007-09-05|Iti Scotland Ltd|Secure authentic feature|
US20090067905A1|2007-09-12|2009-03-12|Xerox Corporation|Document management system and method|
US8181872B2|2007-09-19|2012-05-22|Ali Lebaschi|Imaging device and method for concurrent imaging of opposite sides of an identification card or document|
US9734442B2|2007-10-31|2017-08-15|Ncr Corporation|LumID barcode format|
US20090134227A1|2007-11-26|2009-05-28|Roth Joseph D|Spatial Security Features|
US8914898B2|2008-02-04|2014-12-16|Tharakan Web Innovations Pvt. Ltd.|Electronically implemented method and system for authentication and sharing of documents via a communication network|
EP2237546B1|2009-03-30|2020-05-13|Cipal Schaubroeck NV|Device and process for protecting a digital document, and corresponding process for verifying the authenticity of a printed hardcopy|
JP5366657B2|2009-05-26|2013-12-11|キヤノン株式会社|System, method and program|
JP5478965B2|2009-07-21|2014-04-23|キヤノン株式会社|Image forming apparatus, image forming method, and program|
US8430301B2|2009-11-23|2013-04-30|Konica Minolta Laboratory U.S.A., Inc.|Document authentication using hierarchical barcode stamps to detect alterations of barcode|
US8261988B2|2009-11-30|2012-09-11|Xerox Corporation|Phase locked IR encoding for peened 2D barcodes|
US20110298204A1|2010-06-07|2011-12-08|Xerox Corporation|Document security by aligning visible and hidden marks|
US20120197805A1|2011-01-31|2012-08-02|Intuit Inc.|Method and apparatus for capturing financial data using a camera-equipped computing device|
JP5800525B2|2011-02-21|2015-10-28|株式会社オプトエレクトロニクス|Optical information reading apparatus, optical information reading method, computer-readable program, and recording medium|
US8500023B2|2011-02-24|2013-08-06|Psion Inc.|System and method for providing sufficient illumination quality for barcodes captured with a color image sensor|
US8962065B2|2011-03-29|2015-02-24|Xerox Corporation|Invisible composite security element|
US9111186B2|2011-10-12|2015-08-18|University Of Rochester|Color barcodes for mobile applications: a per channel framework|
WO2013067092A1|2011-11-04|2013-05-10|Document Security Systems, Inc.|System and method for dynamic generation of embedded security features in a document|
JP5850784B2|2012-03-29|2016-02-03|Dowaエレクトロニクス株式会社|Booster antenna and manufacturing method thereof|
US8931697B2|2012-11-30|2015-01-13|Eastman Kodak Company|System for detecting reorigination of barcodes|
US20140254796A1|2013-03-08|2014-09-11|The Chinese University Of Hong Kong|Method and apparatus for generating and/or processing 2d barcode|
US9213931B1|2015-01-28|2015-12-15|Sprint Communications Company L.P.|Matrix barcode enhancement through capture and use of neighboring environment image|US8584212B1|2007-11-15|2013-11-12|Salesforce.Com, Inc.|On-demand service security system and method for managing a risk of access as a condition of permitting access to the on-demand service|
US8875259B2|2007-11-15|2014-10-28|Salesforce.Com, Inc.|On-demand service security system and method for managing a risk of access as a condition of permitting access to the on-demand service|
US10621206B2|2012-04-19|2020-04-14|Full Circle Insights, Inc.|Method and system for recording responses in a CRM system|
WO2013179249A1|2012-05-30|2013-12-05|Label Tech International Trims Limited|Authentication apparatus and methods|
US20140325328A1|2012-10-09|2014-10-30|Robert Dale Beadles|Memory tag hybrid multidimensional bar-text code with social media platform|
US8931697B2|2012-11-30|2015-01-13|Eastman Kodak Company|System for detecting reorigination of barcodes|
US9406009B2|2012-12-14|2016-08-02|International Business Machines Corporation|Method and apparatus to tag metal|
US9076024B2|2013-03-07|2015-07-07|Authentag, Llc|Anti-counterfeiting system and method|
CN106878261A|2013-07-08|2017-06-20|玛链(上海)网络技术有限公司|A kind of ideal money transaction system based on physical assets|
PL3066612T3|2013-11-07|2019-06-28|Scantrust Sa|Two dimensional barcode and method of authentication of such barcode|
US20150199550A1|2014-01-14|2015-07-16|International Business Machines Corporation|Use of invisible ink to create metadata of image object|
US10279583B2|2014-03-03|2019-05-07|Ctpg Operating, Llc|System and method for storing digitally printable security features used in the creation of secure documents|
JP6201835B2|2014-03-14|2017-09-27|ソニー株式会社|Information processing apparatus, information processing method, and computer program|
US9785789B2|2014-04-09|2017-10-10|University Of Connecticut|Method and system for verification and authentication using optically encoded QR codes|
CN104243026B|2014-07-10|2016-05-04|腾讯科技(深圳)有限公司|Method for sending information, message receiving method, device and system|
US9375845B1|2014-09-30|2016-06-28|Sprint Communications Company, L.P.|Synchronizing robot motion with social interaction|
US9529359B1|2015-01-08|2016-12-27|Spring Communications Company L.P.|Interactive behavior engagement and management in subordinate airborne robots|
US9213931B1|2015-01-28|2015-12-15|Sprint Communications Company L.P.|Matrix barcode enhancement through capture and use of neighboring environment image|
IL237548A|2015-03-04|2020-05-31|Au10Tix Ltd|Methods for categorizing input images for use e.g. as a gateway to authentication systems|
US10318781B2|2015-03-30|2019-06-11|Temptime Corporation|Two dimensional barcode with dynamic environmental data system, method, and apparatus|
US10546172B2|2015-03-30|2020-01-28|Temptime Corporation|Two dimensional barcode with dynamic environmental data system, method, and apparatus|
CN104850961A|2015-06-01|2015-08-19|周绍华|Intelligent seal system|
EP3311336B1|2015-06-18|2020-08-26|Hicof Inc.|Authentication feature in a barcode|
US9724824B1|2015-07-08|2017-08-08|Sprint Communications Company L.P.|Sensor use and analysis for dynamic update of interaction in a social robot|
CN108370269B|2015-09-10|2021-04-02|飞利浦照明控股有限公司|Method and apparatus for controlling supply of input signal from encoder to modulator|
EP3153993B1|2015-10-08|2021-07-28|Surys|Method of securing a 2d barcode|
US9921574B1|2016-03-03|2018-03-20|Sprint Communications Company L.P.|Dynamic interactive robot dialogue creation incorporating disparate information sources and collective feedback analysis|
EP3252680B1|2016-05-31|2019-12-25|Agfa Nv|Authentication method of a two dimensional bar code|
US10171699B2|2016-12-07|2019-01-01|Kyocera Document Solutions Inc.|Scanner for scanning micro-details of specimens|
US10671712B1|2017-03-01|2020-06-02|United Services Automobile Association |Virtual notarization using cryptographic techniques and biometric information|
CN108667780B|2017-03-31|2021-05-14|华为技术有限公司|Identity authentication method, system, server and terminal|
US10341524B2|2017-04-20|2019-07-02|Xerox Corporation|System and method of processing documents to provide document history and compliance control|
TWI646467B|2017-09-30|2019-01-01|元智大學|Method and system for generating two dimensional barcode with hidden data|
CN109960957A|2017-12-26|2019-07-02|阿里巴巴集团控股有限公司|Incomplete two dimensional code and its generation, reparation and recognition methods, apparatus and system|
US11269294B2|2018-02-15|2022-03-08|University Of Connecticut|Portable common path shearing interferometry-based holographic microscopy system with augmented reality visualization|
CN110247882A|2018-03-09|2019-09-17|阿里巴巴集团控股有限公司|Communication means and system, data processing method|
US11178148B2|2018-08-21|2021-11-16|HYPR Corp.|Out-of-band authentication to access web-service with indication of physical access to client device|
US11200691B2|2019-05-31|2021-12-14|University Of Connecticut|System and method for optical sensing, visualization, and detection in turbid water using multi-dimensional integral imaging|
法律状态:
2018-12-11| B06F| Objections, documents and/or translations needed after an examination request according [chapter 6.6 patent gazette]|
2019-11-05| B06U| Preliminary requirement: requests with searches performed by other patent offices: procedure suspended [chapter 6.21 patent gazette]|
2021-03-16| B09A| Decision: intention to grant [chapter 9.1 patent gazette]|
2021-05-18| B16A| Patent or certificate of addition of invention granted [chapter 16.1 patent gazette]|Free format text: PRAZO DE VALIDADE: 20 (VINTE) ANOS CONTADOS A PARTIR DE 16/07/2012, OBSERVADAS AS CONDICOES LEGAIS. |
优先权:
申请号 | 申请日 | 专利标题
US13/184,284|2011-07-15|
US13/184,284|US9716711B2|2011-07-15|2011-07-15|High-value document authentication system and method|
PCT/US2012/046901|WO2013012794A2|2011-07-15|2012-07-16|High value document authentication system & method|
[返回顶部]