![]() METHOD OF SECURING AND VERIFYING A DOCUMENT
专利摘要:
The invention relates to a method of securing a document comprising a visual element, implemented by a processing unit comprising processing means, the method comprising generating, from the visual element, a data element. reference security, and the storing of the reference security data, in which the reference security data is generated by means of an algorithm configured to generate: - for any image acquired from the visual element, a datum whose differences with respect to the reference security data are less than a determined threshold, and for any image acquired on a different visual element, a security datum whose differences with respect to the reference security datum are above this threshold. 公开号:FR3047688A1 申请号:FR1651105 申请日:2016-02-11 公开日:2017-08-18 发明作者:Herve Chabanne;Jean-Christophe Fondeur;Stephane Gentric;Dijk Erik Van 申请人:Morpho SA; IPC主号:
专利说明:
FIELD OF THE INVENTION The invention relates to the field of securing documents comprising at least one visual element. The documents may in particular be identity documents such as identity card or passport. The invention also relates to verifying the integrity of such documents once secured. STATE OF THE ART National security services have discovered fraud on identity documents, in which an authentic document with an original identity photograph has been falsified, replacing the photograph with a photograph of a different person. As a result, the user of the falsified document can impersonate the person to whom the identity document was originally issued. In a more general context, security requirements for organizations developing and issuing identity documents are becoming more stringent. PRESENTATION OF THE INVENTION An object of the invention is to provide a method of securing a document, including an identity document, to ensure in particular the integrity of visual elements of the document such as photographs. Another object of the invention is to propose a method for verifying the integrity of a secure document by the proposed method. Another object of the invention is to ensure that the process for verifying the integrity of the document is robust to variations undergone by the document related to its use, its conditions of use, etc. In this regard, the subject of the invention is a method of securing a document comprising a visual element, implemented by a processing unit comprising processing means, the method comprising generating, from the visual element , reference security data, and storing the reference security data, wherein the reference security data is generated by means of an algorithm configured to generate: for any image acquired from the visual element, a security datum whose differences with respect to the reference security datum are less than a determined threshold, and for any image acquired on a different visual element, a security datum whose differences with respect to the datum of the datum. reference security are above that threshold. Advantageously, but optionally, the method according to the invention may further comprise at least one of the following features: the generation of the reference security data is implemented during the creation of the document. the reference security data is stored in the document, by recording the data in an electronic chip stored in the document or printing the data on the document, the reference security data is stored by being recorded in a database . the reference security data is signed by the processing unit, by means of a public key signature algorithm, or recorded with a certificate of authenticity obtained by the application of a coding algorithm based on the use of an error correction code, said secure sketch, the algorithm is chosen so that reconstitution of the visual element from the corresponding security data is impossible, the algorithm is of the type comprising the use histograms of gradients oriented on the visual element, or convolutional neural networks. the algorithm is parameterized from a training on a training database. the visual element is an image of the face of an individual, and the algorithm is trained in such a way as to generate: o for any image acquired from the image of the face of the individual on the document, security data of which the differences with respect to the reference security datum are less than a determined threshold, and o for any image acquired from an image representing another individual, or the same individual under different image acquisition conditions, a datum the differences with respect to the reference security data are greater than said threshold. The invention also relates to a computer program product, comprising code instructions for the implementation of a method according to the preceding description, when it is executed by processing means of a processing unit. The invention also relates to a method for verifying the integrity of a secure document by implementing the method according to the preceding description, the method comprising the steps of: acquiring an image of the visual element of the document, generating, from the image, a security datum by the same algorithm that made it possible to generate the reference security data, comparing the security data obtained with the reference security data, and whether the differences between the security data and the reference security data are below the determined threshold, determine that the visual element is intact, otherwise determine that the visual element is fraudulent. Advantageously, but optionally, the verification method further comprises, before the comparison step, a step of verifying the integrity of the reference security data item. Finally, the subject of the invention is a system for verifying a document, comprising: an image sensor, a processing unit, comprising processing means adapted to implement, on an image acquired by the sensor, an algorithm classification, and a communication interface with a database, the verification system being configured to implement the verification method as described above. The proposed method makes it possible to guarantee the integrity of a visual element of a document such as a photograph, or a string of characters, a signature, etc. Indeed, to each visual element is assigned a reference security data, which is obtained by an algorithm configured so that the data obtained is globally the same for all the images of the same visual element, whatever the conditions of acquisition of images or wear of the element, and which is different for images of a different visual element. For this, the algorithm is driven on a learning database. To further enhance the security of the document, the integrity of the reference security data can be guaranteed by means of a public key signature algorithm or a secure sketch coding algorithm. Thus, the security data can not be falsified by the individual carrying the document. DESCRIPTION OF THE FIGURES Other characteristics, objects and advantages of the present invention will appear on reading the detailed description which follows, with reference to the appended figures, given by way of non-limiting examples and in which: Figures 1a and 1b schematically show a processing system for securing a document and a system for verifying the integrity of a document. FIG. 2 schematically represents the main steps of a method for securing a document, Fig. 3 schematically illustrates the main steps of a method of verifying the integrity of a document. DETAILED DESCRIPTION OF AT LEAST ONE EMBODIMENT OF THE INVENTION Securing a Document Referring to Figure 1a, there is shown a processing system for securing a document, for example an identity document such as a passport, an identity card, etc.. The type of document is not limited to an identity document, but could also relate to documents to play, for example a personal smart card to play at the casino, etc. This system comprises a processing unit 10, for example a computer or a server, having processing means 11 adapted to execute an algorithm which will be described in more detail below. The processing means 11 may for example be a processor type computer, microprocessor, microcontroller, etc. The processing unit 10 may also be adapted to implement cryptographic algorithms, for example of the type of public key signature algorithm or "secure sketch" type discussed in more detail below. The processing unit 10 and the processing means 11 are operated by an entity considered non-fraudulent, typically a government in the case where the document is an identity document. Advantageously, the system may also comprise a database 2, as well as a database management unit 20. The processing unit may also be a computer or a server, having processing means 21, for example a computer of the processor, microprocessor, microcontroller, etc. type, allowing the processing unit to access the base of the processor. read and write data. The two processing units 10, 20 advantageously comprise remote communication interfaces 12, 22 for sending and receiving data, for example via wireless Internet, radiofrequency signal, etc. With reference to FIG. 2, a method 100 for securing a document comprises securing a visual element appearing on the document. This visual element is an image including relevant data when using the document. In the case of an identity document, the visual element is an image that includes data related to the individual to whom the identity document is issued. Advantageously, it is a photograph of identity, that is to say a photograph representing a distinctive sign of the individual to whom the document has been issued, typically his face. Alternatively, the visual element may also be an image of another distinctive sign of the individual, for example a handwritten signature. The visual element can also be the representation on the document of a set of signs related to the identity of the individual, for example a string of characters (surname, first name, date of birth, etc.). According to another variant, the visual element may be the entire document, for example in the case where the document used is electronic and is displayed on an electronic device screen such as a tablet or a mobile phone. The security of the visual element is preferably implemented during the creation of the document, to ensure that the visual element is authentic. The security of the visual element comprises the generation 110, by the processing unit 10, from the visual element, a so-called reference security data item. This data advantageously takes the form of a sequence of bits, of a length of a few bytes to a few tens of bytes. If the visual element is a digital image inserted in the document during its manufacture, step 110 is implemented directly on the element. Alternatively, step 110 may be implemented on an image of the visual element captured on the document using a suitable digital image sensor (not shown). The visual element can be processed before generating the reference security data. It can be advantageously misaligned with respect to a repository, either by performing an alignment or by seeking to match particular points, for example using the SIFT method. Then the visual element can be normalized for example by the method of equalizing histograms. The reference security data dr is obtained, from the visual element, by the execution of an algorithm that is configured to obtain properties sought for the reference security data. A first property is: Images acquired from the same visual element, whatever the acquisition conditions, must lead to obtaining, by the algorithm, substantially identical security data. In the following, "substantially identical security data" is understood to mean security data having differences between them that are lower than a determined threshold. The amount of differences between two security data can be evaluated in known manner by using a suitable metric, for example by calculating a distance between the data, such as the Euclidean distance or the Hamming distance. The threshold value depends on the nature of the calculated function. The conditions for acquiring the image of the visual element include both: hazards related to the conditions of the acquisition itself with an image sensor, for example the lighting conditions, the sensor parameters of image, the distance of the visual element with respect to the sensor, etc., as well as: risks related to the appearance of the visual element, such as, for example, a variation in the appearance of the document resulting from its aging, a yellowing of a photograph, the appearance of scratches or marks, or a variation of aspect related to additions made to increase the security of the document: presence on a part of the element of a stamp, of a hologram, etc. In particular, security data obtained from an image of the same visual element as that from which the reference security data is obtained must be substantially identical to the latter. Another property is: Images acquired from different visual elements must lead to obtaining, by the algorithm, substantially different security data. In the following, "substantially different security data" is understood to mean security data having differences between them greater than the threshold previously mentioned. In particular, security data obtained from an image of a visual element different from that from which reference security data dr is obtained must be substantially different from the reference security data. Furthermore, in the case where the visual element of the document is a photograph of an individual, the security data must be substantially the same as the reference security data dr (i.e., have lower differences at a certain threshold) for all images taken from the same photograph of the same individual. On the other hand, a security datum must be substantially different from the reference security dat dr if it is obtained from any other photograph of the same individual, or from any photograph of another individual. To obtain these properties, the algorithm is driven, i.e., parameterized on a training database (not shown) containing a set of images. During this training, the algorithm is executed on a large number of pairs of images, and indications are provided on those that must result in substantially identical security data, and on other pairs of images that must result in significantly different security data. The value of the threshold for establishing a classification between substantially identical data and substantially different data is determined by the algorithm at the end of its learning. Advantageously, the learning database comprises as many images as possible, for example at least 10,000 images, and preferably at least one million, because the more the database contains images and the more the learning on this basis. of data increases the reliability of the algorithm. The classification algorithm chosen to generate the security data from an image is advantageously a classification algorithm of the type employing a convolutional neural network also known by the acronym CNN (for the English Convolutional Neural Network). In a manner known to those skilled in the art, a convolutional neural network comprises a structure formed by a succession of operations implemented on an input data (in this case an image), the operations comprising linear operations of convolution type, whose result is weighted by a weighting factor, as well as non-linear operations, for example thresholding, etc. The adjustment of the algorithm during learning amounts to adjusting the values of the weighting factors. An example of a convolutional neural network structure applicable to the generation of security data from an image is that which is detailed for the F1 network of Y. Sun et al., "Deep Convolutional Network Cascade for Facial Point Detection, Proceedings of IEEE Conference on Computer Vision and Pattern Recognition (CVPR), 2013. The learning mode of the parameters of the CNN algorithm, so that it generates two different security data from different images of the same person, as well as the presence of non-linear operations in the generation of the CNN algorithm. given from the visual element, prevents the reconstitution of the image from the security data and thus preserves the confidentiality of the data contained in the image on the individual. Alternatively, the algorithm may be of the type employing a HOG descriptor, that is, an oriented gradient histogram. Such an algorithm is applied to a zoned image. For each zone, gradients are calculated for a set of points in the area, regardless of their position in the area, and a histogram of gradient directions is aggregated for all gradients calculated on the area. The algorithm then comprises the concatenation of all the oriented gradient histograms for all the zones, and the reduction of the vector obtained by a type of space reduction method, for example principal component analysis or linear discriminant analysis. This algorithm may also include a preliminary image processing step for normalizing the image colors and the contrast factor. Reference can be made to Dalal et al., "Histograms of Oriented Gradients for Human Detection," Conference on Computer Vision and Pattern Recognition, 2005, for more details and an example of an algorithm based implementation. on a HOG descriptor. In this embodiment, the parameterization of the algorithm on the basis of training data to satisfy the two properties detailed above on the conditions of similarity and dissimilarity of the security data, comprises the adjustment of the parameters related to pre-treatments, the size of the selected zones, the number of gradients per zone, the type of filters used to calculate the gradients, the nature of the reduction of space chosen, etc. The use of such an algorithm, which eliminates the location of the information on the image, also ensures the confidentiality of the visual elements by preventing the reconstruction of a visual element from a corresponding security data. Once the reference security data has been obtained for the visual element of the document, this data is stored in a step 120. It can be stored in the document itself. For example, it can be stored in memory in an integrated electronic chip in the document. Alternatively, it can be printed on the document, visible or not, that is to say for example watermark, in the form of a barcode, etc. However, the reference security data dr is preferably stored in a database 2 managed by a management processing unit 20, which can thus be reliable, for example dependent on a state organization. This limits the possibilities of access by a malicious individual or the holder of the document itself to the data stored in the document. In this case, the processing unit 10 communicates the reference security data to the processing unit 20 which stores it in the base. This communication can be implemented on a secure channel and / or by means of a cryptographic protocol to ensure the confidentiality of the data. In addition, and whatever the storage medium of the security data, the integrity of this security data is preferably itself guaranteed. For example, the security data may be signed by the processing unit 10 which has generated the security data, for example by means of a public key signature algorithm, conventionally using a private key which is owned by the unit 20, and a public key. As a variant, the integrity of the security data can be guaranteed by means of a secure sketch algorithm, that is to say a coding algorithm based on the use of an error correction code. which comprises the implementation, by the processing unit 10, of the steps of: If necessary, binarize the security data to obtain data b, - From a word c of an error correction code, obtain from the reference a result such that r = [c XOR b, h ( c)], where XOR is the "exclusive" function, and h is a cryptographic hashing function, for example of the SHA-256 type, and record the result r with the security data, either in the document or in the database 2. Verifying the integrity of a document Referring to Figure 1b, there is shown a verification system 3 of the integrity of a document. Verification can take place for example during a control of the document, or control of the identity of an individual in the case where the document is an identity document of the individual. The verification system 3 advantageously comprises a processing unit 30, comprising processing means 31 such as a computer, for example of the processor, microprocessor, microcontroller, etc. type. The processing means 31 are adapted to execute an algorithm identical to that already described above for obtaining, from an image, a security data item. The verification system also includes an image sensor 32, typically a digital camera. It can be a camera integrated in a mobile phone (smartphone) or a digital tablet. The verification system 3 is advantageously integrated in a portable housing so that it can be easily deployed during a check; for example the verification system can be integrated with a mobile phone, a digital tablet, etc. If necessary, if the reference security data is stored in the database 2, the verification system 3 finally comprises a communication interface 33 adapted to communicate remotely with the database manager processing unit 20 2, for example wireless internet, radio frequency signal, etc. With reference to FIG. 3, a method 200 for verifying the integrity of a document comprises a first step 210 of acquiring, with the image sensor 32, an image of the visual element of the document of which one wants to check the integrity. Then, the processing unit 30 executes 220, from this image, the same algorithm that was executed during the securing process to obtain the reference security data item dr, and it obtains a new security data item. . Advantageously, the image acquired during step 210 can be processed in the same way as the visual element before generating the new security data to blur the variations related to the image taking. Thus the image can also be recaled and standardized. The processing unit 30 then retrieves, from the database 2 or the document, the reference security data item corresponding to the visual element to be verified. Advantageously, the verification method 200 includes a step 230 of verifying the integrity of the reference security data. If the reference security data item dr has been signed by the processing unit 10, the processing unit 30 of the verification system 3 verifies during a step 230 that the signature is valid using the public key associated with the private key used when signing. If the reference security data is recorded with a result r of the application of a secure sketch algorithm, the integrity of the reference data is verified during the same step 230 by the processing unit 30. doing this the processing unit 30 binarizes the new security data d to obtain binarized data b '. It then calculates c XOR b XOR b 'from the data r. If b and b 'are sufficiently close then this operation provides the code word c initially used by the unit 10, thanks to the corrective capacity of the correction code and thus guarantees the integrity of the reference security data. If the result of the verification step 230 indicates that the reference security data is not integrity, then the processing unit 30 determines that the document is fraudulent. If the result of the verification step 230 indicates that the reference security data is intact, then the processing unit 30 compares in a step 240 the new security data d to the reference security data item d, by calculating between these data an appropriate function such as a Euclidean distance, a Hamming distance, etc., and compares the result with a determined threshold, which corresponds to the threshold introduced above, and discriminating substantially identical images and substantially different images. The method 200 finally comprises a determination step 250, depending on the result of the comparison, whether the document is fraudulent or not. If the differences between the two data are below the threshold, the document is considered integrity. Otherwise, the document is considered falsified.
权利要求:
Claims (13) [1" id="c-fr-0001] 1. Method for securing (100) a document comprising a visual element, implemented by a processing unit (10) comprising processing means (11), the method comprising generating (110), starting from visual element, reference security data (dr), and storing (120) the reference security data, wherein the reference security data (dr) is generated by means of a configured algorithm so as to generate: for any acquired image of the visual element, a security datum whose differences with respect to the reference security datum are less than a determined threshold, and for any image acquired on a different visual element, a security data whose differences from the reference security data are greater than said threshold. [2" id="c-fr-0002] 2. Method of securing (100) a document according to claim 1, wherein the generation (110) of the reference security data (dr) is implemented during the creation of the document. [3" id="c-fr-0003] 3. Method for securing (100) a document according to one of claims 1 or 2, wherein the reference security data is stored (120) in the document, by recording the data in an electronic chip stored in the document or printing of the data on the document. [4" id="c-fr-0004] 4. Method of securing (100) a document according to one of claims 1 or 2, wherein the reference security data (dr) is stored (120) by being recorded in a database (2). [5" id="c-fr-0005] The method of securing (100) a document according to claim 4, wherein the reference security data (dr) is signed by the processing unit (10) by means of a key signature algorithm. public, or registered with a certificate of authenticity obtained by the application of a coding algorithm based on the use of an error correction code, called secure sketch. [6" id="c-fr-0006] 6. Method for securing (100) a document according to one of the preceding claims, wherein the algorithm is chosen so that the reconstitution of the visual element from the corresponding security data is impossible. [7" id="c-fr-0007] 7. Method for securing (100) a document according to one of the preceding claims, wherein the algorithm is of the type comprising the use of histograms of gradients oriented on the visual element, or convolutional neural networks. . [8" id="c-fr-0008] 8. Method for securing (100) a document according to one of the preceding claims, wherein the algorithm is parameterized from a training on a training database. [9" id="c-fr-0009] A method of securing (100) a document according to claim 8, wherein the visual element is an image of the face of an individual, and the algorithm is driven to generate: for any acquired image of the image of the face of the individual appearing on the document, security data whose differences with respect to the reference security data are below a determined threshold, and for any acquired image of an image representing another individual, or the same individual under different image acquisition conditions, a security datum whose differences with respect to the reference security datum are greater than said threshold. [10" id="c-fr-0010] A computer program product, comprising code instructions for carrying out a method according to one of the preceding claims, when it is executed by processing means (11) of a processing unit (10). ). [11" id="c-fr-0011] 11. A method of verifying (200) the integrity of a secure document by implementing the method according to one of the preceding claims, the method comprising the steps of: acquiring an image (210) of the element of the document, generating (220), from the image, a security datum (d) by the same algorithm that made it possible to generate the reference security data (dr), comparing (240) the data of security (d) obtained from the reference security data (dr), and if the differences between the security data (d) and the reference security data (dr) are below the determined threshold, determine (250) that the visual element is integral, if not determine (250) that the visual element is fraudulent. [12" id="c-fr-0012] The verification method (200) of claim 11, wherein the method further comprises, prior to the comparing step, a step of verifying (230) the integrity of the reference security data (dr). [13" id="c-fr-0013] 13. System (3) for verifying a document, comprising: an image sensor (32), a processing unit (30), comprising processing means (30) adapted to implement, on an image acquired by the sensor, a classification algorithm, and a communication interface (33) with a database (2), the verification system being configured to implement the method according to one of claims 11 or 12.
类似技术:
公开号 | 公开日 | 专利标题 EP3206192A1|2017-08-16|Method for securing and verifying a document CA2646635C|2014-07-29|Processing biometric data un a multidimensional repository CA2735405A1|2010-03-04|Method of determining a pseudo-identity on the basis of characteristics of minutiae and associated device CA2888103C|2020-07-21|Electronic signature method with ephemeral signature CA2743954A1|2010-06-17|Identification or authorisation method, and associated system and secure module EP2537286A1|2012-12-26|Method for biometric authentication, authentication system and corresponding program EP3731117B1|2021-08-11|Method of enrolling data of an identification document of an individual and authenticating said identification document EP3543966A1|2019-09-25|Data enrolment method for verifying an identity, and method for verifying identity EP1634220B1|2010-10-06|Biometric identification method and device used for verification purposes on chip cards WO2009083528A1|2009-07-09|Method and system for generating stable biometric data EP3742699B1|2022-03-09|Method for strong authentication of an individual FR3060168B1|2019-07-26|BIOMETRIC IDENTIFICATION METHOD AND SYSTEM EP3731116B1|2021-08-11|Method of authenticating an identification document of an individual and authenticating said individual. EP3690686B1|2021-08-04|Authentication procedure, server and electronic identity device EP3940563A1|2022-01-19|Method for generating an authentication key from the image of a watermark and associated device EP3926499A1|2021-12-22|Method for authenticating a user on a client device FR3104868A1|2021-06-18|Method and device for determining the possibility of using a cryptographic key to perform a cryptographic operation EP2151785A1|2010-02-10|Method and device for fragmented, non-reversible authentication FR3017732A1|2015-08-21|METHOD FOR IDENTIFYING AND / OR AUTHENTICATING AN INDIVIDUAL FROM ITS VENOUS NETWORK FR2998391A1|2014-05-23|Method for identification and/or authentication of individual, involves implementing identification and/or authentication process such that image in comparison zone is compared with image in positioning zone after registration of images
同族专利:
公开号 | 公开日 AU2017200935A1|2017-08-31| FR3047688B1|2018-02-16| US10403076B2|2019-09-03| US20170236355A1|2017-08-17| EP3206192A1|2017-08-16| CA2957774A1|2017-08-11|
引用文献:
公开号 | 申请日 | 公开日 | 申请人 | 专利标题 EP1139302A1|1998-12-07|2001-10-04|Hitachi, Ltd.|Method of checking authenticity of sheet with built-in electronic circuit chip| US20080294900A1|2004-08-13|2008-11-27|Ingenia Technology Limited|Authenticity Verification of Articles Using a Database| EP2290619A1|2009-08-25|2011-03-02|Gemalto SA|Method and device for verifying secure documents|EP3543966A1|2018-03-21|2019-09-25|Idemia Identity & Security France|Data enrolment method for verifying an identity, and method for verifying identity| FR3086884A1|2018-10-09|2020-04-10|Idemia Identity & Security France|METHOD FOR DETECTION OF DOCUMENTARY FRAUD.| EP3731116A1|2019-04-25|2020-10-28|Idemia Identity & Security France|Method for authenticating an identity document of an individual and possibly authentication of said individual| EP3731117A1|2019-04-25|2020-10-28|Idemia Identity & Security France|Methods for enrolment of data from an identity document of an individual and for authenticating an identity document|US8301893B2|2003-08-13|2012-10-30|Digimarc Corporation|Detecting media areas likely of hosting watermarks| US20060015733A1|2004-06-24|2006-01-19|John H. Harland Company|Process and system for the material reduction of counterfeit and identity-maker fraud| US8468355B2|2008-12-19|2013-06-18|University Of South Carolina|Multi-dimensional credentialing using veiled certificates| US20130173484A1|2010-09-18|2013-07-04|Philip Wesby|System and Method for Encoding and Controlled Authentication| US9075975B2|2012-02-21|2015-07-07|Andrew Bud|Online pseudonym verification and identity validation| CN103324946B|2013-07-11|2016-08-17|广州广电运通金融电子股份有限公司|A kind of method and system of paper money recognition classification| US10853592B2|2015-02-13|2020-12-01|Yoti Holding Limited|Digital identity system| US10692085B2|2015-02-13|2020-06-23|Yoti Holding Limited|Secure electronic payment|JP6858525B2|2016-10-07|2021-04-14|グローリー株式会社|Money classification device and money classification method| FR3092414B1|2019-02-01|2021-01-08|Idemia Identity & Security France|Authentication process, server and electronic identity device| FR3096480B1|2019-05-24|2021-04-23|Idemia Identity & Security France|Strong authentication process for an individual|
法律状态:
2017-01-23| PLFP| Fee payment|Year of fee payment: 2 | 2017-08-18| PLSC| Publication of the preliminary search report|Effective date: 20170818 | 2018-01-23| PLFP| Fee payment|Year of fee payment: 3 | 2020-01-22| PLFP| Fee payment|Year of fee payment: 5 | 2021-01-20| PLFP| Fee payment|Year of fee payment: 6 | 2022-01-19| PLFP| Fee payment|Year of fee payment: 7 |
优先权:
[返回顶部]
申请号 | 申请日 | 专利标题 FR1651105|2016-02-11| FR1651105A|FR3047688B1|2016-02-11|2016-02-11|METHOD OF SECURING AND VERIFYING A DOCUMENT|FR1651105A| FR3047688B1|2016-02-11|2016-02-11|METHOD OF SECURING AND VERIFYING A DOCUMENT| US15/429,093| US10403076B2|2016-02-11|2017-02-09|Method for securing and verifying a document| CA2957774A| CA2957774A1|2016-02-11|2017-02-10|Process for securing and verifying a document| AU2017200935A| AU2017200935A1|2016-02-11|2017-02-10|Method for securing and verifying a document| EP17155565.9A| EP3206192A1|2016-02-11|2017-02-10|Method for securing and verifying a document| 相关专利
Sulfonates, polymers, resist compositions and patterning process
Washing machine
Washing machine
Device for fixture finishing and tension adjusting of membrane
Structure for Equipping Band in a Plane Cathode Ray Tube
Process for preparation of 7 alpha-carboxyl 9, 11-epoxy steroids and intermediates useful therein an
国家/地区
|