CA2346439C - Method and system for the application of a safety marking - Google Patents

Method and system for the application of a safety marking Download PDF

Info

Publication number
CA2346439C
CA2346439C CA002346439A CA2346439A CA2346439C CA 2346439 C CA2346439 C CA 2346439C CA 002346439 A CA002346439 A CA 002346439A CA 2346439 A CA2346439 A CA 2346439A CA 2346439 C CA2346439 C CA 2346439C
Authority
CA
Canada
Prior art keywords
marking
string
encrypted
accordance
safety marking
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CA002346439A
Other languages
French (fr)
Other versions
CA2346439A1 (en
Inventor
Harri Vatanen
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Sonera Smarttrust Oy
Original Assignee
Sonera Smarttrust Oy
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Sonera Smarttrust Oy filed Critical Sonera Smarttrust Oy
Publication of CA2346439A1 publication Critical patent/CA2346439A1/en
Application granted granted Critical
Publication of CA2346439C publication Critical patent/CA2346439C/en
Anticipated expiration legal-status Critical
Expired - Fee Related legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3231Biological data, e.g. fingerprint, voice or retina
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/80Wireless

Abstract

The present invention relates to a method and system for the identification of a marking device. The invention is based on utilizing encryption of information and a biometric sample taken of the person. By this method, a marking device can be effectively and reliably identified. In practice, double verification of the authenticity of the owner of the marking device is achieved by the method and system of the invention. The first verification consists in that the owner must know a password for a key used for encrypting the information stored in the marking device, and the second verification consists in that a biometric sample taken of the person must be consistent with biometric sample code stored in the marking device or with information derived from it.

Description

METHOD AND SYSTEM FOR THE APPLICATION OF A SAFETY
MARKING

FIELD OF THE INVENTION

The present invention relates to an elec-tronic safety marking. In particular, the present in-vention concerns a new and improved method and system for the application of a safety marking in an electric form for marking objects and devices.
BACKGROUND OF THE INVENTION

The safety marking is used for the marking of objects, devices and information in order to protect them against theft and misuse. The safety marking may consist of the owner's social security number or name or some other piece of information, engraved on the device and identifying the owner of the device. How-ever, this is difficult to implement as engraving or a corresponding physical marking method may damage the device to be marked and the marking often looks unaes-thetic.
The safety marking may also be based on biometric data, such as e.g. the DNA, finger print or data obtained from the eye, in which case the person's identity can be more reliably ascertained. On the other hand, for example, cloned individuals have iden-tical DNA but different finger prints. The accuracy of identification can be further improved by combining different identifying factors independent of each other. The DNA of a human being can be formed in 244 ;:t~
1,76 * 1013 different ways. Correspondingly, the number of inhabitants on the earth is of the order of about 1010. By combining the DNA with the finger print inde-pendent of it and e.g. the PIN code used in mobile communication devices, the number of different combi-nations will be 1029.
At present, objects can also be marked with an electric or electronic safety marking based on the idea of marking objects with a small coded safety chip containing marking data that can only be read using special reading apparatus. A system of this nature is based on transponder technology used in conjunction with almost invisible chips. The chips are generally passive, so they cannot be re-programmed, which is why they cannot be forged and are not sensitive to elec-tromagnetic radiation. To apply an electronic safety marking, the customer buys a safety marking from an authorized dealer. The dealer installs a microchip in the object to be marked, whereupon the marking is reg-istered, using a register card, in a database main-tained by a third party.
When a stolen object provided with a safety marking is found, the information contained in the chip is read by means of a special reading apparatus.
This information is compared with the third party da-tabase to determine the right owner of the object.
However, such an arrangement requires a special regis-tration database which has to be maintained and is therefore difficult to use. Moreover, the reading ap-paratus or the information read may be modified or ma-nipulated before the database query. Consequently, the system cannot be fully relied on.
The object of the invention is to eliminate the problems referred to above.
A specific object of the invention is to dis-close a new type of method and system for electronic marking of objects, devices or information. The object of the invention is to simplify the identification of marked equipment and to achieve a system that is abso-lutely reliable.
The invention concerns a method for the ap-piication of a safety marking. In the method, the de-vice to be marked is provided with a safety marking in an electric form. The marking can be installed in the device or object so unnoticeably that it is practi-cally impossible to discover.
According to the invention, the safety mark-ing is read into an identification device and decoded in order to obtain the information contained in it.
This information may include personal owner identifi-cation data, such as name, social security number, etc. In connection with this information, it is also possible to apply e.g. a PIN code (PIN, Personal Iden-tity Number), which makes it possible to form an elec-tronic signature. The PIN code to be used can be im-plemented either in the mobile station or in the SIM
card. The PIN code and its length can be so defined that they fit the application, and, in an embodiment, the user can change it at will.
In an embodiment of the invention., the safety marking is produced by forming a first string of pre-determined form from personal or other identification data. This predetermined form may be e.g. the binary form, which can be readily handled by a microproces-sor. The first string is encrypted with a first key, thus encrypting information as to what personal data have been used to form the safety marking. The string is signed electrically. After this, the string is en-crypted in a marking device using e.g. the user's pub-lic key to generate and encrypted string. The marking device preferably contains two encryption keys.
The user's public key in the marking device is unknown to the world outside. Therefore, the iden-tification data remain concealed, thus affording pri-vacy protection to the user of the safety marking. The encrypted string is stored in an electric form in the marking device, which is attached to the object or product to be marked.
To decrypt the safety marking, the encrypted string is read into an identification device compris-ing means for decrypting the encrypted string. The identification device also contains a decryption key to which only the owner and user of the safety marking has an access right. In practice, the access right consists of a password for the decryption key, e.g. a PIN code or some other corresponding code, by means of which the decryption key can be used. The user may send this decryption key likewise in an encrypted form such that a reliable third party, e.g. the police, will be able to decrypt it and use this key e.g. for the identification of the safety marking.
The personal data preferably comprise a biometric sample of the owner of the safety marking.
The biometric sample may be the DNA code, which is stored in the safety marking in a predetermined- form.
The biometric sample may also consist of a finger print or a picture of the retina or iris of the eye of the user of the safety marking. From these samples, a graphic representation is generated and encoded into a suitable form, e.g. binary form, so that it can be en-crypted using a known encryption method.
When a biometric sample is included in the personal data, this provides a double safety check for the verification of the owner of the safety marking.
When a user claiming to be the owner of a safety mark-ing gives a password with which the safety marking can be decrypted and the user's personal details obtained, then a first check has been carried out as the pass-word for the decryption key is specific to the user and/or person. After this, the user can be associated with the safety marking by taking of him/her a sample corresponding to that contained in the safety marking.
For example, if a DNA code contained in the safety marking corresponds to the DNA code determined from the user, then this is irrefutable proof that the safety marking belongs to the person in question.

Included in the safety marking are also the owner's personal details for individualizing the safety marking and obtaining authenticity of the owner.
The system of the invention for the application of a 5 safety marking used to mark objects and equipment by providing them with a safety marking in an electric form comprises an identification device comprising a reading device for the reading of an identification symbol and a processor for the processing of the identification symbol. The identification device may be any known device capable of reading a safety marking stored in an electric form. Moreover, the properties of the identification device are largely determined on the basis of the form of storage of the safety marking. As the safety marking can be stored in many different forms, such as graphic, bar code, binary or equivalent forms, the reading device may also have many different properties, respectively.
According to a broad aspect of the present invention there is provided a system for identification of a safety marking for marking an object by attaching the safety marking to the object in an electronic form. The system comprises means for forming a first string in a predetermined form from personal data representing personal information of an owner of the safety marking; means for encrypting the formed first string to generate an encrypted first siring; means for electronically signing the encrypted first string; means for encrypted the signed encrypted first string to for a twice encrypted first string; means for storing the twice encrypted first string in an electric form in a marking device, the marking device being attached to or a part of the object to be marked; and an identification device connected to a mobile station, the identification device having a reading device for reading the twice encrypted first string and a processor for processing the read twice encrypted first string and 5a decrypting the twice encrypted first string using a decryption key provided in the identification device.
According to a still further broad aspect of the present invention there is provided a method for identifying an owner of a safety marking that is used to mark an object to which the safety marking is attached in an electronic form.
The method comprises the steps of: generating the safety marking by forming, from personal data representing personal information of the user, a first string in a predetermined form, encrypting the formed first string to define an encrypted first string, electronically signing the encrypted first string, encrypting the signed first siring to form a twice encrypted first string, and storing the twice encrypted string in an electric form in a marking device, the marking device being attached to or port of the object to be marked;
and decoding the safety marking by reading the twice encrypted first string from the marking device on the object, by an identification device connected to a mobile station; and decrypting, by the identification device, the twice encrypted string using a decryption key provided in the identification device.
According to a still further broad aspect of the present invention there is provided an identification device connected to a mobile station for identifying a safety marking attached to one of an object or a device as an encrypted string in electronic form. The encrypted string is generated based on personal information of the owner of the object or device and the safety marking being used to mark the object or device. The identification device comprises: means for reading the encrypted string attached to the one of the object, device, or information from the safety marking into the identification device; and means for decrypting the encrypted string using a decryption key in the identification device for determining ownership of the object or device, 5b wherein the mobile station further comprises: means for forming a first string in a predetermined form from personal data representing personal information of an owner of the safety marking; means for encrypting the formed first string to generate an encrypted first string; means for electronically signing the encrypted first string; means for encrypted the signed encrypted first string to for a twice encrypted first string; means for storing the twice encrypted first string in an electric form as the safety marking in a marking device, the marking device being attached to or a part of the object or device to be marked.
In a preferred embodiment, the marking device comprises a storage device and a first interface for linking the marking device with the reading device.
The identification device may consist of a safety mod-ule which comprises a second interface for setting up a connection with the marking device. In a preferred embodiment, the first and second interfaces are imple-mented using Bluetooth technology.
As compared with prior art, the present in-vention has the advantage that it guarantees a reli-able and safe arrangement for the application of a safety marking in an electric form. In addition, the invention significantly simplifies the use of a safety marking in an electric form because it does not re-quire the use of a separate registration database.
A further advantage of the invention as com-pared with prior-art technology is that the invention allows double verification of the authenticity of the owner of the safety marking. This often produces a complete certainty as to who is the owner of the safety marking. The procedure of the invention also affords privacy protection to the user of the safety marking as deciphering the information contained in the safety marking is very difficult, depending on the encryption algorithm used.

LIST OF ILLUSTRATIONS

In the following, the invention will be de-scribed by the aid of a few examples of its preferred embodiments with reference to the attached drawing, in which Fig. 1 presents an identification device ac-cording to the present invention, Fig. 2 presents a preferred marking device according to the present invention, and Fig. 3 presents a flow diagram representing a preferred identification method according to the pres-ent invention.
DETAILED DESCRIPTION OF THE INVENTION

Fig. 1 presents a preferred identification device 1. The identification device comprises a secorid interface RP1 for linking it to a marking device 6. In addition, the identification device comprises encryp-tion and decryption means 5, 7 for decrypting the in-formation to be stored in the marking device 6 and de-crypting the encrypted information to be read by means of the marking device.
Furthermore, the decryption means presented in Fig. 1 comprise a processor 3, which can be de-signed and optimized specially for encryption func-tions and which encrypts and decrypts and implements an electric signature, and a storage 9, which is con-nected to the processor for storing the keys and pa-rameters it needs. The information stored in the stor-age 9 may include the personal decryption key of the user of the safety module, parameters of the encryp-tion algorithm and other data needed. A preferred ex-ample of the encryption algorithm used in this inven-tion is the RSA method, but other unsymmetrical or symmetrical algorithms can also be used, depending on the application.
The frame 11 of the identification device has been designed to fit the shapes of the power source of a mobile station. The frame 11 is provided with a con-nector 12 for connecting the identification device to the mobile telephone. The connector 12 also serves to connect the power and communication between the iden-tification device and the mobile station. In this em-bodiment, the power source of the identification de-vice has a capacity substantially corresponding to the power source of the mobile station and is also charge-able. Therefore, the identification device can be eas-ily connected to the mobile station both mechanically and electrically.
The marking device presented in Fig. 2 com-prises a storage device 8 and a first interface RP1 for connecting the marking device to an external de-vice, e.g. an identification device. The marking de-vice 6 may preferably be a commonly used marking de-vice known in itself based on transponder technology.
Via the first and second interfaces RP1, RP2, the identification device 1 can be connected to the marking device 6 using a wireless or physical link to allow data transfer between them. The encrypted string can be transferred into the marking device 6 by means of the identification device or in conjunction with the manufacture of the marking device. The encrypted string can be read by means of the identification de-vice or a corresponding device provided with the re-quired reading means. A device like this could be e.g.
a safety module as described in patent specification FI 981902. In conjunction with the interfaces RP1, RP2, it is possible to provide a so-called Bluetooth component, although this is not shown in Fig. 1 and 2.
The Bluetooth component is used to implement the func-tions required by the technology in question. The in-terfaces RP1, RP2 can be implemented using any optical infrared link, radio link or a known bus interface.
Fig. 3 illustrates a preferred identification method according to the invention. When an object or device provided with a marking device is to be identi-fied, the information stored in the marking device 6 is read by means of the identification device 1, block 31. The reading may be effected via a wireless connec-tion or the identification device may be physically attached to the marking device. After the information has been read into the identification device, the user's personal password is fed into the identifica-tion device, enabling the use of the personal decryp-tion key stored in the identification device, block 32. This is the first check for verifying the owner of the marking device. Only the owner of the marking de-vice is in possession of the decryption key to be used in decrypting the encrypted string stored in the mark-ing device.
Once the user has given the key, the en-crypted string is decrypted by the identification de-vice 1, block 33. The person's identity is verified against the decrypted string thus obtained, and if it corresponds to the identity declared by the person, then the process goes on to block 35, and if not, then the reading and encrypting operations can be repeated, e.g. three times, returning to block 31. In block 35, if a further check is to be carried out to verify that the person is actually the individual he/she is claim-ing to be, a biometric sample is taken from the person and the sample is compared with the sample information stored in the marking device. If the sample is all right, then the person's identity has been established with nearly absolute certainty and likewise that the marking device belongs to the person in question. This process of comparing the sample can also be repeated e.g. three times to make sure that a failure of the test has not been caused by a technical fault.
The invention makes it possible to implement reliable identification locally without having to es-tablish a connection with a separate database to ver-ify the correctness of an identifier. Especially when electronic identification becomes more widespread, a situation is likely to arise where several databases are used for identity checks, which may impair iden-tity protection.
In a case described as an example, a first string is formed from personal data about the user.
The first string comprises e.g. the DNA code and fin-ger print information, both converted into digital form. The string thus formed is encrypted by the RSA
1024 method using the user's secret encryption key, so that it will not be possible to determine from the string thus generated what part or parts of the body is/are the origin of the biometric data. The string is signed electrically and encrypted using a public key.
5 The identifier thus produced is incorporated in the product to be encrypted.
The safety marking can be checked e.g. by means of an identification device attached to a mobile station, in which case the user's right to the marked 10 object or information can be proved by means of the mobile station. Electronic information can be easily incorporated e.g. in data stored in digital form. For instance, on a CD disk which contains a large amount of redundant information, it is possible to hide an identifier that is hard to detect and is only found as the output of an appropriate function. The safety marking embedded in the information can not be altered as it is not visible from outside. The safety marking can be read e.g. by a verification reading method, the desired safety marking being obtained as an output for certain information. In this way, it is possible to verify e.g. copyright data regarding electronic infor-mation, in other words, to mark electronic information in the name of a given person, corporation or commu-nity.
The present invention is not restricted to the examples described above, but many variations are possible within the scope of protection of the inven-tive idea defined in the claims.

Claims (24)

CLAIMS,
1. A method for identifying an owner of a safety marking that is used to mark an object to which the safety marking is attached in an electronic form, comprising the steps of:
generating the safety marking by forming, from personal data representing personal information of the user, a first string in a predetermined form, encrypting the formed first string to define an encrypted first string, electronically signing the encrypted first string, encrypting the signed first siring to form a twice encrypted first string, and storing the twice encrypted string in an electric form in a marking device, the marking device being attached to a port of the object to be marked; and decoding the safety marking by reading the twice encrypted first string from the marking device on the object, by an identification device connected to a mobile station; and decrypting, by the identification device, the twice encrypted string using a decryption key provided in the identification device.
2. A method in accordance with claim 1, wherein the personal information comprises personal data comprising a biometric sample of the owner of the safety marking.
3. A method in accordance with claim 2, wherein the biometric sample comprises DNA code in a predetermined form of the owner of the safety marking.
4. A method in accordance with claim 2, wherein the biometric sample comprises a fingerprint specimen in a predetermined form of the owner of the safety marking.
5. A method in accordance with claim 2, wherein the biometric sample comprises an image, in a predetermined form, of an eye of the owner of the safety marking.
6. A method in accordance with claim 2, wherein the biometric sample is in binary form.
7. A method in accordance with claim 1, wherein the personal information is included in the safety marking to thereby individualize the safety marking.
8. A system for identification of a safety marking for marking an object by attaching the safety marking to the object in an electronic form, the system comprising:
means for forming a first string in a predetermined form from personal data representing personal information of an owner of the safety marking;
means for encrypting the formed first string to generate an encrypted first string;
means for electronically signing the encrypted first string; means for encrypted the signed encrypting the first string to form a twice encrypted first string;
means for storing the twice encrypted first string in an electric form in a marking device, the marking device being attached to a part of the object to be marked; and an identification device connected to a mobile station, the identification device having a reading device for reading the twice encrypted first string and a processor for processing the read twice encrypted first string and decrypting the twice encrypted first string using a decryption key provided in the identification device.
9. A system in accordance with claim 8, wherein said marking device comprises a storage device and a first interface for connecting the marking device to the reading device.
10. A system in accordance with claim 8, wherein the identification device comprises a second interface for establishing a connection to said marking device.
11. A system in accordance with claim 8, wherein the personal information comprises personal data comprising a biometric sample of the owner of the safety marking.
12. A system in accordance with claim 11, wherein the biometric sample comprises DNA code in a predetermined form of the owner of the safety marking.
13. A system in accordance with claim 11, wherein the biometric sample comprises a fingerprint specimen in a predetermined form of the owner of the safety marking.
14. A system in accordance with claim 11, wherein the biometric sample comprises an image, in a predetermined form, of an eye of the owner of the safety marking.
15. A system in accordance with claim 11, wherein the biometric sample is in binary form.
16. A system in accordance with claim 8, wherein the personal information is included in the safety marking to individualize the safety marking.
17. An identification device connected to a mobile station for identifying a safety marking attached to one of an object or a device as an encrypted string in electronic form, the encrypted string being generated based on personal information of the owner of the object or device and the safety marking being used to mark the object or device, said identification device comprising:
means for reading the encrypted string attached to the one of the object, device, or information from the safety marking into the identification device; and means for decrypting the encrypted string using a decryption key in the identification device for determining ownership of the object or device, wherein the mobile station further comprises:
means for forming a first string in a predetermined form from personal data representing personal information of an owner of the safety marking;
means for encrypting the formed first string to generate an encrypted first string;
means for electronically signing the encrypted first string;
means for encrypting the signed encrypted first string to form a twice encrypted first string;
means for storing the twice encrypted first string in an electric form as the safety marking in a marking device, the marking device being attached to a part of the object or device to be marked.
18. An identification device connected to a mobile station in accordance with claim 17, wherein the personal information comprises personal data comprising a biometric sample of the owner of the safety marking.
19. An identification device connected to a mobile station in accordance with claim 17, wherein the biometric sample comprises DNA code in a predetermined form of the owner of the safety marking.
20. An identification device connected to a mobile station in accordance with claim 17, wherein the biometric sample comprises a fingerprint specimen in a predetermined form of the owner of the safety marking.
21. An identification device connected to a mobile station in accordance with claim 17, wherein the biometric sample comprises an image, in a predetermined form, of an eye of the owner of the safety marking.
22. An identification device connected to a mobile station in accordance with claim 17, wherein the biometric sample is in binary form.
23. An identification device connected to a mobile station in accordance with claim 17, wherein the personal information is included in the safety marking to individualize the safety marking.
24. An identification device connected to a mobile station in accordance with claim 17, wherein the identification device comprises a second interface for establishing a connection to said marking device.
CA002346439A 1998-10-14 1999-10-14 Method and system for the application of a safety marking Expired - Fee Related CA2346439C (en)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
FI982232 1998-10-14
FI982232A FI117077B (en) 1998-10-14 1998-10-14 Method and system for applying the security marking
PCT/FI1999/000851 WO2000022769A1 (en) 1998-10-14 1999-10-14 Method and system for the application of a safety marking

Publications (2)

Publication Number Publication Date
CA2346439A1 CA2346439A1 (en) 2000-04-20
CA2346439C true CA2346439C (en) 2008-12-30

Family

ID=8552708

Family Applications (1)

Application Number Title Priority Date Filing Date
CA002346439A Expired - Fee Related CA2346439C (en) 1998-10-14 1999-10-14 Method and system for the application of a safety marking

Country Status (10)

Country Link
US (1) US7010694B2 (en)
EP (1) EP1121778B1 (en)
JP (1) JP2002527991A (en)
CN (1) CN1336051B (en)
AU (1) AU6343299A (en)
CA (1) CA2346439C (en)
FI (1) FI117077B (en)
NO (1) NO20011857L (en)
PL (1) PL347271A1 (en)
WO (1) WO2000022769A1 (en)

Families Citing this family (34)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7953671B2 (en) 1999-08-31 2011-05-31 American Express Travel Related Services Company, Inc. Methods and apparatus for conducting electronic transactions
US7343351B1 (en) 1999-08-31 2008-03-11 American Express Travel Related Services Company, Inc. Methods and apparatus for conducting electronic transactions
US7889052B2 (en) 2001-07-10 2011-02-15 Xatra Fund Mx, Llc Authorizing payment subsequent to RF transactions
US7725427B2 (en) 2001-05-25 2010-05-25 Fred Bishop Recurrent billing maintenance with radio frequency payment devices
US8548927B2 (en) * 2001-07-10 2013-10-01 Xatra Fund Mx, Llc Biometric registration for facilitating an RF transaction
US8294552B2 (en) 2001-07-10 2012-10-23 Xatra Fund Mx, Llc Facial scan biometrics on a payment device
US9024719B1 (en) 2001-07-10 2015-05-05 Xatra Fund Mx, Llc RF transaction system and method for storing user personal data
US9454752B2 (en) 2001-07-10 2016-09-27 Chartoleaux Kg Limited Liability Company Reload protocol at a transaction processing entity
US8284025B2 (en) 2001-07-10 2012-10-09 Xatra Fund Mx, Llc Method and system for auditory recognition biometrics on a FOB
US7303120B2 (en) 2001-07-10 2007-12-04 American Express Travel Related Services Company, Inc. System for biometric security using a FOB
US8001054B1 (en) 2001-07-10 2011-08-16 American Express Travel Related Services Company, Inc. System and method for generating an unpredictable number using a seeded algorithm
US7705732B2 (en) 2001-07-10 2010-04-27 Fred Bishop Authenticating an RF transaction using a transaction counter
US7121471B2 (en) * 2001-07-10 2006-10-17 American Express Travel Related Services Company, Inc. Method and system for DNA recognition biometrics on a fob
US7668750B2 (en) 2001-07-10 2010-02-23 David S Bonalle Securing RF transactions using a transactions counter
US7735725B1 (en) 2001-07-10 2010-06-15 Fred Bishop Processing an RF transaction using a routing number
US20040236699A1 (en) 2001-07-10 2004-11-25 American Express Travel Related Services Company, Inc. Method and system for hand geometry recognition biometrics on a fob
US7360689B2 (en) 2001-07-10 2008-04-22 American Express Travel Related Services Company, Inc. Method and system for proffering multiple biometrics for use with a FOB
US7249112B2 (en) 2002-07-09 2007-07-24 American Express Travel Related Services Company, Inc. System and method for assigning a funding source for a radio frequency identification device
US7059531B2 (en) * 2001-07-10 2006-06-13 American Express Travel Related Services Company, Inc. Method and system for smellprint recognition biometrics on a fob
US9031880B2 (en) 2001-07-10 2015-05-12 Iii Holdings 1, Llc Systems and methods for non-traditional payment using biometric data
US6805287B2 (en) 2002-09-12 2004-10-19 American Express Travel Related Services Company, Inc. System and method for converting a stored value card to a credit card
TW595195B (en) * 2003-04-04 2004-06-21 Benq Corp Network lock method and related apparatus by ciphered network lock and inerasable deciphering key
FR2854270B1 (en) * 2003-04-28 2005-06-17 Sagem SECURE ACCESS CONTROL METHOD
CZ13987U1 (en) * 2003-11-28 2004-02-02 Cema, A. S. System for identification and protection of property
US8842887B2 (en) * 2004-06-14 2014-09-23 Rodney Beatson Method and system for combining a PIN and a biometric sample to provide template encryption and a trusted stand-alone computing device
US9286457B2 (en) 2004-06-14 2016-03-15 Rodney Beatson Method and system for providing password-free, hardware-rooted, ASIC-based authentication of a human to a mobile device using biometrics with a protected, local template to release trusted credentials to relying parties
US7363504B2 (en) * 2004-07-01 2008-04-22 American Express Travel Related Services Company, Inc. Method and system for keystroke scan recognition biometrics on a smartcard
US7318550B2 (en) 2004-07-01 2008-01-15 American Express Travel Related Services Company, Inc. Biometric safeguard method for use with a smartcard
US7617397B2 (en) * 2005-04-29 2009-11-10 Microsoft Corporation Systems and methods for generation and validation of isogeny-based signatures
US7870614B1 (en) * 2006-01-27 2011-01-11 Aspect Loss Prevention, LLC Sensitive data aliasing
KR101088029B1 (en) * 2009-11-19 2011-11-29 최운호 System for Authentication of Electronic Cash Using Smart Card and Communication Terminal
JP2012174195A (en) * 2011-02-24 2012-09-10 Renesas Electronics Corp Authentication system
DE102016100929A1 (en) * 2016-01-20 2017-07-20 Erich Utsch Ag Packaging containers for license plates; Method for operating an embossing press using the packaging container and embossing press
WO2017139592A1 (en) 2016-02-12 2017-08-17 Genosecurity, LLC Security enhanced portable data store and processor for allowing secure and selective access to genomic data

Family Cites Families (27)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH03189756A (en) * 1989-12-19 1991-08-19 Nippondenso Co Ltd User confirming device for computer equipment
US5453601A (en) * 1991-11-15 1995-09-26 Citibank, N.A. Electronic-monetary system
US5280527A (en) * 1992-04-14 1994-01-18 Kamahira Safe Co., Inc. Biometric token for authorizing access to a host system
DE4490836T1 (en) 1993-02-19 1996-01-11 United Kingdom Government Secure personal identification instrument and method for its production
JPH0750665A (en) * 1993-08-06 1995-02-21 Kumahira Safe Co Inc Identity confirming device and its method
ES2105936B1 (en) * 1994-03-21 1998-06-01 I D Tec S L IMPROVEMENTS INTRODUCED IN INVENTION PATENT N. P-9400595/8 BY: BIOMETRIC PROCEDURE FOR SECURITY AND IDENTIFICATION AND CREDIT CARDS, VISAS, PASSPORTS AND FACIAL RECOGNITION.
US5974141A (en) * 1995-03-31 1999-10-26 Mitsubishi Corporation Data management system
JPH10503132A (en) * 1994-07-26 1998-03-24 インターナショナル データ マトリックス インコーポレイテッド Uncorrectable self-verifying items
CA2195681A1 (en) * 1994-07-26 1996-02-08 Dennis G. Priddy Methods and systems for creating and authenticating unalterable self-verifying articles
US5613012A (en) * 1994-11-28 1997-03-18 Smarttouch, Llc. Tokenless identification system for authorization of electronic transactions and electronic transmissions
GB9524319D0 (en) 1995-11-23 1996-01-31 Kodak Ltd Improvements in or relating to the recording of images
US5742685A (en) * 1995-10-11 1998-04-21 Pitney Bowes Inc. Method for verifying an identification card and recording verification of same
IT1277257B1 (en) * 1995-10-13 1997-11-05 Prima Officina Carte Valori Tu SYSTEM FOR THE SECURITY AUTHENTICATION AND MANAGEMENT OF SECURITIES AND NAME DOCUMENTS
US5796832A (en) * 1995-11-13 1998-08-18 Transaction Technology, Inc. Wireless transaction and information system
US5790668A (en) * 1995-12-19 1998-08-04 Mytec Technologies Inc. Method and apparatus for securely handling data in a database of biometrics and associated data
US5995630A (en) * 1996-03-07 1999-11-30 Dew Engineering And Development Limited Biometric input with encryption
JPH09284272A (en) * 1996-04-19 1997-10-31 Canon Inc Ciphering system, signature system, key common share system, identity proving system and device for the systems
US5956409A (en) * 1996-04-29 1999-09-21 Quintet, Inc. Secure application of seals
JPH1021305A (en) * 1996-07-01 1998-01-23 Hitachi Maxell Ltd Electronic commodity transaction system
JPH10134157A (en) * 1996-10-28 1998-05-22 Nippon Telegr & Teleph Corp <Ntt> Method and device for cipher authenticating process utilizing computer card
KR20000070252A (en) * 1997-01-17 2000-11-25 내쉬 로저 윌리엄 Security apparatus and method
JPH10228374A (en) * 1997-02-13 1998-08-25 Nippon Telegr & Teleph Corp <Ntt> Computer card prevented from being duplicated
DE19718103A1 (en) * 1997-04-29 1998-06-04 Kim Schmitz Data transmission system authorise method e.g. for telebanking
US6084968A (en) * 1997-10-29 2000-07-04 Motorola, Inc. Security token and method for wireless applications
US6141753A (en) * 1998-02-10 2000-10-31 Fraunhofer Gesellschaft Secure distribution of digital representations
US6754822B1 (en) * 1998-04-30 2004-06-22 Fraunhofer-Gesellschaft Zur Forderung Der Angewandten Forshung E.V. Active watermarks and watermark agents
FI981902A (en) * 1998-09-04 2000-03-05 Sonera Oyj Security module, security system and mobile station

Also Published As

Publication number Publication date
US20020083320A1 (en) 2002-06-27
CN1336051A (en) 2002-02-13
FI117077B (en) 2006-05-31
PL347271A1 (en) 2002-03-25
NO20011857L (en) 2001-06-05
US7010694B2 (en) 2006-03-07
EP1121778A1 (en) 2001-08-08
AU6343299A (en) 2000-05-01
JP2002527991A (en) 2002-08-27
FI982232A0 (en) 1998-10-14
EP1121778B1 (en) 2016-06-15
NO20011857D0 (en) 2001-04-11
WO2000022769A1 (en) 2000-04-20
CN1336051B (en) 2013-05-08
CA2346439A1 (en) 2000-04-20

Similar Documents

Publication Publication Date Title
CA2346439C (en) Method and system for the application of a safety marking
US7284125B2 (en) Method and apparatus for personal identification
US6845453B2 (en) Multiple factor-based user identification and authentication
US6871278B1 (en) Secure transactions with passive storage media
EP0924657B2 (en) Remote idendity verification technique using a personal identification device
US8799670B2 (en) Biometric authentication method, computer program, authentication server, corresponding terminal and portable object
KR100768754B1 (en) Portable electronic charge and authorization devices and methods therefor
US8417946B2 (en) Method and apparatus for accessing an electronic device by a data terminal
JP2001007802A (en) Method and device for ciphering and deciphering living body information, and principal authentication system utilizing living body information
WO1999008217A1 (en) Fingerprint collation
US20070106903A1 (en) Multiple Factor-Based User Identification and Authentication
JPH10247906A (en) Device with processing function, information processing system, identifying method, identifying/ciphering method and identifying/deciphering method
JP2000215280A (en) Identity certification system
Sinha A survey of system security in contactless electronic passports
WO2000072507A1 (en) Method and system for verifying a sensor identity
KR100408890B1 (en) Method for certificating an credit dealing using a multi-certificated path and system thereof
US8870067B2 (en) Identification device having electronic key stored in a memory
WO2017123098A1 (en) A method for verifying the identity of a person
KR100720738B1 (en) A method for providing secrecy, authentication and integrity of information to RFID tag
JP2900869B2 (en) Database search system and database protection method
KR20030065761A (en) Fingerprint USB-Key authentication system
JPH11282983A (en) Individual identification method by fingerprint data
KR101885733B1 (en) Biometric authentication apparatus and user authentication method using biometric authentication apparatus
JP2006293473A (en) Authentication system and authentication method, terminal device, and authentication device
EP2770663A1 (en) Encryption Key-Based Product Authentication System and Method

Legal Events

Date Code Title Description
EEER Examination request
MKLA Lapsed

Effective date: 20171016