Security system based on certification
First Claim
1. A security system for preventing forgery or duplication of an object whose authenticity is required to be determined, comprising:
- an identification data storage region for retaining identification data which is associated with a reference data, said reference data being individually assigned when writing said identification data into said identification data storage region; and
a signature data storage region for storing signature data for certifying said identification data;
wherein said signature data is generated by transforming data including said identification data and/or said reference data by using a first variable which is generated from said identification data and/or said reference data; and
the authenticity of said object is determined according to a result of certifying said identification data with data generated by inverse transformation of said signature data in a manner which corresponds to a second variable generated from said identification data and/or said reference data.
1 Assignment
0 Petitions
Accused Products
Abstract
The data containing reference data is transformed into signature data by a method which depends on a variable generated by the reference data, and the identification data is certified by inverse transformation of the signature data. The signature generating rule changes in dependence on the reference data, and it is therefore extremely difficult to analyze the signature generating rule from the medium or the card reader/writer so that the forgery or modification of magnetic or other data, which is otherwise easy to duplicate, can be made extremely difficult. Therefore, even when a reader is illicitly obtained, and analyzed, it is extremely difficult to estimate the signature generating rule as it owes to the difficulty of solving a set of multivariate simultaneous equations.
-
Citations
20 Claims
-
1. A security system for preventing forgery or duplication of an object whose authenticity is required to be determined, comprising:
-
an identification data storage region for retaining identification data which is associated with a reference data, said reference data being individually assigned when writing said identification data into said identification data storage region; and a signature data storage region for storing signature data for certifying said identification data; wherein said signature data is generated by transforming data including said identification data and/or said reference data by using a first variable which is generated from said identification data and/or said reference data; and the authenticity of said object is determined according to a result of certifying said identification data with data generated by inverse transformation of said signature data in a manner which corresponds to a second variable generated from said identification data and/or said reference data. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A method for authenticating an object, comprising:
-
affixing a reference data region to said object, said reference data region comprising a randomly formed physical marking that is difficult to duplicate and which is machine readable to generate unique reference data associated with said object; reading the reference data region to generate the reference data associated with said object; associating administrative data with said object, the administrative data including data relating to the provenance of said object; combining the reference data and the administrative data to generate unique identification data associated with said object; writing the identification data in a machine readable identification data storage region on said object; hashing the identification data with an arbitrary constant to generate hashed identification data; generating unique signature data associated with said object, comprising; combining the hashed identification data with random data to generate input data; selecting at least one constant; operating on the input data with the at least one constant and a signature generating function to generate the signature data, the signature generating function comprising at least one bijection polynomial transformation; and
, writing the signature data generated in a machine readable signature data storage region on said object. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20)
-
Specification