EP1014318B1 - Méthode et système d'édition de tickets et méthode de collationnement de tickets - Google Patents

Méthode et système d'édition de tickets et méthode de collationnement de tickets Download PDF

Info

Publication number
EP1014318B1
EP1014318B1 EP99125264A EP99125264A EP1014318B1 EP 1014318 B1 EP1014318 B1 EP 1014318B1 EP 99125264 A EP99125264 A EP 99125264A EP 99125264 A EP99125264 A EP 99125264A EP 1014318 B1 EP1014318 B1 EP 1014318B1
Authority
EP
European Patent Office
Prior art keywords
ticket
data
image data
security
generating
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Lifetime
Application number
EP99125264A
Other languages
German (de)
English (en)
Other versions
EP1014318A2 (fr
EP1014318A3 (fr
Inventor
Takashi Int. Property Division Yamaguchi
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Toshiba Corp
Original Assignee
Toshiba Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Toshiba Corp filed Critical Toshiba Corp
Publication of EP1014318A2 publication Critical patent/EP1014318A2/fr
Publication of EP1014318A3 publication Critical patent/EP1014318A3/fr
Application granted granted Critical
Publication of EP1014318B1 publication Critical patent/EP1014318B1/fr
Anticipated expiration legal-status Critical
Expired - Lifetime legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07BTICKET-ISSUING APPARATUS; FARE-REGISTERING APPARATUS; FRANKING APPARATUS
    • G07B15/00Arrangements or apparatus for collecting fares, tolls or entrance fees at one or more control points
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07BTICKET-ISSUING APPARATUS; FARE-REGISTERING APPARATUS; FRANKING APPARATUS
    • G07B1/00Machines for printing and issuing tickets
    • G07B1/02Machines for printing and issuing tickets employing selectable printing plates
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07BTICKET-ISSUING APPARATUS; FARE-REGISTERING APPARATUS; FRANKING APPARATUS
    • G07B1/00Machines for printing and issuing tickets

Definitions

  • the present invention relates to a ticket issuing method and a ticket issuing system to issue tickets, for instance, tickets for concerts, tickets of travelling facilities and other tickets by way of a network or a telephone line.
  • the present invention relates to a ticket collating method for examining the genuineness of issued tickets.
  • Such a service is provided recently that when a ticket for a concert is requested via a network, an image for exchanging with a ticket is unloaded on a personal computer at home and record it on a floppy disk, that is then brought to the place of concert for listening the concert.
  • U.S. Patent No. 5,696,507 and U.S. Patent No. 5,666,284 disclosed a method and a system to store postage stamp data including coded postal charge data in a dedicated storage device that is connected to a personal computer and print the stamp data on an envelope.
  • US 5,598,477 discloses a ticket issuing method according to the preamble of claim 1.
  • EP 0 581 317 A2 discloses a method for embedding a digital signature within visual images.
  • EP 0 921 675 A2 which is prior art under Article 54(3)(4) EPC, discloses a method of preventing forgery of certificates or the like, wherein additional information composed of characters, images, voice information or the like is converted into two-dimensional code information and then converted into a visible additional image to be embedded in a full-color main image in the state of invisibility to produce a composite image, which composite image is printed on paper, as an example.
  • An object of the present invention is to provide a ticket issuing method capable of simply issuing tickets that have high security by way of communication means such as a network or a telephone line.
  • Another object of the present invention is to provide a ticket collating method that is capable of easily examining the genuineness of issued tickets and easily making a follow-up survey when any illegal ticket is detected.
  • FIG. 1 is a block diagram schematically showing the structure of a ticket issuing system to achieve the ticket issuing method of the present invention.
  • This ticket issuing system is composed of by connecting a user side apparatus A with a system side apparatus B through such a network C as Internet, LAN, etc.
  • "user” referred to here does mean a person who prints a ticket by a printer available at home and uses that ticket and a person who prints a ticket by a printer available at home or installed at a shop for use by other person or shop customer.
  • the user side apparatus A is composed of a user terminal device 11 comprising a personal computer, a dedicated client software 12 that operates on a personal computer, and a ticket printer 13 such as a color printer that is connected to the user terminal device 11.
  • the system side apparatus B is composed of a host computer/server 16, a dedicated server software 17 that operates on a host computer, a data base 18 that stores ticket data, user data and other data, and a security data detecting system 19.
  • the host computer/server 16 the dedicated server software 17 and the data base 18 are always in the ready to operate state and users who are registered in the data base 18 are able to use anytime.
  • a user starts up the user terminal device 11 and the dedicated client software 12 (Step S1) and connects the user terminal device 11 to the host computer/server 16 (Step S5) by inputting user identification data such as a user ID and a password (Step S2).
  • the host computer/server 16 collates the input user identification data with data stored in the data base 18 (Step S3) and approves the connection (Step S4) and starts the service when the input data is contained in the registered user list, and rejects the connection if it is not contained in the registered user list.
  • a service menu is displayed on the user terminal device 11 and a user selects a desired service and input ticket issue request data (Step S8).
  • the ticket issue request data referred to here are, in the case of, for instance, a ticket purchasing service, such required data as a kind of desired ticket, date and time, charge, seat reservation, charge paying means, etc.
  • the user terminal device 11 transmits these input data to the host computer/server 16.
  • the host computer/server 16 receives the data and collates the data with the,data stored in the data base 18 (Step S9), executes a ticket purchasing step. If a desired ticket cannot be purchased, the host computer/server 16 sends a message stating it to the user terminal device 11 and the step returns to the service menu.
  • the host computer/server 16 If a ticket is purchasable, the host computer/server 16 outputs security data from the ticket issue request data and user identification data (Step S10), forms ticket image data from the ticket issue request data (Step S11), and makes ticket printing data by embedding (combining) the security data in the ticket image data in the invisible state (Step S12). When the security data is printed on a paper, the security data is visible. Further, the host computer/server 16 makes ticket display data based on the ticket printing data (Step S13) and transmits the ticket printing data and the ticket display data to the user terminal device 11 (Step S14). The detailed method for making security data, ticket printing data and ticket display data will be described later.
  • the ticket display data sent from the host computer/server 16 is displayed on the display of the user terminal device 11 (Step S15).
  • a user checks the display by looking it and when there is no problem, prints a ticket. That is, when a print command is executed, the ticket printing data is sent from the user terminal device 11 to the ticket printer 13 and a ticket 14 is printed and output (Step S16).
  • a print completion command is executed and when there are any print error, etc., the print command is executed again.
  • a user is able to go to a place of concert with a printed ticket and use it as usual (Step S17).
  • a security data detecting system 19 In the security data detecting system 19, the genuineness of the ticket is judged by collating the detected security data with data stored in the data base 18 (Step S18).
  • FIG. 3-FIG. 5 show examples of auto race admission tickets applicable to this embodiment.
  • Fig. 3 shows ticket image data 21
  • FIG. 4 shows security data 22
  • FIG. 5 shows ticket printing data schematically.
  • the ticket image data 21 shown in FIG. 3 are generated from the ticket issue request data referring to the data base 18 during the process in Step S11 shown in FIG. 2.
  • a kind of ticket 31 a place 32, a data and time 33, a reserved seat number 34, a charge 35, a serial number 36, a ticket issuer 37 and a logo mark that are required for tickets for a normal concert are printed. These data are also printed on the stub of the ticket.
  • the security data 22 shown in FIG. 4 is generated from the user identification data and the ticket issue request data during the process in Step S10 show in FIG. 2. This security data 22 is used for the genuineness judgement to check whether a ticket was forged or altered. In this example, such data as a two-dimensional code data 39, a serial number for inquiring 40, a ticket issuer 41, a logo mark are printed on this ticket. Letters and figures are also expressed in binary image.
  • the two-dimensional code data 39 is printed for the automatic mechanical process when the security data 22 is read.
  • the kind of ticket 31, place 32, date and time 33, reserved seat number 34, charge 35, serial number 36, ticket issuer 36 and logo mark 38 were converted into two-dimensional codes and contained in this two-dimensional code data 39. Further, the serial number for inquiry 40, ticket issuer 41 and logo mark are provided for checking the security data 22 with the naked eye.
  • Date of Issue indicates a date when issue of a ticket was requested
  • Class. Code 1 indicates the data storage location of the data base for search
  • Class. Code 2 indicates coded kind of ticket and others
  • Ticket No. indicates the ticket issue order.
  • the security data 22 shown in FIG. 4 is able to check both of man and machine. These data are also printed on the stub of a ticket.
  • the ticket printing data 23 shown in FIG. 5, that is, visible data and invisible data are made from the security data and the ticket image data during the process of Step S12 shown in FIG. 2 and an actually usable ticket is produced when these data are printed.
  • the ticket printing data 23 shown in FIG. 5 is made by embedding the security data 22 shown in FIG. 4 in the ticket image data 21 shown in FIG. 3 in the invisible state according to a method that is described later. Accordingly, the tickets shown in FIG. 3 and FIG. 5 are quite the same and cannot be discriminated by the naked eye.
  • an inquiry serial number, a ticket issuer and its logo mark are included in the visible state in the ticket image data, and in the invisible state in the security data.
  • logo mark its location in the visible state is so arranged that it is completely agreed with that in the invisible state.
  • the security data is composed of two-dimensional code data and binary image such as letters or marks as shown in FIG. 4; however, one of these elements only or both elements may be included.
  • Two-dimensional code and binary image are called the basic security data.
  • the two-dimensional code 39 is printed on a ticket for the mechanical automatic process when the security data is read as mentioned above, and a kind of ticket, etc. are coded and included on the security data.
  • a kind of ticket, etc. are coded and included on the security data.
  • For two-dimensionally coded data it is possible to use not only a kind of ticket but also almost all kinds of forms such as voice, image, text, etc. including individual data such as pre-registered voiceprint and fingerprints of user and managing data.
  • the digitized basic security data is converted into a binary image in two-dimensional code.
  • the basic security data is delimited into 4-bit blocks in order from the top and each block is replaced to a 2 ⁇ 2 pixel black and while binary image according to a value of each block as shown in FIG. 6.
  • the binary image data (FIG. 6) is expanded by n times so as not to impair the embedded image data during the smoothing process at the time of the composite process described later.
  • the result when the binary image data shown in FIG. 7 was expanded when, for instance, n 2 is shown in FIG. 8.
  • Calra code was applied in the two-dimensional coding; however, other two-dimensional codes such as matrix system two-dimensional codes and Glyph codes are also usable without problem.
  • the two-dimensional code data and binary image data thus made are arranged in the same size area as the ticket image data as shown in FIG. 4. It is necessary to predetermine the layout by a system for the convenience of a sensor to detect the security data.
  • the ticket image data 21 is data of a so-called : ticket itself and is equivalent to FIG. 3. There are data of 24 bits (8 bits for each of RGB) per pixel.
  • the security data 22 is data to be embedded in the ticket image data 21 in the invisible state and is equivalent to FIG. 4. There are 1 bit data per pixel.
  • the key image data 24 is data that becomes a key for making the ticket printing data and detecting (restoring) the security data. This data is not opened to user and has 1 bit data per pixel.
  • the smoothing process is executed with the black pixels of the security data made "1" and the white pixels made "0".
  • the pixels at both ends of noteworthy pixels in the x direction are taken, the 3 ⁇ 1 pixel area is cut and a weighted average is taken as shown by the following expression (1).
  • W(i) (STL(i-1)+2 ⁇ STL(i)+STL(i+1))/4 where,
  • the result of the smoothing process becomes as shown in FIG. 12.
  • phase modulation step S52 based on the result of the smoothing process in the smoothing process step S51, the phase modulation of the key image data 24 is executed according to the rules of the following expressions (2-1)-(2-3).
  • ⁇ DES(i) MSK(i+1)
  • the color difference modulation process is executed according to the rules of the following expressions (3-1)-(3-6). In this case, three components of R(Red), G(Green) and B(Blue) are separately calculated. An example of the color difference modulation result of the red component is shown in FIG. 14.
  • DESR(i) VR(i)+SRCR(i)
  • DESG(i) VG(i)+SRCG(i)
  • DESB(i) VB(i)+SRCB(i)
  • DESR(i): x the i pixel superimposition process result for Red component An integer in the range of 0 ⁇ 255.
  • DESG(i): x the i pixel superimposition process result for Green component An integer in the range of 0 ⁇ 255.
  • DESB(i): x the i pixel superimposition process result for Blue Component. An integer in the range of 0 ⁇ 255.
  • SRCR(i): x Embedded image data of i pixel for Red Component. An integer in the range of 0 ⁇ 255.
  • SRCG(i): x Embedded image data of i pixel for Green Component. An integer in the range of 0 ⁇ 255.
  • SRCB(i): x Embedded image data of i pixel for Blue Component. An integer in the range of 0 ⁇ 255.
  • DESR(i), DESG(i) and DESG(I) are integers in the range of "0 ⁇ 255", respectively. If the result of calculation is below “0", they are set at "0" and above "255", they are set at "255".
  • red, green and blue color difference amount codes are reversed. Accordingly, in pixels containing much red components, green and blue components are less and in pixels containing less red components, other components are much contained.
  • Red and (Green, Blue) Cyan are complementary colors each other and even when red and cyan are adjacent to each other, they are hardly discriminated by the eyes of a man and looked as no color. Further, as red rich pixels and cyan rich pixels are arranged repeatedly in unit of several pixels according to key image data, this fine color difference cannot be identified by the eyes of man and a color difference amount is judged to be plus-minus "0".
  • the security data embedded in the invisible state in the ticket printing data may be easily exposed to a third person in some case.
  • Ticket display data that is made directly unusable is made by partially reducing the ticket printing data and breaking the ticket image data and the security data embedded in the invisible state.
  • the ticket printing data shown in FIG. 15 is cut in a 3 ⁇ 3 pixel area and is applied with the smoothing process. This is simply to take only an average and the result is as shown in FIG. 16. From the result of the smoothing process, leaving the pixel data at the top of the 4 ⁇ 4 pixel area, the remainder is erased (the thinning process). The result is as shown in FIG. 17. This data becomes the ticket display data.
  • amount of data is about 1/4 of the ticket printing data.
  • the print image resolution is generally 300 ⁇ 600 dpi but the image resolution of the display picture is about 100 dpi, which is 1/3 ⁇ 1/6 of the general print image resolution and therefore, there will be no problem.
  • the ticket display data is made by breaking the securing data by reducing data from the ticket printing data and displayed on the user terminal device 11.
  • the process is fast because amount of data is less and the security data and the ticket image data are partially broken, the ticket printing data cannot be used even when it is tried to obtain it illegally by taking a hard copy of the display. Accordingly, there is such a merit that the security is improved.
  • the ticket printing data and the ticket display data are not different apparently from the normal image and therefore, for instance, such general purpose image formats as JPEG (Joint Photographic Experts Group) and TIFF (Tagged Image File Format) are usable. Further, as they can be processed according to an application for treating general images, the system construction is relatively easy.
  • JPEG Joint Photographic Experts Group
  • TIFF Tagged Image File Format
  • the ticket 14 printed with the ticket printing data printed and output with the ticket printer 13 such as a color printer is used by user at a place of circuit.
  • the system side is able to judge the genuineness of the ticket by detecting the security data of the used ticket 14. This is described below in detail.
  • An image of the ticket 14 printed on a paper, etc. with the ticket printer 13 is read by an optical reading means such as a scanner, digitized to the state shown in FIG. 15 and the security data 22 is restored.
  • a key image data 22 shown in FIG. 10 is used.
  • the portion "1" of the value of the key image data 24 judges the ticket printing data 23 to be valid and the portion "0" of the value of the key image data 24 judges the value of the ticket printing data 23 to be invalid.
  • the result is shown in FIG. 18.
  • the hatched pixels in the figure are invalid data.
  • the valid data (expressed in white on a black ground) in FIG. 18 is cut out in a prescribed size.
  • FIG. 19 The result of the restoration of:a embedded image data (the security data) 22 according to this method is shown in FIG. 19.
  • the thick frame portion in the figure is the portion of the security data 22. This portion is in accord with FIG. 11 and it is seen that the security data 22 was completely restored.
  • the security data 22 becomes visible. Accordingly, it is possible to directly check a logo mark, etc. in the security data 22 visually. This method does not require troublesome operations and a complicated apparatus and therefore, there is a merit that genuineness of a ticket can be checked simply at.any place.
  • a third security data restoring and detecting method a system to thin a value read by an optical means will be described. It is assume that red components of a value read by a scanner, etc. are as shown in FIG. 15. As a checkered pattern of 4 ⁇ 2 unit is used for the composition process in this embodiment, the security data is thinned in unit of 4 pixels. An expansion factor n when making the security data is also related to this value and an expression of (Checkered grid unit ⁇ Expansion factor n ⁇ Number of pixels to be thinned) becomes valid.
  • the genuineness of the ticket 14 can be easily judged. For instance, even if the ticket 14 was given to a third person and illegally copied using a color copying machine, the history of that ticket, for instance, when, where and who issued it can be seen as the security data 22 contains a inquiry serial number and an illegal route can be detected easily.
  • the composition process is executed using a checkered pattern in unit of 4 ⁇ 2 pixels as a key. So, when the composition process is executed using a checkered pattern in size of 1 ⁇ 1 pixel, the effect to prevent the copying with a color copying machine is further promoted. This is because red rich and cyan rich pixel data of the ticket printing data are regularly arranged alternately by the composition process when such square grids as size 1 ⁇ 1 or 2 ⁇ 2 pixels are used.
  • a sensor of a scanner portion of a color copying machine is not a spot but has a limited area and therefore, even if a scanner reading resolution is the same as a ticket printing resolution, pixels of a sensor of scanner and pixels of the ticket printing data are finely deviated and they are read as they are.
  • the red and cyan components are complementary colors and it is therefore difficult to separate pixels arranged in extremely highly precise pitches and erroneously recognized to be gray by the eyes of man and sensors, and they cannot be properly copied.
  • FIG. 22 schematically shows the state from issue of ticket to detection of security data so far in use.
  • ticket image data 21 a landscape photograph is used.
  • security data 22 a logo mark "JAPAN” as a copyright data and a two-dimensional code for checking by the sense of vision of a man and by a machine that are converted into the security data according to the steps shown in this embodiment are used.
  • the ticket printing data 23 is made by executing the composition process of the ticket image data 21, the security data 22 and the key image data 24 according to the method described above.
  • the image of this ticket printing data 23 is seen as a landscape photograph to the eyes of a man but the copyright data, etc. are invisibly embedded.
  • the ticket display data 25 is made from the ticket printing data 23 according to the method shown in this embodiment.
  • these ticket printing data 23 and the ticket display data 25 are transmitted via a network to a user who requested the issue of a ticket.
  • user displays the ticket display data 25 on the display of the user terminal device 11 and after checking its contents, prints and outputs the ticket printing data 23 using the ticket printer 13 as a color printer and obtains the ticket 14.
  • FIG. 23 is an example of the ticket issue method of this invention applied to an electronic postage stamp.
  • FIG. 23(a) is the ticket printing data
  • FIG. 23(b) is a stamp image portion
  • FIG. 23(c) is the security data invisibly embedded in the stamp image portion.
  • security becomes particularly important.
  • security data is invisibly embedded in an electronic postage stamp likewise the auto race admission ticket described above and the print data of that ticket (stamp) is printed directly on an envelope, etc., an electronic stamp can be realized.

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Business, Economics & Management (AREA)
  • Finance (AREA)
  • Editing Of Facsimile Originals (AREA)
  • Image Processing (AREA)
  • Record Information Processing For Printing (AREA)
  • Credit Cards Or The Like (AREA)
  • Accessory Devices And Overall Control Thereof (AREA)

Claims (13)

  1. Procédé d'émission de ticket comprenant les étapes de :
    génération des données d'image de ticket à partir des données de demande d'émission de ticket ;
    génération des données d'image de sécurité à partir des données de demande d'émission de ticket envoyées par un utilisateur via un moyen de communication, les données d'image de sécurité étant visibles lorsque les données d'image de sécurité elles-mêmes sont imprimées sans les combiner avec les données d'image de ticket ;
    génération des données d'impression de ticket en combinant les données d'image de sécurité et les données d'image de ticket ; et
    envoi des données d'impression de ticket à l'utilisateur via le moyen de communication,
    dans l'étape de génération des données d'image de sécurité, les données d'image de sécurité sont générées à partir des données de demande d'émission de ticket et des données d'identification d'utilisateur envoyées par l'utilisateur via le moyen de communication, et
    les données d'image de sécurité sont invisibles par rapport aux données d'image de ticket lorsque les données d'impression de ticket sont imprimées sur du papier de ticket par l'utilisateur.
  2. Procédé d'émission de ticket selon la revendication 1, dans lequel l'étape de génération de données d'impression de ticket comprend les étapes de :
    génération de données d'image de modèle prescrit ;
    génération de données modulées de modèle en modulant les données d'image de modèle par les données d'image de sécurité ; et
    superposition des données d'image modulées de modèle sur les données d'image de ticket.
  3. Procédé d'émission de ticket selon la revendication 2, dans lequel l'étape de génération des données d'image de modèle prescrit comprend l'étape de :
    disposition des données d'image adjacentes pour qu'elles deviennent une combinaison des couleurs complémentaires.
  4. Procédé d'émission de ticket selon l'une quelconque des revendications 1 à 3, comprenant en outre l'étape de :
    génération des données d'affichage de ticket pour contrôler l'affichage par un moyen d'affichage de l'utilisateur en réduisant partiellement les données d'impression de ticket ;
       dans lequel l'étape d'envoi envoie les données d'affichage de ticket ainsi que les données d'impression de ticket à l'utilisateur via le moyen de communication.
  5. Procédé d'émission de ticket selon la revendication 4, dans lequel l'étape de génération des données d'affichage de ticket comprend les étapes de :
    exécution du traitement de lissage des données d'impression de ticket ; et
    exécution du traitement d'amincissement du lissage des données d'impression de ticket traité.
  6. Procédé d'émission de ticket selon l'une quelconque des revendications 1 à 5, dans lequel l'étape de génération de données d'impression de ticket comprend l'étape de :
    combinaison d'une partie des données d'image de sécurité et des données d'image de ticket à la fois dans l'état invisible et l'état visible.
  7. Procédé d'émission de ticket selon l'une quelconque des revendications 1 à 6, dans lequel l'étape de génération de données d'impression de ticket comprend l'étape de :
    combinaison d'une partie de données d'image de sécurité et des données d'image de ticket à la fois dans l'état invisible et l'état visible pour que les emplacements d'état invisible et visible correspondent l'un à l'autre.
  8. Procédé d'émission de ticket selon l'une quelconque des revendications 1 à 7, dans lequel l'étape de génération de données d'impression de ticket comprend l'étape de :
    addition de façon visible d'une marque spécifique à des données d'image de ticket avec des données d'image de sécurité incorporées dans l'état invisible pour distinguer celles-ci à partir des données d'image de ticket sans combiner de façon invisible les données d'image de sécurité.
  9. Procédé d'émission de ticket selon l'une quelconque des revendications 1 à 8, dans lequel les données d'image de sécurité sont composées des données d'identification d'utilisateur, des données d'émission de ticket et des données de temps, de type de données de ticket, des données de période disponible de ticket, des données de tarif de ticket et des données de commande.
  10. Procédé de collationnement de ticket comprenant les étapes de :
    génération des données d'image de ticket à partir des données de demande d'émission de ticket ;
    génération des données d'image de sécurité à partir des données de demande d'émission de ticket et des données d'identification d'utilisateur envoyées par un utilisateur via un moyen de communication, les données d'image de sécurité étant visibles lorsque les données d'image de sécurité elles-mêmes sont imprimées sans combinaison avec les données d'image de ticket et les données d'image de sécurité étant invisibles par rapport aux données d'image de ticket lorsque les données d'impression de ticket sont imprimées sur un papier de ticket par l'utilisateur ;
    génération de données d'impression de ticket en combinant les données d'image de sécurité et les données d'image de ticket ;
    envoi des données d'impression de ticket à l'utilisateur via le moyen de communication ;
    restauration des données d'image de sécurité à partir du ticket imprimé par l'utilisateur sur la base des données d'impression de ticket reçues ; et
    test de l'authenticité du ticket imprimé selon les données d'image de sécurité restaurées.
  11. Procédé de collationnement de ticket selon la revendication 10, dans lequel l'étape de restauration comprend l'étape de :
    élaboration des données d'image de sécurité visibles en superposant physiquement un masque en forme de feuille ayant un facteur de transmission de même modèle que les données d'image de modèle sur le ticket imprimé.
  12. Procédé selon la revendication 10, dans lequel l'étape de restauration comprend l'étape de :
    lecture des données de ticket imprimé optiquement et comparaison du signal lu obtenu avec le signal de masque représentant le même modèle que les données d'image de modèle, élaboration des parties commune des deux signaux invalides.
  13. Procédé de collationnement de ticket selon la revendication 10, dans lequel l'étape de restauration comprend l'étape de :
    lecture des données de ticket imprimées optiquement et exécution du traitement d'amincissement du signal de lecture obtenu sur la période correspondant à la fréquence spatiale des données d'image de modèle.
EP99125264A 1998-12-18 1999-12-17 Méthode et système d'édition de tickets et méthode de collationnement de tickets Expired - Lifetime EP1014318B1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
JP36072098A JP2000182086A (ja) 1998-12-18 1998-12-18 券発行方法および券照合方法
JP36072098 1998-12-18

Publications (3)

Publication Number Publication Date
EP1014318A2 EP1014318A2 (fr) 2000-06-28
EP1014318A3 EP1014318A3 (fr) 2000-09-20
EP1014318B1 true EP1014318B1 (fr) 2004-05-19

Family

ID=18470629

Family Applications (1)

Application Number Title Priority Date Filing Date
EP99125264A Expired - Lifetime EP1014318B1 (fr) 1998-12-18 1999-12-17 Méthode et système d'édition de tickets et méthode de collationnement de tickets

Country Status (4)

Country Link
EP (1) EP1014318B1 (fr)
JP (1) JP2000182086A (fr)
KR (1) KR100433590B1 (fr)
DE (1) DE69917417T2 (fr)

Cited By (53)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7366698B1 (en) 2000-08-11 2008-04-29 Jpmorgan Chase Bank, N.A. Trade receivable processing method and apparatus
US7668363B2 (en) 1999-05-11 2010-02-23 Jpmorgan Chase Bank, N.A. Lockbox imaging system
US7676409B1 (en) 2005-06-20 2010-03-09 Jpmorgan Chase Bank, N.A. Method and system for emulating a private label over an open network
US7689482B2 (en) 2002-05-24 2010-03-30 Jp Morgan Chase Bank, N.A. System and method for payer (buyer) defined electronic invoice exchange
US7692811B2 (en) 2005-07-07 2010-04-06 Konica Minolta Business Technologies, Inc. Image forming apparatus and method
US7702553B1 (en) 2003-11-06 2010-04-20 Jp Morgan Chase Bank, N.A. System and method for conversion of initial transaction to final transaction
US7734545B1 (en) 2006-06-14 2010-06-08 Jpmorgan Chase Bank, N.A. Method and system for processing recurring payments
US7743979B2 (en) 2004-02-25 2010-06-29 Jpmorgan Chase Bank, N.A. Method and system for credit card reimbursements for health care transactions
US7766244B1 (en) 2007-12-31 2010-08-03 Jpmorgan Chase Bank, N.A. System and method for processing transactions using a multi-account transactions device
US7769650B2 (en) 2002-12-03 2010-08-03 Jp Morgan Chase Bank Network-based sub-allocation systems and methods for swaps
US7792717B1 (en) 2003-10-31 2010-09-07 Jpmorgan Chase Bank, N.A. Waterfall prioritized payment processing
US7801814B2 (en) 2000-11-06 2010-09-21 Jpmorgan Chase Bank, N.A. System and method for selectable funding of electronic transactions
US7805365B1 (en) 1999-10-25 2010-09-28 Jpmorgan Chase Bank, N.A. Automated statement presentation, adjustment and payment system and method therefor
US7809636B1 (en) 1998-11-13 2010-10-05 Jpmorgan Chase Bank, N.A. System and method for multicurrency and multibank processing over a non-secure network
US7814003B2 (en) 2003-12-15 2010-10-12 Jp Morgan Chase Billing workflow system for crediting charges to entities creating derivatives exposure
US7822682B2 (en) 2005-06-08 2010-10-26 Jpmorgan Chase Bank, N.A. System and method for enhancing supply chain transactions
US7822656B2 (en) 2000-02-15 2010-10-26 Jpmorgan Chase Bank, N.A. International banking system and method
US7822684B2 (en) 2001-10-05 2010-10-26 Jpmorgan Chase Bank, N.A. Personalized bank teller machine
US7916925B2 (en) 2007-02-09 2011-03-29 Jpmorgan Chase Bank, N.A. System and method for generating magnetic ink character recognition (MICR) testing documents
US7945492B1 (en) 1998-12-23 2011-05-17 Jpmorgan Chase Bank, N.A. System and method for integrating trading operations including the generation, processing and tracking of and trade documents
US7987501B2 (en) 2001-12-04 2011-07-26 Jpmorgan Chase Bank, N.A. System and method for single session sign-on
US8121944B2 (en) 2004-06-24 2012-02-21 Jpmorgan Chase Bank, N.A. Method and system for facilitating network transaction processing
US8160960B1 (en) 2001-06-07 2012-04-17 Jpmorgan Chase Bank, N.A. System and method for rapid updating of credit information
US8185940B2 (en) 2001-07-12 2012-05-22 Jpmorgan Chase Bank, N.A. System and method for providing discriminated content to network users
US8244625B2 (en) 2002-05-24 2012-08-14 Jpmorgan Chase Bank, N.A. System and method for varying electronic settlements between buyers and suppliers with dynamic discount terms
US8290863B2 (en) 2004-07-23 2012-10-16 Jpmorgan Chase Bank, N.A. Method and system for expediting payment delivery
US8290862B2 (en) 2004-07-23 2012-10-16 Jpmorgan Chase Bank, N.A. Method and system for expediting payment delivery
US8301493B2 (en) 2002-11-05 2012-10-30 Jpmorgan Chase Bank, N.A. System and method for providing incentives to consumers to share information
US8301529B1 (en) 2005-11-02 2012-10-30 Jpmorgan Chase Bank, N.A. Method and system for implementing effective governance of transactions between trading partners
US8321682B1 (en) 2008-01-24 2012-11-27 Jpmorgan Chase Bank, N.A. System and method for generating and managing administrator passwords
US8391584B2 (en) 2008-10-20 2013-03-05 Jpmorgan Chase Bank, N.A. Method and system for duplicate check detection
USD678653S1 (en) 2012-07-19 2013-03-19 Jpmorgan Chase Bank, N.A. Drive-up financial transaction machine
US8447641B1 (en) 2010-03-29 2013-05-21 Jpmorgan Chase Bank, N.A. System and method for automatically enrolling buyers into a network
US8468071B2 (en) 2000-08-01 2013-06-18 Jpmorgan Chase Bank, N.A. Processing transactions using a register portion to track transactions
USD690074S1 (en) 2013-03-13 2013-09-17 Jpmorgan Chase Bank, N.A. Financial transaction machine
US8543503B1 (en) 2011-03-30 2013-09-24 Jpmorgan Chase Bank, N.A. Systems and methods for automated invoice entry
US8543504B1 (en) 2011-03-30 2013-09-24 Jpmorgan Chase Bank, N.A. Systems and methods for automated invoice entry
US8554673B2 (en) 2004-06-17 2013-10-08 Jpmorgan Chase Bank, N.A. Methods and systems for discounts management
US8589288B1 (en) 2010-10-01 2013-11-19 Jpmorgan Chase Bank, N.A. System and method for electronic remittance of funds
US8622308B1 (en) 2007-12-31 2014-01-07 Jpmorgan Chase Bank, N.A. System and method for processing transactions using a multi-account transactions device
US8630947B1 (en) 2003-04-04 2014-01-14 Jpmorgan Chase Bank, N.A. Method and system for providing electronic bill payment and presentment
US8726011B1 (en) 2007-05-17 2014-05-13 Jpmorgan Chase Bank, N.A. Systems and methods for managing digital certificates
CN103839324A (zh) * 2013-07-10 2014-06-04 天地融科技股份有限公司 智能卡及校验数据输出方法、操作请求响应方法及***
CN103839323A (zh) * 2013-07-10 2014-06-04 天地融科技股份有限公司 智能卡及校验数据输出方法、操作请求响应方法及***
US8762270B1 (en) 2007-08-10 2014-06-24 Jpmorgan Chase Bank, N.A. System and method for providing supplemental payment or transaction information
US8768836B1 (en) 2000-02-18 2014-07-01 Jpmorgan Chase Bank, N.A. System and method for electronic deposit of a financial instrument by banking customers from remote locations by use of a digital image
US8805739B2 (en) 2001-01-30 2014-08-12 Jpmorgan Chase Bank, National Association System and method for electronic bill pay and presentment
US8849716B1 (en) 2001-04-20 2014-09-30 Jpmorgan Chase Bank, N.A. System and method for preventing identity theft or misuse by restricting access
US9058626B1 (en) 2013-11-13 2015-06-16 Jpmorgan Chase Bank, N.A. System and method for financial services device usage
US9092447B1 (en) 2008-10-20 2015-07-28 Jpmorgan Chase Bank, N.A. Method and system for duplicate detection
US9374366B1 (en) 2005-09-19 2016-06-21 Jpmorgan Chase Bank, N.A. System and method for anti-phishing authentication
US9419957B1 (en) 2013-03-15 2016-08-16 Jpmorgan Chase Bank, N.A. Confidence-based authentication
CN103839323B (zh) * 2013-07-10 2016-11-30 天地融科技股份有限公司 智能卡及校验数据输出方法、操作请求响应方法及***

Families Citing this family (44)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7058817B1 (en) 1999-07-02 2006-06-06 The Chase Manhattan Bank System and method for single sign on process for websites with multiple applications and services
US6972859B1 (en) * 1999-07-22 2005-12-06 Eastman Kodak Company Authorizing the printing of digital images
AU3438401A (en) 1999-11-04 2001-05-14 Jp Morgan Chase Bank System and method for automated financial project management
US10275780B1 (en) 1999-11-24 2019-04-30 Jpmorgan Chase Bank, N.A. Method and apparatus for sending a rebate via electronic mail over the internet
US8571975B1 (en) 1999-11-24 2013-10-29 Jpmorgan Chase Bank, N.A. System and method for sending money via E-mail over the internet
US6842533B1 (en) * 1999-12-28 2005-01-11 Eastman Kodak Company Printing verified pre-approved images
KR20010078679A (ko) * 2000-02-09 2001-08-21 정관선 인터넷상에서 발급된 입장권을 이용한 사용자 통제방법 및장치
JP4495824B2 (ja) 2000-03-21 2010-07-07 株式会社東芝 情報処理方法
US7426530B1 (en) 2000-06-12 2008-09-16 Jpmorgan Chase Bank, N.A. System and method for providing customers with seamless entry to a remote server
US10185936B2 (en) 2000-06-22 2019-01-22 Jpmorgan Chase Bank, N.A. Method and system for processing internet payments
JP2002049941A (ja) * 2000-08-03 2002-02-15 Nec Fielding Ltd チケット販売方法、データ処理装置および方法、データ通信システム、情報記憶媒体
WO2002014075A1 (fr) * 2000-08-14 2002-02-21 Silverbrook Research Pty Ltd Imprimante a encre sympathique imprimant une interface sur une surface
US8335855B2 (en) 2001-09-19 2012-12-18 Jpmorgan Chase Bank, N.A. System and method for portal infrastructure tracking
KR100447448B1 (ko) * 2001-02-01 2004-09-04 권오봉 통신네트워크를 통해 발급되는 유가증권 및 증명서류의위/변조 방지 방법 및 인증코드를 구비한 신분증,금융카드, 의료보험카드
DE10115022A1 (de) * 2001-03-27 2002-10-10 Deutsch Zentr Luft & Raumfahrt Verfahren zum Verkauf von Tickets, wie Bahn-, Bus- oder Flugtickets
WO2003001363A1 (fr) 2001-06-25 2003-01-03 Jp Morgan Chase Bank Coupons electroniques et systeme et procede d'emission de ceux-ci
US7103576B2 (en) 2001-09-21 2006-09-05 First Usa Bank, Na System for providing cardless payment
CA2466071C (fr) 2001-11-01 2016-04-12 Bank One, Delaware, N.A. Systeme et procede pour etablir ou modifier un compte avec des termes selectionnables par l'utilisateur
US20180165441A1 (en) 2002-03-25 2018-06-14 Glenn Cobourn Everhart Systems and methods for multifactor authentication
CA2435659A1 (fr) 2002-07-23 2004-01-23 Kabushiki Kaisha Toshiba Methode de traitement d'image
US7058660B2 (en) 2002-10-02 2006-06-06 Bank One Corporation System and method for network-based project management
EP1584072A1 (fr) * 2003-01-13 2005-10-12 Elca Informatique S.A. Outil publicitaire imprime et procede de generation de cet outil
US10311412B1 (en) 2003-03-28 2019-06-04 Jpmorgan Chase Bank, N.A. Method and system for providing bundled electronic payment and remittance advice
JP4227048B2 (ja) 2003-04-25 2009-02-18 株式会社東芝 画像処理システム
JP2005094066A (ja) * 2003-09-12 2005-04-07 Digital Book Inc コンテンツ管理システム
US7353213B2 (en) * 2003-09-19 2008-04-01 Pitney Bowes Inc. System and method for preventing duplicate printing in a web browser
JP3913237B2 (ja) 2003-10-10 2007-05-09 キヤノン株式会社 情報処理装置および情報処理装置の制御方法
US7113925B2 (en) * 2005-01-19 2006-09-26 Echeck21, L.L.C. Electronic check
KR100691468B1 (ko) * 2005-03-02 2007-03-09 삼성전자주식회사 문서보안을 위한 인쇄방법 및 화상형성장치
JP2007329892A (ja) 2006-05-12 2007-12-20 Canon Inc 情報処理装置、画像処理装置、サーバ装置
US8793490B1 (en) 2006-07-14 2014-07-29 Jpmorgan Chase Bank, N.A. Systems and methods for multifactor authentication
JP5067092B2 (ja) * 2007-09-19 2012-11-07 大日本印刷株式会社 データ放送画面に二次元コードを表示させる方法、データ放送番組データ
US8112355B1 (en) 2008-09-05 2012-02-07 Jpmorgan Chase Bank, N.A. Method and system for buyer centric dispute resolution in electronic payment system
US9608826B2 (en) 2009-06-29 2017-03-28 Jpmorgan Chase Bank, N.A. System and method for partner key management
CN102411797A (zh) * 2010-09-20 2012-04-11 航天信息股份有限公司 票据信息打印方法及装置
CN102446264A (zh) * 2010-10-15 2012-05-09 航天信息股份有限公司 增值税专用***二维码的打印与扫描识别方法及***
FR2977057B1 (fr) * 2011-06-21 2013-11-29 Advanced Track & Trace Procede et dispositif d'authentification d'etiquette.
RU2014100681A (ru) 2011-06-21 2015-07-27 Эдванст Трэк Энд Трэйс Способ и устройство для установления подлинности этикетки
US10148726B1 (en) 2014-01-24 2018-12-04 Jpmorgan Chase Bank, N.A. Initiating operating system commands based on browser cookies
US11102372B2 (en) 2017-09-15 2021-08-24 Dai Nippon Printing Co., Ltd. Information recording body, medium and printed product
JP6979694B2 (ja) * 2018-03-22 2021-12-15 株式会社マーストーケンソリューション 隠蔽画像又は隠蔽情報を認証する認証システム、認証方法及び認証用プログラム
CN110515575B (zh) * 2018-05-21 2021-08-24 北京仁光科技有限公司 用于对一个子网内的计算机进行交互的装置和方法
JP7070152B2 (ja) * 2018-06-27 2022-05-18 凸版印刷株式会社 情報処理システム及び印刷媒体
CN112581701A (zh) * 2020-11-19 2021-03-30 广州地铁集团有限公司 一种一体式智能客服中心

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5568550A (en) * 1994-10-05 1996-10-22 Shmuel Ur Method and system for identifying documents generated by an unauthorized software copy
EP0921675A2 (fr) * 1997-12-03 1999-06-09 Kabushiki Kaisha Toshiba Procédé de traitement d'information d'image et procédé d'empêchement de la falsification de certificats ou même

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5721788A (en) * 1992-07-31 1998-02-24 Corbis Corporation Method and system for digital image signatures
DE69427497T2 (de) * 1993-01-19 2001-11-08 Canon Kk Bildverarbeitungsvorrichtung und -verfahren
US5606507A (en) 1994-01-03 1997-02-25 E-Stamp Corporation System and method for storing, retrieving and automatically printing postage on mail
US5598477A (en) * 1994-11-22 1997-01-28 Pitney Bowes Inc. Apparatus and method for issuing and validating tickets

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5568550A (en) * 1994-10-05 1996-10-22 Shmuel Ur Method and system for identifying documents generated by an unauthorized software copy
EP0921675A2 (fr) * 1997-12-03 1999-06-09 Kabushiki Kaisha Toshiba Procédé de traitement d'information d'image et procédé d'empêchement de la falsification de certificats ou même

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
SZEPANSKI W.: "A signal theoretic method for creating forgery-proof documents for automatic verification", 16 May 1979, IEEE, NEW YORK US *

Cited By (75)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7809636B1 (en) 1998-11-13 2010-10-05 Jpmorgan Chase Bank, N.A. System and method for multicurrency and multibank processing over a non-secure network
US7945492B1 (en) 1998-12-23 2011-05-17 Jpmorgan Chase Bank, N.A. System and method for integrating trading operations including the generation, processing and tracking of and trade documents
US7668363B2 (en) 1999-05-11 2010-02-23 Jpmorgan Chase Bank, N.A. Lockbox imaging system
US8045784B2 (en) 1999-05-11 2011-10-25 Jpmorgan Chase Bank, N.A. Lockbox imaging system
US7805365B1 (en) 1999-10-25 2010-09-28 Jpmorgan Chase Bank, N.A. Automated statement presentation, adjustment and payment system and method therefor
US8380597B2 (en) 2000-02-15 2013-02-19 Jpmorgan Chase Bank, N.A. International banking system and method
US8924289B1 (en) 2000-02-15 2014-12-30 Jpmorgan Chase Bank, N.A. International banking system and method
US7822656B2 (en) 2000-02-15 2010-10-26 Jpmorgan Chase Bank, N.A. International banking system and method
US8768836B1 (en) 2000-02-18 2014-07-01 Jpmorgan Chase Bank, N.A. System and method for electronic deposit of a financial instrument by banking customers from remote locations by use of a digital image
US8468071B2 (en) 2000-08-01 2013-06-18 Jpmorgan Chase Bank, N.A. Processing transactions using a register portion to track transactions
US8065231B1 (en) 2000-08-11 2011-11-22 Jpmorgan Chase Bank, N.A. Trade receivable processing method and apparatus
US7366698B1 (en) 2000-08-11 2008-04-29 Jpmorgan Chase Bank, N.A. Trade receivable processing method and apparatus
US7680735B1 (en) 2000-08-11 2010-03-16 Jpmorgan Chase Bank, N.A. Trade receivable processing method and apparatus
US7801814B2 (en) 2000-11-06 2010-09-21 Jpmorgan Chase Bank, N.A. System and method for selectable funding of electronic transactions
US8805739B2 (en) 2001-01-30 2014-08-12 Jpmorgan Chase Bank, National Association System and method for electronic bill pay and presentment
US8849716B1 (en) 2001-04-20 2014-09-30 Jpmorgan Chase Bank, N.A. System and method for preventing identity theft or misuse by restricting access
US8160960B1 (en) 2001-06-07 2012-04-17 Jpmorgan Chase Bank, N.A. System and method for rapid updating of credit information
US8185940B2 (en) 2001-07-12 2012-05-22 Jpmorgan Chase Bank, N.A. System and method for providing discriminated content to network users
US7822684B2 (en) 2001-10-05 2010-10-26 Jpmorgan Chase Bank, N.A. Personalized bank teller machine
US8707410B2 (en) 2001-12-04 2014-04-22 Jpmorgan Chase Bank, N.A. System and method for single session sign-on
US7987501B2 (en) 2001-12-04 2011-07-26 Jpmorgan Chase Bank, N.A. System and method for single session sign-on
US8484129B2 (en) 2002-05-24 2013-07-09 Jpmorgan Chase Bank, N.A. System and method for varying electronic settlements between buyers and suppliers with dynamic discount terms
US8244625B2 (en) 2002-05-24 2012-08-14 Jpmorgan Chase Bank, N.A. System and method for varying electronic settlements between buyers and suppliers with dynamic discount terms
US7689482B2 (en) 2002-05-24 2010-03-30 Jp Morgan Chase Bank, N.A. System and method for payer (buyer) defined electronic invoice exchange
US8301493B2 (en) 2002-11-05 2012-10-30 Jpmorgan Chase Bank, N.A. System and method for providing incentives to consumers to share information
US8015096B2 (en) 2002-12-03 2011-09-06 Jp Morgan Chase Bank Network-based sub-allocation systems and methods for swaps
US7769650B2 (en) 2002-12-03 2010-08-03 Jp Morgan Chase Bank Network-based sub-allocation systems and methods for swaps
US8630947B1 (en) 2003-04-04 2014-01-14 Jpmorgan Chase Bank, N.A. Method and system for providing electronic bill payment and presentment
US8620786B2 (en) 2003-10-31 2013-12-31 Us Bank National Association System and method for waterfall prioritized payment processing
US7792717B1 (en) 2003-10-31 2010-09-07 Jpmorgan Chase Bank, N.A. Waterfall prioritized payment processing
US7702577B1 (en) 2003-11-06 2010-04-20 Jp Morgan Chase Bank, N.A. System and method for conversion of initial transaction to final transaction
US7702553B1 (en) 2003-11-06 2010-04-20 Jp Morgan Chase Bank, N.A. System and method for conversion of initial transaction to final transaction
US7814003B2 (en) 2003-12-15 2010-10-12 Jp Morgan Chase Billing workflow system for crediting charges to entities creating derivatives exposure
US8160942B2 (en) 2003-12-15 2012-04-17 Jp Morgan Chase Bank Billing workflow system for crediting charges to entities creating derivatives exposure
US7743979B2 (en) 2004-02-25 2010-06-29 Jpmorgan Chase Bank, N.A. Method and system for credit card reimbursements for health care transactions
US8554673B2 (en) 2004-06-17 2013-10-08 Jpmorgan Chase Bank, N.A. Methods and systems for discounts management
US8121944B2 (en) 2004-06-24 2012-02-21 Jpmorgan Chase Bank, N.A. Method and system for facilitating network transaction processing
US8396798B2 (en) 2004-06-24 2013-03-12 Jpmorgan Chase Bank, N.A. Method and system for facilitating network transaction processing
US8290862B2 (en) 2004-07-23 2012-10-16 Jpmorgan Chase Bank, N.A. Method and system for expediting payment delivery
US8290863B2 (en) 2004-07-23 2012-10-16 Jpmorgan Chase Bank, N.A. Method and system for expediting payment delivery
US7822682B2 (en) 2005-06-08 2010-10-26 Jpmorgan Chase Bank, N.A. System and method for enhancing supply chain transactions
US7676409B1 (en) 2005-06-20 2010-03-09 Jpmorgan Chase Bank, N.A. Method and system for emulating a private label over an open network
US8170936B2 (en) 2005-06-20 2012-05-01 Jpmorgan Chase Bank, N.A. Method and system for emulating a private label over an open network
US7692811B2 (en) 2005-07-07 2010-04-06 Konica Minolta Business Technologies, Inc. Image forming apparatus and method
US9374366B1 (en) 2005-09-19 2016-06-21 Jpmorgan Chase Bank, N.A. System and method for anti-phishing authentication
US9020850B1 (en) 2005-11-02 2015-04-28 Jpmorgan Chase Bank, N.A. Method and system for implementing effective governance of transactions between trading partners
US8301529B1 (en) 2005-11-02 2012-10-30 Jpmorgan Chase Bank, N.A. Method and system for implementing effective governance of transactions between trading partners
US7734545B1 (en) 2006-06-14 2010-06-08 Jpmorgan Chase Bank, N.A. Method and system for processing recurring payments
US7904388B1 (en) 2006-06-14 2011-03-08 Jpmorgan Chase Bank, N.A. Method and system for processing recurring payments
US8121385B1 (en) 2007-02-09 2012-02-21 Jpmorgan Chase Bank, N.A. System and method for generating magnetic ink character recognition (MICR) testing documents
US7916925B2 (en) 2007-02-09 2011-03-29 Jpmorgan Chase Bank, N.A. System and method for generating magnetic ink character recognition (MICR) testing documents
US8726011B1 (en) 2007-05-17 2014-05-13 Jpmorgan Chase Bank, N.A. Systems and methods for managing digital certificates
US8762270B1 (en) 2007-08-10 2014-06-24 Jpmorgan Chase Bank, N.A. System and method for providing supplemental payment or transaction information
US8459562B1 (en) 2007-12-31 2013-06-11 Jpmorgan Chase Bank, N.A. System and method for processing transactions using a multi-account transactions device
US8622308B1 (en) 2007-12-31 2014-01-07 Jpmorgan Chase Bank, N.A. System and method for processing transactions using a multi-account transactions device
US7766244B1 (en) 2007-12-31 2010-08-03 Jpmorgan Chase Bank, N.A. System and method for processing transactions using a multi-account transactions device
US8549315B2 (en) 2008-01-24 2013-10-01 Jpmorgan Chase Bank, N.A. System and method for generating and managing administrator passwords
US8321682B1 (en) 2008-01-24 2012-11-27 Jpmorgan Chase Bank, N.A. System and method for generating and managing administrator passwords
US8639017B1 (en) 2008-10-20 2014-01-28 Jpmorgan Chase Bank, N.A. Method and system for duplicate check detection
US8391584B2 (en) 2008-10-20 2013-03-05 Jpmorgan Chase Bank, N.A. Method and system for duplicate check detection
US9092447B1 (en) 2008-10-20 2015-07-28 Jpmorgan Chase Bank, N.A. Method and system for duplicate detection
US8447641B1 (en) 2010-03-29 2013-05-21 Jpmorgan Chase Bank, N.A. System and method for automatically enrolling buyers into a network
US8589288B1 (en) 2010-10-01 2013-11-19 Jpmorgan Chase Bank, N.A. System and method for electronic remittance of funds
US8543504B1 (en) 2011-03-30 2013-09-24 Jpmorgan Chase Bank, N.A. Systems and methods for automated invoice entry
US8543503B1 (en) 2011-03-30 2013-09-24 Jpmorgan Chase Bank, N.A. Systems and methods for automated invoice entry
USD678653S1 (en) 2012-07-19 2013-03-19 Jpmorgan Chase Bank, N.A. Drive-up financial transaction machine
USD693984S1 (en) 2012-07-19 2013-11-19 Jpmorgan Chase Bank, N.A. Drive-up financial transaction machine
USD690074S1 (en) 2013-03-13 2013-09-17 Jpmorgan Chase Bank, N.A. Financial transaction machine
US9419957B1 (en) 2013-03-15 2016-08-16 Jpmorgan Chase Bank, N.A. Confidence-based authentication
CN103839323A (zh) * 2013-07-10 2014-06-04 天地融科技股份有限公司 智能卡及校验数据输出方法、操作请求响应方法及***
CN103839324A (zh) * 2013-07-10 2014-06-04 天地融科技股份有限公司 智能卡及校验数据输出方法、操作请求响应方法及***
CN103839324B (zh) * 2013-07-10 2016-08-10 天地融科技股份有限公司 智能卡及校验数据输出方法、操作请求响应方法及***
CN103839323B (zh) * 2013-07-10 2016-11-30 天地融科技股份有限公司 智能卡及校验数据输出方法、操作请求响应方法及***
US9058626B1 (en) 2013-11-13 2015-06-16 Jpmorgan Chase Bank, N.A. System and method for financial services device usage
US9460469B1 (en) 2013-11-13 2016-10-04 Jpmorgan Chase Bank, N.A. System and method for financial services device usage

Also Published As

Publication number Publication date
KR100433590B1 (ko) 2004-05-31
EP1014318A2 (fr) 2000-06-28
JP2000182086A (ja) 2000-06-30
DE69917417D1 (de) 2004-06-24
DE69917417T2 (de) 2005-06-02
KR20000048145A (ko) 2000-07-25
EP1014318A3 (fr) 2000-09-20

Similar Documents

Publication Publication Date Title
EP1014318B1 (fr) Méthode et système d'édition de tickets et méthode de collationnement de tickets
US6512915B2 (en) Recording medium outputting method, database server, recording medium outputting apparatus, and recording medium outputting system
US6438251B1 (en) Method of processing image information and method of preventing forgery of certificates or the like
US7301654B2 (en) Image data outputting apparatus and image data outputting method
EP0730243B1 (fr) Système et méthode de vérification de cartes d'identification
US6985600B2 (en) Printing media and methods employing digital watermarking
CA2170440C (fr) Carte d'identite a auto-verification
EP1319520B1 (fr) Méthode et dispositif pour l'intégration des images encryptées des signatures et autres données sur chèques
EP1432234B1 (fr) Systèmes et procédés pour la production des documents securisés imprimés et pour la validation de ceux-ci
US6768558B1 (en) Printed matter including invisible information and printing system
US7778437B2 (en) Media and methods employing steganographic marking
JP2004127297A (ja) 拡張された視認品質を有するバーコード、および、そのシステムおよび方法
US6636614B1 (en) Method for preventing the falsification of documents comprising a photograph, preferably a facial-view photograph
US20040150216A1 (en) Method for printing and verifying limited edition stamps
US20090037974A1 (en) Security document printing system and method of controlling the same
JP2001126046A (ja) Icカード、icカード認証システム、及びその認証方法
JP3468608B2 (ja) 印刷物の検証装置
JPH11168616A (ja) 画像情報処理方法および画像情報処理装置
WO2001097175A1 (fr) Systeme et procede destines a l'emission et a l'authentification d'un billet par technique de filigrane numerique
JP2003060890A (ja) 通信ネットワークを利用した個人認証システム
JP2001094755A (ja) 画像処理方法

Legal Events

Date Code Title Description
PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text: ORIGINAL CODE: 0009012

17P Request for examination filed

Effective date: 19991217

AK Designated contracting states

Kind code of ref document: A2

Designated state(s): DE FR GB

AX Request for extension of the european patent

Free format text: AL;LT;LV;MK;RO;SI

PUAL Search report despatched

Free format text: ORIGINAL CODE: 0009013

AK Designated contracting states

Kind code of ref document: A3

Designated state(s): AT BE CH CY DE DK ES FI FR GB GR IE IT LI LU MC NL PT SE

AX Request for extension of the european patent

Free format text: AL;LT;LV;MK;RO;SI

RIC1 Information provided on ipc code assigned before grant

Free format text: 7G 07F 17/42 A, 7G 07B 1/02 B, 7G 07D 7/12 B

AKX Designation fees paid

Free format text: DE FR GB

17Q First examination report despatched

Effective date: 20020322

GRAP Despatch of communication of intention to grant a patent

Free format text: ORIGINAL CODE: EPIDOSNIGR1

GRAS Grant fee paid

Free format text: ORIGINAL CODE: EPIDOSNIGR3

GRAA (expected) grant

Free format text: ORIGINAL CODE: 0009210

AK Designated contracting states

Kind code of ref document: B1

Designated state(s): DE FR GB

REG Reference to a national code

Ref country code: GB

Ref legal event code: FG4D

REF Corresponds to:

Ref document number: 69917417

Country of ref document: DE

Date of ref document: 20040624

Kind code of ref document: P

ET Fr: translation filed
PLBE No opposition filed within time limit

Free format text: ORIGINAL CODE: 0009261

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: NO OPPOSITION FILED WITHIN TIME LIMIT

26N No opposition filed

Effective date: 20050222

PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code: GB

Payment date: 20061213

Year of fee payment: 8

GBPC Gb: european patent ceased through non-payment of renewal fee

Effective date: 20071217

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: GB

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20071217

PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code: FR

Payment date: 20091221

Year of fee payment: 11

PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code: DE

Payment date: 20091222

Year of fee payment: 11

REG Reference to a national code

Ref country code: FR

Ref legal event code: ST

Effective date: 20110831

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: FR

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20110103

REG Reference to a national code

Ref country code: DE

Ref legal event code: R119

Ref document number: 69917417

Country of ref document: DE

Effective date: 20110701

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: DE

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20110701