WO2002041560A2 - Access control systems and methods - Google Patents

Access control systems and methods Download PDF

Info

Publication number
WO2002041560A2
WO2002041560A2 PCT/US2001/050071 US0150071W WO0241560A2 WO 2002041560 A2 WO2002041560 A2 WO 2002041560A2 US 0150071 W US0150071 W US 0150071W WO 0241560 A2 WO0241560 A2 WO 0241560A2
Authority
WO
WIPO (PCT)
Prior art keywords
access
person
computer
badge
data
Prior art date
Application number
PCT/US2001/050071
Other languages
French (fr)
Other versions
WO2002041560A3 (en
Inventor
Bruce L. Davis
Geoffrey B. Rhoads
Original Assignee
Digimarc Corporation
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Digimarc Corporation filed Critical Digimarc Corporation
Priority to AU2002239691A priority Critical patent/AU2002239691A1/en
Publication of WO2002041560A2 publication Critical patent/WO2002041560A2/en
Publication of WO2002041560A3 publication Critical patent/WO2002041560A3/en

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/22Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder
    • G07C9/25Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder using biometric data, e.g. fingerprints, iris scans or voice recognition
    • G07C9/253Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder using biometric data, e.g. fingerprints, iris scans or voice recognition visually
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C11/00Arrangements, systems or apparatus for checking, e.g. the occurrence of a condition, not provided for elsewhere
    • G07C2011/02Arrangements, systems or apparatus for checking, e.g. the occurrence of a condition, not provided for elsewhere related to amusement parks

Definitions

  • the present assignee's application 09/563,663 also relates to access control systems.
  • Access badges are familiar, and are used in a variety of corporate and government facilities.
  • One popular card is printed with a picture of the bearer, and includes communication means (e.g., mag stripe or RF ID) for communicating with a reader device adjacent locked doorways.
  • communication means e.g., mag stripe or RF ID
  • a badge for use by a visitor to a facility is produced by the visitor himself or herself, at a location remote from the facility.
  • the badge can include a photograph of the visitor (e.g., obtained from an image database maintained by a state or federal agency, such as a state department of motor vehicles), and can also include a machine-readable access code. This code, provided to the visitor in advance of their visit, defines certain privileges that the visitor is authorized to enjoy at the facility, including unescorted access to certain areas, access to certain computer resources, etc.
  • the digital data includes an index that identifies a (remote) database record from which additional information relating to the encoded object can be retrieved, e.g., for purposes of display, to control further device action, etc.
  • the present assignee offers a service, termed Digimarc
  • MediaBridge that employs such principles to permit users to link from physical objects (e.g., magazine pages or mailings) to corresponding web sites.
  • physical objects e.g., magazine pages or mailings
  • a user shows the object to a web cam-equipped device, which decodes the data embedded with the object, and consults a corresponding database record to determine the appropriate URL.
  • Digimarc MediaBridge data the information payload that is encoded by an object.
  • the employer e-mails or otherwise sends the candidate an access code.
  • the code can be encrypted for transmission.
  • the code is valid only for a certain time period on a given date (e.g., 9:00 a.m. - 11:00 a.m. on June 28, 1999).
  • the candidate Upon receipt of the access code, the candidate downloads from the web site of the state Department of Motor Nehicles the latest copy of her driver's license photo.
  • the DMN has already encoded this photo with watermark data.
  • This data identifies the electronic address of a state-run DMN server, and a particular record on that server corresponding to the photograph/candidate.
  • This DMN computer record includes a text string indicating the name of the person depicted by the photograph.
  • the data encoded in the DMN photo can be Digimarc MediaBridge data that identifies a Digimarc MediaBridge database record, which in turn provides the address of the DMN server, and identifies the particular record on that server corresponding to the photograph.
  • the candidate incorporates this photo into an access badge.
  • a software application (which may be provided especially for such purposes, e.g., as part of an office productivity suite)
  • the photo is dragged into an access badge template.
  • the access code emailed from the employer is also provided to this application.
  • an ink-jet printer associated with the candidate's computer prints out an access badge that includes the candidate's DMN photo and her name, and is also provided with the employer-provided access code in some machine-readable form (e.g., by digital watermark, barcode, etc.).
  • the name printed on the badge is not typed by the candidate, but is obtained (by the candidate's computer) from the DMN's server, in response to the data encoded in the DMN photograph.
  • the photograph is not scanned as part of a watermark reading process. Instead, the photograph is already available in digital form, so watermark decoding can proceed directly from the digital representation.
  • the access code is encoded on the card using digital watermarking of the printed badge
  • the watermarking format employed can be non-standard to deter hackers.
  • the embedding of this access code can span the entire face of the card, or can be limited to certain regions (e.g., excluding the region occupied by the photograph).
  • the candidate presents herself at the employer's building.
  • the candidate presents the badge to an optical sensor device, which reads the embedded building access code, checks it for authenticity and, if the candidate arrived within the permitted hours, unlocks the door.
  • the optical sensor can also capture and store a picture of the person presenting the access card, if desired.
  • the candidate may encounter a security guard. Seeing an unfamiliar person, the guard may visually compare the photo on the badge with the candidate's face. Additionally, the guard can present the badge to a portable Digimarc MediaBridge device, or to one of many MediaBridge systems scattered through the building (e.g., at every telephone).
  • the Digimarc MediaBridge system extracts the MediaBridge data from the card (e.g., from the DMN photograph), interrogates the DMN's server record corresponding to this data (again, typically through an intervening Digimarc MediaBridge database record), and receives in reply the name of the person depicted in the photograph.
  • the Digimarc MediaBridge device is a telephone device, the name may be displayed on a small LCD display commonly provided on telephones.
  • the guard checks the name returned by the Digimarc MediaBridge system with the name printed on the badge. On seeing that the printed and MediaBridge-decoded names match (and optionally checking the door log to see that a person of that name was authorized to enter and did so), the security guard can let the candidate pass. It will be recognized that the just-described arrangement offers very high security, yet this security is achieved with without the candidate ever previously visiting the employer, without the employer knowing what the candidate looks like, and by use of an access badge produced by the candidate herself.
  • the badge can additionally be encoded with the identity of the person to be visited.
  • this person's name can be associated with the access code encoded on the candidate's badge (e.g., in a data record maintained by the access control computer system used by the employer).
  • email and/or voice mail can be dispatched to that person being visited (or that person's administrative assistant), notifying them that the visitor has arrived.
  • the access code can permit multiple visits - not just one.
  • the authorized visits can be specified, e.g., by dates and times.
  • the access code can permit a predetermined number of visits (e.g., 5), without regard to specifics.
  • combinations of such approaches can be employed (e.g., authorizing up to 5 visits, but none after 12/31/2000).
  • the access code can convey other privileges to the visitor. For example, certain visitors may be authorized to access certain parts of the facility unescorted. Other visitors may be authorized to access certain resources on the company's computer network, using the badge as a network logon credential. Again, these privileges may be limited in time.
  • the access control computer system used by the employer has a data record associated with each access code, in which associated information, such as the dates and times of permitted visits, the name of the person being visited, the phone extension of that person, escort requirements, computer privileges, etc., etc. is specified.
  • information is not associated with the access code, but is otherwise indicated by the badge.
  • the information can be steganographically encoded on the badge.
  • data can be associated with data - other than the access code - that is encoded on the badge.
  • the badge described above can lose its authorization with the passage of time (e.g., not valid after 11 :00 a.m. on June 29, 1999), or with any other event or circumstance (e.g., upon display of the badge to an access control device when exiting the building).
  • the termination of authorization does not physically change the badge, but rather is manifested in data maintained by the access control computer used by the employer.
  • Any trusted repository of personal image data can be employed. Desirably, access to any such repository is controlled, by suitable security techniques, to assure that a person's image is not freely available to the public, but is accessible only to that person, and perhaps appropriate government users.
  • documents not employing photographs can be created and utilized according to the principles detailed above.
  • Authentication of the user may be performed by means other than photographic identification, e.g., biometrics, shared secrets, etc., that are encoded on the document (or are stored elsewhere and can be linked-to using data stored on the card) While the focus of the foregoing discussion was on badges for use at government and corporate facilities, the principles are more broadly applicable. For example, identity documents may similarly be provided for residences, schools, businesses, institutions, theme parks, etc. Similarly, the principles are not limited for use with badges or access cards, but with any high security document.

Landscapes

  • Engineering & Computer Science (AREA)
  • Human Computer Interaction (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Lock And Its Accessories (AREA)
  • Editing Of Facsimile Originals (AREA)

Abstract

An access control system, for buildings, networks, and equipment or the like, that is responsive to photographic badges or other tokens of identification. A visitor or user of the disclosed system can make their own badge in advance, at a location remote from the facility, network or equipment. The badge can include a photograph of the visitor (e.g., obtained from an image database maintained by a state or federal agency, such as a state department of motor vehicles, or another trusted source), and can also include a machine-readable access code. This code, provided to the visitor or user in advance of the visit or use, can define certain privileges that the visitor or user is authorized to enjoy a the building, etc., including unescorted access to certain areas, access to certain computer resources, permission to operate equipment, etc.

Description

ACCESS CONTROL SYSTEMS AND METHODS
Related Application Data The present application is a continuation-in-part of application 09/343,104, filed June 29, 1999. This application is also a continuation-in-part of application 09/198,022, filed November 23, 1998, which is a continuation of application 08/763,847, filed December 4, 1996 (now patent 5,841,886), which is a continuation of application 08/512,993, filed August 9, 1995, now abandoned.
The present assignee's application 09/563,663 also relates to access control systems.
Background and Summary of the Invention Access badges are familiar, and are used in a variety of corporate and government facilities. One popular card is printed with a picture of the bearer, and includes communication means (e.g., mag stripe or RF ID) for communicating with a reader device adjacent locked doorways.
While satisfactory in some contexts, such badges are unsatisfactory in others. For example, visitors to a facility are commonly issued a generic, passive badge that offers little functionality, and rarely any security. In accordance with one aspect of the present invention, a badge for use by a visitor to a facility is produced by the visitor himself or herself, at a location remote from the facility. The badge can include a photograph of the visitor (e.g., obtained from an image database maintained by a state or federal agency, such as a state department of motor vehicles), and can also include a machine-readable access code. This code, provided to the visitor in advance of their visit, defines certain privileges that the visitor is authorized to enjoy at the facility, including unescorted access to certain areas, access to certain computer resources, etc.
The foregoing and additional features and advantages of the present invention will be more readily apparent from the following detailed description. Detailed Description In copending application 09/571,422, the present assignee discloses a variety of systems that permit digital data to be conveyed by physical objects, including cards and badges, permitting such objects to trigger various responses from compliant digital devices. In systems employing optical encoding of the digital data (e.g., digital watermarks), the reading devices can employ optical sensors, such as web cams. The optical encoding can be manifested, e.g., by ink applied to a substrate by an ink jet printer.
(A variety of watermarking techniques are known and are suitable in such applications. Exemplary watermarking technologies are detailed in the present assignee's patent 5,862,260, and pending application 09/09/503,881.)
In many embodiments detailed in the '422 application, the digital data includes an index that identifies a (remote) database record from which additional information relating to the encoded object can be retrieved, e.g., for purposes of display, to control further device action, etc. The present assignee offers a service, termed Digimarc
MediaBridge, that employs such principles to permit users to link from physical objects (e.g., magazine pages or mailings) to corresponding web sites. (I.e., a user shows the object to a web cam-equipped device, which decodes the data embedded with the object, and consults a corresponding database record to determine the appropriate URL.) In the following discussion, the information payload that is encoded by an object is termed Digimarc MediaBridge data.
To illustrate an embodiment according to the present invention, consider an employment candidate who will be interviewing at a new employer. The candidate's visit is expected, but she is not recognized by the building's security personnel. In this, and many other applications, arrangements like the following can be used:
The employer e-mails or otherwise sends the candidate an access code. (The code can be encrypted for transmission.) The code is valid only for a certain time period on a given date (e.g., 9:00 a.m. - 11:00 a.m. on June 28, 1999).
Upon receipt of the access code, the candidate downloads from the web site of the state Department of Motor Nehicles the latest copy of her driver's license photo.
The DMN has already encoded this photo with watermark data. This data identifies the electronic address of a state-run DMN server, and a particular record on that server corresponding to the photograph/candidate. This DMN computer record, in turn, includes a text string indicating the name of the person depicted by the photograph. (The data encoded in the DMN photo can be Digimarc MediaBridge data that identifies a Digimarc MediaBridge database record, which in turn provides the address of the DMN server, and identifies the particular record on that server corresponding to the photograph.)
The candidate incorporates this photo into an access badge. Using a software application (which may be provided especially for such purposes, e.g., as part of an office productivity suite), the photo is dragged into an access badge template. The access code emailed from the employer is also provided to this application. On selecting "Print," an ink-jet printer associated with the candidate's computer prints out an access badge that includes the candidate's DMN photo and her name, and is also provided with the employer-provided access code in some machine-readable form (e.g., by digital watermark, barcode, etc.). Desirably, the name printed on the badge is not typed by the candidate, but is obtained (by the candidate's computer) from the DMN's server, in response to the data encoded in the DMN photograph. (In this application, unlike some, the photograph is not scanned as part of a watermark reading process. Instead, the photograph is already available in digital form, so watermark decoding can proceed directly from the digital representation.)
For security purposes, in cases where the access code is encoded on the card using digital watermarking of the printed badge, the watermarking format employed can be non-standard to deter hackers. The embedding of this access code can span the entire face of the card, or can be limited to certain regions (e.g., excluding the region occupied by the photograph).
On the appointed day the candidate presents herself at the employer's building. At the exterior door lock, the candidate presents the badge to an optical sensor device, which reads the embedded building access code, checks it for authenticity and, if the candidate arrived within the permitted hours, unlocks the door. The optical sensor can also capture and store a picture of the person presenting the access card, if desired. Inside the building the candidate may encounter a security guard. Seeing an unfamiliar person, the guard may visually compare the photo on the badge with the candidate's face. Additionally, the guard can present the badge to a portable Digimarc MediaBridge device, or to one of many MediaBridge systems scattered through the building (e.g., at every telephone). The Digimarc MediaBridge system extracts the MediaBridge data from the card (e.g., from the DMN photograph), interrogates the DMN's server record corresponding to this data (again, typically through an intervening Digimarc MediaBridge database record), and receives in reply the name of the person depicted in the photograph. (If the Digimarc MediaBridge device is a telephone device, the name may be displayed on a small LCD display commonly provided on telephones.) The guard checks the name returned by the Digimarc MediaBridge system with the name printed on the badge. On seeing that the printed and MediaBridge-decoded names match (and optionally checking the door log to see that a person of that name was authorized to enter and did so), the security guard can let the candidate pass. It will be recognized that the just-described arrangement offers very high security, yet this security is achieved with without the candidate ever previously visiting the employer, without the employer knowing what the candidate looks like, and by use of an access badge produced by the candidate herself.
A number of variants on the arrangement just described are, of course, possible. For example, the badge can additionally be encoded with the identity of the person to be visited. Or this person's name can be associated with the access code encoded on the candidate's badge (e.g., in a data record maintained by the access control computer system used by the employer). In either event, once the badge is sensed at the facility, email and/or voice mail can be dispatched to that person being visited (or that person's administrative assistant), notifying them that the visitor has arrived.
Likewise, the access code can permit multiple visits - not just one. The authorized visits can be specified, e.g., by dates and times. Or the access code can permit a predetermined number of visits (e.g., 5), without regard to specifics. Or combinations of such approaches can be employed (e.g., authorizing up to 5 visits, but none after 12/31/2000).
The access code can convey other privileges to the visitor. For example, certain visitors may be authorized to access certain parts of the facility unescorted. Other visitors may be authorized to access certain resources on the company's computer network, using the badge as a network logon credential. Again, these privileges may be limited in time.
In many of the above-described arrangements, it is contemplated that the access control computer system used by the employer has a data record associated with each access code, in which associated information, such as the dates and times of permitted visits, the name of the person being visited, the phone extension of that person, escort requirements, computer privileges, etc., etc. is specified. In other arrangements, such information is not associated with the access code, but is otherwise indicated by the badge. For example, the information can be steganographically encoded on the badge. Or such data can be associated with data - other than the access code - that is encoded on the badge.
The badge described above can lose its authorization with the passage of time (e.g., not valid after 11 :00 a.m. on June 29, 1999), or with any other event or circumstance (e.g., upon display of the badge to an access control device when exiting the building). The termination of authorization does not physically change the badge, but rather is manifested in data maintained by the access control computer used by the employer.
While reference was made to a database of images maintained by the state department of motor vehicles, this is not essential. Any trusted repository of personal image data can be employed. Desirably, access to any such repository is controlled, by suitable security techniques, to assure that a person's image is not freely available to the public, but is accessible only to that person, and perhaps appropriate government users. In other applications, documents not employing photographs can be created and utilized according to the principles detailed above. Authentication of the user may be performed by means other than photographic identification, e.g., biometrics, shared secrets, etc., that are encoded on the document (or are stored elsewhere and can be linked-to using data stored on the card) While the focus of the foregoing discussion was on badges for use at government and corporate facilities, the principles are more broadly applicable. For example, identity documents may similarly be provided for residences, schools, businesses, institutions, theme parks, etc. Similarly, the principles are not limited for use with badges or access cards, but with any high security document.
The foregoing description does not belabor specifics of access control systems, such as details of the access control computer, the solenoid-controlled door latches, etc., that are familiar to those skilled in the art.
It should be recognized that the particular combinations of elements and features in the above-detailed arrangements are exemplary only; the interchanging and substitution of these teachings with other teachings in this and the incorporated-by- reference patents and applications are also contemplated. Moreover, there are numerous opportunities to combine elements of the systems detailed above with other access control technologies for high security applications. For example, specific permissions may be granted to selected persons who would otherwise have only general access privileges. The technology can serve to centralize permissions management in a secure access systems, while simultaneously facilitation convenience and economy in distributing/communicating privileges to users.
In view of the wide variety of embodiments to which the principles and features discussed above can be applied, it should be apparent that the detailed embodiments are illustrative only and should not be taken as limiting the scope of the invention. Rather, we claim as our invention all such modifications as may come within the scope and spirit of the following claims and equivalents thereof.

Claims

I CLAIM:
1. A method of producing an access badge for use by a person when visiting a corporate or governmental facility, the method being practiced by said person using a computer, in advance of the visit, the method comprising: receiving an access code from the company; obtaining from a trusted database a digital image of the person, said image having first digital watermark data therein, said first digital watermark data identifying a database record where information about the person depicted in the image is stored; decoding, using the person's computer, said first digital watermark data from the digital image; using the decoded first digital watermark data to access said database record and to obtain therefrom textual information associated with said image; generating, on the person's computer, artwork that includes at least portions of said digital image and said textual information, at least some of said artwork being digitally watermarked with a second digital watermark, said second digital watermark representing said received access code; and printing a substrate in accordance with said generated artwork to produce a badge; wherein a valid visitor's access badge is produced by the person himself or herself, without need for the person to previously visit the company facility, and without the company previously knowing what the person looks like.
2. A badge produced according to the method of claim 1.
3. A computer readable storage medium having stored thereon software instructions for causing a computer to perform the method of claim 1.
4. A method of producing a visitor badge for use by a visitor in visiting a corporate or government facility, characterized in that the badge is produced by the visitor, and at a location remote from said facility.
5. hi an identification document comprising a substrate having printing thereon, the printing including text specifying the user's name, the printing defining a first steganographic watermark, an improvement wherein the printing further defines a second steganographic watermark, one of said watermarks encoding an access code by which a compliant access control system can determine whether access is to be granted, the other of said watermarks encoding an index identifying a computer record at which further information about the user is stored.
6. In an access control system that includes a computer and one or more interface devices for interacting with an access object, such as a badge, to permit access to a restricted resource, an improvement wherein the interface device includes an imaging sensor for producing two dimensional image data corresponding to said access object, and a digital watermark detector for decoding watermark data from said image data.
7. The system of claim 6 wherein the restricted resource is an area to which access is restricted by a locked door.
8. The system of claim 6 wherein the restricted resource is a networked computer.
9. The system of claim 6 wherein the restricted resource is an item of equipment.
10. The system of claim 6 in which the watermark data includes a code, and the computer includes data associated with said code, said data identifying at least one of: a permitted time period during which access to said restricted resource is permitted, whether an escort is required, and a person to be visited by a visitor using said access object.
11. A database comprising plural records, each including a facial image, at least certain of said images being digitally watermarked.
12. The database of claim 11 wherein data conveyed by one of said digital watermarks permits the watermarked image to be linked with text data indicating the name of the person depicted in the image.
13. hi a method of logging onto a computer network that includes inputting a credential to a computer so as to permit a user to access the network, an improvement comprising sensing 2D image data from an object presented to the computer by the user; decoding a digital watermark from the 2D image data, and using said decoded watermark in determining whether to permit the user to access the network.
14. The method of claim 13 that includes sensing the 2D image data from a photo ID presented by the user.
15. A computer readable storage medium having stored thereon software instructions for causing a computer to perform the method of claim 13.
16. A method of producing an access badge for use by a person when visiting a facility, the method being practiced by said person using a computer, in advance of the visit, the method comprising: receiving an access code from the company; providing to the computer authentication information by which the person's identification can be confirmed; generating, on the person's computer, artwork that conveys said authentication information, at least some of said artwork being digitally watermarked with a digital watermark, said digital watermark representing said received access code; and printing a substrate in accordance with said generated artwork to produce a badge; wherein a valid visitor's access badge is produced by the person himself or herself, without need for the person to previously visit the company facility.
PCT/US2001/050071 2000-10-25 2001-10-24 Access control systems and methods WO2002041560A2 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
AU2002239691A AU2002239691A1 (en) 2000-10-25 2001-10-24 Access control systems and methods

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US69701500A 2000-10-25 2000-10-25
US09/697,015 2000-10-25

Publications (2)

Publication Number Publication Date
WO2002041560A2 true WO2002041560A2 (en) 2002-05-23
WO2002041560A3 WO2002041560A3 (en) 2003-01-30

Family

ID=24799432

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2001/050071 WO2002041560A2 (en) 2000-10-25 2001-10-24 Access control systems and methods

Country Status (2)

Country Link
AU (1) AU2002239691A1 (en)
WO (1) WO2002041560A2 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110097669A (en) * 2019-04-19 2019-08-06 广东中安金狮科创有限公司 Region security system

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5280527A (en) * 1992-04-14 1994-01-18 Kamahira Safe Co., Inc. Biometric token for authorizing access to a host system
US5321751A (en) * 1993-02-18 1994-06-14 Eastman Kodak Company Method and apparatus for credit card verification
US5799092A (en) * 1995-02-28 1998-08-25 Lucent Technologies Inc. Self-verifying identification card
US5864622A (en) * 1992-11-20 1999-01-26 Pitney Bowes Inc. Secure identification card and method and apparatus for producing and authenticating same

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5280527A (en) * 1992-04-14 1994-01-18 Kamahira Safe Co., Inc. Biometric token for authorizing access to a host system
US5864622A (en) * 1992-11-20 1999-01-26 Pitney Bowes Inc. Secure identification card and method and apparatus for producing and authenticating same
US5321751A (en) * 1993-02-18 1994-06-14 Eastman Kodak Company Method and apparatus for credit card verification
US5799092A (en) * 1995-02-28 1998-08-25 Lucent Technologies Inc. Self-verifying identification card

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110097669A (en) * 2019-04-19 2019-08-06 广东中安金狮科创有限公司 Region security system

Also Published As

Publication number Publication date
AU2002239691A1 (en) 2002-05-27
WO2002041560A3 (en) 2003-01-30

Similar Documents

Publication Publication Date Title
US6681028B2 (en) Paper-based control of computer systems
EP0719220B1 (en) System for producing a personal id card
US7809172B2 (en) Method and system for generating and linking composite images
US20040049401A1 (en) Security methods employing drivers licenses and other documents
US7770013B2 (en) Digital authentication with digital and analog documents
US8316239B2 (en) Decoding information to allow access to computerized systems
US7953824B2 (en) Image sensors worn or attached on humans for imagery identification
CA2170440C (en) Self-verifying identification card
US8086867B2 (en) Secure identity and privilege system
US7051086B2 (en) Method of linking on-line data to printed documents
JPH10503132A (en) Uncorrectable self-verifying items
US20060157559A1 (en) Systems and methods for document verification
JP2003008873A (en) Method and device for electronic key management
JP2006313534A (en) Method and system for manufacturing uncorrectable self-identification article and checking its authenticity
JP2007199860A (en) Personal identification system
US20030152250A1 (en) Personal identification instrument and method therefor
WO2002041560A2 (en) Access control systems and methods
KR20110123196A (en) System and method for certificating business card by using marker
JP4541835B2 (en) Entrance management system
US20050144444A1 (en) Data card and authentication process therefor
CN1656491A (en) A computer system for automating the controlled distribution of documents
VS et al. Optimization of digitalized document verification using e-governance service delivery platform (e-SDP)
JP2002215827A (en) Storage and utilization method of electoronic document
JP2006103012A (en) Certificate and its genuineness judging method
JP2003143363A (en) Photographed image distribution system, image management device, photographed image distribution program, and photographed image distribution method

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A2

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ PH PL PT RO RU SD SE SG SI SK SL TJ TM TR TT TZ UA UG US UZ VN YU ZA ZW

AL Designated countries for regional patents

Kind code of ref document: A2

Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
DFPE Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101)
REG Reference to national code

Ref country code: DE

Ref legal event code: 8642

122 Ep: pct application non-entry in european phase
NENP Non-entry into the national phase in:

Ref country code: JP