![]() SECURITY TOKEN AND AUTHENTICATION
专利摘要:
A security token (20) comprising: a substrate (21); and an authentication element (23) mounted on the substrate and formed of a solid material containing one or more minerals. In addition, the invention relates to a security token authenticator and method comprising: an optical detector (38) adapted to generate a signal in response to an interaction of light with an authentication element within a security token, the authentication element being formed of a solid material containing one or more minerals; and a processor configured to: compare (70) the generated signal to a previously obtained signal from the authentication element, and provide (75) an output based on the comparison. 公开号:FR3065096A1 申请号:FR1852772 申请日:2018-03-29 公开日:2018-10-12 发明作者:Peter Alexander Forrest 申请人:OKT Ltd; IPC主号:
专利说明:
Holder (s): OKT LIMITED. Agent (s): SANTARELLI. FR 3 065 096 - A1 SECURITY AND AUTHENTICATION TOKEN. ©) Security token (20) comprising: a substrate (21); and an authentication element (23) mounted on the substrate and formed of a solid material containing one or more minerals. Furthermore, the invention relates to a security token authenticator and a method comprising: an optical detector (38) adapted to generate a signal in response to interaction of light with an authentication element within a security token, the authentication element being formed from a solid material containing one or more minerals; and a processor configured to: compare (70) the generated signal to a signal previously obtained from the authentication element, and provide (75) an output based on the comparison. - i Field of the invention The present invention relates to a security token, a security token authenticator and a method for authenticating a security token. This booklet describes systems and methods for identifying and authenticating portable tokens, typically used to control a person's access to an entity, benefit, or process. Another area of use concerns the association of a token with one or more entities as a valid registration or service indicator. Context of the invention Identifying and authenticating tangible items, especially high value items, as being authentic, are important functions. The technique of photography and, more recently, of electro-optical image recording, has made it possible to carry out comparisons between an original and a suspect object, as described by way of example in American patent N ° 5 521 984, where a reflected light microscope is used to create an image of very fine details of subjects such as paintings, sculptures, stamps, precious stones, or an important document. The falsification of an original work or an anti-counterfeiting device which is associated with goods of similar general appearance, constitutes one of the motivations of the technique of authentication systems. Although biometric and fingerprint identification systems can replace many token-based access control systems, a documentless or physical device agreement has little legal value: documents and devices are likely to persist, for example as valid registration, performance or legal obligations. - 2 The rates of false acceptances and false rejections are important for the usefulness of an authentication system, and are closely linked to the value of the entity or situation checked, or to the level of security required. A high false rejection rate will reduce consumer confidence in the system, and will therefore affect both parties. A high security facility or passport control can generally tolerate higher false rejection rates to the detriment of a certain person, without false acceptances. Likewise, for very high value items these two rates should be close to zero. The examination and comparison processes can be precise and exact, as illustrated in the aforementioned US Patent 5,521,984, the fragility of the security system then being at the level of the identification carried out in the field of data processing and storage. The field of anti-counterfeiting devices for medium-priced consumer goods and credit cards has led to many inventions of two-dimensional devices intended for this market, including stamped transmission holograms and various optical devices. improved diffraction. The usefulness of reflection holograms comes up against problems of cost and obtaining appropriate materials: all holograms have limitations with regard to the scaling of the object concerned. However, some of these devices can be optically duplicated, and most of them use mother matrices which can be duplicated or diverted. In many cases these devices are read, the data is digested and then compared with associated data. Abrasion wear or bending damage can cause problems when reading the authentic device and lead to an increase in false rejects. False rejections often require the intervention of a human being. Certain methods of authenticating devices and documents use reflected coherent light as a method of obtaining a signature characteristic of the subject, as described for example in the American patent. N ° 7 812 935. In general, the processes using scab, complex diffraction or refraction must be able to adapt to minor modifications, unrelated to fraud, this leading to significant alterations in the properties presented during reading. These minor changes can occur anywhere in the subject, such as thermal expansion, stress fracturing, scratches, or discoloration; this creates difficulties in establishing identity if the multiple application of statistical percentiles is not used to develop acceptance criteria, or may require analyzes of data on the basis of coding techniques stored in the reading device. The use of a third dimension, generally the thickness, in a safety device is for example described in US Patent No. 4,825,801, in which the use of flakes and dye balls in a hardened resin , as a seal, challenges in practice the success of any duplication. The high security application of the latter example provides sufficient time for the review process. Subsequently, various multiple objects were placed in curable liquids: as for example described in US Pat. No. 7,353,994. Qualitatively, these devices seem to be resistant; however, the quantification of their spatial characteristic features in a reading device can pose certain problems. - 4 The creation of unique arrangements in a relatively thin security device is described in US Pat. No. 7,793,837, in which a sensitive captive layer present in a consumer card, such as a credit card, is broken and examining the authenticity of the pattern of fragments. In summary, these techniques have certain drawbacks, including: physical changes to the token leading to authentication failure; difficulties related to the reliability and implementation of an automated reading, and high costs. It is therefore necessary to have a method and an apparatus remedying these problems. Summary of the invention Given this context and in accordance with a first aspect of the invention, it relates to a security token comprising: a substrate; and an authentication element mounted on the substrate and made of a solid material containing one or more minerals. The security token can for example be used to authenticate an article such as a work of art, an access card, a consumer product, a bank note, an action certificate, or other articles. The use of minerals makes it difficult or practically impossible to copy the security token, allows authentication or verification that is simple to carry out on the basis of an optical or visual inspection and provides resistance to wear and tear. . Consequently, the invention relates to the use of a solid material containing or formed from one or more minerals as an authenticator, as an authentication element or as a token, badge or security label. It is preferable that the authentication element can be at least partially transparent to light - 5 ultraviolet, visible and / or infrared. This can be obtained from the properties of the material, the thickness of the authentication element or a combination of both. Optionally, the authentication element can be mounted on the substrate by an adhesive. Other fixing means can be used. It is preferable that the adhesive is an optical adhesive. Optionally, the security token may further comprise an optical window at least partially covering the authentication element. This can further protect the authentication element and allow optical or visual access. It is preferable that the authentication element is planar. This may have a thin planar shape. It is preferable that the authentication element can be formed from a rock. A natural rock or solid mineral aggregate has the advantage of being readily available, with each chip, section or sample being unique. The rock is wear-resistant and robust. The rock can be easily worked. The rock usually contains several different minerals and there may be minerals inside the minerals, leading to a structure of great complexity, stable, unique and difficult to reproduce, which can be authenticated on the basis of its optical characteristics or d still others. It is preferable that the rock can be selected from the group of crustal rocks made up of: igneous rocks; sedimentary; and metamorphic. Other types of rock can be used, among which synthetic rocks. Advantageously, the authentication element can have unique optical properties. - 6 It is preferable that the authentication element can have a thickness of 300 micrometers or less. This allows to have a sufficient amount of material for authentication to take place and nevertheless allows the passage of a sufficient amount of light to allow sampling by an authenticator. The thickness may in particular be 250 micrometers or less. It is preferable that the authentication element can have a length and a width in the range of 0.5 mm to 60 mm. Other shapes and sizes can be used, in particular from 1 mm to 5 mm. According to a second aspect, the invention relates to an article secured by the security token described above. According to a third aspect of the invention, the latter provides a security token authenticator comprising: an optical detector designed to generate a signal in response to an interaction of light with an authentication element inside a security token, the authentication element formed from a solid material containing one or more minerals ; and a processor configured to: comparing the signal generated with a signal previously obtained from the authentication element; and provide an output based on the comparison. The security token authenticator can be used to query and authenticate one or more security tokens which can be any of those described above or any other security token carrying the described authentication element. The signal generated by the optical detector can be an electronic signal or an optical signal. The signal may for example contain information describing the structure of the authentication element, such as its composition, its - 7 alignment and its appearance (in 2D and / or 3D). The interaction of light with the authentication element may for example include scattering, transmission and / or reflection, absorption, polarization and fluorescence. The processor can be a CPU (central unit), a computer, an ASIC circuit (integrated circuit for specific application), an FPGA network (pre-broadcast network programmable by the user), an embedded system, local or remote. The signal previously obtained can for example be stored locally, stored remotely or received when necessary. The comparison may require full match, partial match at a predetermined level, or may consist of an indirect match such as a comparison with an electronic fingerprint or a digital representation of the signals being compared. For example, a sample of the generated signal can be converted into a value. This value can be compared to a converted value of the previously obtained signal, which could for example have been obtained during the manufacture or validation of the authentication element. If the generated signal matches the previously obtained signal, the security token can then be authenticated. The output can be in binary form (eg acceptance / rejection) or can be binary output such as a percentage of a confidence value. In addition, a threshold can be applied to this percentage or to this value. For example, for a value greater than 90%, the security token can be considered to be genuine and authentic. Optionally, the comparison of the signal generated with a previously obtained signal can consist of: determining an optical property of the authentication element from the generated signal; compare the determined optical property with an optical property deduced from the signal previously obtained from the authentication element. Here again, the properties - 8 optics can be converted into values before comparison with these values. A concordance between the values or a quasi-concordance (to within certain tolerances or limits) can then be determined. It is preferable that the security token authenticator can also comprise a light source capable of illuminating the authentication element. This light source can be monochromatic (for example an LED [light emitting diode] or a laser) or polychromatic. Advantageously, the security token authenticator may further comprise one or more linear polarizers designed to vary the polarization of the light interacting with the authentication element and / or the light collected by the optical detector. The optical signal can therefore be obtained for different orientations of the polarization. The linear polarizers can be placed between a light source and the authentication element and / or between the authentication element and the detector or the optical sensor. It is preferable that the one or more linear polarizers can be rotated. This can be done electrically. Alternatively, the axis of polarization can be obtained electronically or by electrostatic means. Optionally, the optical detector may further comprise a microscope. An objective can be used to collect and / or illuminate the authentication element. It is preferable that the optical detector can also comprise an apparatus and that the signal is an image or a set of images obtained under different lighting or polarization conditions. The camera can for example include a CCD or CMOS detector. can further electronic expected security optical storage Optionally, the optical properties determined or expected can be selected from the group consisting of: polarization; the structure of the image; refractive index; the colour ; variations in luminance; optical absorption, and opacity. Other optical properties can be used. It is preferable for the token authenticator to include a device capable of storing the properties of a plurality of authentication elements. Values can be stored to represent optical properties. The electronic storage device can also store the generated optical signals. A physical storage device, including photographs and film negatives, can also be used and compared. It is preferable that the security token authenticator can further comprise a mechanical alignment mechanism designed to align the authentication element with the optical detector. It may for example be a physical receptacle which only admits the security token in its correct orientation. According to a fourth aspect of the invention, it relates to an authentication method comprising the steps consisting in: detecting a signal caused by the interaction of light with an authentication element inside a security token, the authentication element formed from a solid material containing one or more minerals; comparing the detected signal with a signal previously obtained from the authentication element; and provide an output based on the comparison. The output can be positive (indicating an authentication) if the detected signal agrees with the previously obtained signal. The comparison or concordance can for example be - ίο determined on the basis of a range, a value or a percentage. It is preferable that the method can further comprise the step of illuminating the authentication element. Advantageously, the comparison step can also comprise the steps consisting in: determining an optical property of the authentication element from the generated signal; compare the determined optical property with an optical property deduced from the signal previously obtained from the authentication element. It is preferable that the method can also comprise the steps consisting in: detecting an additional signal caused by the interaction of light with the authentication element; comparing the detected additional signal to a previously obtained additional signal or to an additional signal from the authentication element; and providing an additional output if the detected signal matches the previously obtained additional signal. Optionally, the method may further comprise the step of varying the illumination of the authentication element. The additional signal can be detected under different lighting conditions, polarization, wavelength, such as intensity, etc. Optionally, the variation of the illumination consists in varying any one or more of: the polarization; the axis of polarization; intensity; and the wavelength. Optionally, the method may further include the step of varying optical properties of a detector used to detect the interaction of light with the authentication element. Filters or - There polarizers can be introduced into, upstream, or inside an optical path of the detector. Optionally, the variation of the optical properties of the detector can consist in applying a polarization offset. Optionally, the method may further include the step of providing authentication if the output and the additional output both indicate matches. The method described above can be implemented in the form of a computer program comprising program instructions for operating a computer. The computer program can be stored on a computer-readable medium or sent as a signal. The numbered clauses below illustrate other aspects of the invention. Any particular feature of these clauses may be used with any other feature or be incorporated into any of the aspects described above. 1. Portable token identification and authentication system comprising: (a) a substantially transparent portable token comprising a section of planar rock consisting of a natural rock originating from the earth's crust, the smallest dimension of which is less than 250 micrometers and being partly or entirely transmissive with respect to light rays according to its smallest dimension; (b) a linearly polarized polychromatic or monochromatic light source; (c) means for generating an image from the light emanating from the linearly polarized light source which has been transmitted by the plane rock section; - 12 (d) an image recording means, this being either a photographic plate or an electronic image recorder; (e) one or more data storage archives of the recorded images; (f) a comparison process which can use a computer processor and a memory, for comparing said image data recorded from a portable token, and from a section of planar rock which it contains, having been recorded at different times; (g) a decision making process following the comparison process which decides the authenticity of the portable token; (h) a binary indication of the decision made by the previous decision-making process. 2. System according to clause 1, in which linear polarizers, phase delay blades or phase compensation blades are further introduced on the optical light transmission path between said linearly polarized light source and said means of 'image recording. 3. System according to clause 1, in which any data storage archive contains a set of images recorded concerning a particular portable token, each element of which corresponds to a particular angular value between the axis of polarization of the linearly polarized light source and a predetermined axis which is orthogonal to the smallest dimension of the planar rock section. 4. The system of clause 1, further comprising an image forming control subsystem comprising a computer processor and a memory, which receives commands from the comparison process and transmits commands to said image generating means or to said linearly polychromatic or monochromatic polarized light source, some of the purposes of which are: - 13 (a) translate the section of plane rock relative to said image generating means or to said linearly polychromatic or monochromatic polarized light source, by any means; (b) varying the angular value between the axis of polarization of said linearly polarized light source and a predetermined axis which is orthogonal to the smallest dimension of the plane rock section, by any means. 5. System according to clause 1, further comprising any image analysis subsystem, in particular a computer processor and a memory, for measuring and analyzing recorded image data and deducing therefrom one or more sets of attribute data of a plane rock section, said data being used in a process of comparison between said attributes of a plane rock section having been recorded, measured or deduced at different times. 6. The system of clause 5, wherein the metrics and attributes that have been stored in the memory of the image analysis subsystem include any of the following sets of elements: (a) sets of coordinates in a coordinate system of a color space which represent modifications of the pleochrolsm manifested in any mineral grain, between recorded images; (b) sets of coordinates in a coordinate system of a color space which represent changes in chromaticity in any mineral grain, between recorded images; (c) sets of coordinates on a luminance scale or a relative luminance scale which represent changes in luminance in any mineral grain, between recorded images; (d) sets of coordinates in a coordinate system of a color space that includes the - 14 luminance, which coordinates represent modifications of the chromaticity or of the luminance in any mineral grain, between recorded images; (e) digital vectors representing fracture paths or boundaries between mineral grains; (f) values of refractive indices of any material constituting the portable token; (g) birefringence values of any mineral grains; (h) digital vectors representing optical axes of any mineral grains. 7. Method for identifying and authenticating portable tokens, the method comprising the steps consisting in: planar crust rock (a) directing light from a linearly polarized, polychromatic or monochromatic light source toward a substantially transparent portable token comprising a section made of natural rock from Earth whose smallest dimension is less than 250 micrometers and being partially or entirely transmissive with respect to light rays according to its smallest dimension; (b) using image generating means to form an image from the light transmissible from the planar rock section along its smallest dimension; (c) using an image recording means which is either a photographic plate or an electronic image recorder, to acquire the light rays of the image and record an image; (d) storing the image data in one or more storage archives for reference images recorded as a reference to which images subsequently recorded by the method can be compared; - (e) allowing any time to pass during which the portable token can, if necessary, be removed from the image generating means; (f) repeating steps (a), (b) and (c), the substantially transparent portable token then being subjected to examination after a certain amount of time has elapsed; (g) storing the image data in one or more storage archives of recorded image data, as data to be subjected to examination by a comparison process; (h) comparing the recorded image data of the planar rock section, having been recorded as a reference, with that recorded for examination, by a comparison process, the comparison process being able to use a processor computer and memory; (i) decide on the identity and the authenticity of the portable token on the basis of a matching correspondence, or absence thereof, between the reference image data and the submitted image data at the exam ; (j) indicate, in the form of a binary logic output, the decision as to whether or not the plane rock section contained in the portable token is authentic. 8. Method according to clause 7, comprising the additional step of interposing a linearly polarized blade between the substantially transparent portable token and the image recording means so that the light rays emanating from the polarized light source linearly, which can be transmitted by the section of planar rock, pass through the linearly polarized plate and enter the image generating means. 9. Method according to clause 7, comprising the additional steps of: (a) interposing a linearly polarized blade between the substantially transparent portable token and the means - 16 for recording images, so that the light rays emanating from the linearly polarized light source, which may have been transmitted by the plane rock section pass through the linearly polarized blade and penetrate into the generating means images; (b) positioning the added linear polarization plate so that its axis of polarization is normal to the axis of polarization of the linearly polarized light source; (c) generate and save a set of images relating to a particular portable token, each element of which corresponds to a particular angular value between the axis of polarization of the linearly polarized light source and a predetermined axis which is orthogonal to the smallest dimension of the plane rock section, so that they are used as reference images or as images under examination. 10. Method according to clause 7, comprising the additional steps of: (a) interposing a phase delay blade and a linearly polarized blade between the substantially transparent portable token and the image recording means, so that the light rays emanating from the linearly polarized light source and having been able to be transmitted by the plane rock section pass through the added phase wave delay blade and the added linearly polarized blade and then enter the image generating means; (b) positioning the added linear polarization plate so that its axis of polarization is normal to the axis of polarization of the linearly polarized light source; (c) generate and save a set of images relating to a particular portable token, each element of which corresponds to a particular angular value between the axis of polarization of the light source - 17 linearly polarized and a predetermined axis which is orthogonal to the smallest dimension of the plane rock section, so that they are used as reference images or as images under examination. 11. Method according to clause 7, comprising the additional steps of: (a) selecting a position in any particular mineral grain which exhibits a variation in luminance between images recorded with different angular values between the axis of polarization of the linearly polarized light source and a predetermined axis which is orthogonal to the smallest dimension of the plane rock section; (b) comparing the luminance of this position of the mineral grain to a scale of luminance values or relative luminance values; (c) recording and recording the matching coordinates on the scale of luminance values or relative luminance values; (d) comparing the chromaticity of this position of the mineral grain to a map in a chromaticity coordinate system; (e) note and match the coordinates on the chromaticity coordinate system map; (f) comparing the chromaticity and the luminance of this position of the mineral grain to a coordinate system of a color space which represents the chromaticity and the luminance; (g) note the corresponding data on the coordinate system map in the color space and save it; (h) noting the angular value between the axis of polarization of the linearly polarized light source and a predetermined axis which is orthogonal to the smallest dimension of the plane rock section; - 18 (i) repeat steps (a), (b), (c), (d), (e), (f), (g) and (h), for the same particular mineral grain, for one or more several images recorded with different angular values between the axis of polarization of the linearly polarized light source and a predetermined axis which is orthogonal to the smallest dimension of the plane rock section; (j) combining the coordinates recorded from the scale of luminance values or relative luminance values, with the recorded angular values which correspond to them to form a set of tuples which can represent the path of a vector in the coordinate space of the luminance value scale used; (k) combining the recorded coordinates from the chromaticity coordinate system with the recorded angular values which correspond to them to form a set of tuples which can represent the path of a vector in the coordinate space of the chromaticity coordinate system ; (l) combine the recorded coordinates from the color space coordinate system with the recorded angular values corresponding to them to form a set of tuples which can represent the path of a vector in the coordinate system of the color space; (m) comparing the vector path data for the positions of particular mineral grains which are subject to examination, with corresponding vector data having been deduced, by the same method, from recorded images of the plane rock section and having been recorded as a reference; (n) decide on the authenticity of the portable token based on a correspondence or a correlation of concordance or absence thereof, between the set of reference image vector data and the 'together - 19 of vector data deduced from the image data of the object of the examination; (o) indicate, in the form of a binary logic output, the decision as to the authenticity or not of the plane rock section contained in the portable token. 12. Method according to clause 7, in which the binary logical output of step (j) is part of a set of data which allows or prohibits access to an entity, to a benefit or to a process, by the bearer of the portable token. 13. Method according to clause 7, in which the binary logic output of step (j) is part of a set of data which validates or invalidates a right of the holder of the portable token. 14. One or more computer-readable media on which coded or stored instruction sets intended for a computer processor which, when executed, implement the method according to clause 7. 15. One or more computer-readable media on which coded or stored instruction sets intended for a computer processor which, when executed, implement the method according to clause 11. 16. A portable token device suitable for use in a portable token identification and authentication system, as an item under examination, such as the system of claim 1, comprising: (a) a flat substrate layer composed of any crystalline ceramic or partially crystalline glass-ceramic material; (b) a layer forming a flat protection plate composed of any crystalline ceramic or partially crystalline glass-ceramic material; - 20 (c) a flat section of natural rock from the earth's crust, the smallest dimension of which is less than 250 micrometers, which is partially or fully transmissive to light rays according to its smallest dimension and which is interposed between the aforementioned flat substrate layer indicated in (a) and the aforementioned plane protective plate layer indicated in (b); (d) an adhesive cement which is substantially transparent to light rays, interposed between the above-mentioned flat substrate layer indicated in (a) and the above-mentioned flat protective plate layer indicated in (b). 17. Portable token device according to clause 16, further comprising one or more polarizing or phase delay blades interposed between said plane substrate layer and said plane protection plate layer. 18. Portable token device according to clause 16, which is further marked externally or internally marked with a mark, an index, a sign, a symbol, a character, d '' a graphic device, a graphic composition, an image, an emblem or a pattern of brands. 19. Portable token, comprising: (a) a flat substrate layer composed of any crystalline ceramic or partially crystalline glass-ceramic material; (b) a layer forming a flat protection plate composed of any crystalline ceramic or partially crystalline glass-ceramic material; (c) a flat section of natural rock from the earth's crust, the smallest dimension of which is less than 250 micrometers, which is partially or completely transmissive to light rays according to its smallest dimension and which is interposed between said aforementioned flat substrate layer indicated in - 21 (a) and said layer forming a flat protective plate indicated in (b); (d) an adhesive cement substantially transparent to light rays, which is interposed between the above-mentioned flat substrate layer indicated in (a) and the above-mentioned flat protective plate layer indicated in (b). 20. Portable token according to clause 19, which is also externally marked or internally marked with a mark, an index, a sign, a symbol, a character, a graphic device, a graphic composition, an image, an emblem or a pattern of brands. It should be noted that any of the features described above can be used with any particular aspect or embodiment of the invention. Brief description of the figures The present invention can be implemented in many different ways and embodiments are described below by way of non-limiting example with reference to the accompanying drawings, in which: FIG. 1 non-limitingly shows an example of a schematic cross-sectional view of a portable or security token. The cross section is taken through the assembly shown in Figure 2; Figure 2 shows a plan view of the portable token of Figure 1; FIG. 3 represents a schematic view of a security token authenticator provided by way of nonlimiting example; and Figure 4 shows a schematic view of another security token authenticator. It should be noted that the figures are illustrated in a simplified manner and have not necessarily been drawn to scale. - 22 Detailed description of the preferred embodiments The technical fields of transmitted light optics, data storage and processing, petrology, polarization microscopes and crystallography are relevant to the examples described below. A portable token and systems and methods for identifying and authenticating the same are disclosed. Referring to Figure 1, the portable token 20 can be used for various applications and uses a thin section of rock 23 as a unique identifying element which is highly resistant to fraud or duplication. The identification and authorization of tokens can be carried out by a system which uses an optical examination of the microstructure and the refractive and absorption properties of crystalline minerals inside the identification element, in particular by polarized light transmission techniques. A comparison between stored reference data and acquired examination data can form the basis for verifying authenticity. Natural three-dimensional orientations of the optical axes of the mineral crystals contribute to the identification information because of their effects. Uses include controlling a person's access to an entity, benefit, or process. According to an exemplary implementation, a thin flat section of a natural rock originating from the earth's crust can be used as an authentication element subject to identification, inside a substantially transparent token and portable. The planar rock section is preferably thin enough to transmit light through most of the minerals of which it is made. Image forming optics can be used with transmitted polarized light to form and record image data - 23 concerning the luminance, color and / or chromaticity of the detailed assembly of presented minerals forming the rock. This image data can then be used as the basis for identification and authentication of the token. In addition, the invention can use natural three-dimensional orientations of the optical axes of mineral crystals, by exploiting their effects, in order to obtain other definition information which can be used in the identification and authentication of the token: it is possible to use the anisotropy of the absorption spectra or the refractive index in certain mineral crystals. The security token and its authenticator can provide a portable token-based identification and authentication system that is more reliable and more often correct in determining the identity and authenticity of the portable token than prior art systems and methods. The system and method can also provide a portable token which, once made, is resistant to duplication, including by the original manufacturer, or in the use of its data, equipment, its materials or its knowledge: the falsification of any of these portable tokens which can be determined by systems and methods as being authentic can be considered to be very difficult by the use of any practical means. The system and method can also provide a portable token comprising a security element resistant to discoloration, heat, cold, abrasion, shock and other physical effects to which it may be exposed upon normal handling. The system and method may also be better able to cause interference with the token than systems - 24 and the methods of the prior art: in particular as regards attempts at falsification. Figure 1 shows a cross-sectional diagram of a portable token; the portable security token 20 comprises a layer of transparent planar substrate 21, an adhesive which is notably or substantially transparent to light rays 22, a planar section of natural rock coming from the earth's crust whose smallest dimension is less than 250 micrometers , which is partially or completely transmissive with respect to light rays according to its smallest dimension 23, a layer forming a transparent planar protective plate 24, or an optical window and markings 25, the substrate layer 21 and the layer forming protective plate 24 being made of any material from the class of crystalline ceramic or vitroceramic materials which are partially crystalline transparent and which tend to give it a certain solidity, abrasion resistance and high optical transparency. The components of the portable or security token 20 are physically joined to each other by the optically transparent adhesive 22, the planar rock section 23 being inside the adhesive component 22. The security token thus described can, for example, the choice of materials, to be substantially transparent at optical wavelengths preferably between 250 and 800 nanometers, is resistant to scratching, is rigid, of stable dimensions and / or is durable. In various embodiments, the security token 20 may be physically strong, or may be more breakable to suit an application such as a security seal element. In one example, the planar section of natural rock can be shaped from an igneous, metamorphic or sedimentary rock and is made so as to have a thickness of thirty micrometers according to its smallest dimension in accordance with the prior art - 25 known from the manufacture of mineralogical thin sections. The term planar rock section will also be used to designate the element 23 in the figures. In this same example, the rock will preferably be selected as being an intact unaltered rock having as preferred properties any one of the following properties: a small proportion of opaque minerals; a significant proportion of optically anisotropic minerals; and a variety of mineral types. A metamorphic shale can be cited as a typical example of these preferences as a source of rock, although most rocks of crustal origin are sufficient. With regard to this same example, the thickness of the plane rock section is sufficient to allow the use of a radiant flux which can be used in practice from a light source 30 and which offers a sensitivity allowing practical use of the device. image recording 38, while also preserving certain physical attributes of the planar rock section 23. Variations in thickness of the sections can be used, for example from +/- 10 to 15 μm depending on the properties considered of the rock. FIG. 2 represents a schematic plan view of a portable or security token 20 according to an example, in which the plane rock section 23 is surrounded by the adhesive 22 so that it is hermetically isolated from the external environment . In this particular example, markings 25 may be present on or inside the portable token; the markings shown in Figure 2 are only an example, these may be spatial references, alphanumeric symbols, graphic compositions, or encrypted data. A typical example of marking 22 could be an eye-readable reference number for the portable or security token 20. In other examples, the portable token may have: a form different from the mode of a schematic view of a security: this system The form of schematically authenticating a rectangular embodiment in FIG. 1 and in FIG. 2 (for example a circular, square, triangular, irregular shape, etc.); perforations; added phase delay blades; polarizing filters added; or colored transparent layers added. FIG. 3 represents, without limitation, an example token authenticator making it possible to identify and authenticate a portable token. This figure represents a portable token placed in a device which performs an optical examination of the token from the transmitted light and reveals the paths of the data through the functional subsystems. This figure shows the data paths relating to both the reference images and the examination images; in this embodiment, a camera with a photographic plate is used. The system for identifying and portable token is shown in Figure 3, which shows functional components, functional configurations and functional blocks of the system as well as data paths. Referring to FIG. 3, a linearly polarized light source can be created by combining a light source 30, a means for projecting light rays, represented by an assembly of condensers 31 and a linearly polarized plate 32. The source light 30 can produce monochromatic or polychromatic light by known techniques using light sources (eg, filament lamps, light emitting diodes (LEDs), lasers, phosphors, and light emitting and discharge lamps). The linear polarizer 32 can also be placed below or inside the condenser assembly 31, and a variable opening can be present in the condenser assembly 31. Other light sources can be used which do not require the condenser assembly 31 360 ° the polarizer Linear 32 can be freely rotated around an axis corresponding to the optical axis of the condenser or the path of the projected light rays, thereby rotating its axis of polarization. FIG. 3 shows a portable token 30 placed on a support plate 33; the latter can be moved in translation along at least two, but preferably three axes, to allow the concerted translation of the portable token 20. Linearly polarized light can be directed towards the plane rock section 23 in the portable token 20. Light rays will be transmitted by the plane rock section or the authentication element 23 independently of the presence of any opaque minerals therein, in the direction of a signal generating means in response to an interaction of the light with authentication element. In this example, the signal is an image. The apparatus of FIG. 3 comprises an image forming optical part A, indicated at 34, and an image forming optical part B, indicated at 35, which constitute means making it possible to generate an image. by techniques known from the microscopic. The combination of elements 34 magnification ratio of 30 for important detail may appear in element 23 for practical use. A phase delay blade 36 and a linearly polarized blade 37 can be interposed between the elements 34 and 35: in other embodiments, the phase delay blade 36 may be absent and in still other forms of embodiment, the linearly polarized blade 37 may be absent. It is important from the point of view of practical configuration that the elements 36 and 37 can be placed between optical type and 35 provides a level - 28 the objective of element 34 and the ocular mounting of element 37, as is known from the technique of polarization microscopes: elements 36 and 37 can be positioned, according to the sequence which is illustrated, elsewhere on the light path between the portable or security token 20 (or at least the authentication element) and the camera 38, with an identical effect. An image formed by the components 34 and 35 from the light transmitted by the portable token 20 can then be recorded by a camera 38. The camera 38 can be a camera with a photographic plate or an electronic detector camera (for example), from which photographic data can be caused to pass along data paths 39 and 40 in the form of recorded image data. The translation of the portable token 20 so that the camera 38 obtains from it different views can be carried out by concerted translation of the components 30, 31, 32, 34, 35, 36, 37 and 38 while that the components 33 and 20 remain stationary, or by other combinations of relative translations. A descriptive note is provided below concerning the signal or the recorded image data obtained using polychromatic white light emitted by the element 30 (in this example, the elements 36 and 37 are absent) without any limitation as to what this achieves. Image data or recorded signals can typically indicate any of the following information: irregular dark areas due to the presence of opaque minerals; a complex irregular pattern of lines due to the boundaries between the mineral grains; fractures; internal cleavage plans; micro-voids; banding; blends of mineral grains; coarse crystal forms; and a range of luminances of the mineral grains - 29 individuals. In this example, various anisotropic mineral grains may have a certain color combined resulting from the different absorption spectra of ordinary and extraordinary rays in this mineral; any color of the anisotropic mineral grains would result from a unique absorption spectrum. Image data or recorded signals can therefore be described as luminance or chromaticity maps, or as being a combination of luminance and chromaticity representing a color. If you rotate the axis of polarization of element 32, you can then see a change in the color and luminance of a particular anisotropic mineral grain, provided that it is not seen in one direction parallel to an optical axis, knowing that there can be two axes; this color change effect is known as pleochroism and can be used, qualitatively or quantitatively, for further identification of the security token 20. In another example in which the linearly polarized plate 37 is added and where its axis of polarization is aligned so as to be perpendicular to that of the plate 32, the transparent anisotropic mineral grains may exhibit variations in luminance when they are subjected relative rotation with respect to the pair of polarizing blades and these variations in color can be evident; these effects result from the speed and phase differences between their ordinary and extraordinary rays leading to constructive or destructive interference at different wavelengths when they are recombined by the polarizing plate 37. As a result, attributes which change to a any particular point of a two-dimensional image, or of a card, can be observed between the cards recorded for different relative rotations of the portable token 20 and the axes of images the archive polarization device of the polarizing plates 32 and 37 : these modifications can be used qualitatively or quantitatively for the identification and authentication of security token 20. In the example shown in FIG. 3, the system can use the principle according to which a set of reference image data (or previously obtained signals) is created, generally under the control of a trusted entity, then compares the following image data (or a signal generated when authentication is required) from a security token under review, to this reference image data: virtual identity can be the basis for identifying and authenticating a security token as an original item. Referring to Figure 3, the signal (image data) from the camera or optical detector 38 may be caused to follow the data path 39 when it is saved as image data. reference image; the image data from the camera 38 can be caused to follow a data path 40 when it is recorded as image data to be subjected to examination. A reference image storage archive 51 may be a device for storing reference data which can be extracted; exam image storage 41 is a storage of image data to be examined, which can also be retrieved. A comparison process 70 can extract recorded image data from the reference image storage archive 51 and from the examination image storage archive 41. The comparison process 70 searches for a quasi-identity between elements of the reference image data set and elements of the examination image data set and may use various means of searching, indexing, aligning, modifying - 31 of scale or superimposition of images, or any other action required. The comparison process 70 transmits the data to an authentication decision subsystem 75 which can also return the data to the element 70. The authentication decision subsystem 75 decides whether or not to declare the portable token 20 as being authentic, at least on the basis of the data received from the comparison process 70. The authentication decision subsystem 75 can for example send the data back to the comparison process 70 in the form of requests relating to comparison efforts. The data coming from the authentication decision subsystem 75 can be caused to pass to an indicator 80; the latter may provide a binary logical indication or an output representative of a declaration made by the decision subsystem 75. The indicator 80 may include: switches, binary state transitions or any other means of indication. FIG. 4 represents an example of a variant represented in a schematic form: it is a system intended to identify and authenticate the security token 20. Identical characteristic elements are designated by identical numerical references and will not be again described in detail. The figure shows the security or portable token 20 in an apparatus which performs an optical examination of the security token from the transmitted light, and illustrates the paths of the data through the functional subsystems. This figure shows the data paths corresponding to both the reference images and the examination images; in this embodiment, a type of electro-optical camera is used and subsystems have been shown which perform functions such as image analysis. In the example shown in Fig. 4, the image data from a recorded camera subjected to electronic interrogation 38 may be caused to pass through the data path 39 when it is recorded as reference image data (previously obtained signal) and by the data path 40 when it is as image data to be examined (signal generated at the time of the Image storage archive of reference 51 can be an extractable reference image data storage device; the examination image storage archive 41 is an image data storage device to be subjected to an examination, which can A photo printer 44 can be connected to the exam image storage archive 41 and a photo printer 54 can be connected to the reference image storage archive 51, these two printers. allowing you to produce physical prints from digital image data when necessary. An image analysis subsystem 55 can receive two-dimensional image data from the reference image storage archive 51, measure and determine attributes and characteristics from a set of images ( signals) relating to a particular token, and can use for this purpose a computer processor and a memory or can implement the authentication method shown schematically in the form of steps 70, 75 and 80 in FIG. 4 ( as well as those described with reference to Figure 3). The image analysis subsystem 55 transmits the measurement, attribute and characteristic data to the reference characteristic data storage archive (RCDS) 57. Likewise, an analysis subsystem frame 45 receives two-dimensional image data from the examined image storage archive (EIA) 41 and measures and determines attributes, characteristics and optical properties from a set of images relating to a particular token under review, and - 33 can use for this purpose a computer processor and a memory (not shown in this figure). The image analysis subsystem 45 transmits the measurement, attribute and characteristic data to the examined characteristic data storage archive (ECDS) 47. A comparison process 70 extracts the image data recorded in the form of prints supplied by the photo printer 54, as regards the reference images, and by the photo printer 44, as regards the examination images. A comparison procedure based solely on electronic data without physical circulation can also or alternatively be carried out. Therefore, the comparison process can be performed using a computer system on only electronic data. The comparison process 70 searches for a quasi-identity between elements of the reference image data set and the elements of the examination image data set. The comparison process 70 also extracts measurement, attribute and characteristic data from the reference characteristic data storage archive 57 and from the examined characteristic data storage archive 47, and searches almost identity between this data for a particular token. In the example of Figure 4, an image forming control subsystem 72 is shown. The image forming control subsystem 72 can receive orders from the comparison process 70 and can transmit orders components 30, 31, 32, 33, 34, 35, 36, 37 and 38, with the particular aim of: varying the brightness of the element (light source) 30; varying the axis of polarization of the element 32; varying the axis of polarization of the element 37; obtain or perform a relative translation of the planar rock section 23 in order to obtain a different view area or a different focal point at the level of the rock section - 34 plane 23; varying the focal points of the image forming optics 34 and 35. The image forming control subsystem 72 can then be used to pilot and control the apparatus so that it acquires the images of the security token 20. In other examples, data passing through data paths or stored in storage devices or archives can be encrypted as a security measure; data can also be transmitted bidirectionally on the data paths between functional subunits of the system. In other examples, the comparison process 70 may use a computer processor, computer readable memory, and a set of processor instructions for performing its functions. In other examples, the image analysis subsystems 45 and 55 may use a computer processor, computer readable memory and a set of processor instructions to implement their functions or to store attributes measured or calculated. In other examples, it is possible to add a phase delay plate 36 which can for example improve the color measurements by presenting a higher order of interference colors having more highly saturated chromaticities. In other examples, certain identifying attributes of said mineral or mineral grain (s) may be determined for a more thorough verification of the identity or to carry out an authentication. In accordance with an example provided by way of illustration: the color presented by a particular mineral grain may vary due to modifications of the angular value between the axis of polarization of the linearly polarized light source and a predetermined axis which is orthogonal to the smallest dimension of the section of - 35 flat rock; by noting how this color or the luminance alone varies with the angle, we can measure a characteristic. These colors can be compared to those of a color space and with a luminance scale: we could use the CIExyY space as an absolute color space, i.e. space in which it there are coordinates describing chromaticity and luminance. The coordinates resulting from the comparison of the color for each angular value can be gathered in the form of sets which can define vector paths in the color space or on the luminance scale. These coordinate sets or these vector paths provide protection against falsification of an otherwise two-dimensional image. When a set of vector paths is established for a number of suitable mineral grains, they can be correlated. These values can themselves constitute the optical properties to be compared. One or more characteristics from any embodiment may or may be combined with one or more characteristics from any other embodiment without departing from the scope of the invention. In this booklet, the use of the words one, one, or the, the, the, must be understood to mean one or more, unless otherwise indicated. As will be noted by a person skilled in the art, he can modify certain details of the embodiment presented above without departing from the scope of the invention as defined by the appended claims. By way of example, the material of the authentication element can also be a crystalline ceramic material or a polycrystalline material. The expression grain is an accepted term in the sub-fields of materialography, such as ceramography, metallography and petrography; in this context, a grain can in certain cases contain multiple crystals or crystallites. Therefore, other types of material grains can be used. Other examples of materials intended to be used as authentication elements include molten or sintered materials comprising anisotropic crystals as well as assemblies of crystallites derived from molten masses cooled or obtained by deposition methods. As an example, a molten alumina ceramic can be used. Partially crystalline ceramics including certain amorphous glasses as well as crystals can also be used. As examples of polycrystalline materials that can be used, mention may be made of chemical or vapor phase deposits of tin oxides, most of the time in the form of thin films; fused ceramics will also generally lead to polycrystalline textures when they solidify. Assemblies of crystallites (transparent or generally transparent) of tin oxides, or the like, are frequently produced by chemical or vapor deposition and are generally referred to as thin films rather than ceramics, due to the fact that 'They were not prepared by a hot calcination process. Thicker slices of such materials can be used as authentication elements, especially if they contain anisotropic crystallites. All anisotropic crystalline ceramics are not non-oxidized ceramic carbides, nitrides and borides are generally transparent only to infrared, while oxides such as alumina, beryllium oxide, yttrium oxide , cerium oxide, and zirconia are generally transparent to visible light. The last two of these compounds can for example be constrained from their usual cubic configuration into systems - 37 anisotropic lenses by cooling regimes or doping techniques. Natural rock offers certain advantages in terms of resistance to duplication attempts due to the presence of heterogeneous minerals, intergrowth, zonation and deep details. A composite material such as concrete can be used. In this example, the section of planar material may consist of a multiplicity or of one or more rock elements. Other embodiments of the linear polarizer include a second linear polarizer. Cross polarizers can be used and arranged at substantially 90 degrees +/- 1 to 3 degrees, other angles can also be used. A trust value approach can be used when determining authentication. The system and method described may lead to an authentication decision or a binary indication output but may instead use the output of the comparison process to provide a non-binary value of confidence in authenticity. The polarizers exhibit a certain variability during their rotation, this improving the possibilities of distinguishing the security token, but may be absent in certain embodiments. A three-axis translational component, xyz, can allow panning or tracking motion relative to the optical sensor components of the security token authenticator. The current densities of CCD and CMOS sensors and the grains of current films allow the use of a 4x magnification using a single lens. However, a needle hole type opening can also be used. The optics can also be of the so-called towing type, as in the case of holograms and - 38 Fresnel lenses. In practice, it is possible to use a planar lens preferably produced in an achromatic manner if non-monochromatic light is used. Stress-free optics are preferred in most polarized microscopy applications. For illumination, the microscope can use powerful filament-based lights and the Kohler illumination method to defocus a point source in order to obtain a uniform illumination field. This illumination can use an Abbe condenser. However, an extended light source such as an electroluminescent or phosphorescent / fluorescent panel can be used, with low magnification. Coherent laser light can often be highly polarized and in this case can be used without the polarizers. Various signals and images can be observed by transillumination of the secure token using a polarizing microscope such as an Olympus CS31-P (TM), or a petrographic or materialographic instrument of this type supplied by manufacturers such as Zeiss (TM) , Nikon (TM) or Leica-Microsystems (TM): these instruments generally rotate the plate on which the object is held. In practice, some compensation may be required to compensate for the thickness of a possible top layer or window of the secure token. A digital electronic storage device for signals and images may be preferable to storage on photographic plates or prints or other data storage means. A preferred material for the upper and / or lower layers of the security token is a monocrystalline sapphire (alumina) having been cut perpendicular to its axis c (also referred to as plane sapphire): this type of section eliminates almost entirely the effects of birefringent anisotropic sapphire (hexagonal, uniaxial). Among the manufacturers, - 39, we will mention Tydex (TM), Monocrystal (TM), Saint-Gobain (TM), Rubicon (TM) and Kyocera (TM). Other possible materials for these optical layers include a transparent synthetic spinel - a variant of magnesium-aluminum oxide from the family of spinels and oxy-aluminum nitrides such as ALON (TM). As a result, they are both crystalline and submicronic and practically isotropic. As an example of the thickness of the layer or of the window, a value of 1 mm to 2 mm will be cited. However, this thickness can be reduced by half for less durable uses. Vitroceramics such as Zerodur (TM) can also be used. Adhesive cement can be used to paste the materials inside the security token. An optical cement such as UV-curing or epoxy-type acrylate cement, such as Norland NOA-61 (TM), can for example be used. Examples of images similar to those that can be seen by transillumination of the security token using a polarizing microscope can be found in publicly available works on petrography or mineralogy and on the Internet. Fine focus adjustment as well as passive autofocus by contrast detection can be used in the microscope. A trial and error focus adjustment can be used to determine a precise focus configuration. An automated translation platform with three axes, xyz, can be used to move the security token. It can for example be piezoelectric micro-positioners. The use of various mechanical, electrical or thermal drive systems can be controlled by the ICS system. According to one embodiment, the two polarizers can be arranged so as to have a fixed axis. Removal and replacement of one of these polarizers - 40 can then lead to two different images or to two different signals for the same secure token: by way of non-limiting example, it can be an image showing colors associated with pleochroism and another image showing colors associated with the interference between light waves. This embodiment could in practice require an adequate enclosure to exclude the presence of dust and contaminants. Multi-angular image sets can be acquired by other motorization techniques. A 90 degree rotation plus a small margin may occur to cause variations in luminance or variations in color to follow a full cycle covering this angle. It is preferable that each polarizer can be driven independently, while generally being coupled so that maximum and minimum signal intensities can be obtained in the absence of any secure token. The shutter of the camera (physical or electronic), or the process of separation of views, can be synchronized with the angular stepwise offset. Numerous combinations, modifications or alterations to the characteristics of the embodiments described above will appear to those skilled in the art and should be considered to be covered by the present invention. All the characteristics described and relating specifically to an embodiment or to an example can be used in any other embodiment by making the appropriate modifications. This description is provided by way of non-limiting illustration of the fundamental principles of the invention in the form of examples of various embodiments. Variants or other embodiments within the scope of the present invention will appear to those skilled in the art on reading the present description.
权利要求:
Claims (33) [1" id="c-fr-0001] 1. Security token (20) characterized in that it comprises: a substrate (21); and an authentication element (23) mounted on the substrate (21) and formed of a solid material containing one or more minerals. [2" id="c-fr-0002] 2. Security token (20) according to claim 1, wherein the authentication element (23) is at least partially transparent to ultraviolet, visible and / or infrared light. [3" id="c-fr-0003] 3. Security token (20) according to claim 1 or claim 2, wherein the authentication element (23) is mounted on the substrate (21) by an adhesive (22). [4" id="c-fr-0004] 4. Security token (20) according to claim 3, wherein the adhesive (22) is an optical adhesive. [5" id="c-fr-0005] 5. Security token (20) according to any one of the preceding claims, further comprising an optical window (24) at least partially covering the authentication element (23). 6. Security token (20) according to any of previous claims,authentication (23) is plan in which The element 7. Security token (20) according to any of previous claims, in which The element authentication (23) is formed by a rock. [6" id="c-fr-0006] 8. The security token (20) according to claim 7, in which the rock is selected from the group of crustal rocks comprising: igneous rocks; sedimentary; and metamorphic. [7" id="c-fr-0007] 9. Security token (20) according to any one of the preceding claims, in which the authentication element (23) has unique optical properties. - 42 [8" id="c-fr-0008] The security token (20) according to any of the preceding claims, wherein the authentication element (23) has a thickness of 300 µm or less. [9" id="c-fr-0009] 11. Security token (20) according to any one of the preceding claims, wherein the authentication element (23) has a length and a width in the range of 0.5 millimeter to 60 millimeters. [10" id="c-fr-0010] 12. Element secured by the security token (20) according to any one of the preceding claims. [11" id="c-fr-0011] 13. Security token authenticator characterized in that it comprises: an optical detector (38) adapted to generate a signal in response to an interaction of light with an authentication element (23) contained in a security token (20), the authentication element (23) being formed of 'a solid material containing one or more minerals; and a processor configured to: comparing the signal generated with a signal previously obtained from the authentication element (23); and provide an output based on the comparison. [12" id="c-fr-0012] 14. Security token authenticator (20) according to claim 13, in which the comparison of the signal generated with a signal obtained previously consists in: determining an optical property of the authentication element (23) from the generated signal; comparing the optical property determined with an optical property deduced from the signal previously obtained from the authentication element (23). [13" id="c-fr-0013] 15. Security token authenticator (20) according to claim 13 or claim 14, further comprising a light source (30) capable of illuminating the authentication element (23). [14" id="c-fr-0014] 16. Security token authenticator (20) according to any one of claims 13 to 15, further comprising one or more suitable linear polarizers (32, 37) - 43 varying the polarization of the light interacting with the authentication element (23) and / or the light collected by the optical detector (38). [15" id="c-fr-0015] 17. Security token authenticator (20) according to claim 16, wherein the one or more linear polarizers (32, 37) can be rotated. [16" id="c-fr-0016] 18. Security token authenticator (20) according to any one of claims 13 to 17, in which the optical detector (38) further comprises a microscope (34, 35). [17" id="c-fr-0017] 19. Security token authenticator (20) according to any one of claims 13 to 18, wherein the optical detector (38) further comprises a camera (38) and the signal is an image. [18" id="c-fr-0018] 20. Security token authenticator (20) according to any one of claims 13 to 19, in which the determined and expected optical properties are selected from the group consisting of: polarization; the structure of the image; refractive index; the colour ; chromaticity; variations in luminance; optical absorption; and opacity. [19" id="c-fr-0019] 21. Security token authenticator (20) according to any one of claims 13 to 20, further comprising an electronic storage device (41, 51) capable of storing the expected optical properties of a plurality of elements of authentication (23). [20" id="c-fr-0020] 22. Security token authenticator (20) according to any one of claims 13 to 21, further comprising a mechanical alignment mechanism (33) capable of aligning the authentication element (23) with the optical detector ( 38). [21" id="c-fr-0021] 23. Authentication method characterized in that it comprises the steps consisting in: detecting a signal resulting from the interaction of light with an authentication element (23) to - 44 inside a security token (20), the authentication element (23) being formed from a solid material containing one or more minerals; comparing (70) the detected signal with a signal previously obtained from the authentication element (23); and providing (75) an output based on the comparison. [22" id="c-fr-0022] 24. The method of claim 23, further comprising the step of illuminating the authentication element (23). [23" id="c-fr-0023] 25. The method of claim 23 or 24, wherein the comparison step (70) comprises the steps consisting in: determining an optical property of the authentication element from the generated signal; comparing (70) the determined optical property with an optical property deduced from the signal previously obtained from the authentication element (23). [24" id="c-fr-0024] 26. Method according to any one of claims 23 to 25, further comprising the steps consisting in: detecting an additional signal resulting from the interaction of light with the authentication element (23); comparing (70) the additional detected signal to an additional signal previously obtained from the authentication element (23); and providing (75) additional output based on the additional comparison. [25" id="c-fr-0025] 27. The method of claim 26, further comprising the step of varying the illumination of the authentication element (23). [26" id="c-fr-0026] 28. The method of claim 27, wherein the variation of the illumination causes one or more of the following characteristics to vary: the polarization; the axis of polarization; intensity; and the wavelength. - 45 [27" id="c-fr-0027] 29. A method according to any one of claims 26 to 28, characterized in that it further comprises the step of varying the optical properties of a detector (38) used to detect the interaction of light with the authentication element (23). [28" id="c-fr-0028] 30. The method of claim 29, wherein the variation of the optical properties of the detector (38) consists in applying a polarization offset. [29" id="c-fr-0029] The method of any of claims 26 to 30, further comprising the step of providing authentication (75) if the output and the additional output both indicate matches. [30" id="c-fr-0030] 32. A computer program comprising program instructions which, when executed on a computer, cause the computer to carry out the method of any one of claims 23 to 31. [31" id="c-fr-0031] 33. A computer-readable medium containing a computer program according to claim 32. [32" id="c-fr-0032] 34. Computer programmed to implement the method of any one of claims 23 to 31. [33" id="c-fr-0033] 35. Use of a solid material containing one or more, or formed from one or more, minerals or formed thereof, as an authenticator, as an authentication element (23) or as a token of security (20), badge or identification label. 1/3 SECTION A-A
类似技术:
公开号 | 公开日 | 专利标题 FR3065096A1|2018-10-12|SECURITY TOKEN AND AUTHENTICATION JP6870129B2|2021-05-12|Systems and methods for sample defect detection and photoluminescence measurement Shribak et al.2003|Techniques for fast and sensitive measurements of two-dimensional birefringence distributions CN101715589B|2014-01-22|Method of marking articles, method and device for marking articles, use of circularly polarised particles RU2734097C2|2020-10-12|Calibration slide for digital pathology Zhu et al.2015|Polarization difference ghost imaging US7446871B2|2008-11-04|Method and apparatus for real-time polarization difference imaging | video TW201523467A|2015-06-16|Method and system for certification and verification of gemstones Langley et al.2018|Optical chemical barcoding based on polarization controlled plasmonic nanopixels Ströhl et al.2017|Total internal reflection fluorescence anisotropy imaging microscopy: setup, calibration, and data processing for protein polymerization measurements in living cells US8094217B2|2012-01-10|Image capturing apparatus and image capturing method JP6846385B2|2021-03-24|Orientation characteristic measurement method, orientation characteristic measurement program, and orientation characteristic measurement device NL2009193B1|2020-04-30|Token based identification. Huang et al.2013|Detection of latent fingerprints by ultraviolet spectral imaging CN107727614A|2018-02-23|Time-space resolution spectrum imaging system Christinck et al.2020|Characterization of the angular-dependent emission of nitrogen-vacancy centers in nanodiamond Low et al.2016|Contactless visualization of latent fingerprints on nonporous curved surfaces of circular cross section Trubin et al.2019|Detection of fake biotissue by polarimetric method using Mueller matrices JP2013109205A|2013-06-06|Image detection device RU2568821C1|2015-11-20|Method for optical labelling of product Arteaga et al.2014|Beyond polarization microscopy: Mueller matrix microscopy with frequency demodulation CN102782477A|2012-11-14|Optical examinations with controlled input light Blamey et al.2008|The application of structured‐light illumination microscopy to hydrocarbon‐bearing fluid inclusions Dana et al.2009|Transparent watermarking using bidirectional imaging Bandey et al.2006|Fingerprint imaging across EM spectrum
同族专利:
公开号 | 公开日 NL2008084C2|2012-07-23| US20140015242A1|2014-01-16| GB201107723D0|2011-06-22| EP2663968B1|2020-07-29| GB2487099B|2018-04-04| FR2970361A1|2012-07-13| EP2663968A1|2013-11-20| FR2970361B1|2018-05-11| US8705805B2|2014-04-22| US10259251B2|2019-04-16| WO2012095370A1|2012-07-19| AU2012206771A1|2013-05-02| FR3065096B1|2020-10-30| GB2487099A|2012-07-11| US20120177255A1|2012-07-12| AU2012206771B2|2015-07-16|
引用文献:
公开号 | 申请日 | 公开日 | 申请人 | 专利标题 AT207138B|1957-03-06|1960-01-11|Meopta Praha Narodni Podnik|Method for determining the refractive index of solid materials in the form of transparent thin sections and device for carrying out this method| AT264871B|1963-11-29|1968-09-25|Polskie Zaklady Optyczne|Polarizing interference microscope| US4476468A|1981-06-22|1984-10-09|Light Signatures, Inc.|Secure transaction card and verification system| GB2218044A|1988-04-29|1989-11-08|Robert Frankfurt|Credit card incorporating gem| US20090127845A1|2004-12-23|2009-05-21|Arjowiggins Security|Security element having a digitised mark and security support or document comprising same| WO2007031077A1|2005-09-17|2007-03-22|Stiftung Alfred-Wegener-Institut Für Polar- Und Meeresforschung|Inorganic marking particles for characterising products for proof of authenticity method for production and use thereof| DE102007020982A1|2007-04-29|2008-10-30|Stiftung Alfred-Wegener-Institut Für Polar- Und Meeresforschung|Visual identification of original product for its authentication by contrast adjustment by providing micro assembly, involves utilizing single random micro assembly made from random surface distributed micro assembly elements| WO2008153503A1|2007-06-12|2008-12-18|Tiang Fo Gerard Tan|A system for marking items, and a system to identify the marked items| US3861886A|1968-11-13|1975-01-21|Melpar Inc|Material identification coding methods and systems| FR2442719B1|1978-06-19|1981-11-13|Arjomari Prioux| DE2858685C2|1978-07-06|1989-06-29|Gao Gesellschaft Fuer Automation Und Organisation Mbh, 8000 Muenchen, De| GB8608629D0|1986-04-09|1986-05-14|Biotechnica Ltd|Labelling| US4825801A|1987-10-05|1989-05-02|The United States Of America As Represented By The Director Of National Security|Tamper indicating seal and method for making the same| DE8909085U1|1989-07-26|1989-09-28|Lin, Jen Wei, Taipeh/T'ai-Pei, Tw| FR2657816B1|1990-02-06|1992-12-11|Arjomari Prioux|DECORATIVE SHEETS WHICH CAN BE USED IN PARTICULAR FOR THE MANUFACTURE OF LAMINATE PANELS AND INCLUDING METALLIC OR IRIDESCENT FLAKES.| US5521984A|1993-06-10|1996-05-28|Verification Technologies, Inc.|System for registration, identification and verification of items utilizing unique intrinsic features| US5619025A|1994-05-05|1997-04-08|Network Security Technologies|Method for tamper-proof identification using photorefractive crystals| US6396941B1|1996-08-23|2002-05-28|Bacus Research Laboratories, Inc.|Method and apparatus for internet, intranet, and local viewing of virtual microscope slides| GB2324065A|1997-04-09|1998-10-14|James Howard Slater|An identification code for banknotes or credit cards comprising a pattern of random beads| DE19737618A1|1997-08-28|1999-03-04|Consortium Elektrochem Ind|Machine-detectable security marking with increased protection against forgery, production of the security marking and security system comprising this security marking| US6020954A|1997-12-18|2000-02-01|Imagestatistics, Inc.|Method and associated apparatus for the standardized grading of gemstones| US6344263B1|1998-03-30|2002-02-05|3M Innovative Properties Company|Light dispersing film and method of manufacture| CA2308466C|1998-08-27|2007-05-15|Nippon Mitsubishi Oil Corporation|Genuineness detecting system and method for using genuineness detecting film| US6261469B1|1998-10-13|2001-07-17|Honeywell International Inc.|Three dimensionally periodic structural assemblies on nanometer and longer scales| US6576155B1|1998-11-10|2003-06-10|Biocrystal, Ltd.|Fluorescent ink compositions comprising functionalized fluorescent nanocrystals| WO2000028598A1|1998-11-10|2000-05-18|Biocrystal Limited|Methods for identification and verification| DE19853764A1|1998-11-21|2000-05-31|Simons Druck & Vertrieb Gmbh|System for securing and labeling products using microparticles| AU3814701A|2000-02-10|2001-08-20|Univ California|Method and apparatus for measuring birefringent particles| DE10007466A1|2000-02-18|2002-03-07|Schenker Juergen|Precious stone security system involves using stones to store identification information| DE10051062A1|2000-10-14|2002-04-18|Merck Patent Gmbh|Interference pigments for security uses have alternating high and low refractive index metal oxide layers wet deposited on a transparent carrier and give novel three-tone effects| GB0031016D0|2000-12-20|2001-01-31|Alphafox Systems Ltd|Security systems| JP4172199B2|2001-05-23|2008-10-29|凸版印刷株式会社|Anti-counterfeit ink, anti-counterfeit printed matter, and its authenticity determination method| US6924893B2|2002-05-13|2005-08-02|Marine Biological Laboratory|Enhancing polarized light microscopy| DE10233928A1|2002-07-25|2004-02-12|Giesecke & Devrient Gmbh|Method and device for checking the authenticity of a security element| DE10236409A1|2002-08-02|2004-02-12|Capsulution Nanoscience Ag|Color coded micro-capsules, as combinatory analysis libraries and specific optical sensors, are colored in a layer-by-layer structure using the whole volume and inner/outer surfaces for reactions| DE10238506A1|2002-08-17|2004-03-04|Hilmar Rauhe|Producing information-bearing micro-particulate mixtures involves defining code that can be implemented using natural or subsequently applied particle characteristics selected from e.g. morphology| US7077329B2|2003-06-24|2006-07-18|National Research Council Of Canada|Spectral coding by fluorescent semiconductor nanocrystals for document identification and security applications| DE102004055291A1|2003-12-09|2005-07-14|Merck Patent Gmbh|Colored flake-form effect pigments for use in preparing, e.g. cosmetic composition, comprise layer containing colorant and groove or grid structure| US7415136B2|2003-12-10|2008-08-19|Woods Hole Oceanographic Institution|Optical method and system for rapid identification of multiple refractive index materials using multiscale texture and color invariants| FR2864557B1|2003-12-30|2006-10-27|Arjo Wiggins Secutity Sas|SAFETY PAPER HAVING HIGH DOUBLE-PLI RESISTANCE AND METHOD OF MANUFACTURE| US20050277710A1|2004-06-14|2005-12-15|Joyce Richard P|Tagged resin, method of making a tagged resin, and articles made therefrom| US7623624B2|2005-11-22|2009-11-24|Illumina, Inc.|Method and apparatus for labeling using optical identification elements characterized by X-ray diffraction| EP1969525A1|2005-12-23|2008-09-17|Ingenia Holdings Limited|Optical authentication| US8176828B2|2007-03-21|2012-05-15|Schott Corporation|Glass-ceramic with laminates| AP2720A|2007-04-03|2013-07-31|Opal Producers Australia Ltd|Apparatus and methods for assessment, evaluation and grading of gemstones| NZ588366A|2008-04-02|2013-03-28|Sicpa Holding Sa|Identification and authentication using liquid crystal material markings| GB0807668D0|2008-04-28|2008-06-04|Innovia Films Ltd|Method of authenticating a polymer film| CA2739721A1|2008-10-09|2010-04-15|Opal Producers Australia Limited|Modified apparatus and method for assessment, evaluation and grading of gemstones| US7793837B1|2009-03-30|2010-09-14|Visa International Service Association|Authentication using physical characteristics of tokens|US9140522B1|2012-09-05|2015-09-22|The United States Of America As Represented By The Secretary Of The Army|Compositionally graded transparent ceramic armor| TWI599757B|2012-12-19|2017-09-21|巴斯夫歐洲公司|Detector for detecting at least one object, use thereof, method for detecting at least one object, human-machine interface, entertainment device, tracking system and camera| CN105452808A|2013-06-13|2016-03-30|巴斯夫欧洲公司|Detector for optically detecting an orientation of at least one object| US9989623B2|2013-06-13|2018-06-05|Basf Se|Detector for determining a longitudinal coordinate of an object via an intensity distribution of illuminated pixels| AU2014310703B2|2013-08-19|2018-09-27|Basf Se|Optical detector| DE102014100532A1|2014-01-17|2015-07-23|Bundesdruckerei Gmbh|Method for verifying the authenticity of an identification document| CN103871151A|2014-03-11|2014-06-18|威海华菱光电股份有限公司|Contact image detection device and application method thereof| CN106170824A|2014-04-17|2016-11-30|巴斯夫欧洲公司|Checking device, checking system and the method for checking article identity| WO2016005893A1|2014-07-08|2016-01-14|Basf Se|Detector for determining a position of at least one object| WO2016026049A1|2014-08-21|2016-02-25|Chris Evans|System and method for secure entry| JP6578006B2|2014-09-29|2019-09-18|ビーエーエスエフ ソシエタス・ヨーロピアBasf Se|Detector for optically determining the position of at least one object| CN107003785B|2014-12-09|2020-09-22|巴斯夫欧洲公司|Optical detector| JP6841769B2|2015-01-30|2021-03-10|トリナミクス ゲゼルシャフト ミット ベシュレンクテル ハフツング|Detector that optically detects at least one object| WO2017012986A1|2015-07-17|2017-01-26|Trinamix Gmbh|Detector for optically detecting at least one object| JP6755316B2|2015-09-14|2020-09-16|トリナミクス ゲゼルシャフト ミット ベシュレンクテル ハフツング|A camera that records at least one image of at least one object| WO2018019921A1|2016-07-29|2018-02-01|Trinamix Gmbh|Optical sensor and detector for optical detection| CN109923372B|2016-10-25|2021-12-21|特里纳米克斯股份有限公司|Infrared optical detector employing integrated filter| EP3542183A1|2016-11-17|2019-09-25|trinamiX GmbH|Detector for optically detecting at least one object| JP2020518127A|2017-04-20|2020-06-18|トリナミクス ゲゼルシャフト ミット ベシュレンクテル ハフツング|Photo detector| KR20200018501A|2017-06-26|2020-02-19|트리나미엑스 게엠베하|A detector for determining the position of at least one object| CN111679452A|2020-05-21|2020-09-18|中国科学院地球化学研究所|Rock polarizing sheet base material storage medium and manufacturing method and application thereof|
法律状态:
2018-04-04| PLFP| Fee payment|Year of fee payment: 7 | 2019-12-26| PLFP| Fee payment|Year of fee payment: 9 | 2020-12-29| PLFP| Fee payment|Year of fee payment: 10 | 2022-01-14| PLFP| Fee payment|Year of fee payment: 11 |
优先权:
[返回顶部]
申请号 | 申请日 | 专利标题 US12/930,517|US8705805B2|2011-01-10|2011-01-10|Secure portable token and systems and methods for identification and authentication of the same| GB1107723.7|2011-05-10| GB1107723.7A|GB2487099B|2011-01-10|2011-05-10|Secure portable token and systems and methods for identification and authentication of the same| FR1200073A|FR2970361B1|2011-01-10|2012-01-10|SECURITY TOKEN AND AUTHENTICATION| 相关专利
Sulfonates, polymers, resist compositions and patterning process
Washing machine
Washing machine
Device for fixture finishing and tension adjusting of membrane
Structure for Equipping Band in a Plane Cathode Ray Tube
Process for preparation of 7 alpha-carboxyl 9, 11-epoxy steroids and intermediates useful therein an
国家/地区
|