Unlock instant, AI-driven research and patent intelligence for your innovation.

Process and device for authentication

a technology of authentication process and authentication device, applied in the field of authentication process and device, can solve problems such as system vulnerability, and achieve the effect of preserving optical diffraction properties

Inactive Publication Date: 2012-06-28
ADVANCED TRACK & TRACE SA
View PDF25 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

"The present invention provides an authentication process and device that can securely protect documents, such as software and multimedia works, from being copied or counterfeited. The process involves generating a random number, a time-stamp, and a first secret key, and then utilizing these keys to symmetrically encrypt a message authentication code. This encryption process ensures that even if a copy of the code is made, the original code can still be detected. The invention also provides a method for transferring a holographic matrix onto a base and marking it with a laser shot to produce a digital code that cannot be easily understood. The process and device can be used in the production of documents with holograms to enhance their security."

Problems solved by technology

These systems are nevertheless vulnerable and the counterfeiters falsify these codes or determine how they operate, which allows them to generate codes that appear to authenticate the counterfeit products.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Process and device for authentication
  • Process and device for authentication
  • Process and device for authentication

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0069]Throughout the description of the first and second aspects (FIGS. 1 and 2), the terms “ciphering” and “encryption” are used interchangeably, these functions consisting of encrypting data by utilizing an encryption key.

[0070]FIG. 1 shows a means of generating random numbers 100 performing the random number generation function 105, a hardware key 110 performing the time-stamp supply function 115, a preservation memory for a first secret key 120, a message authentication code truncation function 125, a preservation memory for a second secret key 130, a symmetric encryption function 135, a hash output 140 and an authentication code output 145.

[0071]The random number generation means 100 provides, for each process generating an authentication code and associated hash, a different random number 105. For preference, this random number generation means comprises a quantum generator so that these numbers are not pseudo-random, which might detract from the security of the process.

[0072]...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The authentication process comprises:a step of generating a random number (105),a step of generating a time-stamp (115),a step of generating a first secret key (120),a step of truncating the message authentication code utilizing said first secret key (125),a step of symmetrically encrypting the random number, time-stamp and truncation (135), utilizing a second secret key (130) to produce an authentication code (145). Preferably, during the step of generating a random number, a quantum generator (100) is utilized. Preferably, during the truncation step, a cryptographic message authenticator is generated utilizing the first secret key. Preferably, during the step of symmetrically encrypting the random number, time-stamp and truncation, by utilizing the second secret key, in addition a hash (140) is produced.

Description

CROSS-REFERENCE TO RELATED APPLICATIONS[0001]This application is a division of U.S. application Ser. No. 12 / 278,211, filed on May 6, 2009, which is the 35 U.S.C. 371 National Stage of PCT / FR2007 / 000206 filed Feb. 5, 2007, which claimed priority to French Application 0601004 filed Feb. 3, 2006, French Application 0601625 filed Feb. 24, 2006 and French Application 0601739 filed Feb. 27, 2006. The entire contents of these applications are hereby incorporated by reference.BACKGROUND OF THE INVENTION[0002]The present invention concerns an authentication process and device. It applies, in particular, to the protection against the counterfeiting of trademarks, distinctive symbols and the products that bear them.[0003]There are product marking systems, for example with ink-jet printers located on the production line for printing a serial number on each article. Other systems utilize codes.[0004]These systems are nevertheless vulnerable and the counterfeiters falsify these codes or determine...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(United States)
IPC IPC(8): H04L9/32
CPCG03H1/0011G06F21/31G06F2221/2107G06F2221/2151G09C1/00H04L9/3242B41M5/24H04L2209/20H04L2209/603G06Q20/3823G06Q20/40B42D25/328B41M3/14H04L9/3297G07D7/004
Inventor MASSICOT, JEAN-PIERREFOUCOU, ALAINSAGAN, ZBIGNIEW
Owner ADVANCED TRACK & TRACE SA
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More