System for producing a personal ID card

ABSTRACT

An identification instrument such as a pocket-sized card includes both human-recognizable an machine-readable indicia. The human-recognizable material may be any combination of photographs, graphical or textual information, with the machine-readable section encoding any or all of the human-recognizable areas in their entirety. When the card is presented for verification, the machine-readable section is scanned, decompressed and/or deciphered and compared to the database used to generate the human-recognizable section or sections. Only with a substantial matching of the information may the card and its user be authenticated. Preferably, a Symbol Technologies compliant two-dimensional barcode is used as the machine-readable encoding format. Multiple levels of encryption and decryption are also described in conjunction with enhanced security.

FIELD OF THE INVENTION

This invention relates generally to identification cards and the like,and more particularly to an ID card wherein human-recognizable indiciamay be redundantly encoded in machine-readable form and reconstructed toverify authenticity.

BACKGROUND OF THE INVENTION

Increasing population and the need for security associated withgovernmental activities and corporate research and development, hasprompted various employee and affiliate identification techniques. Forexample, in larger corporations and governmental institutions, it iscommon for employees to wear picture ID cards. It is also increasinglycommon for such individuals to carry machine-readable "keys" whereinsome scanning device scrutinizes a visual or magnetic code associatedwith a pocket-sized card or plate in order to limit access to restrictedareas. Such machine-readable devices have the added advantage thatcomings and goings may be monitored automatically, often by means of acentralized network.

Picture-type ID cards are likewise very popular and have been inexistence for much longer than computer-readable identificationinstruments. Driver licenses are an obvious and ubiquitous example of atypical picture-type ID card, though numerous other examples exist suchas those associated with academic and education systems.

Despite the technique used, the unscrupulous are always prepared todevise ways to undermine the system in order to gain access tounauthorized information, privileges or other valuable materials. It isnot uncommon, for example, for picture-type ID cards to be tampered withby supplanting certain of the imprinted visual or textual information,thereby creating a bogus version. Indeed, a number of individuals andorganizations are in the business of producing such cards.

Identification cards and systems can maintain their, integrity only ifthey are more difficult to compromise than thieves are clever. As such,techniques are increasingly being implemented to render thefalsification of ID cards and the like more difficult. These approachesmay take two broad forms. One such form involves card manufacturingtechniques which make duplication more difficult. The other formgenerally concerns encoding data so that it is either readable only by amachine or in one way or another more difficult for a human being toperceive or duplicate.

In terms of more sophisticated manufacturing, various layering and/orlamination techniques are now common, the tampering of which would bemore obvious to authorized personnel. As for encoding, machine-readableareas are now being included on credit cards, and so forth. For example,the typical Visa or MasterCard now includes a magnetic stripe withencoded identification and account information, as well as aholographically produced image, the combination of which furtherimproves security.

However, even with machine-readable codes and manufacturing techniqueswhich are increasingly impervious to duplication, there remains a needfor an identification system for cards and the like which furtherensures authenticity by providing a tighter link between the datapresent in different forms on the card or other ID instrument. Forexample, even though certain sections of an ID card may containcomputer-readable information while other sections containhuman-recognizable visual and/or graphical information, in most cases,the two forms of information are substantially independent. As such, oneor more of these independent areas may be falsified, therebyfacilitating a security breach.

SUMMARY OF THE INVENTION

The present invention overcomes the prior art limitation just describedby encoding certain of the visual and/or graphical information containedon an identification instrument in its entirety machine-readable form.In this way, when the card or other such instrument is presented foraccess or other privileges, a machine may be used not only to decipherthe encoded information, but this deciphered information may bepresented in such a way that a direct comparison may be made between themachine-readable code and associated visual/graphical information.

In the preferred embodiment, an identification card bears a photographicportrait of an individual taken with a digital camera. The same databasegenerated by the camera is also used to generate a machine-readableencoded version of the photograph which is imprinted elsewhere on thecard. A verification station includes an operator-controlled computerwhich is capable of reading the encoded portion of the card. Softwareresident as part of the system formats the decoded photograph andpresents a portrait derived from the decoding process on the screen ofthe computer which may readily and conveniently be compared with theportrait originally printed on the card itself.

The system is not limited to a comparison of photographic data, as anyform of visual, graphical or textual information may also be similarlyencoded from the same database information and regenerated on thecomputer screen for the purpose of an operator-assisted comparison.

The unique improvement offered by the present invention is thatregardless of the human-recognizable material, it is encoded inmachine-readable form substantially in its entirety from the samedatabase used for the human-readable counterpart, thus facilitating adirect comparison. The system also supports the use of encryption anddecryption by generating a machine-readable code from the database andimprinting that code in scrambled form on the card. A key is thusrequired at the verification station so that the code, once read, may beunscrambled to generate an image for comparison. The key may bedelivered separately to the verification station, either physically orelectronically. Alternatively, the key itself may be encoded andimprinted on the card where it may be read and used directly. Methodsfor producing the card and encoding the visual, graphical or textualinformation in a preferred machine-readable format are also detailed inthe illustrations and description which follows.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 shows the front side and the back side of an identification cardproduced in accordance with the present invention; and

FIG. 2 is a drawing used to show the flow of information associated withthe method of making and using the card of FIG. 1.

DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS

The present invention concerns methods and apparatus for producinghigh-security identification cards and the like. Both human-recognizableand machine-readable information are imprinted on anidentification-oriented instrument, preferably a flat, pocket-sized cardand, when presented for verification, the machine-readable informationis used to generate a replica of the human-recognizable information. Ifthe two forms of information are substantially similar, the likelihoodis increased that the individual presenting the card is the one to whomthe card was issued.

Now making reference to the figures, FIG. 1 illustrates anidentification card formed in accordance with the present invention.FIG. 1A shows the front side of the card generally at 10, this frontsurface bearing a photographic portrait 12 of an individual, plus areasof the card containing related textual information. For example, in area14 the individual's name and title may be present, in area 16 theindividual's work area affiliation or other data may be present, and inarea 18 an address and phone number may be present. A slot 20 may beincluded so that the card may have a strap for attachment to theindividual's clothing, key chain, or so forth.

The layout of the various areas in FIG. 1A is by no means fixed. Thevarious textual fields may be embellished or eliminated, and thephotograph may be in black and white or color and of any size which thesubstrate card may support. Additionally, other photographic, graphicalor textual information may be present, including a fingerprint, or othersymbology, whether human-readable, machine-readable, magnetically orholographically encoded. Generally speaking, however, it is preferredthat front surface 10 be limited to the presentation of human-readablephotographic, graphical and textual information.

FIG. 1B shows the backside of the card of FIG. 1A, this backside beingdepicted generally at 26. Although other indicia may be present, in thepreferred embodiment the back side contains only a computer-readablecode 30, this being a two-dimensional barcode, though other methods ofvisually, electronically or magnetically encoding systems may be used.The two-dimensional barcode 30 illustrated in FIG. 1B which is basedupon an array of polygon-shaped printed cells and non-printed blankareas arranged along two independent axes, is preferably compliant withthe PDF417 two-dimensional high-density format offered by SymbolTechnologies, Inc. of Bohemia, N. Y. Brochures and other literature areavailable from Symbol Technologies which explain how incoming data arecompressed, stored and decompressed in accordance with its encodingtechnique.

Importantly, in keeping with the unique aspects of the presentinvention, regardless of the encoding system used, at least one area ofhuman-recognizable information on the card is encoded from the samedatabase and made available elsewhere on the card. Using this approach,when the card is presented for verification, the human-readable aspectscontained with the machine-readable code, may be regenerated andcompared.

In the preferred embodiment, the photographic portrait 12 shown in FIG.1A is encoded and printed as barcode 30 in FIG. 1B using the samedatabase. When the card is presented, code 30 is scanned, anddecompressed, thereby reconstructing a substantially identical versionof the photograph as printed on the card. When such a substantial matchis present, it is highly unlikely that the ID card has been forged,since both the photograph and the code would need to be falsified andmanufactured. Owing to the data compression and decompression techniquesstandardly available from Symbol Technologies, in concert with theadditional levels of data encryption which will be described shortly, itis practically impossible to falsify an ID card or other instrumentformed in accordance with the present invention.

Turning now to FIG. 2, there is shown an ID card production station 40and the route through which the card typically takes to ensure itsauthenticity. At production station 40, an operator 42 views a personalcomputer monitor 44. A camera 46 captures an image of a subject 48 andfeeds a signal representative of this image along line 50 to thepersonal computer 51. A digitized portrait 52 of the subject appears onthe screen of monitor 44 along with other fields which may be completedby operator 42 via keyboard 56. An image compression algorithm is usedto reduce the amount of data required to store the image. As part ofthis compression, the background behind the subject may be normalized oreliminated.

Software resident on computer 51 inputs data used to generatephotographic image 52 or information contained within data field 54, orboth, and generates a machine-readable encoded version of thehuman-recognizable data on the screen of monitor 44. Software providedin accordance with the present invention formats all of thisinformation, including the encoded version thereof, and prints them onattached printer 58. Utilizing the above techniques, card 60 similar tothe one depicted in FIG. 1, is produced having both thehuman-recognizable information and any encoded counterparts. The cardmay then be laminated with commercially available equipment provided forsuch purposes.

For verification, card 60 is scanned by an operator 62 utilizing astationary, table-top or hand-held portable-type of scanner 64, whichholographically reads the encoded information 70 on the backside of card60 with a laser. The information generated by scanner/decoder 64 is fedinto a computer, which may be the same computer 51 shown in FIG. 2 and,from this scanned encoded information, the photographic, graphical ortextual information originally encoded is regenerated. At the same time,the original data file, also resident on computer 51 is recalled and theoriginal imagery is compared to that derived via decoding. A matching ofthe information is used to signify the authenticity of the card and/orthe bearer.

In operation, software associated with the invention is preferablyinstalled on a personal computer equipped with a 486-type ofmicroprocessor running DOS, though the system is readily ported to othercomputer configurations. The software is self-loading, and screens areprovided on the monitor which requests identification of drives anddirector names, security password setup, confirmation of configuration,and the naming of the database directory and file name, if applicable.The assignment of encoding format defaults and algorithm choices arealso determined and set up during this installation procedure.

Upon completion of the installation routine, the defaults selected bythe user are encoded into a PDF417 image and printed. This printout isthen sent to the service provider and kept on file to be used inconjunction with customer technical support.

The photographs are captured using either a black and white or colordigital camera or video camera. Preferably a black and white digitalcamera or its equivalent, available from Logitech, Inc. is preferred.The backdrop used for the photograph may be automatically separated fromthe subject using system software. This software automatically resizesthe image to fit the area required for the photo, whether black andwhite or color. The resized image is then compressed using aphotographic compression algorithm then encoded using a printingalgorithm specifically designed to output a PDF file. Various printersare applicable, including HP laser jet and Xerox or Canon color laserprinters.

The operator 42 in FIG. 2 initializes the program via keyboard 56 orthrough the use of a mouse-type of pointing device. A title screen isdisplayed on monitor 44, and the program automatically checks to ensurethat proper equipment is attached. A photograph may then be taken eitherby depressing a button on the camera itself or by clicking an iconprovided on the computer monitor. Once taken, the photograph appears onthe screen in a cropped and resized format.

Identification input screens are next preferably provided which areformatted to prompt the operator to fill in fields associated with theindividual. When all fields are completed the operator begins thebackground processes of compression, encoding and printing. Thecompressed image file is tested to ensure its size fits withinspecification limits and, assuming it does, the selection of a scanoption loads a decompression decoder. Each customer is preferably issueda unique version of the decode and display software, and it isanticipated that any changes to this portion of the program be understrict control of the publisher in much the same way that a safe or lockmanufacturer keeps watch over combination codes.

The present invention provides a number of security features in additionto the two-dimensional encoding process used. For example, a printedencoded version of an image represents a mathematically compressedcombined alphanumeric and binary file. To correctly decode and displaythe image, both the encoder and decoder algorithms must be exact mirrorimages. Software switches are preferably additionally provided and whichare set during compression and decompression and, unless all or thevariables are set correctly, the image will not decode. The input filestructure must also match the decoder display format. The addition ofnon-display check digits to the input file when the decoder adds anotherlayer of security to the system making the forgery of an ID instrumentformed in accordance with the present invention virtually impossible.

Printing the two-dimensional code using a 0.006 dimension in the Xdirection makes reading a copied image nearly impossible. Additionally,laminating the code with a red filter over the symbol absolutelyprohibits copying.

Further security is provided through encryption and decryption, whichmay be used at various stages. For instance, the two-dimensional codingmay be encrypted directly and a key provided, either separately orcontained within the encoded area in order to regenerate thehuman-recognizable indicia.

Encryption and decryption algorithms may also be provided in associationwith verification simply to restore the human-recognizable materialsfrom the archival database. In this manner, an operator would not beable to access photographic, graphical or textual information asoriginally saved without a proper description key. For the absolutehighest level of security, both the photographic, graphical or textualinformation as originally archived and the encoded information on thecard would both be encrypted, with separate keys being necessary toreconstruct either database for comparison.

We claim:
 1. An identification card with protection againstfalsification, comprising:a card in the form of a thin, pocket-sizedsubstrate having front and back surfaces; two-dimensionalhuman-cognizable indicia imprinted on a first surface area of the card,including a graphical representation of an individual's facial likeness;and a two-dimensional machine-readable code imprinted on a secondsurface area of the card, said two-dimensional code being imprintedusing the same printing medium as that used to imprint said graphicalrepresentation, said machine-readable code comprising an array ofpolygon-shaped printed cells and non-printed blank areas arranged alongtwo independent axes, said array encoding data representative of saidfacial likeness in its entirety, whereby said two-dimensional code maybe decoded to generate an identical version of said facial likenesswithout referencing an external database, thus enabling comparisons tobe made between said individual, said graphical representation, and saidgenerated version of said likeness to ensure that said card has not beenfalsified.
 2. The identification card of claim 1 wherein saidtwo-dimensional machine-readable code further encodes other of saidtwo-dimensional human-cognizable indicia in addition to said graphicalrepresentation of an individual's facial likeness.
 3. The identificationcard of claim 2, wherein said other two-dimensional human-cognizableindicia includes textual information.
 4. The identification card ofclaim 2, wherein said other two-dimensional human-cognizable indiciaincludes a graphical representation of said individual's signature. 5.The identification card of claim 2, wherein said other two-dimensionalhuman-cognizable indicia includes a graphical representation of saidindividual's fingerprint.