EP1014318B1 - Ticket issuing method, ticket issuing system and ticket collating method - Google Patents

Ticket issuing method, ticket issuing system and ticket collating method Download PDF

Info

Publication number
EP1014318B1
EP1014318B1 EP99125264A EP99125264A EP1014318B1 EP 1014318 B1 EP1014318 B1 EP 1014318B1 EP 99125264 A EP99125264 A EP 99125264A EP 99125264 A EP99125264 A EP 99125264A EP 1014318 B1 EP1014318 B1 EP 1014318B1
Authority
EP
European Patent Office
Prior art keywords
ticket
data
image data
security
generating
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Lifetime
Application number
EP99125264A
Other languages
German (de)
French (fr)
Other versions
EP1014318A3 (en
EP1014318A2 (en
Inventor
Takashi Int. Property Division Yamaguchi
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Toshiba Corp
Original Assignee
Toshiba Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Toshiba Corp filed Critical Toshiba Corp
Publication of EP1014318A2 publication Critical patent/EP1014318A2/en
Publication of EP1014318A3 publication Critical patent/EP1014318A3/en
Application granted granted Critical
Publication of EP1014318B1 publication Critical patent/EP1014318B1/en
Anticipated expiration legal-status Critical
Expired - Lifetime legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07BTICKET-ISSUING APPARATUS; FARE-REGISTERING APPARATUS; FRANKING APPARATUS
    • G07B15/00Arrangements or apparatus for collecting fares, tolls or entrance fees at one or more control points
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07BTICKET-ISSUING APPARATUS; FARE-REGISTERING APPARATUS; FRANKING APPARATUS
    • G07B1/00Machines for printing and issuing tickets
    • G07B1/02Machines for printing and issuing tickets employing selectable printing plates
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07BTICKET-ISSUING APPARATUS; FARE-REGISTERING APPARATUS; FRANKING APPARATUS
    • G07B1/00Machines for printing and issuing tickets

Definitions

  • the present invention relates to a ticket issuing method and a ticket issuing system to issue tickets, for instance, tickets for concerts, tickets of travelling facilities and other tickets by way of a network or a telephone line.
  • the present invention relates to a ticket collating method for examining the genuineness of issued tickets.
  • Such a service is provided recently that when a ticket for a concert is requested via a network, an image for exchanging with a ticket is unloaded on a personal computer at home and record it on a floppy disk, that is then brought to the place of concert for listening the concert.
  • U.S. Patent No. 5,696,507 and U.S. Patent No. 5,666,284 disclosed a method and a system to store postage stamp data including coded postal charge data in a dedicated storage device that is connected to a personal computer and print the stamp data on an envelope.
  • US 5,598,477 discloses a ticket issuing method according to the preamble of claim 1.
  • EP 0 581 317 A2 discloses a method for embedding a digital signature within visual images.
  • EP 0 921 675 A2 which is prior art under Article 54(3)(4) EPC, discloses a method of preventing forgery of certificates or the like, wherein additional information composed of characters, images, voice information or the like is converted into two-dimensional code information and then converted into a visible additional image to be embedded in a full-color main image in the state of invisibility to produce a composite image, which composite image is printed on paper, as an example.
  • An object of the present invention is to provide a ticket issuing method capable of simply issuing tickets that have high security by way of communication means such as a network or a telephone line.
  • Another object of the present invention is to provide a ticket collating method that is capable of easily examining the genuineness of issued tickets and easily making a follow-up survey when any illegal ticket is detected.
  • FIG. 1 is a block diagram schematically showing the structure of a ticket issuing system to achieve the ticket issuing method of the present invention.
  • This ticket issuing system is composed of by connecting a user side apparatus A with a system side apparatus B through such a network C as Internet, LAN, etc.
  • "user” referred to here does mean a person who prints a ticket by a printer available at home and uses that ticket and a person who prints a ticket by a printer available at home or installed at a shop for use by other person or shop customer.
  • the user side apparatus A is composed of a user terminal device 11 comprising a personal computer, a dedicated client software 12 that operates on a personal computer, and a ticket printer 13 such as a color printer that is connected to the user terminal device 11.
  • the system side apparatus B is composed of a host computer/server 16, a dedicated server software 17 that operates on a host computer, a data base 18 that stores ticket data, user data and other data, and a security data detecting system 19.
  • the host computer/server 16 the dedicated server software 17 and the data base 18 are always in the ready to operate state and users who are registered in the data base 18 are able to use anytime.
  • a user starts up the user terminal device 11 and the dedicated client software 12 (Step S1) and connects the user terminal device 11 to the host computer/server 16 (Step S5) by inputting user identification data such as a user ID and a password (Step S2).
  • the host computer/server 16 collates the input user identification data with data stored in the data base 18 (Step S3) and approves the connection (Step S4) and starts the service when the input data is contained in the registered user list, and rejects the connection if it is not contained in the registered user list.
  • a service menu is displayed on the user terminal device 11 and a user selects a desired service and input ticket issue request data (Step S8).
  • the ticket issue request data referred to here are, in the case of, for instance, a ticket purchasing service, such required data as a kind of desired ticket, date and time, charge, seat reservation, charge paying means, etc.
  • the user terminal device 11 transmits these input data to the host computer/server 16.
  • the host computer/server 16 receives the data and collates the data with the,data stored in the data base 18 (Step S9), executes a ticket purchasing step. If a desired ticket cannot be purchased, the host computer/server 16 sends a message stating it to the user terminal device 11 and the step returns to the service menu.
  • the host computer/server 16 If a ticket is purchasable, the host computer/server 16 outputs security data from the ticket issue request data and user identification data (Step S10), forms ticket image data from the ticket issue request data (Step S11), and makes ticket printing data by embedding (combining) the security data in the ticket image data in the invisible state (Step S12). When the security data is printed on a paper, the security data is visible. Further, the host computer/server 16 makes ticket display data based on the ticket printing data (Step S13) and transmits the ticket printing data and the ticket display data to the user terminal device 11 (Step S14). The detailed method for making security data, ticket printing data and ticket display data will be described later.
  • the ticket display data sent from the host computer/server 16 is displayed on the display of the user terminal device 11 (Step S15).
  • a user checks the display by looking it and when there is no problem, prints a ticket. That is, when a print command is executed, the ticket printing data is sent from the user terminal device 11 to the ticket printer 13 and a ticket 14 is printed and output (Step S16).
  • a print completion command is executed and when there are any print error, etc., the print command is executed again.
  • a user is able to go to a place of concert with a printed ticket and use it as usual (Step S17).
  • a security data detecting system 19 In the security data detecting system 19, the genuineness of the ticket is judged by collating the detected security data with data stored in the data base 18 (Step S18).
  • FIG. 3-FIG. 5 show examples of auto race admission tickets applicable to this embodiment.
  • Fig. 3 shows ticket image data 21
  • FIG. 4 shows security data 22
  • FIG. 5 shows ticket printing data schematically.
  • the ticket image data 21 shown in FIG. 3 are generated from the ticket issue request data referring to the data base 18 during the process in Step S11 shown in FIG. 2.
  • a kind of ticket 31 a place 32, a data and time 33, a reserved seat number 34, a charge 35, a serial number 36, a ticket issuer 37 and a logo mark that are required for tickets for a normal concert are printed. These data are also printed on the stub of the ticket.
  • the security data 22 shown in FIG. 4 is generated from the user identification data and the ticket issue request data during the process in Step S10 show in FIG. 2. This security data 22 is used for the genuineness judgement to check whether a ticket was forged or altered. In this example, such data as a two-dimensional code data 39, a serial number for inquiring 40, a ticket issuer 41, a logo mark are printed on this ticket. Letters and figures are also expressed in binary image.
  • the two-dimensional code data 39 is printed for the automatic mechanical process when the security data 22 is read.
  • the kind of ticket 31, place 32, date and time 33, reserved seat number 34, charge 35, serial number 36, ticket issuer 36 and logo mark 38 were converted into two-dimensional codes and contained in this two-dimensional code data 39. Further, the serial number for inquiry 40, ticket issuer 41 and logo mark are provided for checking the security data 22 with the naked eye.
  • Date of Issue indicates a date when issue of a ticket was requested
  • Class. Code 1 indicates the data storage location of the data base for search
  • Class. Code 2 indicates coded kind of ticket and others
  • Ticket No. indicates the ticket issue order.
  • the security data 22 shown in FIG. 4 is able to check both of man and machine. These data are also printed on the stub of a ticket.
  • the ticket printing data 23 shown in FIG. 5, that is, visible data and invisible data are made from the security data and the ticket image data during the process of Step S12 shown in FIG. 2 and an actually usable ticket is produced when these data are printed.
  • the ticket printing data 23 shown in FIG. 5 is made by embedding the security data 22 shown in FIG. 4 in the ticket image data 21 shown in FIG. 3 in the invisible state according to a method that is described later. Accordingly, the tickets shown in FIG. 3 and FIG. 5 are quite the same and cannot be discriminated by the naked eye.
  • an inquiry serial number, a ticket issuer and its logo mark are included in the visible state in the ticket image data, and in the invisible state in the security data.
  • logo mark its location in the visible state is so arranged that it is completely agreed with that in the invisible state.
  • the security data is composed of two-dimensional code data and binary image such as letters or marks as shown in FIG. 4; however, one of these elements only or both elements may be included.
  • Two-dimensional code and binary image are called the basic security data.
  • the two-dimensional code 39 is printed on a ticket for the mechanical automatic process when the security data is read as mentioned above, and a kind of ticket, etc. are coded and included on the security data.
  • a kind of ticket, etc. are coded and included on the security data.
  • For two-dimensionally coded data it is possible to use not only a kind of ticket but also almost all kinds of forms such as voice, image, text, etc. including individual data such as pre-registered voiceprint and fingerprints of user and managing data.
  • the digitized basic security data is converted into a binary image in two-dimensional code.
  • the basic security data is delimited into 4-bit blocks in order from the top and each block is replaced to a 2 ⁇ 2 pixel black and while binary image according to a value of each block as shown in FIG. 6.
  • the binary image data (FIG. 6) is expanded by n times so as not to impair the embedded image data during the smoothing process at the time of the composite process described later.
  • the result when the binary image data shown in FIG. 7 was expanded when, for instance, n 2 is shown in FIG. 8.
  • Calra code was applied in the two-dimensional coding; however, other two-dimensional codes such as matrix system two-dimensional codes and Glyph codes are also usable without problem.
  • the two-dimensional code data and binary image data thus made are arranged in the same size area as the ticket image data as shown in FIG. 4. It is necessary to predetermine the layout by a system for the convenience of a sensor to detect the security data.
  • the ticket image data 21 is data of a so-called : ticket itself and is equivalent to FIG. 3. There are data of 24 bits (8 bits for each of RGB) per pixel.
  • the security data 22 is data to be embedded in the ticket image data 21 in the invisible state and is equivalent to FIG. 4. There are 1 bit data per pixel.
  • the key image data 24 is data that becomes a key for making the ticket printing data and detecting (restoring) the security data. This data is not opened to user and has 1 bit data per pixel.
  • the smoothing process is executed with the black pixels of the security data made "1" and the white pixels made "0".
  • the pixels at both ends of noteworthy pixels in the x direction are taken, the 3 ⁇ 1 pixel area is cut and a weighted average is taken as shown by the following expression (1).
  • W(i) (STL(i-1)+2 ⁇ STL(i)+STL(i+1))/4 where,
  • the result of the smoothing process becomes as shown in FIG. 12.
  • phase modulation step S52 based on the result of the smoothing process in the smoothing process step S51, the phase modulation of the key image data 24 is executed according to the rules of the following expressions (2-1)-(2-3).
  • ⁇ DES(i) MSK(i+1)
  • the color difference modulation process is executed according to the rules of the following expressions (3-1)-(3-6). In this case, three components of R(Red), G(Green) and B(Blue) are separately calculated. An example of the color difference modulation result of the red component is shown in FIG. 14.
  • DESR(i) VR(i)+SRCR(i)
  • DESG(i) VG(i)+SRCG(i)
  • DESB(i) VB(i)+SRCB(i)
  • DESR(i): x the i pixel superimposition process result for Red component An integer in the range of 0 ⁇ 255.
  • DESG(i): x the i pixel superimposition process result for Green component An integer in the range of 0 ⁇ 255.
  • DESB(i): x the i pixel superimposition process result for Blue Component. An integer in the range of 0 ⁇ 255.
  • SRCR(i): x Embedded image data of i pixel for Red Component. An integer in the range of 0 ⁇ 255.
  • SRCG(i): x Embedded image data of i pixel for Green Component. An integer in the range of 0 ⁇ 255.
  • SRCB(i): x Embedded image data of i pixel for Blue Component. An integer in the range of 0 ⁇ 255.
  • DESR(i), DESG(i) and DESG(I) are integers in the range of "0 ⁇ 255", respectively. If the result of calculation is below “0", they are set at "0" and above "255", they are set at "255".
  • red, green and blue color difference amount codes are reversed. Accordingly, in pixels containing much red components, green and blue components are less and in pixels containing less red components, other components are much contained.
  • Red and (Green, Blue) Cyan are complementary colors each other and even when red and cyan are adjacent to each other, they are hardly discriminated by the eyes of a man and looked as no color. Further, as red rich pixels and cyan rich pixels are arranged repeatedly in unit of several pixels according to key image data, this fine color difference cannot be identified by the eyes of man and a color difference amount is judged to be plus-minus "0".
  • the security data embedded in the invisible state in the ticket printing data may be easily exposed to a third person in some case.
  • Ticket display data that is made directly unusable is made by partially reducing the ticket printing data and breaking the ticket image data and the security data embedded in the invisible state.
  • the ticket printing data shown in FIG. 15 is cut in a 3 ⁇ 3 pixel area and is applied with the smoothing process. This is simply to take only an average and the result is as shown in FIG. 16. From the result of the smoothing process, leaving the pixel data at the top of the 4 ⁇ 4 pixel area, the remainder is erased (the thinning process). The result is as shown in FIG. 17. This data becomes the ticket display data.
  • amount of data is about 1/4 of the ticket printing data.
  • the print image resolution is generally 300 ⁇ 600 dpi but the image resolution of the display picture is about 100 dpi, which is 1/3 ⁇ 1/6 of the general print image resolution and therefore, there will be no problem.
  • the ticket display data is made by breaking the securing data by reducing data from the ticket printing data and displayed on the user terminal device 11.
  • the process is fast because amount of data is less and the security data and the ticket image data are partially broken, the ticket printing data cannot be used even when it is tried to obtain it illegally by taking a hard copy of the display. Accordingly, there is such a merit that the security is improved.
  • the ticket printing data and the ticket display data are not different apparently from the normal image and therefore, for instance, such general purpose image formats as JPEG (Joint Photographic Experts Group) and TIFF (Tagged Image File Format) are usable. Further, as they can be processed according to an application for treating general images, the system construction is relatively easy.
  • JPEG Joint Photographic Experts Group
  • TIFF Tagged Image File Format
  • the ticket 14 printed with the ticket printing data printed and output with the ticket printer 13 such as a color printer is used by user at a place of circuit.
  • the system side is able to judge the genuineness of the ticket by detecting the security data of the used ticket 14. This is described below in detail.
  • An image of the ticket 14 printed on a paper, etc. with the ticket printer 13 is read by an optical reading means such as a scanner, digitized to the state shown in FIG. 15 and the security data 22 is restored.
  • a key image data 22 shown in FIG. 10 is used.
  • the portion "1" of the value of the key image data 24 judges the ticket printing data 23 to be valid and the portion "0" of the value of the key image data 24 judges the value of the ticket printing data 23 to be invalid.
  • the result is shown in FIG. 18.
  • the hatched pixels in the figure are invalid data.
  • the valid data (expressed in white on a black ground) in FIG. 18 is cut out in a prescribed size.
  • FIG. 19 The result of the restoration of:a embedded image data (the security data) 22 according to this method is shown in FIG. 19.
  • the thick frame portion in the figure is the portion of the security data 22. This portion is in accord with FIG. 11 and it is seen that the security data 22 was completely restored.
  • the security data 22 becomes visible. Accordingly, it is possible to directly check a logo mark, etc. in the security data 22 visually. This method does not require troublesome operations and a complicated apparatus and therefore, there is a merit that genuineness of a ticket can be checked simply at.any place.
  • a third security data restoring and detecting method a system to thin a value read by an optical means will be described. It is assume that red components of a value read by a scanner, etc. are as shown in FIG. 15. As a checkered pattern of 4 ⁇ 2 unit is used for the composition process in this embodiment, the security data is thinned in unit of 4 pixels. An expansion factor n when making the security data is also related to this value and an expression of (Checkered grid unit ⁇ Expansion factor n ⁇ Number of pixels to be thinned) becomes valid.
  • the genuineness of the ticket 14 can be easily judged. For instance, even if the ticket 14 was given to a third person and illegally copied using a color copying machine, the history of that ticket, for instance, when, where and who issued it can be seen as the security data 22 contains a inquiry serial number and an illegal route can be detected easily.
  • the composition process is executed using a checkered pattern in unit of 4 ⁇ 2 pixels as a key. So, when the composition process is executed using a checkered pattern in size of 1 ⁇ 1 pixel, the effect to prevent the copying with a color copying machine is further promoted. This is because red rich and cyan rich pixel data of the ticket printing data are regularly arranged alternately by the composition process when such square grids as size 1 ⁇ 1 or 2 ⁇ 2 pixels are used.
  • a sensor of a scanner portion of a color copying machine is not a spot but has a limited area and therefore, even if a scanner reading resolution is the same as a ticket printing resolution, pixels of a sensor of scanner and pixels of the ticket printing data are finely deviated and they are read as they are.
  • the red and cyan components are complementary colors and it is therefore difficult to separate pixels arranged in extremely highly precise pitches and erroneously recognized to be gray by the eyes of man and sensors, and they cannot be properly copied.
  • FIG. 22 schematically shows the state from issue of ticket to detection of security data so far in use.
  • ticket image data 21 a landscape photograph is used.
  • security data 22 a logo mark "JAPAN” as a copyright data and a two-dimensional code for checking by the sense of vision of a man and by a machine that are converted into the security data according to the steps shown in this embodiment are used.
  • the ticket printing data 23 is made by executing the composition process of the ticket image data 21, the security data 22 and the key image data 24 according to the method described above.
  • the image of this ticket printing data 23 is seen as a landscape photograph to the eyes of a man but the copyright data, etc. are invisibly embedded.
  • the ticket display data 25 is made from the ticket printing data 23 according to the method shown in this embodiment.
  • these ticket printing data 23 and the ticket display data 25 are transmitted via a network to a user who requested the issue of a ticket.
  • user displays the ticket display data 25 on the display of the user terminal device 11 and after checking its contents, prints and outputs the ticket printing data 23 using the ticket printer 13 as a color printer and obtains the ticket 14.
  • FIG. 23 is an example of the ticket issue method of this invention applied to an electronic postage stamp.
  • FIG. 23(a) is the ticket printing data
  • FIG. 23(b) is a stamp image portion
  • FIG. 23(c) is the security data invisibly embedded in the stamp image portion.
  • security becomes particularly important.
  • security data is invisibly embedded in an electronic postage stamp likewise the auto race admission ticket described above and the print data of that ticket (stamp) is printed directly on an envelope, etc., an electronic stamp can be realized.

Description

The present invention relates to a ticket issuing method and a ticket issuing system to issue tickets, for instance, tickets for concerts, tickets of travelling facilities and other tickets by way of a network or a telephone line.
Further, the present invention relates to a ticket collating method for examining the genuineness of issued tickets.
In recent years, a system is widespread to request tickets for concerts or transport facilities using a network or a telephone line and a requester goes to pick up the requested ticket at a prescribed place. Thus, it is possible to purchase tickets at home or a company.
Further, based on the widespread of personal computers and color printers and improvement of the infrastructure of the communication environment of the internet, etc., a system that is capable of directly issuing tickets that are requested via a network at home or a company is now under the examination.
Further, such a service is provided recently that when a ticket for a concert is requested via a network, an image for exchanging with a ticket is unloaded on a personal computer at home and record it on a floppy disk, that is then brought to the place of concert for listening the concert.
Further, a system is also being tested now to request an electronic postage stamp via a network and issue the requested electronic postage stamp at home or a company. For instance, U.S. Patent No. 5,696,507 and U.S. Patent No. 5,666,284, disclosed a method and a system to store postage stamp data including coded postal charge data in a dedicated storage device that is connected to a personal computer and print the stamp data on an envelope.
However, a dedicated storage device that is connected to a personal computer is required for the method and the system disclosed in U.S. Patent No. 5,606,5007 and U.S. Paten No. 5,666,284 and therefore, a client system structure is restricted. Further, although a postal charge data is coded, it is printed in the visible state on an envelope using a two-dimensional code technology or its applied technology and therefore, there is such a defect that coded data is read relatively easily when a difference in two data is taken and compared and thus, its security is weak.
US 5,598,477 discloses a ticket issuing method according to the preamble of claim 1.
EP 0 581 317 A2 discloses a method for embedding a digital signature within visual images.
EP 0 921 675 A2, which is prior art under Article 54(3)(4) EPC, discloses a method of preventing forgery of certificates or the like, wherein additional information composed of characters, images, voice information or the like is converted into two-dimensional code information and then converted into a visible additional image to be embedded in a full-color main image in the state of invisibility to produce a composite image, which composite image is printed on paper, as an example.
An object of the present invention is to provide a ticket issuing method capable of simply issuing tickets that have high security by way of communication means such as a network or a telephone line.
In addition, another object of the present invention is to provide a ticket collating method that is capable of easily examining the genuineness of issued tickets and easily making a follow-up survey when any illegal ticket is detected.
These objects are achieved by a ticket issuing method according to claim 1 and a ticket collation method according to claim 10, respectively.
Further developments of the present invention are given in the dependent claims.
BRIEF DESCRIPTION OF THE DRAWINGS
  • FIG. 1 is a block diagram schematically showing the structure of a ticket issuing system for achieving a ticket issuing method of the present invention;
  • FIG. 2 is a flowchart for explaining the operating steps of ticket issue;
  • FIG. 3 is a plan view showing an example of ticket image data when applied to an auto race admission ticket;
  • FIG. 4 is a plan view showing one example of security data when applied to an auto race admission ticket;
  • FIG. 5 is a plan view showing one example of ticket printing data when applied to an auto race admission ticket;
  • FIG. 6 is a schematic diagram for explaining the binary imaging of security data by two-dimensional code;
  • FIG. 7 is a schematic diagram for explaining the binary imaging of security data by two-dimensional code;
  • FIG. 8 is a schematic diagram for explaining the binary imaging of security data by two-dimensional code;
  • FIG. 9 is a block diagram for explaining the ticket printing data preparation step;
  • FIG. 10 is a diagram showing a definite calculation example in the ticket printing data making;
  • FIG. 11 is a diagram showing a definite calculation example in the ticket printing data making;
  • FIG. 12 is a diagram showing a definite calculation example in the ticket printing data making;
  • FIG. 13 is a diagram showing a definite calculation example in the ticket printing data making;
  • FIG. 14 is a diagram showing a definite calculation example in the ticket printing data making;
  • FIG. 15 is a diagram showing a definite calculation example in the ticket printing data making; .
  • FIG. 16 is a diagram showing a definite calculation example in the ticket printing data making;
  • FIG. 17 is a diagram showing a definite calculation example in the ticket printing data making;
  • FIG. 18 is a diagram showing a definite calculation example in the ticket printing data making;
  • FIG. 19 is a diagram showing a definite calculation example in the ticket printing data making;
  • FIG. 20 is a diagram for explaining the thinning process in a third reproduction method;
  • FIG. 21 is a diagram for explaining an interpolation process in a third reproduction method;
  • FIG. 22 is a diagram schematically showing a ticket issuing method; and
  • FIG. 23 is a diagram for explaining an example when the ticket issue method of the present invention is applied to electronic postage stamps.
  • DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS
    Preferred embodiments of the present invention will be described below referring to the drawings.
    FIG. 1 is a block diagram schematically showing the structure of a ticket issuing system to achieve the ticket issuing method of the present invention. This ticket issuing system is composed of by connecting a user side apparatus A with a system side apparatus B through such a network C as Internet, LAN, etc.
    Further, "user" referred to here does mean a person who prints a ticket by a printer available at home and uses that ticket and a person who prints a ticket by a printer available at home or installed at a shop for use by other person or shop customer.
    The user side apparatus A is composed of a user terminal device 11 comprising a personal computer, a dedicated client software 12 that operates on a personal computer, and a ticket printer 13 such as a color printer that is connected to the user terminal device 11.
    The system side apparatus B is composed of a host computer/server 16, a dedicated server software 17 that operates on a host computer, a data base 18 that stores ticket data, user data and other data, and a security data detecting system 19.
    Next, a ticket issue operating steps will be explained referring to a flowchart shown in FIG. 2. The host computer/server 16, the dedicated server software 17 and the data base 18 are always in the ready to operate state and users who are registered in the data base 18 are able to use anytime.
    First, a user starts up the user terminal device 11 and the dedicated client software 12 (Step S1) and connects the user terminal device 11 to the host computer/server 16 (Step S5) by inputting user identification data such as a user ID and a password (Step S2).
    The host computer/server 16 collates the input user identification data with data stored in the data base 18 (Step S3) and approves the connection (Step S4) and starts the service when the input data is contained in the registered user list, and rejects the connection if it is not contained in the registered user list.
    When connected to the host computer/server 16 (Step S5), a service menu is displayed on the user terminal device 11 and a user selects a desired service and input ticket issue request data (Step S8). The ticket issue request data referred to here are, in the case of, for instance, a ticket purchasing service, such required data as a kind of desired ticket, date and time, charge, seat reservation, charge paying means, etc.
    When the ticket issue request data are input, the user terminal device 11 transmits these input data to the host computer/server 16. The host computer/server 16 receives the data and collates the data with the,data stored in the data base 18 (Step S9), executes a ticket purchasing step. If a desired ticket cannot be purchased, the host computer/server 16 sends a message stating it to the user terminal device 11 and the step returns to the service menu.
    If a ticket is purchasable, the host computer/server 16 outputs security data from the ticket issue request data and user identification data (Step S10), forms ticket image data from the ticket issue request data (Step S11), and makes ticket printing data by embedding (combining) the security data in the ticket image data in the invisible state (Step S12). When the security data is printed on a paper, the security data is visible. Further, the host computer/server 16 makes ticket display data based on the ticket printing data (Step S13) and transmits the ticket printing data and the ticket display data to the user terminal device 11 (Step S14). The detailed method for making security data, ticket printing data and ticket display data will be described later.
    The ticket display data sent from the host computer/server 16 is displayed on the display of the user terminal device 11 (Step S15). A user checks the display by looking it and when there is no problem, prints a ticket. That is, when a print command is executed, the ticket printing data is sent from the user terminal device 11 to the ticket printer 13 and a ticket 14 is printed and output (Step S16). When the print is normally completed, a print completion command is executed and when there are any print error, etc., the print command is executed again.
    A user is able to go to a place of concert with a printed ticket and use it as usual (Step S17). At the place of concert, whether the used ticket 14 is a proper ticket is checked using a security data detecting system 19. In the security data detecting system 19, the genuineness of the ticket is judged by collating the detected security data with data stored in the data base 18 (Step S18).
    FIG. 3-FIG. 5 show examples of auto race admission tickets applicable to this embodiment. Fig. 3 shows ticket image data 21, FIG. 4 shows security data 22 and FIG. 5 shows ticket printing data schematically.
    The ticket image data 21 shown in FIG. 3 are generated from the ticket issue request data referring to the data base 18 during the process in Step S11 shown in FIG. 2. On this ticket, a kind of ticket 31, a place 32, a data and time 33, a reserved seat number 34, a charge 35, a serial number 36, a ticket issuer 37 and a logo mark that are required for tickets for a normal concert are printed. These data are also printed on the stub of the ticket. The security data 22 shown in FIG. 4 is generated from the user identification data and the ticket issue request data during the process in Step S10 show in FIG. 2. This security data 22 is used for the genuineness judgement to check whether a ticket was forged or altered. In this example, such data as a two-dimensional code data 39, a serial number for inquiring 40, a ticket issuer 41, a logo mark are printed on this ticket. Letters and figures are also expressed in binary image.
    The two-dimensional code data 39 is printed for the automatic mechanical process when the security data 22 is read. The kind of ticket 31, place 32, date and time 33, reserved seat number 34, charge 35, serial number 36, ticket issuer 36 and logo mark 38 were converted into two-dimensional codes and contained in this two-dimensional code data 39. Further, the serial number for inquiry 40, ticket issuer 41 and logo mark are provided for checking the security data 22 with the naked eye.
    Numbers of four figures are used for the inquiry serial numbers 36 and 40 in this embodiment. The tickets shown here are composed of data shown in the following table 1.
    Classification No. of Figure Data Example Use
    Serial No. 20 1998092512345678 Used for inquiry to Data Base
    Date of Issue 8 19980925 Date
    Class. Code 1 2 12 Data Base Class. Code
    Class. Code 2 4 3412 Kind of Ticket/Area/Form of Contract. etc.
    Ticket No. 6 345678 Ticket Issue Order
    In the above table 1, Date of Issue indicates a date when issue of a ticket was requested, Class. Code 1 indicates the data storage location of the data base for search, Class. Code 2 indicates coded kind of ticket and others, and Ticket No. indicates the ticket issue order. Using a serial number comprising these data as a key for collating to the data base 18, it is possible to uniformly manage a large quantity of tickets.
    Thus, the security data 22 shown in FIG. 4 is able to check both of man and machine. These data are also printed on the stub of a ticket.
    The ticket printing data 23 shown in FIG. 5, that is, visible data and invisible data are made from the security data and the ticket image data during the process of Step S12 shown in FIG. 2 and an actually usable ticket is produced when these data are printed. The ticket printing data 23 shown in FIG. 5 is made by embedding the security data 22 shown in FIG. 4 in the ticket image data 21 shown in FIG. 3 in the invisible state according to a method that is described later. Accordingly, the tickets shown in FIG. 3 and FIG. 5 are quite the same and cannot be discriminated by the naked eye.
    In this embodiment, an inquiry serial number, a ticket issuer and its logo mark are included in the visible state in the ticket image data, and in the invisible state in the security data. Thus, by partially including the data in a ticket in the visible and invisible state, it becomes possible to immediately detect a ticket that is forged or altered through the simple rewriting.
    Further, regarding a logo mark, its location in the visible state is so arranged that it is completely agreed with that in the invisible state. Thus, it becomes very difficult to forge or alter either one or both of logo marks visibly state and invisibly and security of a ticket is further improved.
    Next, how to form the security data will be described.
    The security data is composed of two-dimensional code data and binary image such as letters or marks as shown in FIG. 4; however, one of these elements only or both elements may be included.
    When the security data is input in two-dimensional code, the mechanical process becomes possible when detecting the security data and when the security data is input in binary image, the visual process by man becomes possible and these processes are selectable according to a system characteristic. Two-dimensional code and binary image are called the basic security data.
    One example of the partial generation of the two-: dimensional code 39 shown in FIG. 4 will be explained.
    The two-dimensional code 39 is printed on a ticket for the mechanical automatic process when the security data is read as mentioned above, and a kind of ticket, etc. are coded and included on the security data. For two-dimensionally coded data, it is possible to use not only a kind of ticket but also almost all kinds of forms such as voice, image, text, etc. including individual data such as pre-registered voiceprint and fingerprints of user and managing data.
    First, it is necessary to convert basic security data into digital data. In the case of basic security data comprising such analog data as voice and voiceprint, they are converted into digital data through the A/D conversion. The data that is already in the digital form is used as it is.
    Then, the digitized basic security data is converted into a binary image in two-dimensional code. The basic security data is delimited into 4-bit blocks in order from the top and each block is replaced to a 2×2 pixel black and while binary image according to a value of each block as shown in FIG. 6.
    For instance, when embedded data are arranged in the hexadecimal notation from the top as shown below,
       FF 01 45 D3 ...
    These data are replaced as shown in FIG. 7.
    Further, the binary image data (FIG. 6) is expanded by n times so as not to impair the embedded image data during the smoothing process at the time of the composite process described later. Here, n=2-4 is desirable. The result when the binary image data shown in FIG. 7 was expanded when, for instance, n=2 is shown in FIG. 8.
    In this embodiment, Calra code was applied in the two-dimensional coding; however, other two-dimensional codes such as matrix system two-dimensional codes and Glyph codes are also usable without problem.
    In the case where such two-dimensional image data as a character string 41 of "Ticket East-West-South-North" and a logo mark 42 as shown in FIG. 4 are inserted in the security data, these data are converted into binary image data. In this case, it is necessary to unify image resolutions when converting data into binary images and is desirable to bring image resolutions in accord with those of the ticket printing data. Such significant portions including letters, etc. are converted into black components and meaningless portions such as background, etc. are converted into white components.
    The two-dimensional code data and binary image data thus made are arranged in the same size area as the ticket image data as shown in FIG. 4. It is necessary to predetermine the layout by a system for the convenience of a sensor to detect the security data.
    Next, the ticket printing data making method (the composite processing method) will be described in detail.
    The ticket image data 21 is data of a so-called : ticket itself and is equivalent to FIG. 3. There are data of 24 bits (8 bits for each of RGB) per pixel. The security data 22 is data to be embedded in the ticket image data 21 in the invisible state and is equivalent to FIG. 4. There are 1 bit data per pixel. The key image data 24 is data that becomes a key for making the ticket printing data and detecting (restoring) the security data. This data is not opened to user and has 1 bit data per pixel.
    First, in the smoothing processing step S51, the smoothing process is executed with the black pixels of the security data made "1" and the white pixels made "0". Here, the pixels at both ends of noteworthy pixels in the x direction are taken, the 3×1 pixel area is cut and a weighted average is taken as shown by the following expression (1). W(i)=(STL(i-1)+2 · STL(i)+STL(i+1))/4 where,
  • W(i) : x = Weighted mean value of i pixel
  • STL(i): x = Embedded image data of i pixel = 1 or 0
  • If the security data was not increased by n times when made, the two-dimensional code data of the security data was destructed in this smoothing process. The more the expansion factor n is larger, the higher the safe factor not to destruct the embedded image data will become but concealed data is apt to be disclosed.
    For instance, when the key image data 24 and the security data 22 are as shown in FIG. 10 and FIG. 11, . respectively, the result of the smoothing process becomes as shown in FIG. 12. The embedded data was expanded to 4 times by setting the security data 22 at n=4. Further, two pixels around the outside are set at "0" as the embedding allowance.
    Then, in the phase modulation step S52, based on the result of the smoothing process in the smoothing process step S51, the phase modulation of the key image data 24 is executed according to the rules of the following expressions (2-1)-(2-3). When W(i) =0 → DES (i) = MSK(i) When W(i) =1 → DES (i) = MSK(i+2) When other than above → DES(i)=MSK(i+1)
  • DES(i): x=i pixel phase modulation result = 1 or 0
  • MSK(i): x=i pixel key image data = 1 or 0
  • Here, the x=0 column and x=15 column are the edges of the image data and therefore, cannot be smoothed and also cannot be applied with the phase modulation. So, at the edge, the exclusive OR of the key image data 24 with the security data 22 is taken. The result of the phase modulation is shown in FIG. 13.
    Then, in the color difference modulation step S53, based on the phase modulation result in the phase modulation step S52, the color difference modulation process is executed according to the rules of the following expressions (3-1)-(3-6). In this case, three components of R(Red), G(Green) and B(Blue) are separately calculated. An example of the color difference modulation result of the red component is shown in FIG. 14. When DES(i)=1 → VR(i)= -ΔV → VG(i)= +ΔV → VB(i)= +ΔV When DES(i)=0 → VR(i)= +ΔV → VG(i)= -ΔV → VB(i)= -ΔV    VR(i): x = the color difference modulation result of i pixel for Red component An integer in the range of -255∼255
       VG(i): x = the color difference modulation result of i pixel for Green component An integer in the range of -255∼255
       VB(i): x = the color difference modulation result of i pixel for Blue component An integer in the range of -255∼255
    Further, the color difference amount ΔV is an integer in the range of preset "0∼255". The more the color difference amount ΔV is larger, the more the visible contract when restoring an embedded image data becomes higher, and the embedded data can be reproduced easily. However, if it is too large, the security data is apt to be easily disclosed. Accordingly, the color difference amount ΔV is desirable at about "16∼96"; however, ΔV=48 is used here.
    Lastly, in the superimposition step S54, from the color difference modulation result and the ticket image data 21 in the color difference step S53, the superimposition process shown in the following expression (4-1)-(4-3) is executed and the ticket printing data 23 is made. DESR(i)=VR(i)+SRCR(i) DESG(i)=VG(i)+SRCG(i) DESB(i)=VB(i)+SRCB(i)    DESR(i): x = the i pixel superimposition process result for Red component
       An integer in the range of 0∼255.
       DESG(i): x = the i pixel superimposition process result for Green component
       An integer in the range of 0∼255.
       DESB(i): x = the i pixel superimposition process result for Blue Component.
       An integer in the range of 0∼255.
       SRCR(i): x = Embedded image data of i pixel for Red Component.
       An integer in the range of 0∼255.
       SRCG(i): x = Embedded image data of i pixel for Green Component.
       An integer in the range of 0∼255.
       SRCB(i): x = Embedded image data of i pixel for Blue Component.
       An integer in the range of 0∼255.
    Further, DESR(i), DESG(i) and DESG(I) are integers in the range of "0∼255", respectively. If the result of calculation is below "0", they are set at "0" and above "255", they are set at "255".
    Results of Red component when all pixels of the ticket image data 21 are (R,G,B)=(127, 127, 127) are shown in FIG. 15. All values are integers in the range of "0∼ 255" and "255" indicates that Red component is most frequent. In FIG. 15, pixels with less red components and pixels with much red components are alternately repeated in unit of two pixels in the area where so security data is embedded like a value of (0,0) pixel = 79, a value of (1,0) pixel = 79, a value of (2,0) pixel = 175 ...
    As shown in the expressions (3-1)∼(3-3) or (3-4) ∼ (3-6), red, green and blue color difference amount codes are reversed. Accordingly, in pixels containing much red components, green and blue components are less and in pixels containing less red components, other components are much contained. Red and (Green, Blue) = Cyan are complementary colors each other and even when red and cyan are adjacent to each other, they are hardly discriminated by the eyes of a man and looked as no color. Further, as red rich pixels and cyan rich pixels are arranged repeatedly in unit of several pixels according to key image data, this fine color difference cannot be identified by the eyes of man and a color difference amount is judged to be plus-minus "0".
    For instance, in the expression (4-1), it is erroneously judged to be: DESR(i) = SRCR(i) And it is not possible to discriminated that the image data is embedded. Accordingly, it becomes possible to form a ticket printing data with a security data embedded invisibly in a ticket image data according to this principle.
    When making the print with a color printer using the ticket printing data, the more a color difference amount ΔV is larger, the more easy to discriminate the data and therefore, the more a degree to restore the security data becomes higher. However, the security data embedded in the invisible state in the ticket printing data may be easily exposed to a third person in some case.
    So, when printing and outputting the ticket printing data with a color printer, it is possible to prevent the security data from being exposed without breaking the security data by outputting the data after executing an error diffusion process as an image processing. The security data in the macroscopically invisible state are preserved because density of pixels of ticket printing data is compensated by the error diffusion process.
    Further, when the error diffusion process is applied, low frequency components decrease and high frequency components increase. As the security data embedded in the ticket printing data is composed of high frequency components, other high frequency components are mixed therein and therefore, the security data becomes the state that is not visually discriminated.
    Next, a ticket display data making method will be described.
    Ticket display data that is made directly unusable is made by partially reducing the ticket printing data and breaking the ticket image data and the security data embedded in the invisible state.
    First, the ticket printing data shown in FIG. 15 is cut in a 3×3 pixel area and is applied with the smoothing process. This is simply to take only an average and the result is as shown in FIG. 16. From the result of the smoothing process, leaving the pixel data at the top of the 4×4 pixel area, the remainder is erased (the thinning process). The result is as shown in FIG. 17. This data becomes the ticket display data.
    Here, amount of data is about 1/4 of the ticket printing data. The print image resolution is generally 300∼600 dpi but the image resolution of the display picture is about 100 dpi, which is 1/3∼1/6 of the general print image resolution and therefore, there will be no problem.
    Thus, without displaying the ticket printing data directly on the user terminal device 11, the ticket display data is made by breaking the securing data by reducing data from the ticket printing data and displayed on the user terminal device 11. As the process (display) is fast because amount of data is less and the security data and the ticket image data are partially broken, the ticket printing data cannot be used even when it is tried to obtain it illegally by taking a hard copy of the display. Accordingly, there is such a merit that the security is improved.
    The ticket printing data and the ticket display data are not different apparently from the normal image and therefore, for instance, such general purpose image formats as JPEG (Joint Photographic Experts Group) and TIFF (Tagged Image File Format) are usable. Further, as they can be processed according to an application for treating general images, the system construction is relatively easy.
    Further, even when the ticket printing data image format is changed to other formats in a system, an embedded security data is left as it is and no problem is caused. :
    By the way, the ticket 14 printed with the ticket printing data printed and output with the ticket printer 13 such as a color printer is used by user at a place of circuit. At this time, the system side is able to judge the genuineness of the ticket by detecting the security data of the used ticket 14. This is described below in detail.
    An image of the ticket 14 printed on a paper, etc. with the ticket printer 13 is read by an optical reading means such as a scanner, digitized to the state shown in FIG. 15 and the security data 22 is restored.
    To restore the security data 22, a key image data 22 shown in FIG. 10 is used. By bringing the key image data 24 to correspond with values of the ticket image of the ticket printing data 23 read by a scanner 1 : 1. The portion "1" of the value of the key image data 24 judges the ticket printing data 23 to be valid and the portion "0" of the value of the key image data 24 judges the value of the ticket printing data 23 to be invalid. The result is shown in FIG. 18. The hatched pixels in the figure are invalid data. The valid data (expressed in white on a black ground) in FIG. 18 is cut out in a prescribed size.
    The security data 22 in this embodiment was expanded by 4 times by setting n=4 and therefore, after removing the embedded allowance of 2 pixels around it, the data is cut out in unit of 4×4 pixels. If a valid data value in he 4×4 pixel range is a red rich value ("175" in this embodiment), the embedded image data (the security data) is 1. If it is a cyan rich value ("79" in this embodiment), the embedded image data is 0. If both of red rich and cyan rich values are included, either one containing more rich color is adopted.
    This is because of the smoothing process in the composition process. The result of the restoration of:a embedded image data (the security data) 22 according to this method is shown in FIG. 19. The thick frame portion in the figure is the portion of the security data 22. This portion is in accord with FIG. 11 and it is seen that the security data 22 was completely restored.
    Further, in this embodiment, for instance, after printing the data at a resolution 400 dpi by a thermal sublimation type printer and reading it at a resolution 1200 dpi by an optical scanner, it was restored without any problem.
    Further, as a second security data restoring and detecting method, when a reproduction sheet having the same pattern transmission factor as the key image data 24 is superimposed on the printed surface of the ticket 14 physically, the security data 22 becomes visible. Accordingly, it is possible to directly check a logo mark, etc. in the security data 22 visually. This method does not require troublesome operations and a complicated apparatus and therefore, there is a merit that genuineness of a ticket can be checked simply at.any place.
    Further, as a third security data restoring and detecting method, a system to thin a value read by an optical means will be described. It is assume that red components of a value read by a scanner, etc. are as shown in FIG. 15. As a checkered pattern of 4×2 unit is used for the composition process in this embodiment, the security data is thinned in unit of 4 pixels. An expansion factor n when making the security data is also related to this value and an expression of (Checkered grid unit × Expansion factor n ≧ Number of pixels to be thinned) becomes valid.
    When the image data shown in FIG. 15 is thinned in 5 unit of 4 pixels, it will become as shown in FIG. 20. However, as image data is insufficient, when all of 4×2 areas are set at the same value with the remaining pixels at the top, the image data becomes as shown in FIG. 21. Although two pixels are deviated in the x direction and the y direction, it is seen that the security data 22 shown in FIG. 11 was completely restored. Thus, when the read image data is thinned, number of pixels to be processed when restoring are reduced and it becomes possible to restore the data at high speed.
    As described above, by detecting the presence of the security data 22 embedded in the used ticket 14, the genuineness of the ticket 14 can be easily judged. For instance, even if the ticket 14 was given to a third person and illegally copied using a color copying machine, the history of that ticket, for instance, when, where and who issued it can be seen as the security data 22 contains a inquiry serial number and an illegal route can be detected easily.
    In this embodiment, the composition process is executed using a checkered pattern in unit of 4×2 pixels as a key. So, when the composition process is executed using a checkered pattern in size of 1×1 pixel, the effect to prevent the copying with a color copying machine is further promoted. This is because red rich and cyan rich pixel data of the ticket printing data are regularly arranged alternately by the composition process when such square grids as size 1×1 or 2×2 pixels are used.
    A sensor of a scanner portion of a color copying machine is not a spot but has a limited area and therefore, even if a scanner reading resolution is the same as a ticket printing resolution, pixels of a sensor of scanner and pixels of the ticket printing data are finely deviated and they are read as they are. Here, the red and cyan components are complementary colors and it is therefore difficult to separate pixels arranged in extremely highly precise pitches and erroneously recognized to be gray by the eyes of man and sensors, and they cannot be properly copied.
    According to this embodiment, it becomes possible to remarkably promote security of tickets, etc. However, because security data is embedded in the invisible state, some means is needed to restore it and it is not easy to perform this work for all tickets.
    So, it is necessary to distinguish a ticket that has security data embedded in the invisible state from those tickets without security data embedded but guaranteed them to be proper by some other means. For instance, using a means to print a logo mark of a ticket with embedded security data in red and to print a logo mark of a ticket without embedded security in blue, they can be easily checked and time and cost can be saved sharply.
    FIG. 22 schematically shows the state from issue of ticket to detection of security data so far in use. For the ticket image data 21, a landscape photograph is used. For the security data 22, a logo mark "JAPAN" as a copyright data and a two-dimensional code for checking by the sense of vision of a man and by a machine that are converted into the security data according to the steps shown in this embodiment are used.
    First, the ticket printing data 23 is made by executing the composition process of the ticket image data 21, the security data 22 and the key image data 24 according to the method described above. The image of this ticket printing data 23 is seen as a landscape photograph to the eyes of a man but the copyright data, etc. are invisibly embedded. Further, the ticket display data 25 is made from the ticket printing data 23 according to the method shown in this embodiment.
    Then, these ticket printing data 23 and the ticket display data 25 are transmitted via a network to a user who requested the issue of a ticket. When receiving the ticket display data 25, user displays the ticket display data 25 on the display of the user terminal device 11 and after checking its contents, prints and outputs the ticket printing data 23 using the ticket printer 13 as a color printer and obtains the ticket 14.
    User is able to use this issued ticket 14 and a system side detects the security data of the used ticket 14 using the key image data and judges the genuineness of it by collating the data base with the security data.
    As the security data including the copyright data is embedded invisibly in this issued ticket 14, it is possible to restore the copyright data according to the method of restoration described above.
    FIG. 23 is an example of the ticket issue method of this invention applied to an electronic postage stamp. FIG. 23(a) is the ticket printing data, FIG. 23(b) is a stamp image portion and FIG. 23(c) is the security data invisibly embedded in the stamp image portion. To enable a user to issue what has a value equal to money like postage stamps, security becomes particularly important. When security data is invisibly embedded in an electronic postage stamp likewise the auto race admission ticket described above and the print data of that ticket (stamp) is printed directly on an envelope, etc., an electronic stamp can be realized.
    In the case of such a mail, it is generally processed mechanically by an address reader and therefore, security can be maintained by judging its genuineness by reading the security data embedded in an electronic stamp with a sensor. Further, when printing a stamp by a color printer, a cost can be reduced sharply by simultaneously printing an address and a name.
    As described above, according to this invention, it is possible to provide a ticket issuing method that is capable of easily issuing tickets having high security through such communication means as a network, a telephone line, etc.
    Further, according to this invention, it is possible to provide a ticket collating method that is capable of easily judging the genuineness of issued tickets and easily making a follow-up check when any illegality : occurred.

    Claims (13)

    1. A ticket issuing method comprising the steps of:
      generating ticket image data from ticket issue request data;
      generating security image data from the ticket issue request data sent from a user via a communication means, the security image data being visible when the security image data itself is printed without combining with the ticket image data;
      generating ticket printing data by combining the security image data and the ticket image data; and
      sending the ticket printing data to the user via the communication means,
      in the step of generating the security image data, the security image data are generated from the ticket issue request data and user identification data sent from the user via the communication means, and
      the security image data are invisible against the ticket image data when the ticket printing data is printed on a ticket paper by the user.
    2. A ticket issuing method according to claim 1, wherein the step of generating the ticket printing data includes the steps of:
      generating prescribed pattern image data;
      generating pattern modulated data by modulating the pattern image data by the security image data; and
      superimposing the pattern modulated image data on the ticket image data.
    3. A ticket issuing method according to claim 2, wherein the step of generating the prescribed pattern image data includes the step of:
      arranging adjacent image data so that they become a combination of complementary colors.
    4. A ticket issuing method according to one of claims 1 to 3, further comprising the step of:
      generating ticket display data for checking the display by a display means of the user by partially reducing the ticket printing data;
         wherein the sending step sends the ticket display data together with the ticket printing data to the user via the communication means.
    5. A ticket issuing method according to claim 4, wherein the step of generating the ticket display data includes the steps of:
      executing the smoothing process of the ticket printing data; and
      executing the thinning process of the smoothing processed ticket printing data.
    6. A ticket issuing method according to one of claims 1 to 5, wherein the ticket printing data generating step includes the step of:
      combining a part of the security image data and the ticket image data in both the invisible state and the visible state.
    7. A ticket issuing method according to one of claims 1 to 6, wherein the ticket printing data generating step includes the step of:
      combining a part of the security image data and the ticket image data in both the invisible state and the visible state so that the invisible and visible state locations agree with each other.
    8. A ticket issuing method according to one of claims 1 to 7, wherein the ticket printing data generating step includes the step of:
      visibly adding a specific mark to the ticket image data with the security image data embedded in the invisible state for distinguishing the same from ticket image data without invisibly combined security image data.
    9. A ticket issuing method according to one of claims 1 to 8, wherein the security image data is composed of user identification data, ticket issue data and time data, kind of ticket data, ticket available period data, ticket charge data and control data.
    10. A ticket collating method comprising the steps of:
      generating ticket image data from ticket issue request data;
      generating security image data from the ticket issue request data and user identification data sent from a user via a communication means, the security image data being visible when the security image data itself is printed without combining with the ticket image data and the security image data being invisible against the ticket image data when the ticket printing data is printed on a ticket paper by the user;
      generating ticket printing data by combining the security image data and the ticket image data;
      sending the ticket printing data to the user via the communication means;
      restoring the security image data from a ticket printed by the user based on the received ticket printing data; and
      judging genuineness of the printed ticket according to the restored security image data.
    11. A ticket collating method according to claim 10, wherein the restoring step includes the step of:
      making the security image data visible by physically superimposing a sheet shape mask having the transmission factor of the same pattern as the pattern image data on the printed ticket.
    12. A method according to claim 10, wherein the restoring step includes the step of:
      reading the printed ticket data optically and comparing the obtained read signal with a mask signal representing the same pattern as the pattern image data, making the agreed portions of both signals invalid.
    13. A ticket collating method according to claim 10, wherein the restoring step includes the step of:
      reading the printed ticket data optically and executing the thinning process of the obtained read signal at the period corresponding to spatial frequency of the pattern image data.
    EP99125264A 1998-12-18 1999-12-17 Ticket issuing method, ticket issuing system and ticket collating method Expired - Lifetime EP1014318B1 (en)

    Applications Claiming Priority (2)

    Application Number Priority Date Filing Date Title
    JP36072098A JP2000182086A (en) 1998-12-18 1998-12-18 Ticket issuing method and ticket collation method
    JP36072098 1998-12-18

    Publications (3)

    Publication Number Publication Date
    EP1014318A2 EP1014318A2 (en) 2000-06-28
    EP1014318A3 EP1014318A3 (en) 2000-09-20
    EP1014318B1 true EP1014318B1 (en) 2004-05-19

    Family

    ID=18470629

    Family Applications (1)

    Application Number Title Priority Date Filing Date
    EP99125264A Expired - Lifetime EP1014318B1 (en) 1998-12-18 1999-12-17 Ticket issuing method, ticket issuing system and ticket collating method

    Country Status (4)

    Country Link
    EP (1) EP1014318B1 (en)
    JP (1) JP2000182086A (en)
    KR (1) KR100433590B1 (en)
    DE (1) DE69917417T2 (en)

    Cited By (53)

    * Cited by examiner, † Cited by third party
    Publication number Priority date Publication date Assignee Title
    US7366698B1 (en) 2000-08-11 2008-04-29 Jpmorgan Chase Bank, N.A. Trade receivable processing method and apparatus
    US7668363B2 (en) 1999-05-11 2010-02-23 Jpmorgan Chase Bank, N.A. Lockbox imaging system
    US7676409B1 (en) 2005-06-20 2010-03-09 Jpmorgan Chase Bank, N.A. Method and system for emulating a private label over an open network
    US7689482B2 (en) 2002-05-24 2010-03-30 Jp Morgan Chase Bank, N.A. System and method for payer (buyer) defined electronic invoice exchange
    US7692811B2 (en) 2005-07-07 2010-04-06 Konica Minolta Business Technologies, Inc. Image forming apparatus and method
    US7702577B1 (en) 2003-11-06 2010-04-20 Jp Morgan Chase Bank, N.A. System and method for conversion of initial transaction to final transaction
    US7734545B1 (en) 2006-06-14 2010-06-08 Jpmorgan Chase Bank, N.A. Method and system for processing recurring payments
    US7743979B2 (en) 2004-02-25 2010-06-29 Jpmorgan Chase Bank, N.A. Method and system for credit card reimbursements for health care transactions
    US7766244B1 (en) 2007-12-31 2010-08-03 Jpmorgan Chase Bank, N.A. System and method for processing transactions using a multi-account transactions device
    US7769650B2 (en) 2002-12-03 2010-08-03 Jp Morgan Chase Bank Network-based sub-allocation systems and methods for swaps
    US7792717B1 (en) 2003-10-31 2010-09-07 Jpmorgan Chase Bank, N.A. Waterfall prioritized payment processing
    US7801814B2 (en) 2000-11-06 2010-09-21 Jpmorgan Chase Bank, N.A. System and method for selectable funding of electronic transactions
    US7805365B1 (en) 1999-10-25 2010-09-28 Jpmorgan Chase Bank, N.A. Automated statement presentation, adjustment and payment system and method therefor
    US7809636B1 (en) 1998-11-13 2010-10-05 Jpmorgan Chase Bank, N.A. System and method for multicurrency and multibank processing over a non-secure network
    US7814003B2 (en) 2003-12-15 2010-10-12 Jp Morgan Chase Billing workflow system for crediting charges to entities creating derivatives exposure
    US7822682B2 (en) 2005-06-08 2010-10-26 Jpmorgan Chase Bank, N.A. System and method for enhancing supply chain transactions
    US7822684B2 (en) 2001-10-05 2010-10-26 Jpmorgan Chase Bank, N.A. Personalized bank teller machine
    US7822656B2 (en) 2000-02-15 2010-10-26 Jpmorgan Chase Bank, N.A. International banking system and method
    US7916925B2 (en) 2007-02-09 2011-03-29 Jpmorgan Chase Bank, N.A. System and method for generating magnetic ink character recognition (MICR) testing documents
    US7945492B1 (en) 1998-12-23 2011-05-17 Jpmorgan Chase Bank, N.A. System and method for integrating trading operations including the generation, processing and tracking of and trade documents
    US7987501B2 (en) 2001-12-04 2011-07-26 Jpmorgan Chase Bank, N.A. System and method for single session sign-on
    US8121944B2 (en) 2004-06-24 2012-02-21 Jpmorgan Chase Bank, N.A. Method and system for facilitating network transaction processing
    US8160960B1 (en) 2001-06-07 2012-04-17 Jpmorgan Chase Bank, N.A. System and method for rapid updating of credit information
    US8185940B2 (en) 2001-07-12 2012-05-22 Jpmorgan Chase Bank, N.A. System and method for providing discriminated content to network users
    US8244625B2 (en) 2002-05-24 2012-08-14 Jpmorgan Chase Bank, N.A. System and method for varying electronic settlements between buyers and suppliers with dynamic discount terms
    US8290863B2 (en) 2004-07-23 2012-10-16 Jpmorgan Chase Bank, N.A. Method and system for expediting payment delivery
    US8290862B2 (en) 2004-07-23 2012-10-16 Jpmorgan Chase Bank, N.A. Method and system for expediting payment delivery
    US8301493B2 (en) 2002-11-05 2012-10-30 Jpmorgan Chase Bank, N.A. System and method for providing incentives to consumers to share information
    US8301529B1 (en) 2005-11-02 2012-10-30 Jpmorgan Chase Bank, N.A. Method and system for implementing effective governance of transactions between trading partners
    US8321682B1 (en) 2008-01-24 2012-11-27 Jpmorgan Chase Bank, N.A. System and method for generating and managing administrator passwords
    US8391584B2 (en) 2008-10-20 2013-03-05 Jpmorgan Chase Bank, N.A. Method and system for duplicate check detection
    USD678653S1 (en) 2012-07-19 2013-03-19 Jpmorgan Chase Bank, N.A. Drive-up financial transaction machine
    US8447641B1 (en) 2010-03-29 2013-05-21 Jpmorgan Chase Bank, N.A. System and method for automatically enrolling buyers into a network
    US8468071B2 (en) 2000-08-01 2013-06-18 Jpmorgan Chase Bank, N.A. Processing transactions using a register portion to track transactions
    USD690074S1 (en) 2013-03-13 2013-09-17 Jpmorgan Chase Bank, N.A. Financial transaction machine
    US8543503B1 (en) 2011-03-30 2013-09-24 Jpmorgan Chase Bank, N.A. Systems and methods for automated invoice entry
    US8543504B1 (en) 2011-03-30 2013-09-24 Jpmorgan Chase Bank, N.A. Systems and methods for automated invoice entry
    US8554673B2 (en) 2004-06-17 2013-10-08 Jpmorgan Chase Bank, N.A. Methods and systems for discounts management
    US8589288B1 (en) 2010-10-01 2013-11-19 Jpmorgan Chase Bank, N.A. System and method for electronic remittance of funds
    US8622308B1 (en) 2007-12-31 2014-01-07 Jpmorgan Chase Bank, N.A. System and method for processing transactions using a multi-account transactions device
    US8630947B1 (en) 2003-04-04 2014-01-14 Jpmorgan Chase Bank, N.A. Method and system for providing electronic bill payment and presentment
    US8726011B1 (en) 2007-05-17 2014-05-13 Jpmorgan Chase Bank, N.A. Systems and methods for managing digital certificates
    CN103839323A (en) * 2013-07-10 2014-06-04 天地融科技股份有限公司 Intelligent card, verification data output method, operation request response method and system
    CN103839324A (en) * 2013-07-10 2014-06-04 天地融科技股份有限公司 Intelligent card, verification data output method, operation request response method and system
    US8762270B1 (en) 2007-08-10 2014-06-24 Jpmorgan Chase Bank, N.A. System and method for providing supplemental payment or transaction information
    US8768836B1 (en) 2000-02-18 2014-07-01 Jpmorgan Chase Bank, N.A. System and method for electronic deposit of a financial instrument by banking customers from remote locations by use of a digital image
    US8805739B2 (en) 2001-01-30 2014-08-12 Jpmorgan Chase Bank, National Association System and method for electronic bill pay and presentment
    US8849716B1 (en) 2001-04-20 2014-09-30 Jpmorgan Chase Bank, N.A. System and method for preventing identity theft or misuse by restricting access
    US9058626B1 (en) 2013-11-13 2015-06-16 Jpmorgan Chase Bank, N.A. System and method for financial services device usage
    US9092447B1 (en) 2008-10-20 2015-07-28 Jpmorgan Chase Bank, N.A. Method and system for duplicate detection
    US9374366B1 (en) 2005-09-19 2016-06-21 Jpmorgan Chase Bank, N.A. System and method for anti-phishing authentication
    US9419957B1 (en) 2013-03-15 2016-08-16 Jpmorgan Chase Bank, N.A. Confidence-based authentication
    CN103839323B (en) * 2013-07-10 2016-11-30 天地融科技股份有限公司 Smart card and verification data output method, operation requests response method and system

    Families Citing this family (44)

    * Cited by examiner, † Cited by third party
    Publication number Priority date Publication date Assignee Title
    US7058817B1 (en) 1999-07-02 2006-06-06 The Chase Manhattan Bank System and method for single sign on process for websites with multiple applications and services
    US6972859B1 (en) * 1999-07-22 2005-12-06 Eastman Kodak Company Authorizing the printing of digital images
    AU3438401A (en) 1999-11-04 2001-05-14 Jp Morgan Chase Bank System and method for automated financial project management
    US8571975B1 (en) 1999-11-24 2013-10-29 Jpmorgan Chase Bank, N.A. System and method for sending money via E-mail over the internet
    US10275780B1 (en) 1999-11-24 2019-04-30 Jpmorgan Chase Bank, N.A. Method and apparatus for sending a rebate via electronic mail over the internet
    US6842533B1 (en) * 1999-12-28 2005-01-11 Eastman Kodak Company Printing verified pre-approved images
    KR20010078679A (en) * 2000-02-09 2001-08-21 정관선 The control method of user using issud admission ticket on the web
    JP4495824B2 (en) 2000-03-21 2010-07-07 株式会社東芝 Information processing method
    US7426530B1 (en) 2000-06-12 2008-09-16 Jpmorgan Chase Bank, N.A. System and method for providing customers with seamless entry to a remote server
    US10185936B2 (en) 2000-06-22 2019-01-22 Jpmorgan Chase Bank, N.A. Method and system for processing internet payments
    JP2002049941A (en) * 2000-08-03 2002-02-15 Nec Fielding Ltd Ticket selling method, device/method for processing data, data communication system and information storage medium
    WO2002014435A1 (en) * 2000-08-14 2002-02-21 Silverbrook Research Pty Ltd Dibenzoanthraquinone based chromophores
    US8335855B2 (en) 2001-09-19 2012-12-18 Jpmorgan Chase Bank, N.A. System and method for portal infrastructure tracking
    KR100447448B1 (en) * 2001-02-01 2004-09-04 권오봉 Method for preventing forgery of every kinds of lottery-ticket, exchange-ticket, certificate published by communication network and ID-card, credit-card, medical insurance card with authentication code
    DE10115022A1 (en) * 2001-03-27 2002-10-10 Deutsch Zentr Luft & Raumfahrt Selling e.g. rail, bus or flight tickets, involves user activating virtual ticket generation program after selecting desired travel connection via central Internet travel information service
    US8266437B2 (en) 2001-06-25 2012-09-11 Jpmorgan Chase Bank, N.A. Electronic vouchers and a system and method for issuing the same
    US7103576B2 (en) 2001-09-21 2006-09-05 First Usa Bank, Na System for providing cardless payment
    CA2466071C (en) 2001-11-01 2016-04-12 Bank One, Delaware, N.A. System and method for establishing or modifying an account with user selectable terms
    US20180165441A1 (en) 2002-03-25 2018-06-14 Glenn Cobourn Everhart Systems and methods for multifactor authentication
    CA2435659A1 (en) 2002-07-23 2004-01-23 Kabushiki Kaisha Toshiba Image processing method
    US7058660B2 (en) 2002-10-02 2006-06-06 Bank One Corporation System and method for network-based project management
    WO2004063993A1 (en) * 2003-01-13 2004-07-29 Elca Informatique S.A. Printed commercial instrument and method of generation thereof
    US10311412B1 (en) 2003-03-28 2019-06-04 Jpmorgan Chase Bank, N.A. Method and system for providing bundled electronic payment and remittance advice
    JP4227048B2 (en) 2003-04-25 2009-02-18 株式会社東芝 Image processing system
    JP2005094066A (en) * 2003-09-12 2005-04-07 Digital Book Inc Content management system
    US7353213B2 (en) 2003-09-19 2008-04-01 Pitney Bowes Inc. System and method for preventing duplicate printing in a web browser
    JP3913237B2 (en) 2003-10-10 2007-05-09 キヤノン株式会社 Information processing apparatus and information processing apparatus control method
    US7113925B2 (en) * 2005-01-19 2006-09-26 Echeck21, L.L.C. Electronic check
    KR100691468B1 (en) * 2005-03-02 2007-03-09 삼성전자주식회사 Printing method for security document and image reproduction apparatus
    JP2007329892A (en) 2006-05-12 2007-12-20 Canon Inc Information processing apparatus, image processing apparatus, and server device
    US8793490B1 (en) 2006-07-14 2014-07-29 Jpmorgan Chase Bank, N.A. Systems and methods for multifactor authentication
    JP5067092B2 (en) * 2007-09-19 2012-11-07 大日本印刷株式会社 Method for displaying a two-dimensional code on a data broadcasting screen, data broadcasting program data
    US8112355B1 (en) 2008-09-05 2012-02-07 Jpmorgan Chase Bank, N.A. Method and system for buyer centric dispute resolution in electronic payment system
    US9608826B2 (en) 2009-06-29 2017-03-28 Jpmorgan Chase Bank, N.A. System and method for partner key management
    CN102411797A (en) * 2010-09-20 2012-04-11 航天信息股份有限公司 Method and device for printing bill information
    CN102446264A (en) * 2010-10-15 2012-05-09 航天信息股份有限公司 Printing and scanning recognition method and system for two-dimensional code of special value-added tax invoice
    WO2012175878A1 (en) * 2011-06-21 2012-12-27 Advanced Track & Trace Method and device for authenticating a tag
    FR2977057B1 (en) * 2011-06-21 2013-11-29 Advanced Track & Trace METHOD AND DEVICE FOR AUTHENTICATING A LABEL.
    US10148726B1 (en) 2014-01-24 2018-12-04 Jpmorgan Chase Bank, N.A. Initiating operating system commands based on browser cookies
    WO2019054380A1 (en) 2017-09-15 2019-03-21 大日本印刷株式会社 Information recording body, medium and printed product
    JP6979694B2 (en) * 2018-03-22 2021-12-15 株式会社マーストーケンソリューション Authentication system, authentication method and authentication program that authenticates hidden images or hidden information
    CN110515575B (en) * 2018-05-21 2021-08-24 北京仁光科技有限公司 Apparatus and method for interacting computers within a subnet
    JP7070152B2 (en) * 2018-06-27 2022-05-18 凸版印刷株式会社 Information processing system and print medium
    CN112581701A (en) * 2020-11-19 2021-03-30 广州地铁集团有限公司 Integrated intelligent customer service center

    Citations (2)

    * Cited by examiner, † Cited by third party
    Publication number Priority date Publication date Assignee Title
    US5568550A (en) * 1994-10-05 1996-10-22 Shmuel Ur Method and system for identifying documents generated by an unauthorized software copy
    EP0921675A2 (en) * 1997-12-03 1999-06-09 Kabushiki Kaisha Toshiba Method of processing image information and method of preventing forgery of certificates or the like

    Family Cites Families (4)

    * Cited by examiner, † Cited by third party
    Publication number Priority date Publication date Assignee Title
    US5721788A (en) * 1992-07-31 1998-02-24 Corbis Corporation Method and system for digital image signatures
    DE69427497T2 (en) * 1993-01-19 2001-11-08 Canon Kk Image processing device and method
    US5606507A (en) 1994-01-03 1997-02-25 E-Stamp Corporation System and method for storing, retrieving and automatically printing postage on mail
    US5598477A (en) * 1994-11-22 1997-01-28 Pitney Bowes Inc. Apparatus and method for issuing and validating tickets

    Patent Citations (2)

    * Cited by examiner, † Cited by third party
    Publication number Priority date Publication date Assignee Title
    US5568550A (en) * 1994-10-05 1996-10-22 Shmuel Ur Method and system for identifying documents generated by an unauthorized software copy
    EP0921675A2 (en) * 1997-12-03 1999-06-09 Kabushiki Kaisha Toshiba Method of processing image information and method of preventing forgery of certificates or the like

    Non-Patent Citations (1)

    * Cited by examiner, † Cited by third party
    Title
    SZEPANSKI W.: "A signal theoretic method for creating forgery-proof documents for automatic verification", 16 May 1979, IEEE, NEW YORK US *

    Cited By (75)

    * Cited by examiner, † Cited by third party
    Publication number Priority date Publication date Assignee Title
    US7809636B1 (en) 1998-11-13 2010-10-05 Jpmorgan Chase Bank, N.A. System and method for multicurrency and multibank processing over a non-secure network
    US7945492B1 (en) 1998-12-23 2011-05-17 Jpmorgan Chase Bank, N.A. System and method for integrating trading operations including the generation, processing and tracking of and trade documents
    US7668363B2 (en) 1999-05-11 2010-02-23 Jpmorgan Chase Bank, N.A. Lockbox imaging system
    US8045784B2 (en) 1999-05-11 2011-10-25 Jpmorgan Chase Bank, N.A. Lockbox imaging system
    US7805365B1 (en) 1999-10-25 2010-09-28 Jpmorgan Chase Bank, N.A. Automated statement presentation, adjustment and payment system and method therefor
    US8380597B2 (en) 2000-02-15 2013-02-19 Jpmorgan Chase Bank, N.A. International banking system and method
    US7822656B2 (en) 2000-02-15 2010-10-26 Jpmorgan Chase Bank, N.A. International banking system and method
    US8924289B1 (en) 2000-02-15 2014-12-30 Jpmorgan Chase Bank, N.A. International banking system and method
    US8768836B1 (en) 2000-02-18 2014-07-01 Jpmorgan Chase Bank, N.A. System and method for electronic deposit of a financial instrument by banking customers from remote locations by use of a digital image
    US8468071B2 (en) 2000-08-01 2013-06-18 Jpmorgan Chase Bank, N.A. Processing transactions using a register portion to track transactions
    US7366698B1 (en) 2000-08-11 2008-04-29 Jpmorgan Chase Bank, N.A. Trade receivable processing method and apparatus
    US7680735B1 (en) 2000-08-11 2010-03-16 Jpmorgan Chase Bank, N.A. Trade receivable processing method and apparatus
    US8065231B1 (en) 2000-08-11 2011-11-22 Jpmorgan Chase Bank, N.A. Trade receivable processing method and apparatus
    US7801814B2 (en) 2000-11-06 2010-09-21 Jpmorgan Chase Bank, N.A. System and method for selectable funding of electronic transactions
    US8805739B2 (en) 2001-01-30 2014-08-12 Jpmorgan Chase Bank, National Association System and method for electronic bill pay and presentment
    US8849716B1 (en) 2001-04-20 2014-09-30 Jpmorgan Chase Bank, N.A. System and method for preventing identity theft or misuse by restricting access
    US8160960B1 (en) 2001-06-07 2012-04-17 Jpmorgan Chase Bank, N.A. System and method for rapid updating of credit information
    US8185940B2 (en) 2001-07-12 2012-05-22 Jpmorgan Chase Bank, N.A. System and method for providing discriminated content to network users
    US7822684B2 (en) 2001-10-05 2010-10-26 Jpmorgan Chase Bank, N.A. Personalized bank teller machine
    US8707410B2 (en) 2001-12-04 2014-04-22 Jpmorgan Chase Bank, N.A. System and method for single session sign-on
    US7987501B2 (en) 2001-12-04 2011-07-26 Jpmorgan Chase Bank, N.A. System and method for single session sign-on
    US8484129B2 (en) 2002-05-24 2013-07-09 Jpmorgan Chase Bank, N.A. System and method for varying electronic settlements between buyers and suppliers with dynamic discount terms
    US8244625B2 (en) 2002-05-24 2012-08-14 Jpmorgan Chase Bank, N.A. System and method for varying electronic settlements between buyers and suppliers with dynamic discount terms
    US7689482B2 (en) 2002-05-24 2010-03-30 Jp Morgan Chase Bank, N.A. System and method for payer (buyer) defined electronic invoice exchange
    US8301493B2 (en) 2002-11-05 2012-10-30 Jpmorgan Chase Bank, N.A. System and method for providing incentives to consumers to share information
    US8015096B2 (en) 2002-12-03 2011-09-06 Jp Morgan Chase Bank Network-based sub-allocation systems and methods for swaps
    US7769650B2 (en) 2002-12-03 2010-08-03 Jp Morgan Chase Bank Network-based sub-allocation systems and methods for swaps
    US8630947B1 (en) 2003-04-04 2014-01-14 Jpmorgan Chase Bank, N.A. Method and system for providing electronic bill payment and presentment
    US8620786B2 (en) 2003-10-31 2013-12-31 Us Bank National Association System and method for waterfall prioritized payment processing
    US7792717B1 (en) 2003-10-31 2010-09-07 Jpmorgan Chase Bank, N.A. Waterfall prioritized payment processing
    US7702553B1 (en) 2003-11-06 2010-04-20 Jp Morgan Chase Bank, N.A. System and method for conversion of initial transaction to final transaction
    US7702577B1 (en) 2003-11-06 2010-04-20 Jp Morgan Chase Bank, N.A. System and method for conversion of initial transaction to final transaction
    US7814003B2 (en) 2003-12-15 2010-10-12 Jp Morgan Chase Billing workflow system for crediting charges to entities creating derivatives exposure
    US8160942B2 (en) 2003-12-15 2012-04-17 Jp Morgan Chase Bank Billing workflow system for crediting charges to entities creating derivatives exposure
    US7743979B2 (en) 2004-02-25 2010-06-29 Jpmorgan Chase Bank, N.A. Method and system for credit card reimbursements for health care transactions
    US8554673B2 (en) 2004-06-17 2013-10-08 Jpmorgan Chase Bank, N.A. Methods and systems for discounts management
    US8121944B2 (en) 2004-06-24 2012-02-21 Jpmorgan Chase Bank, N.A. Method and system for facilitating network transaction processing
    US8396798B2 (en) 2004-06-24 2013-03-12 Jpmorgan Chase Bank, N.A. Method and system for facilitating network transaction processing
    US8290862B2 (en) 2004-07-23 2012-10-16 Jpmorgan Chase Bank, N.A. Method and system for expediting payment delivery
    US8290863B2 (en) 2004-07-23 2012-10-16 Jpmorgan Chase Bank, N.A. Method and system for expediting payment delivery
    US7822682B2 (en) 2005-06-08 2010-10-26 Jpmorgan Chase Bank, N.A. System and method for enhancing supply chain transactions
    US7676409B1 (en) 2005-06-20 2010-03-09 Jpmorgan Chase Bank, N.A. Method and system for emulating a private label over an open network
    US8170936B2 (en) 2005-06-20 2012-05-01 Jpmorgan Chase Bank, N.A. Method and system for emulating a private label over an open network
    US7692811B2 (en) 2005-07-07 2010-04-06 Konica Minolta Business Technologies, Inc. Image forming apparatus and method
    US9374366B1 (en) 2005-09-19 2016-06-21 Jpmorgan Chase Bank, N.A. System and method for anti-phishing authentication
    US9020850B1 (en) 2005-11-02 2015-04-28 Jpmorgan Chase Bank, N.A. Method and system for implementing effective governance of transactions between trading partners
    US8301529B1 (en) 2005-11-02 2012-10-30 Jpmorgan Chase Bank, N.A. Method and system for implementing effective governance of transactions between trading partners
    US7734545B1 (en) 2006-06-14 2010-06-08 Jpmorgan Chase Bank, N.A. Method and system for processing recurring payments
    US7904388B1 (en) 2006-06-14 2011-03-08 Jpmorgan Chase Bank, N.A. Method and system for processing recurring payments
    US8121385B1 (en) 2007-02-09 2012-02-21 Jpmorgan Chase Bank, N.A. System and method for generating magnetic ink character recognition (MICR) testing documents
    US7916925B2 (en) 2007-02-09 2011-03-29 Jpmorgan Chase Bank, N.A. System and method for generating magnetic ink character recognition (MICR) testing documents
    US8726011B1 (en) 2007-05-17 2014-05-13 Jpmorgan Chase Bank, N.A. Systems and methods for managing digital certificates
    US8762270B1 (en) 2007-08-10 2014-06-24 Jpmorgan Chase Bank, N.A. System and method for providing supplemental payment or transaction information
    US8459562B1 (en) 2007-12-31 2013-06-11 Jpmorgan Chase Bank, N.A. System and method for processing transactions using a multi-account transactions device
    US8622308B1 (en) 2007-12-31 2014-01-07 Jpmorgan Chase Bank, N.A. System and method for processing transactions using a multi-account transactions device
    US7766244B1 (en) 2007-12-31 2010-08-03 Jpmorgan Chase Bank, N.A. System and method for processing transactions using a multi-account transactions device
    US8549315B2 (en) 2008-01-24 2013-10-01 Jpmorgan Chase Bank, N.A. System and method for generating and managing administrator passwords
    US8321682B1 (en) 2008-01-24 2012-11-27 Jpmorgan Chase Bank, N.A. System and method for generating and managing administrator passwords
    US8639017B1 (en) 2008-10-20 2014-01-28 Jpmorgan Chase Bank, N.A. Method and system for duplicate check detection
    US8391584B2 (en) 2008-10-20 2013-03-05 Jpmorgan Chase Bank, N.A. Method and system for duplicate check detection
    US9092447B1 (en) 2008-10-20 2015-07-28 Jpmorgan Chase Bank, N.A. Method and system for duplicate detection
    US8447641B1 (en) 2010-03-29 2013-05-21 Jpmorgan Chase Bank, N.A. System and method for automatically enrolling buyers into a network
    US8589288B1 (en) 2010-10-01 2013-11-19 Jpmorgan Chase Bank, N.A. System and method for electronic remittance of funds
    US8543504B1 (en) 2011-03-30 2013-09-24 Jpmorgan Chase Bank, N.A. Systems and methods for automated invoice entry
    US8543503B1 (en) 2011-03-30 2013-09-24 Jpmorgan Chase Bank, N.A. Systems and methods for automated invoice entry
    USD678653S1 (en) 2012-07-19 2013-03-19 Jpmorgan Chase Bank, N.A. Drive-up financial transaction machine
    USD693984S1 (en) 2012-07-19 2013-11-19 Jpmorgan Chase Bank, N.A. Drive-up financial transaction machine
    USD690074S1 (en) 2013-03-13 2013-09-17 Jpmorgan Chase Bank, N.A. Financial transaction machine
    US9419957B1 (en) 2013-03-15 2016-08-16 Jpmorgan Chase Bank, N.A. Confidence-based authentication
    CN103839324A (en) * 2013-07-10 2014-06-04 天地融科技股份有限公司 Intelligent card, verification data output method, operation request response method and system
    CN103839323A (en) * 2013-07-10 2014-06-04 天地融科技股份有限公司 Intelligent card, verification data output method, operation request response method and system
    CN103839324B (en) * 2013-07-10 2016-08-10 天地融科技股份有限公司 Smart card and verification data output method, operation requests response method and system
    CN103839323B (en) * 2013-07-10 2016-11-30 天地融科技股份有限公司 Smart card and verification data output method, operation requests response method and system
    US9058626B1 (en) 2013-11-13 2015-06-16 Jpmorgan Chase Bank, N.A. System and method for financial services device usage
    US9460469B1 (en) 2013-11-13 2016-10-04 Jpmorgan Chase Bank, N.A. System and method for financial services device usage

    Also Published As

    Publication number Publication date
    DE69917417T2 (en) 2005-06-02
    EP1014318A3 (en) 2000-09-20
    EP1014318A2 (en) 2000-06-28
    KR20000048145A (en) 2000-07-25
    JP2000182086A (en) 2000-06-30
    DE69917417D1 (en) 2004-06-24
    KR100433590B1 (en) 2004-05-31

    Similar Documents

    Publication Publication Date Title
    EP1014318B1 (en) Ticket issuing method, ticket issuing system and ticket collating method
    US6512915B2 (en) Recording medium outputting method, database server, recording medium outputting apparatus, and recording medium outputting system
    US6438251B1 (en) Method of processing image information and method of preventing forgery of certificates or the like
    US7301654B2 (en) Image data outputting apparatus and image data outputting method
    EP0730243B1 (en) Identification card verification system and method
    US6985600B2 (en) Printing media and methods employing digital watermarking
    CA2170440C (en) Self-verifying identification card
    EP1319520B1 (en) Method and apparatus for embedding encrypted images of signatures and other data on checks
    EP1432234B1 (en) Systems and methods for providing hardcopy secure documents and for validation of such documents
    US6768558B1 (en) Printed matter including invisible information and printing system
    US20040079800A1 (en) Document verification system
    US6603568B1 (en) System and method for issuing electronic tickets
    US6636614B1 (en) Method for preventing the falsification of documents comprising a photograph, preferably a facial-view photograph
    US7778437B2 (en) Media and methods employing steganographic marking
    US20040150216A1 (en) Method for printing and verifying limited edition stamps
    US20090037974A1 (en) Security document printing system and method of controlling the same
    JP2001126046A (en) Ic card, ic card authentication system and its authentication method
    JPH11168616A (en) Image information processing method and image information processor
    WO2001097175A1 (en) System and method for issuing and authenticating ticket using watermarking technique
    JP2003060890A (en) Individual authentication system using communication network
    JP2001094755A (en) Image processing method

    Legal Events

    Date Code Title Description
    PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

    Free format text: ORIGINAL CODE: 0009012

    17P Request for examination filed

    Effective date: 19991217

    AK Designated contracting states

    Kind code of ref document: A2

    Designated state(s): DE FR GB

    AX Request for extension of the european patent

    Free format text: AL;LT;LV;MK;RO;SI

    PUAL Search report despatched

    Free format text: ORIGINAL CODE: 0009013

    AK Designated contracting states

    Kind code of ref document: A3

    Designated state(s): AT BE CH CY DE DK ES FI FR GB GR IE IT LI LU MC NL PT SE

    AX Request for extension of the european patent

    Free format text: AL;LT;LV;MK;RO;SI

    RIC1 Information provided on ipc code assigned before grant

    Free format text: 7G 07F 17/42 A, 7G 07B 1/02 B, 7G 07D 7/12 B

    AKX Designation fees paid

    Free format text: DE FR GB

    17Q First examination report despatched

    Effective date: 20020322

    GRAP Despatch of communication of intention to grant a patent

    Free format text: ORIGINAL CODE: EPIDOSNIGR1

    GRAS Grant fee paid

    Free format text: ORIGINAL CODE: EPIDOSNIGR3

    GRAA (expected) grant

    Free format text: ORIGINAL CODE: 0009210

    AK Designated contracting states

    Kind code of ref document: B1

    Designated state(s): DE FR GB

    REG Reference to a national code

    Ref country code: GB

    Ref legal event code: FG4D

    REF Corresponds to:

    Ref document number: 69917417

    Country of ref document: DE

    Date of ref document: 20040624

    Kind code of ref document: P

    ET Fr: translation filed
    PLBE No opposition filed within time limit

    Free format text: ORIGINAL CODE: 0009261

    STAA Information on the status of an ep patent application or granted ep patent

    Free format text: STATUS: NO OPPOSITION FILED WITHIN TIME LIMIT

    26N No opposition filed

    Effective date: 20050222

    PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

    Ref country code: GB

    Payment date: 20061213

    Year of fee payment: 8

    GBPC Gb: european patent ceased through non-payment of renewal fee

    Effective date: 20071217

    PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

    Ref country code: GB

    Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

    Effective date: 20071217

    PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

    Ref country code: FR

    Payment date: 20091221

    Year of fee payment: 11

    PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

    Ref country code: DE

    Payment date: 20091222

    Year of fee payment: 11

    REG Reference to a national code

    Ref country code: FR

    Ref legal event code: ST

    Effective date: 20110831

    PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

    Ref country code: FR

    Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

    Effective date: 20110103

    REG Reference to a national code

    Ref country code: DE

    Ref legal event code: R119

    Ref document number: 69917417

    Country of ref document: DE

    Effective date: 20110701

    PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

    Ref country code: DE

    Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

    Effective date: 20110701