SlideShare a Scribd company logo
1 of 12
The AICode® technology




                   Copyright Authentication Industries June 2012
What is an AICode® ?

         The AiCode® is an integrity code that can be printed on any commonly available printer.

It is the computed result of encrypted fixed data, variable data and random data that generate a succession
                                   of interconnected electronic signatures.

              Materialized as a printed mark it is printed along with the rest of the document.




                                       examples of AICodes®




                                                                                   Copyright Authentication Industries June 2012
Why is an AICode® a security element?



                                   1.       IMPOSSIBLE TO COPY
The AiCode® unlike other printed marks cannot be photocopied : the copy will be both visually and machine detected




                                                                               Copyright Authentication Industries June 2012
Why is an AICode® a security element?


                     2.     IMPOSSIBLE TO REGENERATE
The AiCode® cannot be regenerated : the use of specific algorithms along with random data and
          interconnected keys leave the regeneration of a similar code impossible.

It is computed by a certification platform linked to a secured datacenter to the beneficiary’s printer




                                                                                    Copyright Authentication Industries June 2012
Why is an AICode® a security element?


                                   3.      IMPOSSIBLE TO FALSIFY
 The AiCode® and the document cannot be falsified as both the variable data and the AICode® are irreversibly linked
                                                    together.

For example a photo substitution will not be possible without also altering the AICode® (which part of the AiCode®…. ?)




                                                                                 Copyright Authentication Industries June 2012
Why is an AICode® a security element?




                                Copyright Authentication Industries June 2012
Why is an AICode® a security element?


                                           5.      IMPOSTORS PROOF
                  Adding biometric information of the document holder into the AiCode® will defeat impostors.

During the generation of the document the biometrics of the holder can be encoded into the AICode® and will deter any ID theft.

                                          The right document - the rightful holder




                                                                                       Copyright Authentication Industries June 2012
An indisputable physical authentication proof
The Ai Code is thus a mix of encrypted data and of printing techniques that protect the document from
                illegal reproductions: there is always and only one unique original




                                                                               Copyright Authentication Industries June 2012
Controlling the AICode® is easy
  • With the naked eye : by inspecting the integrity of the AICode®
  • With Smartphones
  • With desktop scanners




                                                    Copyright Authentication Industries June 2012
A smartphone controlling an AICode®




                               Copyright Authentication Industries June 2012
A scanner controlling an AICode®




                    ✓ Document is ORIGINAL /COPY / FAKE
                    ✓ Data is OK NOT OK
                        Holder is CORRECT / INCORRECT




                                     Copyright Authentication Industries June 2012
AICODE®
For DOCUMENT PROTECTION / AUTHENTICATION


                    BY




      info@authenticationindustries.com

      www.authenticationindustries.com




                                          Copyright Authentication Industries June 2012

More Related Content

Similar to Aicode june 2012 uk automatic

Kodak - OpenID Retail Summit at PayPal
Kodak - OpenID Retail Summit at PayPalKodak - OpenID Retail Summit at PayPal
Kodak - OpenID Retail Summit at PayPal
Ashish Jain
 

Similar to Aicode june 2012 uk automatic (20)

EZDOC - SAP IDOC Management Simplified
EZDOC - SAP IDOC Management SimplifiedEZDOC - SAP IDOC Management Simplified
EZDOC - SAP IDOC Management Simplified
 
Securing Android Applications
Securing Android ApplicationsSecuring Android Applications
Securing Android Applications
 
5 biggest artificial intelligence trends in 2022
5 biggest artificial intelligence trends in 20225 biggest artificial intelligence trends in 2022
5 biggest artificial intelligence trends in 2022
 
Kodak - OpenID Retail Summit at PayPal
Kodak - OpenID Retail Summit at PayPalKodak - OpenID Retail Summit at PayPal
Kodak - OpenID Retail Summit at PayPal
 
FIDO & PSD2 – Achieving Strong Customer Authentication Compliance
FIDO & PSD2 – Achieving Strong Customer Authentication ComplianceFIDO & PSD2 – Achieving Strong Customer Authentication Compliance
FIDO & PSD2 – Achieving Strong Customer Authentication Compliance
 
[WSO2Con USA 2018] Design and Implementation of the Veridium Authenticator: A...
[WSO2Con USA 2018] Design and Implementation of the Veridium Authenticator: A...[WSO2Con USA 2018] Design and Implementation of the Veridium Authenticator: A...
[WSO2Con USA 2018] Design and Implementation of the Veridium Authenticator: A...
 
AN ANDROID APP FOR BUILDING STUDENT PROFILES
AN ANDROID APP FOR BUILDING STUDENT PROFILESAN ANDROID APP FOR BUILDING STUDENT PROFILES
AN ANDROID APP FOR BUILDING STUDENT PROFILES
 
IDOCS ALE
IDOCS ALEIDOCS ALE
IDOCS ALE
 
Webinar: Catch Up with FIDO Plus AMA Session
Webinar: Catch Up with FIDO Plus AMA SessionWebinar: Catch Up with FIDO Plus AMA Session
Webinar: Catch Up with FIDO Plus AMA Session
 
FIDO Alliance Webinar: Catch Up WIth FIDO
FIDO Alliance Webinar: Catch Up WIth FIDOFIDO Alliance Webinar: Catch Up WIth FIDO
FIDO Alliance Webinar: Catch Up WIth FIDO
 
[Lithuania] DigiCerts and DigiID to Enterprise apps
[Lithuania] DigiCerts and DigiID to Enterprise apps[Lithuania] DigiCerts and DigiID to Enterprise apps
[Lithuania] DigiCerts and DigiID to Enterprise apps
 
Owasp digi ms_v1_
Owasp digi ms_v1_Owasp digi ms_v1_
Owasp digi ms_v1_
 
Technical Principles of FIDO Authentication
Technical Principles of FIDO AuthenticationTechnical Principles of FIDO Authentication
Technical Principles of FIDO Authentication
 
Technical Principles of FIDO Authentication
Technical Principles of FIDO AuthenticationTechnical Principles of FIDO Authentication
Technical Principles of FIDO Authentication
 
The Future of Authentication for IoT
The Future of Authentication for IoTThe Future of Authentication for IoT
The Future of Authentication for IoT
 
IUID Policy
IUID PolicyIUID Policy
IUID Policy
 
IDoc_Guide.pdf
IDoc_Guide.pdfIDoc_Guide.pdf
IDoc_Guide.pdf
 
Technical Principles of FIDO Authentication
Technical Principles of FIDO AuthenticationTechnical Principles of FIDO Authentication
Technical Principles of FIDO Authentication
 
Fido Technical Overview
Fido Technical OverviewFido Technical Overview
Fido Technical Overview
 
FIDO Authentication Technical Overview
FIDO Authentication Technical OverviewFIDO Authentication Technical Overview
FIDO Authentication Technical Overview
 

Recently uploaded

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Recently uploaded (20)

Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 

Aicode june 2012 uk automatic

  • 1. The AICode® technology Copyright Authentication Industries June 2012
  • 2. What is an AICode® ? The AiCode® is an integrity code that can be printed on any commonly available printer. It is the computed result of encrypted fixed data, variable data and random data that generate a succession of interconnected electronic signatures. Materialized as a printed mark it is printed along with the rest of the document. examples of AICodes® Copyright Authentication Industries June 2012
  • 3. Why is an AICode® a security element? 1. IMPOSSIBLE TO COPY The AiCode® unlike other printed marks cannot be photocopied : the copy will be both visually and machine detected Copyright Authentication Industries June 2012
  • 4. Why is an AICode® a security element? 2. IMPOSSIBLE TO REGENERATE The AiCode® cannot be regenerated : the use of specific algorithms along with random data and interconnected keys leave the regeneration of a similar code impossible. It is computed by a certification platform linked to a secured datacenter to the beneficiary’s printer Copyright Authentication Industries June 2012
  • 5. Why is an AICode® a security element? 3. IMPOSSIBLE TO FALSIFY The AiCode® and the document cannot be falsified as both the variable data and the AICode® are irreversibly linked together. For example a photo substitution will not be possible without also altering the AICode® (which part of the AiCode®…. ?) Copyright Authentication Industries June 2012
  • 6. Why is an AICode® a security element? Copyright Authentication Industries June 2012
  • 7. Why is an AICode® a security element? 5. IMPOSTORS PROOF Adding biometric information of the document holder into the AiCode® will defeat impostors. During the generation of the document the biometrics of the holder can be encoded into the AICode® and will deter any ID theft. The right document - the rightful holder Copyright Authentication Industries June 2012
  • 8. An indisputable physical authentication proof The Ai Code is thus a mix of encrypted data and of printing techniques that protect the document from illegal reproductions: there is always and only one unique original Copyright Authentication Industries June 2012
  • 9. Controlling the AICode® is easy • With the naked eye : by inspecting the integrity of the AICode® • With Smartphones • With desktop scanners Copyright Authentication Industries June 2012
  • 10. A smartphone controlling an AICode® Copyright Authentication Industries June 2012
  • 11. A scanner controlling an AICode® ✓ Document is ORIGINAL /COPY / FAKE ✓ Data is OK NOT OK Holder is CORRECT / INCORRECT Copyright Authentication Industries June 2012
  • 12. AICODE® For DOCUMENT PROTECTION / AUTHENTICATION BY info@authenticationindustries.com www.authenticationindustries.com Copyright Authentication Industries June 2012