CN100407217C - Anti-faking and authentication method for bill using identifying code - Google Patents

Anti-faking and authentication method for bill using identifying code Download PDF

Info

Publication number
CN100407217C
CN100407217C CN2005100492280A CN200510049228A CN100407217C CN 100407217 C CN100407217 C CN 100407217C CN 2005100492280 A CN2005100492280 A CN 2005100492280A CN 200510049228 A CN200510049228 A CN 200510049228A CN 100407217 C CN100407217 C CN 100407217C
Authority
CN
China
Prior art keywords
bill
identifying code
check
counterfeit
code
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN2005100492280A
Other languages
Chinese (zh)
Other versions
CN1811789A (en
Inventor
陈驰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN2005100492280A priority Critical patent/CN100407217C/en
Publication of CN1811789A publication Critical patent/CN1811789A/en
Application granted granted Critical
Publication of CN100407217C publication Critical patent/CN100407217C/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
  • Storage Device Security (AREA)

Abstract

The present invention relates to an anti-faking authentication system which verifies the authenticity of bill contents by using an identifying code. A section or a plurality of sections of a group of data which are obtained by using a bill number, an account, an issue date, amount, quantity, etc. (called elements for short, whole use or partial use) existing on a bill after the bill is drawn up as a variate and adding a digital key to be used as a constant to be calculated by a formula, are used as an identifying code. Then, the identifying code is marked on the bill. After the bill is transferred to a receiving unit, the identifying code is calculated by the same arithmetic formula, and the identifying code is compared with the identifying code on the bill so that the aim for verifying the authenticity of the bill is achieved.

Description

" identifying code " bill anti-counterfeit authenticating method
Technical field
The present invention is a kind of method for anti-counterfeit that the ticket contents authenticity is verified.Say so more specifically and prevent the bill fraud with the method for comparing identifying code.
Background technology
Because the current techniques means is advanced day by day, broad application such as scanning, laser engraving, the anti-counterfeit of seals means of generally using now are broken, increasing by the case that forge, alter finance and other bill are swindled, as to utilize the false proof way of signature more and more can not backed bill to use merely safety.Therefore the ticket applications field presses for the safety that a kind of safe, easy to use method for anti-counterfeit comes backed bill to use.
Summary of the invention
The objective of the invention is to overcome the shortcoming of existing anti-counterfeiting technology, proposed a kind of new bill anti-counterfeit method, strengthen the safety that bill uses.
The present invention is achieved by following technical scheme, there have been note number on the bill, account number, date of draft, the amount of money, quantity etc. after utilizing bill to open, adding digital secret key again utilizes the mathematical computations mode to carry out drawing one group of data after the computing, wherein one or more snippets of intercepting is labeled on the bill as identifying code then.After bill arrives recruiting unit, calculate identifying code with the identical calculations mode again, and compare with the identifying code on the bill, if consistent bill is true, otherwise be false.
Embodiment
Below be that example is further described the present invention just with the bank transfer check.
1, the check drawer has combined input such as the cheque number of filling on the check of having opened, account number, date of draft, the amount of money (hereinafter to be referred as key element) in the identifying code calculation procedure of data secret key, be verified sign indicating number after the operation, and be labeled in the blank space of check, give bearer or bank.Because identifying code can be printed on the existing general cashier's check by Hand writing or machine, so the check that uses can continue to use fully now.Certainly identification for convenience can be specified a unified labeling position in advance by bank.
2, account form generally can be provided by the bank of deposit, secret key can be provided by the bank of deposit or account holder, the corresponding corresponding secret key of each account holder (or each account number), for safety and convenient the use, general secret key can also can use more group of number and other character to form with 4 groups 8 tens digit, and input is in the identifying code calculation procedure of both sides' computing machine or other computational tool.
3, bank is after obtaining check, importing this cheque number, check drawer's account number, date of draft, the amount of money, identifying code etc. when manipulating needs the key element of input, by computer according to check drawer's account number from database, access automatically corresponding secret key and corresponding calculated mode calculate identifying code and automatically and the identifying code on the check compare, unanimity shows that then this check is legal, the program of can transferring accounts normally, otherwise be shown as illegally, check is ended to use.So also can verify use in other bank except that bank of deposit because the computer of present bank has generally carried out this check of networking.
4, since this method when calculating identifying code, in a single day used all relevant factors on the check,, identifying code had been lost efficacy so any key element on the bill occurs tampering, simultaneously because the uniqueness of secret key has only legal check drawer just can calculate the effective identifying code of oneself.The validity that identifying code is also just proofreaded by computing machine automatically by bank, the general staff also can only know the comparison result of identifying code, has so just further strengthened the security of check.So it almost is impossible that the disabled user wants to forge available check.
5, three simple example of following use illustrate the variation of different formula and key element and the relation that identifying code changes:
Example 1:
Figure C20051004922800041
Getting six behind the radix point after " the calculating post code " of I row is calculated by formula (A*E+B*F+C/G)/SQRT (D*H) in the table draws.And J row identifying code 1 to be preceding 4 of the radix point of intercepting I column data obtain, K row identifying code 2 be behind the radix point of intercepting I column data 4 obtain.
Example 2:
Figure C20051004922800051
Getting six behind the radix point after " the calculating post code " of I row is calculated by formula (A*F-B+E-C*G)/TAN (D/H) in the table draws.And J row identifying code 1 to be preceding 4 of the radix point of intercepting I column data obtain, K row identifying code 2 be behind the radix point of intercepting I column data 4 obtain.
Example 3:
Figure C20051004922800052
Getting six behind the radix point after " the calculating post code " of I row is calculated by formula (A/E-B/F-C/G)/SIN (D/H) in the table draws.And J row identifying code 1 to be the radix point of intercepting I column data preceding 4 and be converted to sexadecimal and obtain, K row identifying code 2 is behind the radix point of intercepting I column data 4 and be converted to sexadecimal and obtain.
Three kinds of different account forms have been used in 3 examples in the above, identical data can obtain different identifying codes with different account forms, and the account form that can reach this effect is very many, and any in the employed check key element will make identifying code change in the account form and change.
Account form will be complicated and perfect more in actual use, the figure place of secret key also can be more, the group number also can increase, the identifying code of intercepting also can be other particular piece of data, because computing formula and secret key are to be hidden in through in the compiler language, the identifying code that is labeled on the check also is the fragment of result of calculation.So want to obtain computing formula and secret key almost is impossible by the calculating means.This method security and practicality have so just been strengthened greatly.
Check drawer even can give any bearer the blank check of building seal, open in needs by the bearer, open the back and tell the check drawer each key element on the check by phone or alternate manner, the check drawer calculates identifying code and tells the bearer after confirmation, fill in by the bearer, make check legal available, and do not worry the safety of blank check.Do not worry more that blank check is lost or stolen after safety problem.
6, because this method only needs a cover calculation procedure and corresponding secret key to calculate on computer or other computational tool and marked on check or authorized other people to mark by the check drawer, get final product in bank's checking of comparing, so under the relatively more universal situation of computing machine now, need to increase any equipment hardly.For safety, secret key or identifying code account form can be changed as required easily simultaneously, because it only can be finished between the account holder of bank of deposit and correspondence.
Certainly this method also can be used for the security purposes of other various similar bill.In order more further to strengthen the security of bill, the same special messenger of having only with signature of the use of identifying code calculation procedure just can use and need password to move, perhaps calculation procedure and secret key are deposited respectively, only just merge in use, have guaranteed the safety of fund so more.

Claims (3)

1. " identifying code " bill anti-counterfeit authenticating method, it is characterized in that, existed note number, account number, date of draft, the amount of money, quantity on the bill to add digital secret key again after utilizing bill to open, after utilizing the mathematical computations mode to carry out computing, drawing one group of data intercepts wherein one or more snippets then and is labeled on the bill as identifying code, after bill arrives recruiting unit, calculate identifying code with the identical calculations mode again, and compare with the identifying code on the bill, if consistent bill is true, otherwise be false.
2. according to claims 1 described " identifying code " bill anti-counterfeit authenticating method, it is characterized in that described " identifying code " is metric arabic numeral.
3. according to claims 1 described " identifying code " bill anti-counterfeit authenticating method, it is characterized in that described " identifying code " is hexadecimal code.
CN2005100492280A 2005-01-26 2005-01-26 Anti-faking and authentication method for bill using identifying code Expired - Fee Related CN100407217C (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2005100492280A CN100407217C (en) 2005-01-26 2005-01-26 Anti-faking and authentication method for bill using identifying code

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2005100492280A CN100407217C (en) 2005-01-26 2005-01-26 Anti-faking and authentication method for bill using identifying code

Publications (2)

Publication Number Publication Date
CN1811789A CN1811789A (en) 2006-08-02
CN100407217C true CN100407217C (en) 2008-07-30

Family

ID=36844701

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2005100492280A Expired - Fee Related CN100407217C (en) 2005-01-26 2005-01-26 Anti-faking and authentication method for bill using identifying code

Country Status (1)

Country Link
CN (1) CN100407217C (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113362522B (en) * 2021-07-02 2023-03-14 北京高阳金信信息技术有限公司 Processing method for online storing and converting of paper check
CN113611014B (en) * 2021-07-08 2023-07-21 国家电网有限公司技术学院分公司 Five-prevention lockset management method based on block chain
CN113593090B (en) * 2021-07-30 2023-07-18 国家电网有限公司技术学院分公司 Block chain-based five-prevention Bluetooth lock system of transformer substation

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1107990A (en) * 1995-01-26 1995-09-06 中国航天工业总公司 Anti-fake biller, identifier and their anbi-fake, identifying method
CN1253350A (en) * 1998-10-29 2000-05-17 南京德硕网络系统有限公司 Method for generating multi-layer acknowledge label
JP2003077026A (en) * 2001-04-25 2003-03-14 World Techno:Kk Method and device for discriminating fake from real bill

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1107990A (en) * 1995-01-26 1995-09-06 中国航天工业总公司 Anti-fake biller, identifier and their anbi-fake, identifying method
CN1253350A (en) * 1998-10-29 2000-05-17 南京德硕网络系统有限公司 Method for generating multi-layer acknowledge label
JP2003077026A (en) * 2001-04-25 2003-03-14 World Techno:Kk Method and device for discriminating fake from real bill

Also Published As

Publication number Publication date
CN1811789A (en) 2006-08-02

Similar Documents

Publication Publication Date Title
US20200134619A1 (en) System and Method for Financial Transaction Validation
EP3350953B1 (en) The transfer of digital currency encryption keys through the process of issuance, validation and devaluation of physical medium with multi-factor authorization, and the physical medium of encryption keys for digital currency to conduct this transfer technology
Chaum Security without identification: Transaction systems to make big brother obsolete
US10032238B2 (en) Private online transaction system
GB2597592A (en) Computer-implemented control system and method
US20160217356A1 (en) System and Method for Encoding and Controlled Authentication
US20100169223A1 (en) Payment System and Method Using an IC Identification Card
CN101536045A (en) Visual code transaction verification
CN104268742A (en) Official seal fake detection method and device based on network digital certificate and network lookup
EP2474948A1 (en) Tracing and recalling system for managing commodity circulation based on internet
CN103189891A (en) Product authentication method
CN102147884A (en) Anti-counterfeiting and authenticity-verifying method and system for article
WO2021250046A1 (en) Computer implemented methods and systems
Astrakhantseva et al. Cryptocurrency fraud schemes analysis
Shope The bill of lading on the blockchain: an analysis of its compatibility with international rules on commercial transactions
CN100407217C (en) Anti-faking and authentication method for bill using identifying code
CN108764904A (en) It is a kind of distribution Accounting system in dual key theft preventing method
CN103295053B (en) Multi-code early-warning type memory lock bank card
US20190363897A1 (en) System and method for authenticating security certificates
CN111553791A (en) Digital cash object currency, method, system, device and storage medium for generating same
Chaum Numbers can be a better form of cash than paper
Dyntu Cryptocurrency as a means of money laundering
Wezza et al. A novel model for securing seals using blockchain and digital signature based on qr codes
JP2001216395A (en) Authentication system using possessed paper money and application of the system
KR20160073368A (en) Electronic accounting server and system to issue revenue stamp having the same

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
C57 Notification of unclear or unknown address
DD01 Delivery of document by public notice

Addressee: Chen Chi

Document name: patent for invention

C17 Cessation of patent right
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20080730

Termination date: 20110126