CN109299763A - The anti-tamper forgery method of papery concerning security matters carrier based on RFID key chain - Google Patents

The anti-tamper forgery method of papery concerning security matters carrier based on RFID key chain Download PDF

Info

Publication number
CN109299763A
CN109299763A CN201811209249.8A CN201811209249A CN109299763A CN 109299763 A CN109299763 A CN 109299763A CN 201811209249 A CN201811209249 A CN 201811209249A CN 109299763 A CN109299763 A CN 109299763A
Authority
CN
China
Prior art keywords
papery
concerning security
security matters
matters carrier
page
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201811209249.8A
Other languages
Chinese (zh)
Other versions
CN109299763B (en
Inventor
程熹
黄峻岭
张磊波
陈莉
孙加
洪雅迪
袁田
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Wuxi Power Supply Branch Jiangsu Electric Power Co Ltd
Wuxi Power Supply Co of State Grid Jiangsu Electric Power Co Ltd
Original Assignee
Wuxi Power Supply Branch Jiangsu Electric Power Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Wuxi Power Supply Branch Jiangsu Electric Power Co Ltd filed Critical Wuxi Power Supply Branch Jiangsu Electric Power Co Ltd
Priority to CN201811209249.8A priority Critical patent/CN109299763B/en
Publication of CN109299763A publication Critical patent/CN109299763A/en
Application granted granted Critical
Publication of CN109299763B publication Critical patent/CN109299763B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K17/00Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/123Applying verification of the received information received data contents, e.g. message integrity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0863Generation of secret information including derivation or calculation of cryptographic keys or passwords involving passwords or one-time passwords

Abstract

The present invention provides a kind of anti-tamper forgery method of papery concerning security matters carrier based on RFID key chain, comprising the following steps: step S2 generates papery concerning security matters carrier key chain;It include: S2.1, the generation parameter for generating the root key V0, V0 of papery concerning security matters carrier key chain includes: the global information character string of papery concerning security matters carrier, is denoted as G;The corresponding RFID tag unique ID of papery concerning security matters carrier, is denoted as RID;By one way hash function F, calculates and generate V0=F (G | | RID), wherein | | it is accorded with for character string attended operation;S2.2, the building of key chain;The corresponding summary info character string of page in the papery concerning security matters carrier every page is successively obtained, the key Vx of this page is generated to the interior page summary info character string S of key string Vx-1 and this page that the prevpage of this page generates using one way hash function F;Step S3, the attachment of papery concerning security matters carrier key chain and papery concerning security matters carrier.The present invention realizes the safeguard protection to papery concerning security matters carrier.

Description

The anti-tamper forgery method of papery concerning security matters carrier based on RFID key chain
Technical field
The present invention relates to concerning security matters vectors safe protection technology fields, in particular to the interior page document of papery concerning security matters carrier It is anti-to alter, distort, taking out the technologies such as page, addition page.
Background technique
Papery concerning security matters carrier occupies very big specific gravity in concerning security matters material, and carries mostly as the concerning security matters of long-term preservation Body, preservation and censorship to this some materials are the important components of concerning security matters store keeping work.Papery concerning security matters carrier With the carrier of electronization, as USB flash disk, movable storage device are different.The concerning security matters carrier of the electronization such as USB flash disk, movable storage device can be with It is detected with Intelligent hardware by all kinds of softwares, papery concerning security matters carrier itself is without electronization, papery concerning security matters carrier at present Censorship is generally also to rely on manually, is sampled inspection.But such papery concerning security matters carrier secrecy detection mode is deposited There is certain problem:
1. manual detection work intensity is big: papery concerning security matters carrier passes through the materials such as long-term accumulation, including all kinds of archives, drawing, Manually it is difficult to be detected one by one;
2. artificial detection result not can guarantee: artificial detection, which can only detect papery concerning security matters carrier, whether there is, and surface is with interior page It is no complete, it can not detect whether interior page is tampered;
Aiming at the problem that in terms of artificial detection, existing research is realized using RFID tag with patent proposition to papery concerning security matters carrier Unified management, RFID tag is usually to be pasted onto the surface of papery concerning security matters carrier, can be to relating to by RFID tag reader Close carrier carries out the reading of batch, and realization makes an inventory to concerning security matters carrier, then docking information management system, searches existing in comparison library Concerning security matters carrier information, this mode can effectively realize the censorship to high-volume concerning security matters carrier, but there are still have Problem:
Information in 1.RFID label can forge, although there is research by the unique tags ID combination concerning security matters carrier in RFID Information encrypted after RFID tag is written, to identify corresponding concerning security matters carrier by RFID unique tags ID, still This mode is still problematic, and although the ID in RFID tag is unique, but forge identical ID's by certain means RFID tag is feasible;
2. although this mode is not can bind unique corresponding concerning security matters carrier by the unique ID of RFID tag It is adapted to papery concerning security matters carrier, because papery concerning security matters carrier structure is more open, interior page is easy to be taken out page, replaces, distorts, Although RFID tag can bind the Periodical front cover information of papery concerning security matters carrier, it can be difficult to guaranteeing its interior page safety.
Summary of the invention
It is an object of the present invention to overcome the shortcomings of the prior art and provide a kind of paperys based on RFID key chain The anti-tamper forgery method of concerning security matters carrier realizes the safety guarantee to papery concerning security matters carrier, convenient for the censorship of concerning security matters archives, prevents Model alters to the interior page file of papery concerning security matters carrier, distorts, taking out the destructions such as page, addition page, and the present invention is directed to utilize RFID The summary info character string of page, structure in tags unique identifier ID, the global information of papery concerning security matters carrier and papery concerning security matters carrier To the key chain of HASH before building out.Key chain is by RFID tag and papery concerning security matters carrier global information, by the interior page of page number sequence Summary info character string constitutes a complete verifying chain, to realize RFID tag anti-counterfeiting, interior page can not be distorted The function of papery concerning security matters vectors safe guarantee.The technical solution adopted by the present invention is that:
A kind of anti-tamper forgery method of papery concerning security matters carrier based on RFID key chain, comprising the following steps:
Step S2 generates papery concerning security matters carrier key chain;Include:
S2.1 generates the root key of papery concerning security matters carrier key chain, is denoted as V0, the generation parameter of V0 includes:
The global information character string of papery concerning security matters carrier, is denoted as G;
The corresponding RFID tag unique ID of papery concerning security matters carrier, is denoted as RID;
By one way hash function F, calculates and generate V0=F (G | | RID), wherein | | it is accorded with for character string attended operation;
S2.2, the building of key chain;
The corresponding summary info character string of page in the papery concerning security matters carrier every page is successively obtained, it is right using one way hash function F The interior page summary info character string S of key string Vx-1 and this page that the prevpage of this page generates, generate the key Vx of this page;
Vx=F(Vx-1 | | S), wherein | | it is accorded with for character string attended operation;
Step S3, the attachment of papery concerning security matters carrier key chain and papery concerning security matters carrier, comprising:
The corresponding RFID tag of papery concerning security matters carrier is attached on papery concerning security matters carrier by S3.1;
The global information character string of papery concerning security matters carrier is attached on papery concerning security matters carrier by S3.2;
Each key since the second key in addition to V0, will be converted into two dimensional code in key chain by S3.3, attached one by one On each interior page of papery concerning security matters carrier.
Further, the composition of page summary info character string includes: in papery concerning security matters carrier
Interior page relevant information, it is necessary to include the page number of interior page;
The interior anti-tamper information of page, as the unique identifier to interior page in papery concerning security matters carrier;
Interior page relevant information is connected with the anti-tamper information of interior page, constitutes the interior page summary info character of papery concerning security matters carrier String.
Further, the anti-tamper information of interior page, is generated by following steps:
Page in papery concerning security matters carrier is scanned generation picture;
Binary conversion treatment is carried out for interior page scanned picture, the picture after binaryzation is carried out horizontally or vertically in scheduled ratio Direction segmentation, the average gray value of statistics segmentation rear region, is converted into grey level histogram for picture, extracts ash in grey level histogram The variation of angle value generates the gray-value variation curve of interior page scanned picture;
Polynomial curve fitting is carried out using the gray-value variation curve of the internal page scanned picture of least square method, by fitting gained Parameter link together, the anti-tamper unique string as the interior page i.e. in page anti-tamper information.
Further, the anti-tamper forgery method of papery concerning security matters carrier based on RFID key chain, further includes one The secrecy detection method of papery concerning security matters carrier, specifically includes the following steps:
S4.1 takes out the papery concerning security matters carrier for needing to detect, and reads RFID tag unique ID on papery concerning security matters carrier;
S4.2 retrieves the ID in papery concerning security matters carrier information library, takes out the global information of the corresponding papery concerning security matters carrier of the ID, It whether consistent is checked with the global information being attached on papery concerning security matters carrier;
S4.3, if unanimously, according to step S2.1 in claim 1, the root key of key chain is generated, according in claim 2 Step generates the summary info character string of each interior page, according still further to step S2.2 in claim 1, generates key chain;Every generation A key in key chain takes out the two dimensional code printed on the corresponding interior page of the key, two dimensional code is converted into key, and new Key is generated to be compared;
S4.4, if the key that each key interior page two dimensional code corresponding to being reserved in is converted in newly-generated key chain compares completely Unanimously, then papery concerning security matters carrier secrecy detects successfully, and otherwise detection not passes through.
The present invention has the advantages that
1) the high-intensitive censorship to papery concerning security matters carrier is realized.The present invention realizes the credible inspection of height to papery concerning security matters carrier It looks into, others congenic method realizes the information identification by storing in RFID tag and RFID tag only to substitute to paper at present The identification of matter concerning security matters carrier, there are certain security breaches for such identification method.Attacker can be to papery concerning security matters carrier Interior page is readily distorted, takes out page even replacement.Different from these methods, the present invention not only used FRID label information, But also it has been embedded in the key chain that interior page summary info is constituted in papery concerning security matters carrier, so as to realize high-intensitive secrecy It checks.
2) resist and take precautions against the destruction and attack to page in papery concerning security matters carrier.The present invention is realized to papery concerning security matters carrier The safeguard protection of interior page, main approach are the anti-tamper information of interior page proposed by the present invention, the image which is scanned by interior page Pass through the parameter composition of curve matching after processing binaryzation.Such parameter is distorted for resisting the interior page of papery concerning security matters carrier Attack has very high robustness;In addition, the key of prevpage is as the next page present invention uses the data structure of key chain The parameter that key generates, therefore page is authenticated one by one by page number sequence in papery concerning security matters carrier, to ensure that entire papery concerning security matters carry The safety of internal page.
3) resist and take precautions against the forgery or personation papery concerning security matters carrier attack of papery concerning security matters carrier RFID tag.The present invention by It organizes together, generates close in by FRID label information and the information of page in papery concerning security matters carrier entirety, papery concerning security matters carrier Key chain.Therefore by RFID tag with papery concerning security matters carrier being combined together more closely, can be resisted using the method for the present invention With the forgery attack of prevention papery concerning security matters carrier RFID tag, while impersonation attack can also be resisted i.e. by original concerning security matters carrier RFID tag is at will pasted and is sticked on other objects, and body paper matter concerning security matters carrier is palmed off using other objects.
Detailed description of the invention
Fig. 1 is flow chart of the method for the present invention.
Specific embodiment
Below with reference to specific drawings and examples, the invention will be further described.
The present invention proposes a kind of anti-tamper forgery method of papery concerning security matters carrier based on RFID key chain, comprising:
(1) papery concerning security matters carrier information library is established;
Papery concerning security matters carrier information library specifically includes that the global information of papery concerning security matters carrier, the corresponding RFID of papery concerning security matters carrier Unique ID, page summary info character string in papery concerning security matters carrier;Wherein:
The global information of papery concerning security matters carrier includes being not restricted to: concerning security matters number, rank, the title, load of papery concerning security matters carrier Body founder, date created etc.;
The corresponding RFID tag unique ID of papery concerning security matters carrier: papery concerning security matters are pasted onto from what RFID reader was read The unique ID of RFID tag on carrier;
Page summary info character string in papery concerning security matters carrier: by scanning page in papery concerning security matters carrier page by page, each interior page is generated Summary info character string is stored in the database by the order of the page;
The composition of page summary info character string includes: in papery concerning security matters carrier
Interior page relevant information, it is necessary to include the page number of interior page, and other customized informations;
The interior anti-tamper information of page, as the unique identifier to interior page in papery concerning security matters carrier;
Interior page relevant information is connected with the anti-tamper information of interior page, constitutes the interior page summary info character of papery concerning security matters carrier String;
The interior anti-tamper information of page, is generated by following steps:
Page in papery concerning security matters carrier is scanned generation picture;
Binary conversion treatment is carried out for interior page scanned picture, the picture after binaryzation is carried out horizontally or vertically in scheduled ratio Direction segmentation, the average gray value of statistics segmentation rear region, is converted into grey level histogram for picture, extracts ash in grey level histogram The variation of angle value generates the gray-value variation curve of interior page scanned picture;
Polynomial curve fitting is carried out using the gray-value variation curve of the internal page scanned picture of least square method, by fitting gained Parameter link together, the anti-tamper unique string as the interior page i.e. in page anti-tamper information.
(2) papery concerning security matters carrier key chain is generated;
S2.1 generates the root key of papery concerning security matters carrier key chain, is denoted as V0, the generation parameter of V0 includes:
The global information character string of papery concerning security matters carrier, is denoted as G;
The corresponding RFID tag unique ID of papery concerning security matters carrier, is denoted as RID;
By one way hash function F, calculates and generate V0=F (G | | RID), wherein | | it is accorded with for character string attended operation;
S2.2, the building of key chain;
Successively from obtaining the corresponding summary info character of page in the papery concerning security matters carrier every page in papery concerning security matters carrier information library String, using one way hash function F, to the interior page summary info word of key string Vx-1 and this page that the prevpage of this page generates Symbol string S, generates the key Vx of this page;
Vx=F(Vx-1 | | S), wherein | | it is accorded with for character string attended operation.
(3) attachment of papery concerning security matters carrier key chain and papery concerning security matters carrier, comprising:
The corresponding RFID tag of papery concerning security matters carrier is attached on papery concerning security matters carrier by S3.1, and adhering mode includes being pasted onto Carrier cover, or be embedded in carrier;
The global information character string of papery concerning security matters carrier is attached on papery concerning security matters carrier, such as is printed on papery and relates to by S3.2 The cover of close carrier;
Each key since the second key in addition to V0, will be converted into two dimensional code in key chain by S3.3, attached one by one On each interior page of papery concerning security matters carrier.
(4) the secrecy detection method of papery concerning security matters carrier, comprising the following steps:
S4.1 takes out the papery concerning security matters carrier for needing to detect, and reads RFID tag on papery concerning security matters carrier by RFID reader Unique ID;
S4.2 retrieves the ID in papery concerning security matters carrier information library, takes out the global information of the corresponding papery concerning security matters carrier of the ID, It whether consistent is checked with the global information being attached on papery concerning security matters carrier;
S4.3, if unanimously, according to step S2.1, the root key of key chain is generated, according to the structure of interior page summary info character string At step, the summary info character string of each interior page is generated, according still further to step S2.2, generates key chain;In every generation key chain One key takes out the two dimensional code printed on the corresponding interior page of the key, two dimensional code is converted into key, with newly-generated key It is compared;
S4.4, if the key that each key interior page two dimensional code corresponding to being reserved in is converted in newly-generated key chain compares completely Unanimously, then papery concerning security matters carrier secrecy detects successfully, and otherwise detection not passes through.
The present invention is close by the root that the global information of RFID tag unique ID and papery concerning security matters carrier generates key chain Key, then summary info character string is generated to the interior page of carrier one by one, every page is raw using the corresponding key of prevpage and the page At summary info character string carry out HASH, generate new key, be built into key chain.
The root key of key chain ensure that the unique ID of RFID tag and being associated with for papery concerning security matters carrier global information, One way hash function also ensures that the root key of key chain can not be forged, and the corresponding key of each interior page can be in key chain Further whether it is replaced and distorts by page in the gray-value variation curve verifying of interior page and whether interior page is replaced, extracts And sequence is reverse etc., maintains secrecy detection to realize to the high reliability of papery concerning security matters carrier.
It should be noted last that the above specific embodiment is only used to illustrate the technical scheme of the present invention and not to limit it, Although being described the invention in detail referring to example, those skilled in the art should understand that, it can be to the present invention Technical solution be modified or replaced equivalently, without departing from the spirit and scope of the technical solution of the present invention, should all cover In the scope of the claims of the present invention.

Claims (4)

1. a kind of anti-tamper forgery method of papery concerning security matters carrier based on RFID key chain, which comprises the following steps:
Step S2 generates papery concerning security matters carrier key chain;Include:
S2.1 generates the root key of papery concerning security matters carrier key chain, is denoted as V0, the generation parameter of V0 includes:
The global information character string of papery concerning security matters carrier, is denoted as G;
The corresponding RFID tag unique ID of papery concerning security matters carrier, is denoted as RID;
By one way hash function F, calculates and generate V0=F (G | | RID), wherein | | it is accorded with for character string attended operation;
S2.2, the building of key chain;
The corresponding summary info character string of page in the papery concerning security matters carrier every page is successively obtained, it is right using one way hash function F The interior page summary info character string S of key string Vx-1 and this page that the prevpage of this page generates, generate the key Vx of this page;
Vx=F(Vx-1 | | S), wherein | | it is accorded with for character string attended operation;
Step S3, the attachment of papery concerning security matters carrier key chain and papery concerning security matters carrier, comprising:
The corresponding RFID tag of papery concerning security matters carrier is attached on papery concerning security matters carrier by S3.1;
The global information character string of papery concerning security matters carrier is attached on papery concerning security matters carrier by S3.2;
Each key since the second key in addition to V0, will be converted into two dimensional code in key chain by S3.3, attached one by one On each interior page of papery concerning security matters carrier.
2. the anti-tamper forgery method of papery concerning security matters carrier based on RFID key chain as described in claim 1, which is characterized in that
The composition of page summary info character string includes: in papery concerning security matters carrier
Interior page relevant information, it is necessary to include the page number of interior page;
The interior anti-tamper information of page, as the unique identifier to interior page in papery concerning security matters carrier;
Interior page relevant information is connected with the anti-tamper information of interior page, constitutes the interior page summary info character of papery concerning security matters carrier String.
3. the anti-tamper forgery method of papery concerning security matters carrier based on RFID key chain as claimed in claim 2, which is characterized in that
The interior anti-tamper information of page, is generated by following steps:
Page in papery concerning security matters carrier is scanned generation picture;
Binary conversion treatment is carried out for interior page scanned picture, the picture after binaryzation is carried out horizontally or vertically in scheduled ratio Direction segmentation, the average gray value of statistics segmentation rear region, is converted into grey level histogram for picture, extracts ash in grey level histogram The variation of angle value generates the gray-value variation curve of interior page scanned picture;
Polynomial curve fitting is carried out using the gray-value variation curve of the internal page scanned picture of least square method, by fitting gained Parameter link together, the anti-tamper unique string as the interior page i.e. in page anti-tamper information.
4. the anti-tamper forgery method of papery concerning security matters carrier based on RFID key chain as claimed in claim 2, which is characterized in that It further include the secrecy detection method of a papery concerning security matters carrier, specifically includes the following steps:
S4.1 takes out the papery concerning security matters carrier for needing to detect, and reads RFID tag unique ID on papery concerning security matters carrier;
S4.2 retrieves the ID in papery concerning security matters carrier information library, takes out the global information of the corresponding papery concerning security matters carrier of the ID, It whether consistent is checked with the global information being attached on papery concerning security matters carrier;
S4.3, if unanimously, according to step S2.1 in claim 1, the root key of key chain is generated, according in claim 2 Step generates the summary info character string of each interior page, according still further to step S2.2 in claim 1, generates key chain;Every generation A key in key chain takes out the two dimensional code printed on the corresponding interior page of the key, two dimensional code is converted into key, and new Key is generated to be compared;
S4.4, if the key that each key interior page two dimensional code corresponding to being reserved in is converted in newly-generated key chain compares completely Unanimously, then papery concerning security matters carrier secrecy detects successfully, and otherwise detection not passes through.
CN201811209249.8A 2018-10-17 2018-10-17 Paper secret-involved carrier tamper-proof counterfeiting method based on RFID key chain Active CN109299763B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811209249.8A CN109299763B (en) 2018-10-17 2018-10-17 Paper secret-involved carrier tamper-proof counterfeiting method based on RFID key chain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811209249.8A CN109299763B (en) 2018-10-17 2018-10-17 Paper secret-involved carrier tamper-proof counterfeiting method based on RFID key chain

Publications (2)

Publication Number Publication Date
CN109299763A true CN109299763A (en) 2019-02-01
CN109299763B CN109299763B (en) 2021-11-02

Family

ID=65163003

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811209249.8A Active CN109299763B (en) 2018-10-17 2018-10-17 Paper secret-involved carrier tamper-proof counterfeiting method based on RFID key chain

Country Status (1)

Country Link
CN (1) CN109299763B (en)

Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101281581A (en) * 2007-09-27 2008-10-08 北京数字证书认证中心有限公司 Method for checking whether contents of paper file is distorted or not
EP1986119A1 (en) * 2007-03-28 2008-10-29 RICOH Co., Ltd. A document image authentication server
CN101419176A (en) * 2007-10-26 2009-04-29 比亚迪股份有限公司 Surface flaw detecting method and device
CN101507178A (en) * 2006-08-28 2009-08-12 三菱电机株式会社 Data processing system, data processing method, and program
CN101593196A (en) * 2008-05-30 2009-12-02 日电(中国)有限公司 The methods, devices and systems that are used for rapidly searching ciphertext
CN101950367A (en) * 2010-08-16 2011-01-19 中国科学院计算技术研究所 RFID system introducing agent device and two-way authentification method thereof
US20130226413A1 (en) * 2012-02-27 2013-08-29 Ford Global Technologies, Llc Vehicle Safety System Optimization Using RFID Occupant Identification
CN103324894A (en) * 2013-07-11 2013-09-25 广州市尊网商通资讯科技有限公司 Method and system for generating composite anti-fake document
CN103400130A (en) * 2013-07-22 2013-11-20 哈尔滨工业大学 Energy minimization framework-based document image tilt detection and correction method
US20150269404A1 (en) * 2012-12-12 2015-09-24 Tencent Technology (Shenzhen) Company Limited Method for Performing Optimization Process on Two-dimension Code Picture and Mobile Terminal
CN108305075A (en) * 2018-03-07 2018-07-20 广州建翎电子技术有限公司 A kind of trade document file management system and management method based on block chain

Patent Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101507178A (en) * 2006-08-28 2009-08-12 三菱电机株式会社 Data processing system, data processing method, and program
EP1986119A1 (en) * 2007-03-28 2008-10-29 RICOH Co., Ltd. A document image authentication server
CN101281581A (en) * 2007-09-27 2008-10-08 北京数字证书认证中心有限公司 Method for checking whether contents of paper file is distorted or not
CN101419176A (en) * 2007-10-26 2009-04-29 比亚迪股份有限公司 Surface flaw detecting method and device
CN101593196A (en) * 2008-05-30 2009-12-02 日电(中国)有限公司 The methods, devices and systems that are used for rapidly searching ciphertext
CN101950367A (en) * 2010-08-16 2011-01-19 中国科学院计算技术研究所 RFID system introducing agent device and two-way authentification method thereof
US20130226413A1 (en) * 2012-02-27 2013-08-29 Ford Global Technologies, Llc Vehicle Safety System Optimization Using RFID Occupant Identification
US20150269404A1 (en) * 2012-12-12 2015-09-24 Tencent Technology (Shenzhen) Company Limited Method for Performing Optimization Process on Two-dimension Code Picture and Mobile Terminal
CN103324894A (en) * 2013-07-11 2013-09-25 广州市尊网商通资讯科技有限公司 Method and system for generating composite anti-fake document
CN103400130A (en) * 2013-07-22 2013-11-20 哈尔滨工业大学 Energy minimization framework-based document image tilt detection and correction method
CN108305075A (en) * 2018-03-07 2018-07-20 广州建翎电子技术有限公司 A kind of trade document file management system and management method based on block chain

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
GUOHUA OU: "A key-chain based key management scheme for heterogeneous sensor network", 《2010 IEEE INTERNATIONAL CONFERENCE ON INFORMATION THEORY AND INFORMATION SECURITY》 *
李敬红: "一种基于RFID的文件管理系统设计方案", 《计算机与数学工程》 *

Also Published As

Publication number Publication date
CN109299763B (en) 2021-11-02

Similar Documents

Publication Publication Date Title
US20220405522A1 (en) Method for protecting the intellectual property rights of a trained machine learning network model using digital watermarking by adding, on purpose, an anomaly to the training data
US20080078836A1 (en) Barcode for two-way verification of a document
CN102113026B (en) Method and device for identifying document printing plate
KR100405828B1 (en) Apparatus and method for producing a document which is capable of preventing a forgery or an alteration of itself, and apparatus and method for authenticating the document
US7523865B2 (en) High resolution barcode and document including verification features
CN105706107A (en) Two dimensional barcode and method of authentication of such barcode
Nguyen et al. A watermarking technique to secure printed matrix barcode—Application for anti-counterfeit packaging
Tkachenko et al. Printed document authentication using two level or code
Nguyen et al. A watermarking technique to secure printed QR codes using a statistical test
CN1691087B (en) System and method for decoding digital coding image
Song et al. My smartphone recognizes genuine QR codes! practical unclonable qr code via 3D printing
Kaiser et al. Learning to decipher license plates in severely degraded images
CN109299763A (en) The anti-tamper forgery method of papery concerning security matters carrier based on RFID key chain
Eskenazi et al. When document security brings new challenges to document analysis
Roy et al. Fake Product Monitoring System using Artificial Intelligence
CN116663549A (en) Digitized management method, system and storage medium based on enterprise files
KR101501122B1 (en) Method and apparatus for producing a frame-barcode inserted document which is capable of preventing a forgery or an alteration of itself, and method and apparatus for authenticating the document
Hassan et al. A survey on techniques of detecting identity documents forgery
Al-Jarrah et al. Steganalysis using LSB-focused statistical features
Steinebach et al. FaceHash: face detection and robust hashing
US20150363790A1 (en) Asset tracking and counterfeit detection system
TWI606424B (en) System and method for detecting and deactivating illegal access cards
CN110472384A (en) A kind of big data water mark method and device based on artificial intelligence
Haoliang et al. The Application of Digital Signature Technology and fingerprint identification in 2D Barcode person identity
Hildebrandt et al. Digitized forensics: retaining a link between physical and digital crime scene traces using QR-codes

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant