CN109299763B - Paper secret-involved carrier tamper-proof counterfeiting method based on RFID key chain - Google Patents

Paper secret-involved carrier tamper-proof counterfeiting method based on RFID key chain Download PDF

Info

Publication number
CN109299763B
CN109299763B CN201811209249.8A CN201811209249A CN109299763B CN 109299763 B CN109299763 B CN 109299763B CN 201811209249 A CN201811209249 A CN 201811209249A CN 109299763 B CN109299763 B CN 109299763B
Authority
CN
China
Prior art keywords
paper
secret
carrier
key
page
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201811209249.8A
Other languages
Chinese (zh)
Other versions
CN109299763A (en
Inventor
程熹
黄峻岭
张磊波
陈莉
孙加
洪雅迪
袁田
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Wuxi Power Supply Co of State Grid Jiangsu Electric Power Co Ltd
Original Assignee
Wuxi Power Supply Co of State Grid Jiangsu Electric Power Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Wuxi Power Supply Co of State Grid Jiangsu Electric Power Co Ltd filed Critical Wuxi Power Supply Co of State Grid Jiangsu Electric Power Co Ltd
Priority to CN201811209249.8A priority Critical patent/CN109299763B/en
Publication of CN109299763A publication Critical patent/CN109299763A/en
Application granted granted Critical
Publication of CN109299763B publication Critical patent/CN109299763B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K17/00Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/123Applying verification of the received information received data contents, e.g. message integrity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0863Generation of secret information including derivation or calculation of cryptographic keys or passwords involving passwords or one-time passwords

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Editing Of Facsimile Originals (AREA)
  • Storage Device Security (AREA)

Abstract

The invention provides a paper secret-involved carrier anti-tampering and counterfeiting method based on an RFID key chain, which comprises the following steps: step S2, generating a paper secret-related carrier key chain; the method comprises the following steps: s2.1, generating a root key V0 of the paper secret carrier key chain, wherein the generation parameters of V0 comprise: recording the global information character string of the paper secret-related carrier as G; the unique identification ID of the RFID label corresponding to the paper secret-related carrier is marked as RID; calculating and generating V0 ═ F (G ||RID) through a one-way HASH function F, wherein || is a character string connection operator; s2.2, constructing a key chain; sequentially acquiring a summary information character string corresponding to each page of the paper secret-related carrier, and generating a key Vx of the page by using a one-way HASH function F and a key character string Vx-1 generated on the previous page of the page and an inner page summary information character string S of the page; and step S3, attaching the paper secret-related carrier key chain to the paper secret-related carrier. The invention realizes the safety protection of the paper secret-related carrier.

Description

Paper secret-involved carrier tamper-proof counterfeiting method based on RFID key chain
Technical Field
The invention relates to the technical field of security protection of a confidential carrier, in particular to technologies for preventing inner page documents of a paper confidential carrier from being altered, tampered, extracted and added.
Background
The paper secret-related carrier occupies a large proportion in the secret-related material, is mostly used as the secret-related carrier for long-term storage, and the storage and the secret inspection of the part of the material are important components of the management work of the secret-related material. The paper secret-related carrier is different from an electronic carrier, such as a U disk and a mobile storage device. Electronic secret-related carriers such as a U disk and a mobile storage device can be detected through various software and intelligent hardware, the paper secret-related carriers are not electronic, and at present, the security inspection of the paper secret-related carriers generally depends on manual work to perform sampling inspection. However, the confidential detection method of the paper confidential carrier has certain problems:
1. the manual detection has high working strength: after long-term accumulation of the paper secret-related carriers, including various archives, drawings and other materials, the paper secret-related carriers are difficult to detect one by one manually;
2. the manual detection result cannot be guaranteed: manual detection can only detect whether a paper secret-related carrier exists or not, whether the surface and the inner page are complete or not, whether the inner page is tampered or not and the like;
aiming at the problem in the aspect of manual detection, the prior research and patent propose that the unified management of paper secret-related carriers is realized by using RFID tags, the RFID tags are generally adhered to the surface of the paper secret-related carriers, batch reading can be carried out on the secret-related carriers through an RFID tag reader-writer, the checking of the secret-related carriers is realized, then an information management system is connected, and the existing secret-related carrier information in a comparison library is searched and compared, so that the mode can effectively realize the secret inspection of the large-batch secret-related carriers, but still has the problems:
the information in the RFID tag can be forged, although research is carried out on writing the information in the RFID tag after the unique tag ID in the RFID is combined with the information of the confidential carrier to be encrypted, so that the corresponding confidential carrier is identified through the RFID unique tag ID, the method still has problems, although the ID in the RFID tag is unique, the RFID tag with the same ID can be forged through a certain means;
2. although the unique identification ID of the RFID tag can bind the unique corresponding secret carrier, the method is not suitable for the paper secret carrier because the structure of the paper secret carrier is loose, the inner page of the paper secret carrier is easy to extract, replace and tamper, and the RFID tag can bind the cover information of the paper secret carrier, but the safety of the inner page is difficult to guarantee.
Disclosure of Invention
The invention aims to overcome the defects in the prior art, provides a method for preventing paper secret-involved carriers from being tampered and counterfeited based on an RFID key chain, realizes the safety guarantee of the paper secret-involved carriers, is convenient for the secret inspection of secret-involved files, and prevents the destructive behaviors of changing, tampering, page extraction, page addition and the like of inner pages of the paper secret-involved carriers. The key chain forms a complete verification chain by the global information of the RFID label and the paper secret-related carrier and the inner page summary information character string of the page sequence, thereby realizing the security guarantee function of the paper secret-related carrier, such as anti-counterfeiting of the RFID label, non-tampering of the inner page and the like. The technical scheme adopted by the invention is as follows:
a paper secret-involved carrier tamper-proof counterfeiting method based on an RFID key chain comprises the following steps:
step S2, generating a paper secret-related carrier key chain; the method comprises the following steps:
s2.1, generating a root key of a paper secret-related carrier key chain, wherein the generation parameters marked as V0 and V0 comprise:
recording the global information character string of the paper secret-related carrier as G;
the unique identification ID of the RFID label corresponding to the paper secret-related carrier is marked as RID;
calculating and generating V0 ═ F (G | | | RID) through a one-way HASH function F, wherein | | | is a character string connection operator;
s2.2, constructing a key chain;
sequentially acquiring a summary information character string corresponding to each page of the paper secret-related carrier, and generating a key Vx of the page by using a one-way HASH function F and a key character string Vx-1 generated on the previous page of the page and an inner page summary information character string S of the page;
f (Vx-1 | | | S), where | | | is a string connection operator;
step S3, the attachment of the paper secret-related carrier key chain and the paper secret-related carrier comprises the following steps:
s3.1, attaching the RFID label corresponding to the paper secret-related carrier;
s3.2, attaching the global information character string of the paper secret-related carrier to the paper secret-related carrier;
and S3.3, converting each key in the key chain from the second bit key except V0 into two-dimensional codes, and attaching the two-dimensional codes to each inner page of the paper secret carrier one by one.
Further, the composition of the paper confidential carrier inner page abstract information character string comprises:
the related information of the inner page, which must include the page number of the inner page;
the inner page tamper-resistant information is used as a unique identifier of the inner page in the paper secret carrier;
and connecting the related information of the inner page with the tamper-resistant information of the inner page to form an inner page abstract information character string of the paper secret-related carrier.
Further, the inner page tamper-resistant information is generated by the following steps:
scanning the inner page of the paper secret-related carrier to generate a picture;
carrying out binarization processing on the inner page scanned picture, carrying out horizontal or vertical segmentation on the binarized picture according to a preset proportion, counting the average gray value of the segmented region, converting the picture into a gray histogram, extracting the change of the gray value in the gray histogram, and generating a gray value change curve of the inner page scanned picture;
and performing polynomial curve fitting on the gray value change curve of the scanned inner page picture by using a least square method, and connecting parameters obtained by fitting together to serve as a unique anti-tampering character string of the inner page, namely inner page anti-tampering information.
Further, the method for preventing the paper secret carrier from being tampered and counterfeited based on the RFID key chain also comprises a secret detection method of the paper secret carrier, and specifically comprises the following steps:
s4.1, taking out the paper secret-related carrier to be detected, and reading the unique identification ID of the RFID label on the paper secret-related carrier;
s4.2, searching the ID in the paper secret-related carrier information library, taking out the global information of the paper secret-related carrier corresponding to the ID, and checking whether the global information is consistent with the global information attached to the paper secret-related carrier;
s4.3, if the two are consistent, generating a root key of the key chain according to the step S2.1 in the claim 1, generating a summary information character string of each inner page according to the step in the claim 2, and generating the key chain according to the step S2.2 in the claim 1; when a key in the key chain is generated, the two-dimensional code printed on the inner page corresponding to the key is taken out, the two-dimensional code is converted into the key, and the key is compared with the newly generated key;
and S4.4, if the comparison between each key in the newly generated key chain and the key obtained by converting the two-dimensional code reserved in the corresponding inner page is completely consistent, the secrecy detection of the paper secret carrier is successful, otherwise, the detection is not passed.
The invention has the advantages that:
1) high-strength confidential inspection of the paper confidential carrier is realized. The invention realizes high credibility inspection of the paper secret-related carrier, and other similar methods only realize identification of the paper secret-related carrier by the RFID label and information stored in the RFID label, so that the identification mode has certain security loopholes. An attacker can easily tamper, extract and even replace the inner page of the paper secret carrier. Different from the methods, the invention not only uses the RFID label information, but also embeds the key chain formed by the abstract information of the inner page in the paper confidential carrier, thereby realizing the high-strength confidential inspection.
2) And the damage and the attack to the inner page of the paper secret-related carrier are resisted and prevented. The invention realizes the safety protection of the inner page of the paper secret-related carrier, and the main approach is the inner page tamper-resistant information provided by the invention, and the information consists of parameters which are processed and binarized by the scanned image of the inner page and then subjected to curve fitting. Such parameters have high robustness for resisting inner page tampering attack of the paper secret carrier; in addition, the invention uses the data structure of the key chain, and the key of the previous page is used as the parameter for generating the key of the next page, so that the inner pages of the paper secret-related carrier are authenticated one by one according to the page sequence, thereby ensuring the safety of the whole inner page of the paper secret-related carrier.
3) And the counterfeit or counterfeit paper secret-related carrier attack of the RFID label of the paper secret-related carrier is resisted and prevented. According to the invention, the RFID label information and the information of the whole paper secret-related carrier and the inner page of the paper secret-related carrier are organized together, so that a key chain is generated. Therefore, the RFID label and the paper secret-related carrier are more closely combined together, the method can resist and prevent the counterfeiting attack of the paper secret-related carrier RFID label, meanwhile, the counterfeiting attack can be resisted, namely, the original secret-related carrier RFID label is stuck to other objects at will, and other objects are used for counterfeiting the base paper secret-related carrier.
Drawings
FIG. 1 is a flow chart of the method of the present invention.
Detailed Description
The invention is further illustrated by the following specific figures and examples.
The invention provides a paper secret-involved carrier anti-tampering and counterfeiting method based on an RFID key chain, which comprises the following steps:
establishing a paper secret-related carrier information base;
the paper secret-related carrier information base mainly comprises: global information of the paper secret-related carrier, an RFID unique identification ID corresponding to the paper secret-related carrier, and an abstract information character string on an inner page of the paper secret-related carrier; wherein:
the global information of the paper secret-related carrier includes, but is not limited to: the classified number, grade, name, carrier creator, creation date and the like of the paper classified carrier;
unique identification ID of the RFID label corresponding to the paper secret-related carrier: the unique identification ID of the RFID label pasted on the paper secret-related carrier is read by an RFID reader-writer;
the method comprises the following steps of (1) paper secret carrier inner page summary information character strings: scanning inner pages of the paper secret-related carrier page by page to generate abstract information character strings of each inner page, and storing the abstract information character strings in a database according to the sequence of the pages;
the composition of the paper confidential carrier inner page abstract information character string comprises the following steps:
the related information of the inner page must include the page number of the inner page and other user-defined information;
the inner page tamper-resistant information is used as a unique identifier of the inner page in the paper secret carrier;
connecting the related information of the inner page with the tamper-resistant information of the inner page to form an inner page abstract information character string of the paper secret-related carrier;
the inner page anti-tampering information is generated by the following steps:
scanning the inner page of the paper secret-related carrier to generate a picture;
carrying out binarization processing on the inner page scanned picture, carrying out horizontal or vertical segmentation on the binarized picture according to a preset proportion, counting the average gray value of the segmented region, converting the picture into a gray histogram, extracting the change of the gray value in the gray histogram, and generating a gray value change curve of the inner page scanned picture;
and performing polynomial curve fitting on the gray value change curve of the scanned inner page picture by using a least square method, and connecting parameters obtained by fitting together to serve as a unique anti-tampering character string of the inner page, namely inner page anti-tampering information.
Secondly, generating a paper secret-related carrier key chain;
s2.1, generating a root key of a paper secret-related carrier key chain, wherein the generation parameters marked as V0 and V0 comprise:
recording the global information character string of the paper secret-related carrier as G;
the unique identification ID of the RFID label corresponding to the paper secret-related carrier is marked as RID;
calculating and generating V0 ═ F (G | | | RID) through a one-way HASH function F, wherein | | | is a character string connection operator;
s2.2, constructing a key chain;
acquiring abstract information character strings corresponding to the inner pages of each page of the paper secret-related carrier from a paper secret-related carrier information base in sequence, and generating a secret key Vx of the page by using a one-way HASH function F and generating a secret key character string Vx-1 of the previous page and an inner page abstract information character string S of the page;
and Vx is F (Vx-1 | | S), wherein | | | is a character string connection operator.
(III) the adhesion of the paper secret-related carrier key chain and the paper secret-related carrier comprises the following steps:
s3.1, attaching the RFID tag corresponding to the paper secret-related carrier in a manner of being pasted on the cover of the carrier or being embedded into the carrier;
s3.2, attaching the global information character string of the paper secret-related carrier to the paper secret-related carrier, such as printing the global information character string on a cover of the paper secret-related carrier;
and S3.3, converting each key in the key chain from the second bit key except V0 into two-dimensional codes, and attaching the two-dimensional codes to each inner page of the paper secret carrier one by one.
(IV) the confidentiality detection method of the paper confidentiality-related carrier comprises the following steps:
s4.1, taking out the paper secret-related carrier to be detected, and reading the unique identification ID of the RFID label on the paper secret-related carrier through an RFID reader-writer;
s4.2, searching the ID in the paper secret-related carrier information library, taking out the global information of the paper secret-related carrier corresponding to the ID, and checking whether the global information is consistent with the global information attached to the paper secret-related carrier;
s4.3, if the key chain is consistent with the key chain, generating a root key of the key chain according to the step S2.1, generating an abstract information character string of each inner page according to the composition steps of the abstract information character strings of the inner pages, and then generating the key chain according to the step S2.2; when a key in the key chain is generated, the two-dimensional code printed on the inner page corresponding to the key is taken out, the two-dimensional code is converted into the key, and the key is compared with the newly generated key;
and S4.4, if the comparison between each key in the newly generated key chain and the key obtained by converting the two-dimensional code reserved in the corresponding inner page is completely consistent, the secrecy detection of the paper secret carrier is successful, otherwise, the detection is not passed.
The invention generates a root key of a key chain by the unique ID of the RFID label and the global information of the paper secret-involved carrier, then generates summary information character strings for the inner pages of the carrier one by one, and carries out HASH on each page by using the corresponding key of the previous page and the summary information character strings generated by the page to generate a new key so as to construct the key chain.
The root key of the key chain ensures the association of the unique identification ID of the RFID label and the global information of the paper secret-involved carrier, the one-way HASH function also ensures that the root key of the key chain cannot be forged, and the keys corresponding to the inner pages in the key chain can further verify whether the inner pages are replaced and tampered, whether the inner pages are replaced, extracted, sequence reversal and the like through the gray value change curve of the inner pages, so that the high-reliability secret detection of the paper secret-involved carrier is realized.
Finally, it should be noted that the above embodiments are only for illustrating the technical solutions of the present invention and not for limiting, and although the present invention has been described in detail with reference to examples, it should be understood by those skilled in the art that modifications or equivalent substitutions may be made on the technical solutions of the present invention without departing from the spirit and scope of the technical solutions of the present invention, which should be covered by the claims of the present invention.

Claims (2)

1. A paper secret-involved carrier tamper-proof counterfeiting method based on an RFID key chain is characterized by comprising the following steps:
step S2, generating a paper secret-related carrier key chain; the method comprises the following steps:
s2.1, generating a root key of a paper secret-related carrier key chain, wherein the generation parameters marked as V0 and V0 comprise:
recording the global information character string of the paper secret-related carrier as G;
the unique identification ID of the RFID label corresponding to the paper secret-related carrier is marked as RID;
calculating and generating V0 ═ F (G | | | RID) through a one-way HASH function F, wherein | | | is a character string connection operator;
s2.2, constructing a key chain;
sequentially acquiring a summary information character string corresponding to each page of the paper secret-related carrier, and generating a key Vx of the page by using a one-way HASH function F and a key character string Vx-1 generated on the previous page of the page and an inner page summary information character string S of the page;
f (Vx-1 | | | S), where | | | is a string connection operator;
step S3, the attachment of the paper secret-related carrier key chain and the paper secret-related carrier comprises the following steps:
s3.1, attaching the RFID label corresponding to the paper secret-related carrier;
s3.2, attaching the global information character string of the paper secret-related carrier to the paper secret-related carrier;
s3.3, converting each key in the key chain from a second-bit key except V0 into two-dimensional codes, and attaching the two-dimensional codes to each inner page of the paper secret-related carrier one by one;
the composition of the paper confidential carrier inner page abstract information character string comprises the following steps:
the related information of the inner page, which must include the page number of the inner page;
the inner page tamper-resistant information is used as a unique identifier of the inner page in the paper secret carrier;
connecting the related information of the inner page with the tamper-resistant information of the inner page to form an inner page abstract information character string of the paper secret-related carrier;
the inner page anti-tampering information is generated by the following steps:
scanning the inner page of the paper secret-related carrier to generate a picture;
carrying out binarization processing on the inner page scanned picture, carrying out horizontal or vertical segmentation on the binarized picture according to a preset proportion, counting the average gray value of the segmented region, converting the picture into a gray histogram, extracting the change of the gray value in the gray histogram, and generating a gray value change curve of the inner page scanned picture;
and performing polynomial curve fitting on the gray value change curve of the scanned inner page picture by using a least square method, and connecting parameters obtained by fitting together to serve as a unique anti-tampering character string of the inner page, namely inner page anti-tampering information.
2. The method for preventing the paper classified carrier from being tampered and counterfeited based on the RFID key chain as claimed in claim 1, further comprising a security detection method of the paper classified carrier, and specifically comprising the following steps:
s4.1, taking out the paper secret-related carrier to be detected, and reading the unique identification ID of the RFID label on the paper secret-related carrier;
s4.2, searching the ID in the paper secret-related carrier information library, taking out the global information of the paper secret-related carrier corresponding to the ID, and checking whether the global information is consistent with the global information attached to the paper secret-related carrier;
s4.3, if the two are consistent, generating a root key of a key chain according to the step S2.1 in the claim 1, generating a summary information character string of each inner page according to the step in the claim 1, and generating the key chain according to the step S2.2 in the claim 1; when a key in the key chain is generated, the two-dimensional code printed on the inner page corresponding to the key is taken out, the two-dimensional code is converted into the key, and the key is compared with the newly generated key;
and S4.4, if the comparison between each key in the newly generated key chain and the key obtained by converting the two-dimensional code reserved in the corresponding inner page is completely consistent, the secrecy detection of the paper secret carrier is successful, otherwise, the detection is not passed.
CN201811209249.8A 2018-10-17 2018-10-17 Paper secret-involved carrier tamper-proof counterfeiting method based on RFID key chain Active CN109299763B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811209249.8A CN109299763B (en) 2018-10-17 2018-10-17 Paper secret-involved carrier tamper-proof counterfeiting method based on RFID key chain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811209249.8A CN109299763B (en) 2018-10-17 2018-10-17 Paper secret-involved carrier tamper-proof counterfeiting method based on RFID key chain

Publications (2)

Publication Number Publication Date
CN109299763A CN109299763A (en) 2019-02-01
CN109299763B true CN109299763B (en) 2021-11-02

Family

ID=65163003

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811209249.8A Active CN109299763B (en) 2018-10-17 2018-10-17 Paper secret-involved carrier tamper-proof counterfeiting method based on RFID key chain

Country Status (1)

Country Link
CN (1) CN109299763B (en)

Family Cites Families (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101507178A (en) * 2006-08-28 2009-08-12 三菱电机株式会社 Data processing system, data processing method, and program
US9081987B2 (en) * 2007-03-28 2015-07-14 Ricoh Co., Ltd. Document image authenticating server
CN100565546C (en) * 2007-09-27 2009-12-02 北京数字证书认证中心有限公司 A kind of method of checking contents of paper file whether to be distorted
CN101419176B (en) * 2007-10-26 2012-03-28 比亚迪股份有限公司 Surface flaw detecting method and device
CN101593196B (en) * 2008-05-30 2013-09-25 日电(中国)有限公司 Method, device and system for rapidly searching ciphertext
CN101950367B (en) * 2010-08-16 2012-07-25 中国科学院计算技术研究所 RFID system introducing agent device and two-way authentification method thereof
US20130226413A1 (en) * 2012-02-27 2013-08-29 Ford Global Technologies, Llc Vehicle Safety System Optimization Using RFID Occupant Identification
CN103871027A (en) * 2012-12-12 2014-06-18 腾讯科技(深圳)有限公司 Optimization processing method of QR code images and mobile terminal
CN103324894B (en) * 2013-07-11 2016-01-06 广州市尊网商通资讯科技有限公司 A kind of composite anti-fake document structure tree method and system
CN103400130B (en) * 2013-07-22 2016-07-20 哈尔滨工业大学 File image inclination degree based on energy minimization framework detects and correcting method
CN108305075A (en) * 2018-03-07 2018-07-20 广州建翎电子技术有限公司 A kind of trade document file management system and management method based on block chain

Also Published As

Publication number Publication date
CN109299763A (en) 2019-02-01

Similar Documents

Publication Publication Date Title
US7766241B2 (en) Barcode for two-way verification of a document
KR100405828B1 (en) Apparatus and method for producing a document which is capable of preventing a forgery or an alteration of itself, and apparatus and method for authenticating the document
CN108805787B (en) Paper document tampering and authenticating method and device
CN105550730B (en) Safe two-dimensional code manufacture method and decoding method, and safe two-dimensional code identifier
CN100565546C (en) A kind of method of checking contents of paper file whether to be distorted
CN1209730C (en) Digital anti-fake method
CN101593324B (en) Method and system for network multi-level approval based on dependable computing application technique
CN102722737B (en) A kind of paper document tamper resistant method
CN1635533A (en) Digital stamp system
CN107633413A (en) A kind of anti-fake traceability system and method
CN116842583B (en) Electronic signature system and method with PDF signature as core
CN115114598B (en) Watermark generation method and device and watermark file tracing method and device
Singh et al. Recent advances in multimedia security and information hiding.
CN101514534A (en) Paper embedded with RFID label capable of being numerically signed for anti-counterfeiting
CN102013088B (en) Digital watermark generation and embedding method based on comprehensive characteristics of digital archival resources
CN105912894B (en) A method of it is anti-fake that passport NO. being used for E-seal printed text
CN111008387A (en) Anti-counterfeiting tracing system and method for printed document based on digital signature and document DNA
CN109299763B (en) Paper secret-involved carrier tamper-proof counterfeiting method based on RFID key chain
Dlamini et al. Mitigating the challenge of hardcopy document forgery
Singh et al. Detection of seal and signature entities with hierarchical recovery based on watermark self embedding in tampered digital documents
WO2013190479A2 (en) Composite device and application process and apparatus thereof
Salleh et al. Application of 2D barcode in hardcopy document verification system
Wu et al. An Innovative Method for Securing QR Codes against Counterfeits in Supply Chain Management
Haoliang et al. The Application of Digital Signature Technology and fingerprint identification in 2D Barcode person identity
KR100491649B1 (en) Insertion and detecting system of multi-dimension barcode and the control method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant