CN111767011A - Password printing method, tracing method and system based on black and white printing file - Google Patents

Password printing method, tracing method and system based on black and white printing file Download PDF

Info

Publication number
CN111767011A
CN111767011A CN202010605017.5A CN202010605017A CN111767011A CN 111767011 A CN111767011 A CN 111767011A CN 202010605017 A CN202010605017 A CN 202010605017A CN 111767011 A CN111767011 A CN 111767011A
Authority
CN
China
Prior art keywords
file
printed
password
black
traced
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010605017.5A
Other languages
Chinese (zh)
Inventor
袁迦萱
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN202010605017.5A priority Critical patent/CN111767011A/en
Publication of CN111767011A publication Critical patent/CN111767011A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/12Digital output to print unit, e.g. line printer, chain printer
    • G06F3/1201Dedicated interfaces to print systems
    • G06F3/1223Dedicated interfaces to print systems specifically adapted to use a particular technique
    • G06F3/1237Print job management
    • G06F3/1242Image or content composition onto a page
    • G06F3/1243Variable data printing, e.g. document forms, templates, labels, coupons, advertisements, logos, watermarks, transactional printing, fixed content versioning
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/12Digital output to print unit, e.g. line printer, chain printer
    • G06F3/1201Dedicated interfaces to print systems
    • G06F3/1223Dedicated interfaces to print systems specifically adapted to use a particular technique
    • G06F3/1237Print job management
    • G06F3/1273Print job history, e.g. logging, accounting, tracking

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Human Computer Interaction (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Accessory Devices And Overall Control Thereof (AREA)

Abstract

In the password printing method, the tracing method and the system based on the black and white printing file, the password printing method comprises the following steps: acquiring a file to be printed; identifying at least one blank in a file to be printed; acquiring file information of a file to be printed; generating a password according to a preset password rule and the file information at least one blank of a file to be printed; and printing the file to be printed containing the password by using a black-and-white printer. The method can finish printing by a black-and-white printer once after generating the secret code corresponding to the file information on the file to be printed, and is convenient to use. The generated password can be in one-to-one correspondence with the file information, so that the file information of the printed file can be identified through the password in the following process, and the accuracy of tracing and checking the following printed file is improved.

Description

Password printing method, tracing method and system based on black and white printing file
Technical Field
The invention belongs to the technical field of judicial appraisal or criminal science, and particularly relates to a password printing method, a tracing method and a system based on black and white printed files.
Background
With the rapid development of social informatization, the printer becomes an indispensable writing tool for people to work and process daily affairs. At the same time, the development of printed document inspection technology is also overwhelming.
At present, the inspection of printed documents is mainly carried out from three aspects of printed trace characteristics, printed material components and computer software. However, with the rapid development of technology in recent years, some high-precision printing trace features used in the early stage of the printer are difficult to be found or even do not exist, and meanwhile, due to the fact that the brands of printing consumables are various and the components are complex, and due to the fact that the printer is compatible with the ink box, the accuracy of printed document inspection is reduced, and inspection of the same identification and forming time is difficult to perform.
The detection of the forming time of the printed document is one of the ways of judging the authenticity of the printed document, and the detection of the forming time of the printed document is mainly carried out by three aspects of trace characteristics, ink mark forming time and paper forming time at present. However, there are many uncertain factors due to various factors affecting the inspection of the formation time of the printed document. Therefore, the printed document formation time has not been checked satisfactorily and has been poor in accuracy so far.
Disclosure of Invention
Aiming at the defects in the prior art, the invention provides a password printing method, a tracing method and a system based on a black and white printing file, which improve the accuracy of tracing and checking the printing file.
In a first aspect, a method for printing a password based on a black and white print file includes the steps of:
acquiring a file to be printed;
identifying at least one blank in a file to be printed;
acquiring file information of a file to be printed;
generating a password according to a preset password rule and the file information at least one blank of a file to be printed;
and printing the file to be printed containing the password by using a black-and-white printer.
Preferably, the combination is not visible to the naked eye.
Preferably, the file information includes one or more of the following data: printer brand, printer model, individual information of machines and tools and printing time; wherein the machine individual information includes a printer serial number or other unique information distinguished from other machines.
Preferably, the combination comprises a dot matrix of N rows and M columns formed by a plurality of small dots.
Preferably, the cipher rule includes identifying different file information by rows or columns in a lattice.
In a second aspect, a tracing method based on black and white printed files includes the following steps:
acquiring a to-be-traced print file; the file to be traced and printed is obtained by printing according to the secret code printing method of the first aspect;
identifying the password in the print file to be traced through identification equipment;
and analyzing the password by using the password rule to obtain the file information of the to-be-traced printed file, thereby realizing tracing of the to-be-traced printed file.
Preferably, the identification device comprises a document inspection apparatus.
In a third aspect, a traceability system based on black and white printed files comprises:
a processing device: the method comprises the steps of obtaining a print file to be traced; the file to be traced and printed is obtained by printing according to the secret code printing method of the first aspect; the processing equipment is also used for analyzing the password identified by the identification equipment by using the password rule to obtain the file information of the to-be-traced printed file and realize tracing of the to-be-traced printed file;
identifying the equipment: the system is used for identifying the password in the print file to be traced and sending the identified password to the processing equipment.
In a fourth aspect, a computer-readable storage medium stores a computer program comprising program instructions which, when executed by a processor, cause the processor to perform the method of the first aspect.
In a fifth aspect, a chip mountable on a black and white printer;
the chip comprises a processor and a memory, the processor and the memory being interconnected, wherein the memory is configured to store a computer program, the computer program comprising program instructions, and the processor is configured to invoke the program instructions to perform the method of the first aspect.
According to the technical scheme, the password printing method, the medium and the chip based on the black-and-white printing file can complete printing at one time through the black-and-white printer after the password corresponding to the file information is generated on the file to be printed, and are convenient to use. The generated password can be in one-to-one correspondence with the file information, so that the file information of the printed file can be identified through the password in the following process, and the accuracy of tracing and checking the following printed file is improved.
According to the tracing method and system based on the black and white printed file, the cipher in the printed file to be traced is identified through the identification device, the cipher rule is utilized to analyze the cipher, and the cipher and the file information are in one-to-one correspondence, so that the file information of the printed file to be traced can be analyzed and obtained through the cipher rule, the printing time and the printer information of the printed file to be traced can be obtained, and the tracing of the printed file is realized. The obtained file information can be used for detecting the authenticity of the printed file to be traced, and the tracing and detecting accuracy of the printed file is improved.
Drawings
In order to more clearly illustrate the detailed description of the invention or the technical solutions in the prior art, the drawings that are needed in the detailed description of the invention or the prior art will be briefly described below. Throughout the drawings, like elements or portions are generally identified by like reference numerals. In the drawings, elements or portions are not necessarily drawn to scale.
Fig. 1 is a flowchart of a password printing method according to an embodiment of the present invention.
Fig. 2 is a flowchart of a tracing method according to a second embodiment of the present invention.
Fig. 3 is a block diagram of a traceability system according to a third embodiment of the present invention.
Detailed Description
Embodiments of the present invention will be described in detail below with reference to the accompanying drawings. The following examples are only for illustrating the technical solutions of the present invention more clearly, and therefore are only examples, and the protection scope of the present invention is not limited thereby. It is to be noted that, unless otherwise specified, technical or scientific terms used herein shall have the ordinary meaning as understood by those skilled in the art to which the invention pertains.
It will be understood that the terms "comprises" and/or "comprising," when used in this specification and the appended claims, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof.
It is also to be understood that the terminology used in the description of the invention herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the invention. As used in the specification of the present invention and the appended claims, the singular forms "a," "an," and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise.
It should be further understood that the term "and/or" as used in this specification and the appended claims refers to and includes any and all possible combinations of one or more of the associated listed items.
As used in this specification and the appended claims, the term "if" may be interpreted contextually as "when", "upon" or "in response to a determination" or "in response to a detection". Similarly, the phrase "if it is determined" or "if a [ described condition or event ] is detected" may be interpreted contextually to mean "upon determining" or "in response to determining" or "upon detecting [ described condition or event ]" or "in response to detecting [ described condition or event ]".
The first embodiment is as follows:
the password printing method based on the black and white printing file, referring to fig. 1, comprises the following steps:
s1: acquiring a file to be printed;
specifically, the obtained file to be printed is an electronic part, and may be in a picture format, a PDF format, or a text format.
S2: identifying at least one blank in a file to be printed;
specifically, the method automatically searches for the blank in the print document for the password layout, for example, at least finds 3 blank layout passwords in one page of the print document. The method lays out the password in the blank, can avoid the password from being overlapped with the content or the picture of the printed file, and fully considers the layout of the content or the picture in the printed file.
S3: acquiring file information of a file to be printed;
specifically, the file information includes one or a combination of several of the following data: printer brand, printer model, individual information of the machine and the printing time. Wherein the machine individual information includes a printer serial number or other unique information distinguished from other machines. The printing time includes year, month, day, hour, minute, second, and the like. The file information can embody the forming time of the printed file and trace the source of the printer and the printing time of the file to be printed.
S4: generating a password according to a preset password rule and the file information at least one blank of a file to be printed;
in particular, the password rule contains the relationship between the file information and the password. The same file information generates the same secret code. Therefore, the corresponding file information can be traced through the password.
S5: and printing the file to be printed containing the password by using a black-and-white printer.
Specifically, after the password corresponding to the file information is generated on the file to be printed, the method can complete printing at one time through a black-and-white printer, and is convenient to use. Black and white printers include inkjet printers, laser printers, and the like. The cipher generated by the method can be in one-to-one correspondence with the file information, so that the file information of the printed file can be identified through the cipher subsequently, and the accuracy of tracing and checking the subsequently printed file is improved.
Preferably, the combination is not visible to the naked eye.
Specifically, the combination is invisible to the naked eye without the aid of special identification equipment in order not to affect the normal visual inspection of the printed document. The size and the interval of the cipher can be set according to the requirements of users. The setting requirements of the size and the distance of the password enable the identification device to identify the password on one hand, and on the other hand, the influence of the password on the content or the picture in the page is reduced as much as possible, and the printer is required to be ensured to print normally.
The method can not only present the file information on the printed file, but also ensure that the visual check of the printed file is not influenced. In the subsequent process of tracing and checking the printed file, the check of the printed file is easily realized by identifying the password, so that the check and tracing of the printed file become quick, simple, convenient and accurate.
Preferably, the combination comprises a dot matrix of N rows and M columns formed by a plurality of small dots.
Specifically, the user may set a specific number of columns and rows according to specific requirements, and the dot matrix may be a 5-row 14-column dot matrix formed by a plurality of small dots. The small dots can be solid small dots, the row spacing of the dot matrix can be set to 0.4 mm, the column spacing can be set to 0.4 mm, and the diameter of the small dots is set to 1 nanometer to 30 micrometers.
Preferably, the cipher rule includes identifying different file information by rows or columns in a lattice.
Specifically, one or more dots in the dot matrix can be set to be displayed or hidden in the cipher rule to identify different file information. For the above-mentioned 5 rows and 14 columns dot matrix, the following cipher rules can be set: the dot matrix reference point (for identifying the start position of the dot matrix) is represented by the 1 st row of small dots, the printer brand is represented by the 2 nd row of small dots, the printer model is represented by the 3 rd to 4 th rows of small dots, the individual information of the equipment is represented by the 5 th to 7 th rows of small dots, the year of the printing time is represented by the 8 th to 9 th rows of small dots, the month of the printing time is represented by the 10 th row of small dots, the day of the printing time is represented by the 11 th row of small dots, and the minute of the printing time is represented by the 13 th to 14 th rows of small dots when the printing time is represented by the 12 th row of small dots.
The method can be packaged to form a program, so that the program can be directly implanted into a driving program of the black-white printer in the research and development process of the black-white printer; the program may be embedded in a driver of the black-and-white printer. The method breaks through the original way of printed file inspection, establishes the tracing password from the source, obviously improves the accuracy of printer and individual identification, and makes the printed file tracing and inspection more scientific, more standard and more standard.
Example two:
the second embodiment is added with the following contents on the basis of other embodiments:
a tracing method based on black and white printed files, see fig. 2, comprising the following steps:
s11: acquiring a to-be-traced print file; the file to be traced and printed is obtained by printing according to the secret code printing method;
specifically, the method is mainly used for tracing the file information of the file to be traced and printed, namely obtaining the printing time and the printer information of the file to be traced and printed. And printing the file to be traced and printed by adopting the printing method of the first embodiment.
S12: identifying the password in the print file to be traced through identification equipment;
specifically, the method is not limited to specific identification equipment, and the identification equipment needs to have a magnifying function, for example, equipment with a magnifying glass is selected, or a document inspection instrument identification secret code is adopted, and the model of the document inspection instrument can be selected from VSC-6000.
S13: and analyzing the password by using the password rule to obtain the file information of the to-be-traced printed file, thereby realizing tracing of the to-be-traced printed file.
Specifically, the method identifies the password in the to-be-traced printed file through the identification device, analyzes the password by using the password rule, and can analyze the file information of the to-be-traced printed file by using the password rule because the password and the file information are in one-to-one correspondence, so that the printing time and the printer information of the to-be-traced printed file can be obtained, and tracing of the printed file is realized. And the obtained file information can be used for verifying the authenticity of the to-be-traced printed file for the verification of the printed file.
For the sake of brief description, the method provided by the embodiment of the present invention may refer to the corresponding contents in the foregoing method embodiments.
Example three:
the third embodiment is added with the following contents on the basis of other embodiments:
a traceability system based on black and white printed documents, see fig. 3, comprising:
a processing device: the method comprises the steps of obtaining a print file to be traced; the file to be traced and printed is obtained by printing according to the secret code printing method; the processing equipment is also used for analyzing the password identified by the identification equipment by using the password rule to obtain the file information of the to-be-traced printed file and realize tracing of the to-be-traced printed file;
in particular, the processing device may be a computer, or a mobile terminal or the like.
Identifying the equipment: the system is used for identifying the password in the print file to be traced and sending the identified password to the processing equipment.
The system identifies the password in the file to be traced and printed through the identification equipment, analyzes the password by using the password rule, and analyzes the file information of the file to be traced and printed by using the password rule because the password and the file information are in one-to-one correspondence, so that the printing time and the printer information of the file to be traced and printed can be obtained, and the tracing of the printed file is realized. And the obtained file information can be used for verifying the authenticity of the to-be-traced printed file for the verification of the printed file.
For the sake of brief description, the system provided by the embodiment of the present invention may refer to the corresponding content in the foregoing method embodiments.
Example four:
the fourth embodiment is added with the following contents on the basis of other embodiments:
a computer-readable storage medium, in which a computer program is stored, the computer program comprising program instructions which, when executed by a processor, cause the processor to carry out the above-mentioned method.
Specifically, the printing method according to the first embodiment and the tracing method according to the second embodiment may be respectively stored in different computer-readable storage media, the medium storing the printing method according to the first embodiment is installed on a printer, and the medium storing the tracing method according to the second embodiment is installed on a processing device.
The computer readable storage medium may be an internal storage unit of the terminal, such as a hard disk or a memory of the terminal. The computer readable storage medium may also be an external storage device of the terminal, such as a plug-in hard disk, a Smart Media Card (SMC), a Secure Digital (SD) Card, a Flash memory Card (Flash Card), and the like provided on the terminal. Further, the computer-readable storage medium may also include both an internal storage unit and an external storage device of the terminal. The computer-readable storage medium is used for storing the computer program and other programs and data required by the terminal. The computer readable storage medium may also be used to temporarily store data that has been output or is to be output.
For the sake of brief description, the media provided by the embodiments of the present invention, and the portions of the embodiments that are not mentioned, refer to the corresponding contents in the foregoing method embodiments.
Example five:
the fifth embodiment is added with the following contents on the basis of other embodiments:
a chip mountable on a black and white printer;
the chip comprises a processor and a memory, wherein the processor and the memory are connected with each other, the memory is used for storing a computer program, the computer program comprises program instructions, and the processor is configured to call the program instructions and execute the method.
Similarly, different chips may be designed according to the printing method of the first embodiment and the tracing method of the second embodiment, the chip including the printing method of the first embodiment is mounted on a printer, and the chip including the tracing method of the second embodiment is mounted on a processing device.
The Processor may be a Central Processing Unit (CPU), or other general purpose Processor, a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), an off-the-shelf Programmable Gate Array (FPGA) or other Programmable logic device, discrete Gate or transistor logic, discrete hardware components, etc. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like.
The memory may include both read-only memory and random access memory, and provides instructions and data to the processor. The portion of memory may also include non-volatile random access memory. For example, the memory may also store device type information.
For a brief description, the chip provided in the embodiments of the present invention may refer to the corresponding content in the foregoing method embodiments.
Finally, it should be noted that: the above embodiments are only used to illustrate the technical solution of the present invention, and not to limit the same; while the invention has been described in detail and with reference to the foregoing embodiments, it will be understood by those skilled in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some or all of the technical features may be equivalently replaced; such modifications and substitutions do not depart from the spirit and scope of the present invention, and they should be construed as being included in the following claims and description.

Claims (10)

1. The password printing method based on the black and white printing file is characterized by comprising the following steps:
acquiring a file to be printed;
identifying at least one blank in a file to be printed;
acquiring file information of a file to be printed;
generating a password according to a preset password rule and the file information at least one blank of a file to be printed;
and printing the file to be printed containing the password by using a black-and-white printer.
2. The password printing method based on black-and-white printed document according to claim 1,
the combination is invisible to the naked eye.
3. The password printing method based on black-and-white printed document according to claim 2,
the file information comprises one or more of the following data combinations: printer brand, printer model, individual information of machines and tools and printing time; wherein the machine individual information includes a printer serial number or other unique information distinguished from other machines.
4. The password printing method based on black-and-white printed document according to claim 2,
the cipher code comprises a dot matrix which is composed of a plurality of small dots and is provided with N rows and M columns.
5. The password printing method based on black-and-white printed document according to claim 4,
the cipher rule includes identifying different file information with several rows or columns in the dot matrix.
6. A tracing method based on black and white printed files is characterized by comprising the following steps:
acquiring a to-be-traced print file; the file to be traced and printed is obtained by printing according to the secret code printing method of any one of claims 1 to 5;
identifying the password in the print file to be traced through identification equipment;
and analyzing the password by using the password rule to obtain the file information of the to-be-traced printed file, thereby realizing tracing of the to-be-traced printed file.
7. The tracing method based on black-and-white printed files as claimed in claim 6,
the identification device comprises a document inspection instrument.
8. A traceability system based on black and white printed files is characterized by comprising:
a processing device: the method comprises the steps of obtaining a print file to be traced; the file to be traced and printed is obtained by printing according to the secret code printing method of any one of claims 1 to 5; the processing equipment is also used for analyzing the password identified by the identification equipment by using the password rule to obtain the file information of the to-be-traced printed file and realize tracing of the to-be-traced printed file;
identifying the equipment: the system is used for identifying the password in the print file to be traced and sending the identified password to the processing equipment.
9. A computer-readable storage medium, characterized in that the computer storage medium stores a computer program comprising program instructions that, when executed by a processor, cause the processor to perform the method according to any of claims 1-5.
10. A chip, wherein said chip is capable of being mounted on a black and white printer;
the chip comprises a processor and a memory, the processor and the memory being interconnected, wherein the memory is used for storing a computer program comprising program instructions, the processor being configured for invoking the program instructions for performing the method according to any one of claims 1-5.
CN202010605017.5A 2020-06-29 2020-06-29 Password printing method, tracing method and system based on black and white printing file Pending CN111767011A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010605017.5A CN111767011A (en) 2020-06-29 2020-06-29 Password printing method, tracing method and system based on black and white printing file

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010605017.5A CN111767011A (en) 2020-06-29 2020-06-29 Password printing method, tracing method and system based on black and white printing file

Publications (1)

Publication Number Publication Date
CN111767011A true CN111767011A (en) 2020-10-13

Family

ID=72724392

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010605017.5A Pending CN111767011A (en) 2020-06-29 2020-06-29 Password printing method, tracing method and system based on black and white printing file

Country Status (1)

Country Link
CN (1) CN111767011A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113031885A (en) * 2021-03-22 2021-06-25 珠海奔图电子有限公司 File printing preview method and device and file printing system

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101101664A (en) * 2006-07-04 2008-01-09 天津市阿波罗信息技术有限公司 Paper medium original copy script and copy anti-fake processing method
CN103164830A (en) * 2011-12-09 2013-06-19 中国电信股份有限公司 Method and device of embedding watermark information into printing content
CN106427235A (en) * 2016-09-06 2017-02-22 广州市三环永新科技有限公司 Lottery printer with anti-counterfeiting printing function and anti-counterfeiting method thereof
CN107169459A (en) * 2017-05-18 2017-09-15 湖北警官学院 Print copying file identification system and method based on secret mark dot matrix form
CN107978008A (en) * 2017-10-19 2018-05-01 远光软件股份有限公司 A kind of Method of printing of private mark, electronic equipment and computer-readable recording medium
CN110428356A (en) * 2019-07-22 2019-11-08 中孚安全技术有限公司 A kind of dark watermark source tracing method of papery printout, system, terminal and storage medium

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101101664A (en) * 2006-07-04 2008-01-09 天津市阿波罗信息技术有限公司 Paper medium original copy script and copy anti-fake processing method
CN103164830A (en) * 2011-12-09 2013-06-19 中国电信股份有限公司 Method and device of embedding watermark information into printing content
CN106427235A (en) * 2016-09-06 2017-02-22 广州市三环永新科技有限公司 Lottery printer with anti-counterfeiting printing function and anti-counterfeiting method thereof
CN107169459A (en) * 2017-05-18 2017-09-15 湖北警官学院 Print copying file identification system and method based on secret mark dot matrix form
CN107978008A (en) * 2017-10-19 2018-05-01 远光软件股份有限公司 A kind of Method of printing of private mark, electronic equipment and computer-readable recording medium
CN110428356A (en) * 2019-07-22 2019-11-08 中孚安全技术有限公司 A kind of dark watermark source tracing method of papery printout, system, terminal and storage medium

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113031885A (en) * 2021-03-22 2021-06-25 珠海奔图电子有限公司 File printing preview method and device and file printing system
CN113031885B (en) * 2021-03-22 2024-04-09 珠海奔图电子有限公司 File printing preview method and device and file printing system

Similar Documents

Publication Publication Date Title
US7236653B2 (en) System and method for locating document areas using markup symbols
US20020050982A1 (en) Data form having a position-coding pattern detectable by an optical sensor
CN102591596A (en) Information processing equipment, and information processing method
TWI312953B (en)
JP7187826B2 (en) Authenticity determination device and program
JP6795195B2 (en) Character type estimation system, character type estimation method, and character type estimation program
US10452944B2 (en) Multifunction peripheral assisted optical mark recognition using dynamic model and template identification
JP2004252561A (en) Entry propriety determination device, blank form, and program
CN111767011A (en) Password printing method, tracing method and system based on black and white printing file
KR20230041036A (en) Method, device, system and storage medium for managing user handwriting data
JP4216300B2 (en) Entry suitability determination device, entry form, and program
US8331740B2 (en) Inferential self-registration of imperfect OMR forms
JP4255252B2 (en) Authentication system, authentication method, authentication program, and paper medium
JP5229272B2 (en) Verification system and program
JP4473686B2 (en) Server, terminal device and program
CN111857615A (en) Cipher printing method, tracing method and system based on color printing file
CN112541498A (en) Information processing apparatus and recording medium
US20100278544A1 (en) System and method for ensuring that only a specific toner is used for printing a document
JP4541908B2 (en) Verification server and program
JP2006119712A (en) Information management terminal device and program, and document for electronic pen
US8964192B2 (en) Print verification database mechanism
JP4725402B2 (en) Processing device, program and copy form for electronic pen
JP2008165343A (en) Electronic pen, entry information determination system and program
EP1986133B1 (en) Automatic review of variable imaging jobs
US20210101401A1 (en) Method for authenticating a forgery-proof object

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination