WO2015154646A1 - Système de pistage anti-contrefaçon de monnaie ou de sécurité basé sur une technologie de certificats à usage unique - Google Patents

Système de pistage anti-contrefaçon de monnaie ou de sécurité basé sur une technologie de certificats à usage unique Download PDF

Info

Publication number
WO2015154646A1
WO2015154646A1 PCT/CN2015/075949 CN2015075949W WO2015154646A1 WO 2015154646 A1 WO2015154646 A1 WO 2015154646A1 CN 2015075949 W CN2015075949 W CN 2015075949W WO 2015154646 A1 WO2015154646 A1 WO 2015154646A1
Authority
WO
WIPO (PCT)
Prior art keywords
message
securities
currency
system server
money
Prior art date
Application number
PCT/CN2015/075949
Other languages
English (en)
Chinese (zh)
Inventor
江峰
江欣屿
Original Assignee
江峰
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 江峰 filed Critical 江峰
Publication of WO2015154646A1 publication Critical patent/WO2015154646A1/fr

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce

Definitions

  • the invention relates to the field of money or securities security technology.
  • the currency anti-counterfeiting technology is still limited to setting an anti-counterfeiting mark on each currency, and a currency check device matched with it.
  • the magnetic counterfeiting technology on the RMB banknote counter is 6 kinds: 1. Detecting the magnetic ink distribution of the banknote, and also detecting the fifth version of the RMB security line; 2.
  • Fluorescent counterfeiting checking the quality of the banknote with ultraviolet light, coupled with the photoelectric sensor Monitoring, as long as there are subtle paper changes, can be counterfeit; 3, penetrating for counterfeiting: according to the characteristics of the renminbi, coupled with the penetrating authentication mode, to increase the ability to identify various counterfeit coins; 4, infrared counterfeiting: the use of Advanced fuzzy recognition technology, according to the infrared characteristics of banknotes, can effectively identify various counterfeit coins; 5, multi-spectral forgery: multi-spectral light source, lens array, image sensor unit array formed by arranging LED particles of different wavelengths into a matrix , control and signal amplification circuit and input/output interface; multi-spectral light source and lens array form an optical path system for emitting light and focusing the reflected light on the renminbi onto the image sensor unit array, using multi-spectral image sensor image analysis function, Banknotes for authenticity identification; 6, digital quantitative qualitative analysis detection and authentication: using high-speed parallel AD conversion circuit, high fidelity Set signal, quantitative analysis of ultraviolet light,
  • counterfeiting illegally obtain the encrypted authentication data in the electronic tag and illegally copy it by various means such as decryption of the electronic tag, thereby counterfeiting the electronic tag to achieve the purpose of fraud. Therefore, the existing Internet anti-counterfeiting authentication system needs to be improved and improved from the system security.
  • the object of the present invention is to provide a system scheme for effectively preventing counterfeiters from copying RFID electronic tags through security vulnerabilities of electronic tags or security vulnerabilities of other anti-counterfeiting system components, and applying them to anti-counterfeiting identification of money or securities. in.
  • the entire black box system security architecture is built, and the security of the anti-counterfeiting system is ensured from the overall security architecture of the system.
  • the technical solution adopted for achieving the object of the present invention is such a currency or securities security anti-counterfeiting traceability system based on the one-one-one-one-in-one technology, which is characterized in that it comprises a system server and RFID electronic products set on money or securities.
  • the message MB i,j is written in the RFID tag embedded in any currency or securities.
  • the message MB i,j is a digital identity certificate for money or securities.
  • the message CB i, j with the message MB i, j corresponding to, and for the message MB i, j for comparison operation, to verify the authenticity of money or securities.
  • the system server sends the money or the securities to the terminal device as false information, and ends the authenticity verification operation.
  • the system server sends the currency or the valuable securities to the terminal device as true Information and go to the next step.
  • Update certificate The system server generates a message MB i, j+1 and sends it to the terminal device.
  • the message MB i,j+1 is written by the terminal device into the RFID electronic tag on the money to be tested or the valuable securities that has been determined by the step 2) to replace the original MB i,j .
  • the message MB i,j+1 is a new digital identity certificate representing the currency or the securities for use by the user for authenticity verification of the currency or the securities.
  • the system server stores the message MB i, j + 1 corresponding to the message CB i, j + 1, i.e., the update message set S ⁇ CB i, 1, CB i , 2 ...... CB i, j, CB i, j +1 ⁇ .
  • the message CB i,j+1 is used for the next comparison with the message MB i,j+1 to verify the authenticity of the currency or the securities.
  • the CB i,j is equal to MB i,j .
  • the CB i,j is an encrypted message of MB i,j .
  • the CB i,j is the hash value after MB i,j has been hashed.
  • the message CB i,j is still stored in the system server.
  • the system server records and submits the scan time and geographic location of the terminal device that scans the currency or the securities, and simultaneously invokes and submits that the terminal device reads the currency or has the last time the system server receives the MB i,k
  • the time and geographical location of the RFID of the price securities provide the counterfeiting time and geographical location of the counterfeiters for anti-counterfeiting and counterfeiting.
  • the present invention includes another embodiment, that is, a currency or securities security traceability system based on one-on-one technology, including a system server, an RFID electronic tag embedded in each currency or securities, and having read and write A terminal device and a random number generator that function as an RFID electronic tag.
  • the combined message T1 i,j is written in the RFID electronic tag on any currency or security.
  • the message T2 i, j with the message T1 i, j corresponds to, and a message for T1 i, j for comparison operation, to verify the authenticity of currencies or securities.
  • the system server After receiving the message X sent by the reader, the system server first determines whether the format of X is the same as the combined message T1 i,j . If not, the money to be tested or the securities to be tested is false, that is, the message X is not the combined message T1 i,j , and the authenticity verification operation is ended.
  • the message X is split into two parts, XA and XB.
  • the format of the XA is the same as that of the CA i
  • CXB is not any element of ⁇ CB i,1 , CB i,2 ... CB i,j ⁇
  • message X is not a combined message T1 i,j , and the test currency or the securities are false.
  • the system server sends the money or the securities to the terminal device as false information, and ends the authenticity verification operation.
  • the system server randomly generates a new random number MB i, j+1 .
  • the random number MB i,j+1 is used as a new digital signature certificate for the message MA i .
  • the message set S is updated to ⁇ T2 i,1 , T2 i,2 ... T2 i,j , T2 i,j+1 ⁇ .
  • the combined message T2 i, j+1 is used for the next time the user authenticates the currency or the securities, and compares the combined messages T1 i, j+1 to verify the currency or the price. The authenticity of the securities.
  • the message T2 i,j is still stored in the system server.
  • the system server records and submits the scan time and geographic location of the terminal device that scans the currency or the securities, and invokes the last time the system server receives the MB i,k when the terminal device reads the currency or has a price.
  • the time and geographical location of the securities RFID provide the counterfeiting time and geographical location of the counterfeiters for anti-counterfeiting and counterfeiting.
  • the combined message T1 i,j pre-written in the RFID tag on each currency or securities has randomness and uniqueness.
  • the length of the message MA i or MB i,j is 8 to 1024 bits.
  • the currency or portfolio serial number portion MA i includes a currency or securities printing time and a currency or securities serial number.
  • the RFID reader is a mobile phone or terminal device with a radio frequency identification function or a short-range wireless communication NFC function.
  • a part of the bytes in MB i,j serves as a key for decrypting CA i .
  • a key for decrypting the CA i is implicitly included according to a certain rule.
  • the system server marks the messages CB i,j corresponding to the stolen money or securities.
  • the system server records and submits the scan time and geographic location of the terminal device that scans the currency or the securities, that is, the time and geographic location at which the stolen money or the securities are present.
  • the present invention can effectively prevent the electronic tag from being decrypted or being copied and copied by the fraudulent person of the tag itself.
  • the invention innovatively adopts a one-card dynamic signature authentication system.
  • messages written to an electronic tag are in a one-time certificate. That is, when the currency or the securities are printed, the initial MB i,j is stored in the electronic tag.
  • the server automatically generates a new MB i,j+1 and calculates a new one. Message CB i, j+1 .
  • the new message MB i+1 is rewritten into the electronic tag set on the currency or the valuable security by the mobile device such as a mobile phone, and the new message CB i,j+1 is stored in the system server. The next time you scan the same currency or portfolio, the new MB i, j+1 will be read for verification to prevent the tag from being cracked and copied.
  • the system employs a fault tolerance mechanism to prevent password replacement failures due to network delays or other causes. And the system will make a complete certification record. Once a certain currency or securities certification is illegal, it can accurately locate the illegal start position and possible geographical area.
  • a currency or portfolio security traceability system based on one-on-one technology including a system server, an RFID electronic tag disposed on each currency or securities, and a terminal device having the function of reading and writing RFID electronic tags.
  • the terminal device is a money detector. That is, in conjunction with money or securities provided with RFID electronic tags, devices that read and write RFID tags are installed on the money detectors that check these currencies. That is, the RFID device can be installed in the transmission component of the money detector.
  • the message MB i,j is written in the RFID electronic tag on any currency or securities.
  • the message MB i,j is a digital identity certificate for money or securities.
  • the message CB i, j with the message MB i, j corresponding to, and for the message MB i, j for comparison operation, to verify the authenticity of currencies or securities.
  • a message MB 1,1 is written in an RFID electronic tag, which is the first time the message is written into the RFID tag.
  • the message written in the commercially available RFID tag will be the message set ⁇ MB 1,1 , MB 2,1 ,...,MB n,1 ,...MB 1,2 ,MB 2,2 ,... ..., MB n, 2 , ... MB 1, m , MB 2, m , ... MB n, m ⁇ .
  • the system server stores the message MB i, j corresponding message CB i, j. That is, the system server stores the message set as belonging to or equal to ⁇ CB 1,1 , CB 2,1 , . . . , CB n,1 , . . . CB 1,2 , CB 2,2 , . . . , CB n,2 , ...CB 1,m ,CB 2,m ,...CB n,m ⁇ .
  • the message CB i,j is used for comparison with the message MB i,j to verify the authenticity of the currency or the securities.
  • the relationship between CB i,j and MB i,j is one of the following three cases: a) the CB i,j is equal to MB i,j . b) The CB i,j is an encrypted message of MB i,j . c) The CB i,j is the hash value after MB i,j has been hashed.
  • the RFID tag After using the money detector to read the RFID electronic tag on the currency or securities under test, the RFID tag may also be a true electronic tag, or it may be It is an electronic tag on a counterfeit currency or a security. Transmitting the message X in the read RFID electronic tag to the system server, and performing comparison operation with the message stored in the system server to verify the authenticity of the currency or the securities (ie, the message X is possible Is the real message MB i, j , or not, need the system server to judge).
  • the system server sends the money or the securities to the counterfeit machine as false information, and ends the authenticity verification operation.
  • Update certificate The system server generates a message MB i, j+1 and sends it to the money detector.
  • the message MB i,j+1 is written by the money detector into the RFID electronic tag on the money to be tested or the securities that has been determined to be true in step 2) to replace the original MB i,j .
  • the message MB i,j+1 is a new digital identity certificate representing the currency or the securities for use by the user for authenticity verification of the currency or the securities.
  • the message CB i,j+1 is used for the next comparison with the message MB i,j+1 to verify the authenticity of the currency or the securities.
  • the message CB i,j is still stored in the system server.
  • the system server records and submits the scan time and geographic location of the money detector or the securities checker, and simultaneously calls and submits the last time the system server receives the MB i,k when the money detector reads the currency Or the time and geographical location of the RFID of the securities, providing the counterfeiting time and geographical location of the counterfeiters for anti-counterfeiting and counterfeiting.
  • a total of 10 banknotes were printed.
  • the messages MB 1,1 , MB 2,1 , MB 3,1 , MB 4,1 , MB 5,1 , MB 6,1 , MB 7,1 were written.
  • the message CB 1,1 is the hash value of the message MB 1,1
  • the message CB 2,1 is the hash value of the message MB 2,1
  • ... the message CB 10,1 is the hash of the message MB 10,1 Value, and so on.
  • the RFID electronic tag may also be an electronic tag on one of the above 10 banknotes, or may be a counterfeit coin. Electronic label.
  • the system server transmits the information determined to be counterfeit to the money detector, and ends the authenticity check operation.
  • the obtained hash value belongs to the message set S, that is, it is judged that the banknote is one of the above 10 true banknotes.
  • the system server will increment the hash value "message CB 1,2 " of the message MB 1,2 in the message set S.
  • the system server will increment the hash value "message CB 1,3 " of the message MB 1,3 in the message set S.
  • the present invention requires communication with the server over the network. It may take a certain amount of time for the money detector to receive data from the server. Therefore, it is necessary to improve the traditional money detector to meet the requirements.
  • This embodiment is a preferred mode of Embodiment 1, and further includes a random number generator to implement A combination of currency or securities that is encrypted for authentication.
  • An anti-counterfeiting source system for money or securities based on one-on-one technology including a system server, an RFID electronic tag embedded in each currency or securities, a money detector with the function of reading and writing RFID electronic tags, and Random number generator.
  • the combined message T1 i,j is written in the RFID electronic tag on any currency or security.
  • the message T2 i, j with the message T1 i, j corresponds to, and a message for T1 i, j for comparison operation, to verify the authenticity of currencies or securities.
  • the RFID tag set on this currency or securities is written to T1.
  • a message T1 1,1 is written in an RFID electronic tag, which is the message written into the RFID tag for the first time.
  • the message written in the RFID tag of the circulating genuine currency will be the message set ⁇ T1 1,1 , T1 2,1 ,...,T1 n,1 ,...T1 1,2 , T1 2,2 ,... , T1 n, 2 , ... T1 1, m , T1 2, m , ... T1 n, m ⁇ .
  • the system server stores a message T2 i,j corresponding to the message T1 i,j . That is, the system server stores the message set as belonging to or equal to ⁇ T2 1,1 , T2 2,1 , . . . , T2 n,1 , . . . T2 1,2 , T2 2,2 , . . . , T2 n, 2 , ... T2 1,m , T2 2,m ,...T2 n,m ⁇ .
  • the message T2 i,j is used for comparison with the message T1 i,j to verify the authenticity of the currency or the securities.
  • the system server After receiving the message X sent by the reader, the system server first determines whether the format of X is the same as the combined message T1 i,j . If not, the money to be tested or the securities to be tested is false, that is, the message X is not the combined message T1 i,j , and the authenticity verification operation is ended.
  • the message X is split into two parts, XA and XB.
  • the format of the XA is the same as that of the CA i
  • CXB is not any element of ⁇ CB i,1 , CB i,2 ... CB i,j ⁇
  • message X is not a combined message T1 i,j , and the test currency or the securities are false.
  • the system server sends the money or the securities to the counterfeit machine as false information, and ends the authenticity verification operation.
  • the system server randomly generates a new random number MB i, j+1 .
  • the random number MB i,j+1 is used as a new digital signature certificate for the message MA j .
  • the message set S is updated to ⁇ T2 i,1 , T2 i,2 ... T2 i,j , T2 i,j+1 ⁇ .
  • the combined message T2 i, j+1 is used for the next time the user authenticates the currency or the securities, and compares the combined messages T1 i, j+1 to verify the currency or the price. The authenticity of the securities.
  • the message T2 i,j is still stored in the system server.
  • the system server records and submits the scan time and geographic location of the money detector or the securities checker, and simultaneously calls and submits the last time the system server receives the MB i,k when the money detector reads the currency Or the time and geographical location of the RFID of the securities, providing the counterfeiting time and geographical location of the counterfeiters for anti-counterfeiting and counterfeiting.

Landscapes

  • Business, Economics & Management (AREA)
  • General Business, Economics & Management (AREA)
  • Physics & Mathematics (AREA)
  • Economics (AREA)
  • Finance (AREA)
  • General Physics & Mathematics (AREA)
  • Strategic Management (AREA)
  • Development Economics (AREA)
  • Accounting & Taxation (AREA)
  • Marketing (AREA)
  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Storage Device Security (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Inspection Of Paper Currency And Valuable Securities (AREA)

Abstract

La présente invention repose sur la technologie des réseaux et concerne un système de pistage anti-contrefaçon de monnaie ou de sécurité basé sur une technologie de certificats à usage unique, ledit système étant capable de surmonter le problème dû au fait que la technologie traditionnelle anti-contrefaçon de monnaie est facilement appréhendée par les contrefacteurs, et d'empêcher efficacement la solution au moyen de laquelle les contrefacteurs copient des étiquettes électroniques RFID à l'échelle via des vulnérabilités de systèmes. Partant du principe selon lequel tout participant au système et tout fournisseur de dispositifs utilisé par le système sont peu fiables, une architecture de sécurité complète du système par boîtes élémentaires est construite, et la sécurité du système anti-contrefaçon est garantie par l'architecture de sécurité complète du système.
PCT/CN2015/075949 2014-04-09 2015-04-07 Système de pistage anti-contrefaçon de monnaie ou de sécurité basé sur une technologie de certificats à usage unique WO2015154646A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201410140584.2 2014-04-09
CN201410140584.2A CN103971250B (zh) 2014-04-09 2014-04-09 一种基于移动终端和rfid的一次一证防伪溯源系统

Publications (1)

Publication Number Publication Date
WO2015154646A1 true WO2015154646A1 (fr) 2015-10-15

Family

ID=51240710

Family Applications (4)

Application Number Title Priority Date Filing Date
PCT/CN2014/092112 WO2015154482A1 (fr) 2014-04-09 2014-11-25 Système de traçage propre à décourager la contrefaçon de certificat unique basé sur un terminal mobile et une identification par radiofréquence (rfid)
PCT/CN2015/073591 WO2015154595A1 (fr) 2014-04-09 2015-03-03 Système d'authentification à masque jetable (otp) basé sur une théorie d'authentification en boucle fermée et sur internet
PCT/CN2015/075949 WO2015154646A1 (fr) 2014-04-09 2015-04-07 Système de pistage anti-contrefaçon de monnaie ou de sécurité basé sur une technologie de certificats à usage unique
PCT/CN2015/075952 WO2015154647A1 (fr) 2014-04-09 2015-04-07 Système d'authentification de devise ou de valeur basé sur une théorie d'authentification à boucle fermée

Family Applications Before (2)

Application Number Title Priority Date Filing Date
PCT/CN2014/092112 WO2015154482A1 (fr) 2014-04-09 2014-11-25 Système de traçage propre à décourager la contrefaçon de certificat unique basé sur un terminal mobile et une identification par radiofréquence (rfid)
PCT/CN2015/073591 WO2015154595A1 (fr) 2014-04-09 2015-03-03 Système d'authentification à masque jetable (otp) basé sur une théorie d'authentification en boucle fermée et sur internet

Family Applications After (1)

Application Number Title Priority Date Filing Date
PCT/CN2015/075952 WO2015154647A1 (fr) 2014-04-09 2015-04-07 Système d'authentification de devise ou de valeur basé sur une théorie d'authentification à boucle fermée

Country Status (2)

Country Link
CN (1) CN103971250B (fr)
WO (4) WO2015154482A1 (fr)

Families Citing this family (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103971250B (zh) * 2014-04-09 2017-04-05 四川谦泰仁投资管理有限公司 一种基于移动终端和rfid的一次一证防伪溯源系统
CN105844472A (zh) * 2015-01-13 2016-08-10 四川谦泰仁投资管理有限公司 一种同时兼容二维码防伪的rfid商品防伪溯源系统
CN105279470B (zh) * 2015-09-24 2018-01-16 深圳市金溢科技股份有限公司 一种处理款箱交接的方法、系统及手持终端
CN106709562A (zh) * 2015-11-16 2017-05-24 四川谦泰仁投资管理有限公司 一种具有rfid识别的点钞系统
CN110366441B (zh) 2017-03-06 2022-06-28 康明斯滤清系统知识产权公司 具有过滤器监控系统的原装过滤器识别
CN108881163B (zh) * 2017-05-16 2021-05-14 江峰 一种带区块发布机制的多中心区块链系统
CN110648143A (zh) * 2018-06-11 2020-01-03 江峰 一种基于Merkle可信树的闭环防伪验证系统
CN109360002A (zh) * 2018-09-21 2019-02-19 蛙力买(浙江)信息科技有限公司 一种产品的防伪方法及装置

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030221098A1 (en) * 2002-05-22 2003-11-27 Kun-Huei Chen Method for automatically updating a network ciphering key
CN101183439A (zh) * 2006-11-14 2008-05-21 中国民生银行股份有限公司 电子票据处理系统及处理方法
CN102186151A (zh) * 2011-05-13 2011-09-14 中国电信股份有限公司 在线处理涉税业务的方法与系统、中介传输装置
CN102469080A (zh) * 2010-11-11 2012-05-23 中国电信股份有限公司 实现通行证用户安全登录应用客户端的方法和系统

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040000987A1 (en) * 2002-06-27 2004-01-01 Ncr Corporation Check fraud detection process using checks having radio frequency identifier (RFID) tags and a system therefor
WO2007027151A1 (fr) * 2005-09-01 2007-03-08 Stora Enso Oyj Verification d'un identificateur de produits
CN101556654B (zh) * 2009-05-27 2013-03-27 杨志清 多变量动态数字签名、交互认证式电子标签防伪方法
CN102236861A (zh) * 2011-07-07 2011-11-09 江苏联博计算机信息产业有限公司 基于路径机制的商品防伪方法
CN203232458U (zh) * 2012-03-31 2013-10-09 四川谦泰仁投资管理有限公司 一种基于移动终端和rfid电子标签的商品防伪系统
CN103544511A (zh) * 2013-10-29 2014-01-29 上海华彩科技有限公司 一种防伪标识
CN103971250B (zh) * 2014-04-09 2017-04-05 四川谦泰仁投资管理有限公司 一种基于移动终端和rfid的一次一证防伪溯源系统

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030221098A1 (en) * 2002-05-22 2003-11-27 Kun-Huei Chen Method for automatically updating a network ciphering key
CN101183439A (zh) * 2006-11-14 2008-05-21 中国民生银行股份有限公司 电子票据处理系统及处理方法
CN102469080A (zh) * 2010-11-11 2012-05-23 中国电信股份有限公司 实现通行证用户安全登录应用客户端的方法和系统
CN102186151A (zh) * 2011-05-13 2011-09-14 中国电信股份有限公司 在线处理涉税业务的方法与系统、中介传输装置

Also Published As

Publication number Publication date
CN103971250A (zh) 2014-08-06
WO2015154482A1 (fr) 2015-10-15
CN103971250B (zh) 2017-04-05
WO2015154647A1 (fr) 2015-10-15
WO2015154595A1 (fr) 2015-10-15

Similar Documents

Publication Publication Date Title
WO2015154646A1 (fr) Système de pistage anti-contrefaçon de monnaie ou de sécurité basé sur une technologie de certificats à usage unique
US7152047B1 (en) System and method for production and authentication of original documents
US8634066B1 (en) Authentication method and system
US8886946B1 (en) Authentication method and system
KR101117914B1 (ko) 임의적으로 발생하는 특징들을 가지는 위조 및 날조 방지 라벨
US7188258B1 (en) Method and apparatus for producing duplication- and imitation-resistant identifying marks on objects, and duplication- and duplication- and imitation-resistant objects
US20090008924A1 (en) Authenticating banknotes or other physical objects
CN106209877A (zh) 一种以区块链后台为认证核心的防伪认证系统
US20130212027A1 (en) Systems, method and computer-accessible mediums for providing secure paper transactions using paper fiber identifiers
US9871660B2 (en) Method for certifying and authentifying security documents based on a measure of the relative variations of the different processes involved in its manufacture
JP2016535375A (ja) 証書および書類認証システム
CN109756341A (zh) 电子签章方法及装置
CN104881811B (zh) 票据信息电子化的管理方法、系统和装置
KR20090100045A (ko) 전자 문서 발급 및 검증 시스템, 전자 문서 발급 방법 및전자 문서 검증 방법
US8931688B2 (en) System and method for currency validation
JP6532534B2 (ja) セキュリティ文書の認証および確認を、セキュリティ文書の作成に関与する異なるプロセスにおける相対的位置の変動の測定に基づいて行うための方法
KR20080052005A (ko) 화상형성장치 및 이를 포함하는 위폐 관리 시스템
CN111612964B (zh) 基于区块链的票据凭证防伪检测方法及装置
Toreini New advances in tamper evident technologies
Wezza et al. A novel model for securing seals using blockchain and digital signature based on qr codes
JP7274202B2 (ja) 光学コード作成プログラム、光学コード読取認証プログラム、光学コード認証システム、代金決済システム、印刷物の製造方法、及び光学コードの認証方法
CN107480558B (zh) 一种凭证管理系统及方法
Alicherry Verifying authenticity of currency and tracking duplicates
Shibwabo et al. A Prototype for authentication of secondary school certificates: a case of Kenya certificate of secondary education
WO2019110972A1 (fr) Mesures anti-fraude par rapport à des chèques

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 15777528

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 15777528

Country of ref document: EP

Kind code of ref document: A1

122 Ep: pct application non-entry in european phase

Ref document number: 15777528

Country of ref document: EP

Kind code of ref document: A1