Unlock instant, AI-driven research and patent intelligence for your innovation.

A method for identifying the authenticity of documents

A document, authenticity technology, applied in the fields of information security and computer applications, can solve problems such as loss of national fiscal revenue

Active Publication Date: 2011-11-30
浙江浙科信息技术有限公司
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Taking fake tax invoices as an example, while fake invoices bring huge benefits to counterfeiters and sellers, they also cause heavy losses to the state's fiscal revenue.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method for identifying the authenticity of documents
  • A method for identifying the authenticity of documents
  • A method for identifying the authenticity of documents

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0118] specific implementation

[0119] figure 1 Shown is the structure diagram of the element data byte string. It can be seen from the figure that the feature data string structure.

[0120] figure 2 Shown is the search code generation process.

[0121] (1) Grouping: the character strings obtained in are grouped by 128 bits to obtain L groups. I 0 , I 1 ,... I L-1 .

[0122] (2) MC calculation: Repeat L times, and each time obtain a 32-bit output, which is input to the MC calculation of the next group.

[0123] (3) After the last MC calculation, add the codes of the issuer and receiver.

[0124] image 3 Given is the MC calculation process.

[0125] (1) Function A loops.

[0126] (2) Function B loops.

[0127] (3) Function C loop.

[0128] (4) Function D loops.

[0129] The selected specific embodiments of the present invention are as follows:

[0130] Step (1), obtaining the element data of the document, the element data being the issuer, acceptor, target, ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a method for authenticating true and false of documents. An encryption method of the present documents has a certain shortcoming. The method comprises the following steps of: firstly acquiring element data of the documents, and analyzing and pre-processing the element data of the documents; setting four integers with the length of 8 bits and assigning, carrying out MC calculation on the obtained I0 group and the obtained I4 group, adding codes of a document issuing party and a document receiving party at the head of a character string to generate an ASCII document inquiry code with 12 characters; printing or writing the document inquiry code in empty positions of the documents, and inserting the document element and document inquiry code into a data table of the issuing party or a trusted third party for inquiring; and authenticating the true and false of the documents by the receiving party through the document inquiry code. In the method, the inquiry code with the proper length can be generated from the document element for conveniently use in inquiry. The MC operation process used in the method is safe, and the method is simple and suitable for inquiring.

Description

technical field [0001] The invention belongs to the technical field of information security and computer application, and relates to a method for identifying the authenticity of documents, which is especially suitable for users who generate a large number of documents, such as tax invoices and customs certificates. Background technique [0002] With the development of social economy and technology, in economic activities, lawbreakers often forge and resell documents in order to seek illegal benefits, causing economic losses to all parties involved in economic activities. Taking false tax invoices as an example, while false invoices bring huge benefits to counterfeiters and sellers, they also cause heavy losses to the state's fiscal revenue. As far as the catering invoices with a face value of 100 yuan are concerned, the value of each ticket is 10,000 yuan, and the merchant can buy it from legal channels for only 10 yuan. According to regulations, this invoice should pay a t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G07D7/02G07D7/004
Inventor 吴惠良
Owner 浙江浙科信息技术有限公司