A method for identifying the authenticity of documents
A document, authenticity technology, applied in the fields of information security and computer applications, can solve problems such as loss of national fiscal revenue
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0118] specific implementation
[0119] figure 1 Shown is the structure diagram of the element data byte string. It can be seen from the figure that the feature data string structure.
[0120] figure 2 Shown is the search code generation process.
[0121] (1) Grouping: the character strings obtained in are grouped by 128 bits to obtain L groups. I 0 , I 1 ,... I L-1 .
[0122] (2) MC calculation: Repeat L times, and each time obtain a 32-bit output, which is input to the MC calculation of the next group.
[0123] (3) After the last MC calculation, add the codes of the issuer and receiver.
[0124] image 3 Given is the MC calculation process.
[0125] (1) Function A loops.
[0126] (2) Function B loops.
[0127] (3) Function C loop.
[0128] (4) Function D loops.
[0129] The selected specific embodiments of the present invention are as follows:
[0130] Step (1), obtaining the element data of the document, the element data being the issuer, acceptor, target, ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 