Valuable securities authenticating method, system and terminal
A securities and counterfeit identification technology, which is applied in the field of authenticity identification, can solve the problems of low accuracy of securities identification
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0056] figure 1Shows a schematic flowchart of a method for authenticating securities according to an embodiment of the present invention;
[0057] like figure 1 As shown, a method for authenticating securities according to an embodiment of the present invention includes:
[0058] Step S102, determining at least one visual interface of the securities; Step S104, judging whether there is an encrypted area in each visual interface; Step S106, if there is an encrypted area in the visual interface, determine that the encrypted area is in the visual interface Step S108, determine the position of the encrypted area in the visual interface according to the shape parameter; Step S110, determine the ordinary pattern in the encrypted area, the encrypted information embedded in the ordinary pattern and the printing equipment of the encrypted information; Step S112 , use the material detection tool to determine the printing material for printing the encrypted information; step S114, if i...
Embodiment 2
[0066] like figure 2 As shown, the method for authenticating securities according to another embodiment of the present invention includes: step S202, determining at least one visual interface of the securities; step S204, judging whether there is an encrypted area in each visual interface; Step S206, if there is an encrypted area in the visual interface, determine the shape parameter of the encrypted area in the visual interface; Step S208, determine the position of the encrypted area in the visual interface according to the shape parameter; Step S210, determine the encrypted area The ordinary pattern, the encrypted information embedded in the ordinary pattern, and the printing equipment corresponding to the encrypted information; Step S212, determine the printing material for printing the encrypted information by the material detection tool; Step S214, decrypt the encrypted information, generate a decryption Result; Step S216, query the matching degree corresponding to the d...
Embodiment 3
[0073] like image 3 As shown, the securities authentication system 300 according to the embodiment of the second aspect of the present invention includes: a visual interface determination unit 302 for determining at least one visual interface of the securities; an identification encryption area unit 304 for using For determining whether there is an encrypted area in each visual interface; the shape determination unit 306 is used to determine the shape parameters of the encrypted area in the visual interface when there is an encrypted area in the visual interface; the position determination unit 308 is used for according to The shape parameter determines the position of the encrypted area in the visual interface; the encryption determination unit 310 is used to determine the ordinary pattern in the encrypted area, the encrypted information embedded in the ordinary pattern and the printing equipment of the encrypted information; the material determination unit 312 is used for D...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


