Unlock instant, AI-driven research and patent intelligence for your innovation.

Valuable securities authenticating method, system and terminal

A securities and counterfeit identification technology, which is applied in the field of authenticity identification, can solve the problems of low accuracy of securities identification

Active Publication Date: 2020-06-19
CHINA BANKNOTE SECURITY PRINTING TECH RES INST CO LTD +1
View PDF10 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Counterfeiters can use high-tech technologies, including holographic anti-counterfeiting technology and optical variable ink technology, etc., to smear magnetic powder substances on the magnetic area of ​​securities or apply fluorescent ink to the front area of ​​securities paper to counterfeit securities. Anti-counterfeiting, resulting in low accuracy of counterfeiting of securities

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Valuable securities authenticating method, system and terminal
  • Valuable securities authenticating method, system and terminal
  • Valuable securities authenticating method, system and terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0056] figure 1Shows a schematic flowchart of a method for authenticating securities according to an embodiment of the present invention;

[0057] like figure 1 As shown, a method for authenticating securities according to an embodiment of the present invention includes:

[0058] Step S102, determining at least one visual interface of the securities; Step S104, judging whether there is an encrypted area in each visual interface; Step S106, if there is an encrypted area in the visual interface, determine that the encrypted area is in the visual interface Step S108, determine the position of the encrypted area in the visual interface according to the shape parameter; Step S110, determine the ordinary pattern in the encrypted area, the encrypted information embedded in the ordinary pattern and the printing equipment of the encrypted information; Step S112 , use the material detection tool to determine the printing material for printing the encrypted information; step S114, if i...

Embodiment 2

[0066] like figure 2 As shown, the method for authenticating securities according to another embodiment of the present invention includes: step S202, determining at least one visual interface of the securities; step S204, judging whether there is an encrypted area in each visual interface; Step S206, if there is an encrypted area in the visual interface, determine the shape parameter of the encrypted area in the visual interface; Step S208, determine the position of the encrypted area in the visual interface according to the shape parameter; Step S210, determine the encrypted area The ordinary pattern, the encrypted information embedded in the ordinary pattern, and the printing equipment corresponding to the encrypted information; Step S212, determine the printing material for printing the encrypted information by the material detection tool; Step S214, decrypt the encrypted information, generate a decryption Result; Step S216, query the matching degree corresponding to the d...

Embodiment 3

[0073] like image 3 As shown, the securities authentication system 300 according to the embodiment of the second aspect of the present invention includes: a visual interface determination unit 302 for determining at least one visual interface of the securities; an identification encryption area unit 304 for using For determining whether there is an encrypted area in each visual interface; the shape determination unit 306 is used to determine the shape parameters of the encrypted area in the visual interface when there is an encrypted area in the visual interface; the position determination unit 308 is used for according to The shape parameter determines the position of the encrypted area in the visual interface; the encryption determination unit 310 is used to determine the ordinary pattern in the encrypted area, the encrypted information embedded in the ordinary pattern and the printing equipment of the encrypted information; the material determination unit 312 is used for D...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a negotiable security authenticity identification method, a negotiable security authenticity identification system and a terminal. The negotiable security authenticity identification method includes the following steps that: at least one visual interface of a negotiable security is determined; whether encrypted regions exist in each visual interface is judged; if encrypted regions exist in the visual interfaces, the shape parameters of the encrypted regions in the visual interfaces are determined; the positions of the encrypted regions in the visual interfaces are determined according to the shape parameters; common patterns in the encrypted regions, encrypted information embedded into the common patterns and printing devices of the encrypted information are determined; printing materials for printing the encrypted information are determined by means of a material detection tool; and if in all the visual interfaces, the encrypted information, the printing devices, and the printing materials satisfy preset conditions, and the positions are within a preset position range, the negotiable security is authentic. According to the method, system and terminal provided by the technical schemes of the invention, the encrypted information of the encrypted regions and the printing materials are further confirmed, and therefore, the authenticity of the negotiable security can be realized, and detection accuracy can be improved.

Description

technical field [0001] The present invention relates to the technical field of authenticity identification, in particular to a method for authenticating counterfeit securities, a system for authenticating counterfeit securities, a computer device, a computer-readable storage medium and a terminal. Background technique [0002] At present, in related technologies, special anti-counterfeiting printing materials, such as fluorescent ink or phosphorescent ink, are commonly used to print specific patterns on any area of ​​paper on the front and back of valuable securities such as banknotes, checks, bonds, stocks, etc., thereby improving security. The anti-counterfeiting ability of securities, however, there are the following technical defects in the anti-counterfeiting of such securities: [0003] Counterfeiters can use high-tech technologies, including holographic anti-counterfeiting technology and optical variable ink technology, etc., to smear magnetic powder on the magnetic a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G07D7/20G07D7/202
CPCG07D7/2016G07D7/202
Inventor 张健王建鑫秦庆旺冯礼冯治国韩英魁刘石磊姚宗勇霍珊珊
Owner CHINA BANKNOTE SECURITY PRINTING TECH RES INST CO LTD