Secret code printing method, tracing method and system based on black-and-white printing file

A technology for printing documents and passwords, applied in the field of forensic identification or criminal science, it can solve the problems of poor accuracy and unsatisfactory inspection effect of the printing document formation time, and achieve the effect of improving accuracy and convenient use.

Pending Publication Date: 2020-10-13
袁迦萱
0 Cites 0 Cited by

AI-Extracted Technical Summary

Problems solved by technology

However, there are many uncertainties due to the various factors affecting the formation time inspection of printed docu...
View more

Method used

[0057] The method can be packaged to form a program, so that the program can be directly implanted in the driver program of the black and white printer during the development of the black and white printer; the program can also be implanted in the driver program of the black and white printer. This method breaks th...
View more

Abstract

The invention provides a secret code printing method and system based on a black-and-white printing file and a tracing method and system. The secret code printing method comprises the following steps:obtaining the file to be printed; identifying at least one blank in the to-be-printed file; obtaining file information of a to-be-printed file; generating a secret code at at least one blank of a to-be-printed file according to a preset secret code rule and the file information; and printing a to-be-printed file containing the secret code by using a black-and-white printer. According to the method, after the secret code corresponding to the file information is generated on the to-be-printed file, printing can be completed at a time through the black-and-white printer, and use is convenient. The generated secret codes can be in one-to-one correspondence with the file information, so that the file information of the printed file can be identified subsequently through the secret codes, and the subsequent printed file tracing and inspection accuracy is improved.

Application Domain

Digital output to print units

Technology Topic

Software engineeringComputer printing +2

Image

  • Secret code printing method, tracing method and system based on black-and-white printing file
  • Secret code printing method, tracing method and system based on black-and-white printing file
  • Secret code printing method, tracing method and system based on black-and-white printing file

Examples

  • Experimental program(5)

Example Embodiment

[0038] Example one:
[0039] Password printing method based on black and white printing files, see figure 1 , Including the following steps:
[0040] S1: Obtain the file to be printed;
[0041] Specifically, the obtained file to be printed is an electronic file, which may be in a picture format, a PDF format, or a text format.
[0042] S2: Identify at least one blank space in the file to be printed;
[0043] Specifically, the method automatically finds the blank spaces in the printed file to perform the password layout, for example, finds at least 3 blank spaces within one page of the printed file to lay out the password. This method lays out the password in the blank space, can avoid the overlap of the password with the content or picture of the printed file, and fully considers the layout of the content or picture in the printed file.
[0044] S3: Obtain file information of the file to be printed;
[0045] Specifically, the file information includes one or a combination of the following data: printer brand, printer model, individual machine information, and printing time. The individual machine tool information includes the printer serial number or other unique information that is different from other machines. Printing time includes year, month, day, hour, minute, second, etc. The file information can reflect the formation time of the printed file, and can trace the source of the printer and the printing time of the file to be printed.
[0046] S4: Generate a password in at least one blank space of the file to be printed according to a preset password rule and the file information;
[0047] Specifically, the password rule includes the relationship between the file information and the password. The same file information generates the same password. In this way, the corresponding file information can be traced through the password.
[0048] S5: Use a black-and-white printer to print the file to be printed containing the password.
[0049] Specifically, after the method generates a password corresponding to the file information on the file to be printed, it can be printed by a black and white printer at one time, which is convenient to use. Black and white printers include inkjet printers, laser printers, and so on. The password generated by the method can be one-to-one corresponding to the file information, so that the file information of the printed file can be identified through the password, and the accuracy of the traceability and inspection of the subsequent printed file can be improved.
[0050] Preferably, the password is invisible to naked eyes.
[0051] Specifically, in order not to affect the normal viewing of the printed file with the naked eye, the password is invisible to the naked eye without the aid of a special identification device. The size and spacing of the password can be set according to user needs. Among them, the size and spacing of the password are required to enable the identification device to recognize the password, on the other hand, to minimize the influence of the password on the content or pictures on the page, and it is also necessary to ensure that the printer can print normally.
[0052] This method can not only present the file information on the printed file, but also ensure that the visual inspection of the printed file is not affected. In this way, in the follow-up process of traceability and verification of printed documents, the verification of printed documents can be easily realized by identifying the password, making the verification and traceability of printed documents fast, simple and accurate.
[0053] Preferably, the cipher code includes a dot matrix of N rows and M columns composed of a number of small dots.
[0054] Specifically, the user can set a specific number of columns and rows according to specific requirements, and the dot matrix can be a dot matrix with 5 rows and 14 columns composed of several small dots. The small dots can be solid small dots, the row spacing of the dot matrix can be set to 0.4 mm, the column spacing can be set to 0.4 mm, and the diameter of the small dots is set to 1 nanometer to 30 microns.
[0055] Preferably, the password rule includes using several rows or several columns in the dot matrix to identify different file information.
[0056] Specifically, one or several dots in the dot matrix can be set to be displayed or hidden in the password rule to identify different file information. For the above dot matrix with 5 rows and 14 columns, the following password rules can be set: use the small dot in the first column to indicate the dot matrix reference point (used to identify the starting position of the dot), and use the small dot in the second column to indicate the printer brand , Use the dots in the 3-4 columns to indicate the printer model, use the dots in the 5-7 columns to indicate the individual machine information, use the dots in the 8-9 columns to indicate the year of printing time, and use the dots in the 10th column Indicate the month of the printing time, use the dots in the 11th column to indicate the day of the printing time, and use the dots in the 12th column to indicate the printing time, and use the dots in the 13th to 14th columns to indicate the minutes of the printing time.
[0057] This method can be packaged to form a program, so that the program can be directly implanted into the driver of the black-and-white printer during the development process of the black-and-white printer; the program can also be implanted in the driver of the black-and-white printer. This method breaks the original way of printed document inspection, establishes the traceability code from the source, and significantly improves the accuracy of the identification of printing equipment and individuals, making the traceability and inspection of printed documents more scientific, standardized and standard.

Example Embodiment

[0058] Embodiment two:
[0059] On the basis of other embodiments, the second embodiment also adds the following content:
[0060] A traceability method based on black and white print files, see figure 2 , Including the following steps:
[0061] S11: Obtain a print file to be traced; the print file to be traced is printed according to the foregoing password printing method;
[0062] Specifically, this method is mainly used to trace the file information of the print file to be traced, that is, to obtain the printing time and printer information of the print file to be traced. The print file to be traced is printed using the printing method of the first embodiment.
[0063] S12: Identify the password in the printed document to be traced through the identification device;
[0064] Specifically, the method does not limit the specific identification device, and the identification device needs to have a magnifying function, for example, a device with a magnifying glass is used, or a document checker is used to recognize the password. The model of the document checker can be VSC-6000.
[0065] S13: Analyze the password by using the password rule to obtain the file information of the print file to be traced, so as to realize the traceability of the print file to be traced.
[0066] Specifically, the method uses the identification device to identify the password in the print file to be traced, and uses the password rule to parse the password. Since the password and the file information are in a one-to-one correspondence, the password rule can be used to parse the to be traced. Print the file information of the file, so that the print time and printer information of the print file to be traced can be obtained, and the print file can be traced. The obtained file information can also be used to verify the authenticity of the print file to be traced for verification of the print file.
[0067] For a brief description of the method provided in the embodiment of the present invention, for the parts not mentioned in the embodiment, please refer to the corresponding content in the foregoing method embodiment.

Example Embodiment

[0068] Example three:
[0069] On the basis of other embodiments, the third embodiment also adds the following content:
[0070] A traceability system based on black and white print files, see image 3 ,include:
[0071] Processing device: used to obtain the traceable print file; the traceable print file is printed according to the above-mentioned password printing method; the processing device is also used to parse the password recognized by the identification device using the password rule to obtain the traceable print The file information of the file to realize the traceability of the printed file to be traced;
[0072] Specifically, the processing device may be a computer, or a mobile terminal, and so on.
[0073] Identification device: used to identify the password in the printed document to be traced, and send the identified password to the processing device.
[0074] The system recognizes the password in the print file to be traced through the identification device, and uses the password rule to parse the password. Since the password and file information are in a one-to-one correspondence, the password rule can be used to parse the file to be traced. File information, so that you can get the print time and printer information of the print file to be traced, and realize the print file traceability. The obtained file information can also be used to verify the authenticity of the printed file to be traced for printing file verification.
[0075] For the brief description of the system provided by the embodiment of the present invention, for the parts not mentioned in the embodiment, please refer to the corresponding content in the foregoing method embodiment.

PUM

PropertyMeasurementUnit
Diameter4.0 ~ 30.0nm

Description & Claims & Application Information

We can also present the details of the Description, Claims and Application information to help users get a comprehensive understanding of the technical details of the patent, such as background art, summary of invention, brief description of drawings, description of embodiments, and other original content. On the other hand, users can also determine the specific scope of protection of the technology through the list of claims; as well as understand the changes in the life cycle of the technology with the presentation of the patent timeline. Login to view more.

Similar technology patents

Disposable medical-examination light

ActiveUS20090097236A1good visualizationeasy to use
Owner:UTAH MEDICAL PRODS

Patient positioning support structure

ActiveUS20120198625A1easy to useinexpensive to make
Owner:WARSAW ORTHOPEDIC INC

Classification and recommendation of technical efficacy words

  • improve accuracy
  • easy to use

Golf club head with adjustable vibration-absorbing capacity

InactiveUS20050277485A1improve grip comfortimprove accuracy
Owner:FUSHENG IND CO LTD

Direct fabrication of aligners for arch expansion

ActiveUS20170007366A1improve accuracyimproved strength , accuracy
Owner:ALIGN TECH

Stent delivery system with securement and deployment accuracy

ActiveUS7473271B2improve accuracyreduces occurrence and/or severity
Owner:BOSTON SCI SCIMED INC

Method for improving an HS-DSCH transport format allocation

InactiveUS20060089104A1improve accuracyincrease benefit
Owner:NOKIA SOLUTIONS & NETWORKS OY

Catheter systems

ActiveUS20120059255A1increase selectivityimprove accuracy
Owner:ST JUDE MEDICAL ATRIAL FIBRILLATION DIV

Laser assisted total joint arthroplasty

InactiveUS20090234360A1easy to use
Owner:ALEXANDER VLADIMIR

Enclosure for a portable hemodialysis system

ActiveUS20090114582A1easy to use
Owner:DEKA PROD LLP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products