Eldefrawy et al., 2015 - Google Patents
Banknote Validation through an Embedded RFID Chip and an NFC‐Enabled SmartphoneEldefrawy et al., 2015
View PDF- Document ID
- 10705075395106433961
- Author
- Eldefrawy M
- Khan M
- Publication year
- Publication venue
- Mathematical Problems in Engineering
External Links
Snippet
With the new, state‐of‐the‐art printing devices and equipment, there has been rapid growth in the counterfeiting of banknotes. Traditional security features on banknotes are easy targets for counterfeiters, and they can easily imitate the original banknotes with fake ones …
- 238000010200 validation analysis 0 title abstract description 25
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07D—HANDLING OF COINS OR OF PAPER CURRENCY OR SIMILAR VALUABLE PAPERS, e.g. TESTING, SORTING BY DENOMINATIONS, COUNTING, DISPENSING, CHANGING OR DEPOSITING
- G07D7/00—Testing specially adapted to determine the identity or genuineness of paper currency or similar valuable papers, e.g. for segregating those which are unacceptable or alien to a currency
- G07D7/06—Testing specially adapted to determine the identity or genuineness of paper currency or similar valuable papers, e.g. for segregating those which are unacceptable or alien to a currency using wave or particle radiation, e.g. radiating waves onto the banknote
- G07D7/12—Visible light, infra-red or ultra violet radiation
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07D—HANDLING OF COINS OR OF PAPER CURRENCY OR SIMILAR VALUABLE PAPERS, e.g. TESTING, SORTING BY DENOMINATIONS, COUNTING, DISPENSING, CHANGING OR DEPOSITING
- G07D7/00—Testing specially adapted to determine the identity or genuineness of paper currency or similar valuable papers, e.g. for segregating those which are unacceptable or alien to a currency
- G07D7/20—Testing patterns thereon, e.g. recognition of patterns, image processing, comparing to a reference in a memory
- G07D7/2025—Pattern matching
- G07D7/2058—Pattern matching matching a template
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07D—HANDLING OF COINS OR OF PAPER CURRENCY OR SIMILAR VALUABLE PAPERS, e.g. TESTING, SORTING BY DENOMINATIONS, COUNTING, DISPENSING, CHANGING OR DEPOSITING
- G07D7/00—Testing specially adapted to determine the identity or genuineness of paper currency or similar valuable papers, e.g. for segregating those which are unacceptable or alien to a currency
- G07D7/0006—Security markings visible to the naked eye
- G07D7/0033—Checkcodes, e.g. coded number derived from serial number and value
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US12126715B2 (en) | Methods and systems of providing verification of information using a centralized or distributed ledger | |
US20150002260A1 (en) | System and method for authenticating rfid tags | |
CN107301521A (en) | Strengthen the method for warehouse receipt transaction security in a kind of warehouse receipt system based on block chain | |
CN106797311A (en) | For the method for security password generation | |
CN107908932B (en) | Digital currency anti-counterfeiting and verification method, system and equipment based on L algorithm | |
JP2015213288A (en) | Optical code, information transmission method, and authentication method | |
CN116057554A (en) | Method for managing transaction data sets, participant unit, transaction register and payment system | |
Bogari et al. | An investigative analysis of the security weaknesses in the evolution of RFID enabled passport | |
Eldefrawy et al. | Banknote Validation through an Embedded RFID Chip and an NFC‐Enabled Smartphone | |
Nithyanand | A Survey on the Evolution of Cryptographic Protocols in ePassports | |
Rizvi et al. | Protecting financial transactions through networks and point of sales | |
Zhang et al. | An anti-counterfeiting RFID privacy protection protocol | |
Alshehri et al. | A formal framework for security analysis of NFC mobile coupon protocols | |
Geldenhuys et al. | A digital signature issuing and verification system for auto identification tokens | |
Chen et al. | An RFID system yoking‐proof protocol conforming to EPCglobal C1G2 standards | |
CN114978548B (en) | RFID mutual authentication method and system based on SM2 and SM3 cryptographic algorithm | |
Omer et al. | Mutual authentication protocols for RFID systems | |
Eldefrawy et al. | Detecting counterfeit-money using RFID-enabled mobile devices | |
Herath et al. | Task based Interdisciplinary E-Commerce Course with UML Sequence Diagrams, Algorithm Transformations and Spatial Circuits to Boost Learning Information Security Concepts | |
Sandhya et al. | Zero knowledge and hash-based secure access control scheme for mobile RFID systems | |
Väisänen et al. | Security analysis and review of digital signature-based low-cost RFID tag authentication | |
Abidin | Enhancing the Security of E-Passports using a Secure Key Management Framework. | |
Allard et al. | Physical aggregated objects and dependability | |
CN115310976A (en) | Non-contact transaction processing method, device and system | |
Murrell et al. | Electronic identification, personal privacy and security in the services sector |