Nothing Special   »   [go: up one dir, main page]

Eldefrawy et al., 2015 - Google Patents

Banknote Validation through an Embedded RFID Chip and an NFC‐Enabled Smartphone

Eldefrawy et al., 2015

View PDF @Full View
Document ID
10705075395106433961
Author
Eldefrawy M
Khan M
Publication year
Publication venue
Mathematical Problems in Engineering

External Links

Snippet

With the new, state‐of‐the‐art printing devices and equipment, there has been rapid growth in the counterfeiting of banknotes. Traditional security features on banknotes are easy targets for counterfeiters, and they can easily imitate the original banknotes with fake ones …
Continue reading at onlinelibrary.wiley.com (PDF) (other versions)

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07DHANDLING OF COINS OR OF PAPER CURRENCY OR SIMILAR VALUABLE PAPERS, e.g. TESTING, SORTING BY DENOMINATIONS, COUNTING, DISPENSING, CHANGING OR DEPOSITING
    • G07D7/00Testing specially adapted to determine the identity or genuineness of paper currency or similar valuable papers, e.g. for segregating those which are unacceptable or alien to a currency
    • G07D7/06Testing specially adapted to determine the identity or genuineness of paper currency or similar valuable papers, e.g. for segregating those which are unacceptable or alien to a currency using wave or particle radiation, e.g. radiating waves onto the banknote
    • G07D7/12Visible light, infra-red or ultra violet radiation
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07DHANDLING OF COINS OR OF PAPER CURRENCY OR SIMILAR VALUABLE PAPERS, e.g. TESTING, SORTING BY DENOMINATIONS, COUNTING, DISPENSING, CHANGING OR DEPOSITING
    • G07D7/00Testing specially adapted to determine the identity or genuineness of paper currency or similar valuable papers, e.g. for segregating those which are unacceptable or alien to a currency
    • G07D7/20Testing patterns thereon, e.g. recognition of patterns, image processing, comparing to a reference in a memory
    • G07D7/2025Pattern matching
    • G07D7/2058Pattern matching matching a template
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07DHANDLING OF COINS OR OF PAPER CURRENCY OR SIMILAR VALUABLE PAPERS, e.g. TESTING, SORTING BY DENOMINATIONS, COUNTING, DISPENSING, CHANGING OR DEPOSITING
    • G07D7/00Testing specially adapted to determine the identity or genuineness of paper currency or similar valuable papers, e.g. for segregating those which are unacceptable or alien to a currency
    • G07D7/0006Security markings visible to the naked eye
    • G07D7/0033Checkcodes, e.g. coded number derived from serial number and value

Similar Documents

Publication Publication Date Title
US12126715B2 (en) Methods and systems of providing verification of information using a centralized or distributed ledger
US20150002260A1 (en) System and method for authenticating rfid tags
CN107301521A (en) Strengthen the method for warehouse receipt transaction security in a kind of warehouse receipt system based on block chain
CN106797311A (en) For the method for security password generation
CN107908932B (en) Digital currency anti-counterfeiting and verification method, system and equipment based on L algorithm
JP2015213288A (en) Optical code, information transmission method, and authentication method
CN116057554A (en) Method for managing transaction data sets, participant unit, transaction register and payment system
Bogari et al. An investigative analysis of the security weaknesses in the evolution of RFID enabled passport
Eldefrawy et al. Banknote Validation through an Embedded RFID Chip and an NFC‐Enabled Smartphone
Nithyanand A Survey on the Evolution of Cryptographic Protocols in ePassports
Rizvi et al. Protecting financial transactions through networks and point of sales
Zhang et al. An anti-counterfeiting RFID privacy protection protocol
Alshehri et al. A formal framework for security analysis of NFC mobile coupon protocols
Geldenhuys et al. A digital signature issuing and verification system for auto identification tokens
Chen et al. An RFID system yoking‐proof protocol conforming to EPCglobal C1G2 standards
CN114978548B (en) RFID mutual authentication method and system based on SM2 and SM3 cryptographic algorithm
Omer et al. Mutual authentication protocols for RFID systems
Eldefrawy et al. Detecting counterfeit-money using RFID-enabled mobile devices
Herath et al. Task based Interdisciplinary E-Commerce Course with UML Sequence Diagrams, Algorithm Transformations and Spatial Circuits to Boost Learning Information Security Concepts
Sandhya et al. Zero knowledge and hash-based secure access control scheme for mobile RFID systems
Väisänen et al. Security analysis and review of digital signature-based low-cost RFID tag authentication
Abidin Enhancing the Security of E-Passports using a Secure Key Management Framework.
Allard et al. Physical aggregated objects and dependability
CN115310976A (en) Non-contact transaction processing method, device and system
Murrell et al. Electronic identification, personal privacy and security in the services sector