Eldefrawy et al., 2015 - Google Patents
Banknote Validation through an Embedded RFID Chip and an NFC‐Enabled SmartphoneEldefrawy et al., 2015
View PDF- Document ID
- 10705075395106433961
- Author
- Eldefrawy M
- Khan M
- Publication year
- Publication venue
- Mathematical Problems in Engineering
External Links
Snippet
With the new, state‐of‐the‐art printing devices and equipment, there has been rapid growth in the counterfeiting of banknotes. Traditional security features on banknotes are easy targets for counterfeiters, and they can easily imitate the original banknotes with fake ones …
- 238000010200 validation analysis 0 title abstract description 25
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07D—HANDLING OF COINS OR OF PAPER CURRENCY OR SIMILAR VALUABLE PAPERS, e.g. TESTING, SORTING BY DENOMINATIONS, COUNTING, DISPENSING, CHANGING OR DEPOSITING
- G07D7/00—Testing specially adapted to determine the identity or genuineness of paper currency or similar valuable papers, e.g. for segregating those which are unacceptable or alien to a currency
- G07D7/06—Testing specially adapted to determine the identity or genuineness of paper currency or similar valuable papers, e.g. for segregating those which are unacceptable or alien to a currency using wave or particle radiation, e.g. radiating waves onto the banknote
- G07D7/12—Visible light, infra-red or ultra violet radiation
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07D—HANDLING OF COINS OR OF PAPER CURRENCY OR SIMILAR VALUABLE PAPERS, e.g. TESTING, SORTING BY DENOMINATIONS, COUNTING, DISPENSING, CHANGING OR DEPOSITING
- G07D7/00—Testing specially adapted to determine the identity or genuineness of paper currency or similar valuable papers, e.g. for segregating those which are unacceptable or alien to a currency
- G07D7/20—Testing patterns thereon, e.g. recognition of patterns, image processing, comparing to a reference in a memory
- G07D7/2025—Pattern matching
- G07D7/2058—Pattern matching matching a template
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07D—HANDLING OF COINS OR OF PAPER CURRENCY OR SIMILAR VALUABLE PAPERS, e.g. TESTING, SORTING BY DENOMINATIONS, COUNTING, DISPENSING, CHANGING OR DEPOSITING
- G07D7/00—Testing specially adapted to determine the identity or genuineness of paper currency or similar valuable papers, e.g. for segregating those which are unacceptable or alien to a currency
- G07D7/0006—Security markings visible to the naked eye
- G07D7/0033—Checkcodes, e.g. coded number derived from serial number and value
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US12126715B2 (en) | Methods and systems of providing verification of information using a centralized or distributed ledger | |
CN105354604B (en) | A kind of method for anti-counterfeit effectively based on physics unclonable function | |
US20150002260A1 (en) | System and method for authenticating rfid tags | |
CN107301521A (en) | Strengthen the method for warehouse receipt transaction security in a kind of warehouse receipt system based on block chain | |
JP2015213288A (en) | Optical code, information transmission method, and authentication method | |
CN116057554A (en) | Method for managing transaction data sets, participant unit, transaction register and payment system | |
Bogari et al. | An investigative analysis of the security weaknesses in the evolution of RFID enabled passport | |
Eldefrawy et al. | Banknote Validation through an Embedded RFID Chip and an NFC‐Enabled Smartphone | |
Nithyanand | A Survey on the Evolution of Cryptographic Protocols in ePassports | |
Zhang et al. | An anti-counterfeiting RFID privacy protection protocol | |
Rizvi et al. | Protecting financial transactions through networks and point of sales | |
CN108768967B (en) | RFID safety middleware | |
Liu et al. | EQRC: A secure QR code-based E-coupon framework supporting online and offline transactions | |
Alshehri et al. | A formal framework for security analysis of NFC mobile coupon protocols | |
Chen et al. | An RFID system yoking‐proof protocol conforming to EPCglobal C1G2 standards | |
Geldenhuys et al. | A digital signature issuing and verification system for auto identification tokens | |
Omer et al. | Mutual authentication protocols for RFID systems | |
Eldefrawy et al. | Detecting counterfeit-money using RFID-enabled mobile devices | |
Sandhya et al. | Zero knowledge and hash-based secure access control scheme for mobile RFID systems | |
Väisänen et al. | Security analysis and review of digital signature-based low-cost RFID tag authentication | |
Al-Bastaki et al. | Task based Interdisciplinary E-Commerce Course with UML Sequence Diagrams, Algorithm Transformations and Spatial Circuits to Boost Learning Information Security Concepts | |
Abidin | Enhancing the Security of E-Passports using a Secure Key Management Framework. | |
Allard et al. | Physical aggregated objects and dependability | |
CN115310976A (en) | Non-contact transaction processing method, device and system | |
Murrell et al. | Electronic identification, personal privacy and security in the services sector |