[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

CN110264223A - Verification method, generation method and the relevant apparatus of anti-fake contract - Google Patents

Verification method, generation method and the relevant apparatus of anti-fake contract Download PDF

Info

Publication number
CN110264223A
CN110264223A CN201910529971.8A CN201910529971A CN110264223A CN 110264223 A CN110264223 A CN 110264223A CN 201910529971 A CN201910529971 A CN 201910529971A CN 110264223 A CN110264223 A CN 110264223A
Authority
CN
China
Prior art keywords
contract
text
fake
watermark
image
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910529971.8A
Other languages
Chinese (zh)
Inventor
孙建
郭锡超
何晋俊
莫奇军
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Industrial and Commercial Bank of China Ltd ICBC
Original Assignee
Industrial and Commercial Bank of China Ltd ICBC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Industrial and Commercial Bank of China Ltd ICBC filed Critical Industrial and Commercial Bank of China Ltd ICBC
Priority to CN201910529971.8A priority Critical patent/CN110264223A/en
Publication of CN110264223A publication Critical patent/CN110264223A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/018Certifying business or products
    • G06Q30/0185Product, service or business identity fraud
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07DHANDLING OF COINS OR VALUABLE PAPERS, e.g. TESTING, SORTING BY DENOMINATIONS, COUNTING, DISPENSING, CHANGING OR DEPOSITING
    • G07D7/00Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency
    • G07D7/005Testing security markings invisible to the naked eye, e.g. verifying thickened lines or unobtrusive markings or alterations
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07DHANDLING OF COINS OR VALUABLE PAPERS, e.g. TESTING, SORTING BY DENOMINATIONS, COUNTING, DISPENSING, CHANGING OR DEPOSITING
    • G07D7/00Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency
    • G07D7/20Testing patterns thereon

Landscapes

  • Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Marketing (AREA)
  • Finance (AREA)
  • Economics (AREA)
  • Strategic Management (AREA)
  • Development Economics (AREA)
  • General Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Editing Of Facsimile Originals (AREA)

Abstract

The embodiment of the present invention provides verification method, generation method and the relevant apparatus of a kind of anti-fake contract, and it includes: two dimensional code, text of Contract, watermark, concealed code in the image of the contract to be verified which, which includes: the image for obtaining contract to be verified,;Identify that the two dimensional code obtains the contract number of the contract to be verified;Body text, watermark text and the concealed code text prestored is obtained according to the contract number;Image procossing is carried out to the image of the contract to be verified and obtains watermark information, text message and concealed code information;Contract verification result is obtained according to the body text, the watermark text, the concealed code text, the text message, the watermark information and the concealed code information, it does not need client and inputs the information such as network address, the contract number of verifying website, it does not need manually to compare, it is only necessary to which the image for inputting contract to be verified can realize contract verification automatically.

Description

Verification method, generation method and the relevant apparatus of anti-fake contract
Technical field
The present invention relates to technical field of data processing more particularly to a kind of verification method of anti-fake contract, generation method with And relevant apparatus.
Background technique
In recent years, contract fraud event frequent occurrence, especially fake, swindle event emerges one after another by bank financing contract. For financing contract, other than Internetbank channel, which still there are a large amount of contracts in bank, to be signed by cabinet face channel, only a few silver Row interior employee catches this loophole to inveigle client to buy false finance product in cabinet face, and for the contract that this cabinet face is signed, visitor Family wants that verifying its true and false needs bank counter to verify, and takes time and effort very much, and verification process relies on manually, it is difficult to ensure objective Property.
To solve the above problems, some banks, which open, verifies channel on multiparty line, client can be on mobile phone or computer Inputting contract number, the information such as customer name, essence of a contract or treaty content are fed back to client by bank, but when, client is still The information such as network address, the contract number of oneself input verifying website are needed, it is then artificial to compare, still compare effort.
Summary of the invention
In view of this, the present invention provides a kind of verification method of anti-fake contract and device, generation method and device, electronics are set Standby and computer readable storage medium solves to need oneself input to test when client verifies contract by verifying channel on multiparty line The information such as network address, the contract number of website are demonstrate,proved, then artificial the problem of comparing, still comparing effort.
To achieve the goals above, the present invention adopts the following technical scheme:
In a first aspect, providing a kind of verification method of anti-fake contract, comprising:
Obtain the image of contract to be verified, include: in the image of the contract to be verified two dimensional code, text of Contract, watermark, Concealed code;
Identify that the two dimensional code obtains the contract number of the contract to be verified;
Body text, watermark text and the concealed code text prestored is obtained according to the contract number;
Image procossing is carried out to the image of the contract to be verified and obtains watermark information, text message and concealed code letter Breath;
According to the body text, the watermark text, the concealed code text, the text message, watermark letter Breath and the concealed code information obtain contract verification result.
Further, described to be believed according to the body text, the watermark text, the concealed code text, the text Breath, the watermark information and the concealed code information obtain contract verification result, comprising:
Concealed code matching result is obtained according to the concealed code information and the concealed code text;
Watermark matches result is obtained according to the watermark information and the watermark text;
Text matching result is obtained according to the text message and the contract text;
It obtains contract according to the concealed code matching result, the watermark matches result and the text matching result and tests Demonstrate,prove result.
Further, the verification method of the anti-fake contract further include:
Judge whether the text matching result is true;
If so, obtaining the business key message stored in host according to the contract number;
Host information, which is obtained, with the business key message in the body text according to the business key message matches knot Fruit;
Final verification result is obtained according to the host information matching result and the contract verification result.
Further, in the image of the contract to be verified further include: seal, the image to the contract to be verified It carries out image procossing and obtains watermark information, text message and concealed code information, comprising:
The seal in the image of the contract to be verified is eliminated, seal image is obtained;
The text in seal image is gone to obtain watermarking images described in elimination;
Identify that the watermarking images obtain the watermark information based on OCR identification technology;
The watermark in seal image is gone described in elimination, obtains text image;
Identify that the text image obtains the text message based on OCR identification technology;
Identify that the image of the contract to be verified obtains the concealed code information based on OCR identification technology.
Second aspect provides a kind of generation method of anti-fake contract, comprising:
Obtain text of Contract;
Two dimensional code and concealed code are generated according to the text of Contract;
Anti-fake contract is generated according to the text of Contract, the two dimensional code and the concealed code.
Further, the text of Contract includes: contract number, described to generate two dimensional code, packet according to the text of Contract It includes:
The two dimensional code is generated according to the contract number.
Further, this generates concealed code according to the text of Contract, comprising:
Hash calculation is carried out to the text of Contract and obtains the concealed code.
Further, further includes:
Watermark is added to the anti-fake contract.
Further, further includes:
It is with an official seal affixed to the anti-fake contract.
Further, which includes business key message, the generation method of the anti-fake contract further include:
The business key message is sent to host, so that the host stores the business key message, completes to keep accounts.
Further, further includes:
Store the text of Contract, the watermark and the concealed code, formed body text, the watermark text of the corresponding contract with And concealed code text.
The third aspect provides a kind of anti-fake contract verification device, comprising:
Image collection module obtains the image of contract to be verified, includes: two dimensional code in the image of the contract to be verified, closes Same text, watermark, concealed code;
Two dimensional code identification module identifies that the two dimensional code obtains the contract number of the contract to be verified;
Text obtains module, and body text, watermark text and the concealed code text prestored is obtained according to the contract number;
Image processing module, to the image of the contract to be verified carry out image procossing obtain watermark information, text message with And concealed code information;
Authentication module, according to the body text, the watermark text, the concealed code text, the text message, the watermark information And the concealed code information obtains contract verification result.
Further, which includes:
First matching unit obtains concealed code matching result according to the concealed code information and the concealed code text;
Second matching unit obtains watermark matches result according to the watermark information and the watermark text;
Third matching unit obtains text matching result according to the text message and the contract text;
Authentication unit is closed according to the concealed code matching result, the watermark matches result and the text matching result Same verification result.
Further, further includes:
Judgment module judges whether the text matching result is true;
Host data obtains module, when the text matching result is true, is obtained in host and is stored according to the contract number Business key message;
Key information match module is led according to the business key message and the business key message in the body text Machine information matching result;
Secondary authentication module obtains finally verifying knot according to the host information matching result and the contract verification result Fruit.
Further, in the image of the contract to be verified further include: seal, the image processing module include:
Seal eliminates unit, eliminates the seal in the image of the contract to be verified, obtains seal image;
Watermarking images acquiring unit eliminates the text gone in seal image and obtains watermarking images;
Watermark recognition unit identifies that the watermarking images obtain the watermark information based on OCR identification technology;
Text acquiring unit eliminates the watermark gone in seal image, obtains text image;
Text recognition unit identifies that the text image obtains the text message based on OCR identification technology;
Concealed code recognition unit identifies that the image of the contract to be verified obtains the concealed code information based on OCR identification technology.
Fourth aspect provides a kind of anti-fake contract generating means, comprising:
Text obtains module, obtains text of Contract;
Two dimensional code concealed code generation module generates two dimensional code and concealed code according to the text of Contract;
Anti-fake contract generation module generates anti-fake contract according to the text of Contract, the two dimensional code and the concealed code.
Further, which includes: contract number, which includes:
Two dimensional code generation unit generates the two dimensional code according to the contract number.
Further, which includes:
Concealed code generation unit carries out Hash calculation to the text of Contract and obtains the concealed code.
Further, further includes:
Watermark adding module adds watermark to the anti-fake contract.
Further, further includes:
It affixes one's seal module, it is with an official seal affixed to the anti-fake contract.
Further, which includes business key message, the anti-fake contract generating means further include:
Keep accounts module, which is sent to host, so that the host stores the business key message, completes It keeps accounts.
Further, further includes:
Memory module, stores the text of Contract, the watermark and the concealed code, formed the corresponding contract body text, Watermark text and concealed code text.
5th aspect, provides a kind of electronic equipment, including memory, processor and storage on a memory and can handled The computer program run on device, the processor realize the step of the verification method of above-mentioned anti-fake contract when executing described program Suddenly, alternatively, the step of realizing the generation method of above-mentioned anti-fake contract.
5th aspect, provides a kind of computer readable storage medium, is stored thereon with computer program, the computer program The step of verification method of above-mentioned anti-fake contract is realized when being executed by processor, alternatively, realizing the life of above-mentioned anti-fake contract The step of at method.
The verification method and device, generation method and device of anti-fake contract provided in an embodiment of the present invention, electronic equipment with And computer readable storage medium, the verification method include: the image for obtaining contract to be verified, the image of the contract to be verified In include: two dimensional code, text of Contract, watermark, concealed code;Identify that the two dimensional code obtains the contract volume of the contract to be verified Number;Body text, watermark text and the concealed code text prestored is obtained according to the contract number;To the contract to be verified Image carry out image procossing obtain watermark information, text message and concealed code information;According to the body text, the water Printed text sheet, the concealed code text, the text message, the watermark information and the concealed code information obtain contract verification As a result.That is: contract number is identified by two dimensional code, the contract dataset prestored is then transferred according to number in the server, and it is logical The contract dataset that image procossing obtains is crossed to be compared and then obtain contract verification result it is not necessary to which client inputs verifying website The information such as network address, contract number do not need manually to compare, it is only necessary to which the image for inputting contract to be verified can realize contract automatically Verifying, it is easy to operate, it is time saving and energy saving, the workload of customer authentication contract is reduced, improves the accuracy of verifying, high reliablity can have Effect is prevented financial risk, and guarantees the safety of banking contract.
For above and other objects, features and advantages of the invention can be clearer and more comprehensible, preferred embodiment is cited below particularly, And cooperate institute's accompanying drawings, it is described in detail below.
Detailed description of the invention
In order to illustrate the technical solutions in the embodiments of the present application or in the prior art more clearly, to embodiment or will show below There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is the application Some embodiments for those of ordinary skill in the art without creative efforts, can also basis These attached drawings obtain other attached drawings.In the accompanying drawings:
The system architecture diagram of Fig. 1 embodiment provides to realize the present invention anti-fake contract verification method and generation method;
Fig. 2 is the exemplary diagram of the anti-fake contract in the embodiment of the present invention;
Fig. 3 is the flow diagram of the anti-fake contract verification method in the embodiment of the present invention;
Fig. 4 shows the specific steps of step S500 in Fig. 3;
Fig. 5 is the flow diagram one of the anti-fake contract generation method in the embodiment of the present invention;
Fig. 6 is the flow diagram two of the anti-fake contract generation method in the embodiment of the present invention;
Fig. 7 is the structural block diagram of the anti-fake contract verification device in the embodiment of the present invention;
Fig. 8 is the structural block diagram of the anti-fake contract generating means in the embodiment of the present invention;
Fig. 9 is the structure chart of electronic equipment of the embodiment of the present invention.
Specific embodiment
In order to make those skilled in the art more fully understand application scheme, below in conjunction in the embodiment of the present application Attached drawing, the technical scheme in the embodiment of the application is clearly and completely described, it is clear that described embodiment is only The embodiment of the application a part, instead of all the embodiments.Based on the embodiment in the application, ordinary skill people Member's every other embodiment obtained without making creative work, all should belong to the model of the application protection It encloses.
It should be understood by those skilled in the art that, the embodiment of the present invention can provide as method, system or computer program Product.Therefore, complete hardware embodiment, complete software embodiment or reality combining software and hardware aspects can be used in the present invention Apply the form of example.Moreover, it wherein includes the computer of computer usable program code that the present invention, which can be used in one or more, The computer program implemented in usable storage medium (including but not limited to magnetic disk storage, CD-ROM, optical memory etc.) produces The form of product.
It should be noted that term " includes " and " tool in the description and claims of this application and above-mentioned attached drawing Have " and their any deformation, it is intended that cover it is non-exclusive include, for example, containing a series of steps or units Process, method, system, product or equipment those of are not necessarily limited to be clearly listed step or unit, but may include without clear Other step or units listing to Chu or intrinsic for these process, methods, product or equipment.
It should be noted that in the absence of conflict, the features in the embodiments and the embodiments of the present application can phase Mutually combination.The application is described in detail below with reference to the accompanying drawings and in conjunction with the embodiments.
Currently, some banks, which open, verifies channel on multiparty line, client can input contract volume on mobile phone or computer Number, the information such as customer name, essence of a contract or treaty content feed back to client by bank, but when, there is still a need for oneself is defeated by client Enter to verify the information such as network address, the contract number of website, it is then artificial to compare, still compare effort.
To solve the above-mentioned technical problems in the prior art, the embodiment of the present invention provides a kind of verifying of anti-fake contract Method identifies contract number by two dimensional code, then transfers the contract dataset prestored in the server according to number, and pass through figure As the net for obtaining contract verification in turn result it is not necessary to which website is verified in client's input is compared in the contract dataset that processing obtains The information such as location, contract number do not need manually to compare, it is only necessary to which the image for inputting contract to be verified can realize that automatically contract is tested Card, it is time saving and energy saving, the workload of customer authentication contract is reduced, the accuracy of verifying is improved, can effectively prevent financial risk, is guaranteed The safety of banking contract.
The system architecture diagram of Fig. 1 embodiment provides to realize the present invention anti-fake contract verification method and generation method.Such as Shown in Fig. 1, which includes: typing terminal 1, contract processing server 5, verifying terminal 3 and/or mobile phone 4 and host 6.
Wherein, typing terminal 1 is responsible for receiving the contract information of business personnel's typing, and sends information to contract processing clothes Business device 5, typing terminal can be portable computer, desktop computer, smart phone, Flat electronic equipment etc.;Anti-fake contract 2 is paper Matter contract paper_origin, contains two dimensional code, watermark, seal, concealed code and text of Contract etc.;Terminal 3 is verified to be responsible for Anti-fake contract paper_origin is scanned, and scanned picture picture_origin is issued into contract processing server 5, meanwhile, It verifies terminal 3 to be also responsible for showing verification result, wherein verifying terminal can be the comprehensive service terminal of bank or ATM terminal etc. Self-help terminal equipment;The effect of mobile phone 4 is similar with verifying terminal, using 4 camera of mobile phone to anti-fake contract paper_ Origin takes pictures, and the picture picture_origin that will take pictures issues contract processing server 5, while being also responsible for showing and test Demonstrate,prove result.
Contract processing server 5 is for executing anti-fake contract verification method provided in an embodiment of the present invention and/or anti-fake conjunction Same generation method is specifically responsible for adding the anti-fake letters such as watermark, two dimensional code, concealed code to the text of Contract of typing
Breath, is generated the electronics shelves of anti-fake contract, in contract verification link, is disappeared using watermark enhancing, watermark elimination, seal It removes, concealed code identification, the technologies such as OCR verify contract, and transfer host account information and carry out account verification;Host 6 is negative Duty actually keeps accounts and records account information.
Specifically, contract processing server 5 includes anti-fake contract generating means and anti-fake contract verification device, anti-fake conjunction It is responsible for adding the anti-counterfeiting information such as watermark, two dimensional code, concealed code to the text of Contract of typing with generating means, generates anti-fake contract Electronics shelves.Anti-fake contract verification device is responsible for being analyzed and processed the scanned picture picture_origin of papery contract, obtains The two dimensional code of coordinate { X, Y } is taken, the contract number in two dimensional code is taken out, based on contract number finds the contract retained in server Text, watermark text and concealed code, and image procossing and OCR are carried out to picture_origin and identified, get papery conjunction Text message together, watermark information, concealed code information, are compared, also, can obtain paper with the corresponding information that server retains The business key message (contract number, the amount of money, customer name) of matter contract is checked, most therewith by obtaining host account information After generate verification result.
Typing terminal 1 connects contract processing server 5 and generates anti-fake contract 2, contract processing server 5 connect the record of host 6 and Account information is transferred, verifying terminal 3 and mobile phone 4 can be scanned and (take pictures) to anti-fake contract 2, and even contract processing server 5 pairs of contracts are verified.
Certainly, it will be appreciated by persons skilled in the art that the mobile phone 4 can also be with camera and communication function Other terminals replace, such as Flat electronic equipment, portable computer, desktop computer, personal digital assistant (PDA) etc..
Specifically, the contract processing server 5 and verifying terminal 3 and/or mobile phone 4 (or its alternate device) communicate to connect, The image of contract to be processed can be sent to contract processing service by the verifying terminal 3 and/or mobile phone 4 (or its alternate device) Device 5, contract processing server 5 can receive the image of the contract to be processed online.The server S 1 can it is online or The image of contract to be processed is pre-processed offline, include: in the image of contract to be verified two dimensional code, text of Contract, watermark, Concealed code;Identify that the two dimensional code obtains the contract number of the contract to be verified;It is prestored according to contract number acquisition Body text, watermark text and concealed code text;Image procossing is carried out to the image of the contract to be verified and obtains watermark letter Breath, text message and concealed code information;According to the body text, the watermark text, the concealed code text, it is described just Literary information, the watermark information and the concealed code information obtain contract verification result.Then, contract processing server 5 can Contract verification result is sent to the verifying terminal 3 and/or mobile phone 4 (or its alternate device) online.The verifying terminal 3 And/or mobile phone 4 (or its alternate device) can receive the contract verification result online.
In addition, the contract processing server 5 and typing terminal 1 communicate to connect, the typing terminal 1 can be by contract information It is sent to contract processing server 5, contract processing server 5 can receive the contract information online.The server S 1 can With online or offline pre-process to contract information, based on contract text generates two dimensional code and concealed code;Based on contract just Text, two dimensional code and concealed code generate anti-fake contract.Then, contract processing server 5 can be online by the anti-fake contract of generation It is sent to the typing terminal 1.The typing terminal 1 can receive the anti-fake contract online.
The contract processing server 5 and verifying terminal 3 and/or mobile phone 4 (or its alternate device) between, the Contracts Division Reason server 5 can be used any suitable network protocol with typing terminal 1 and be communicated, and be included in the application submitting day not yet The network protocol developed.The network protocol for example may include ICP/IP protocol, UDP/IP agreement, http protocol, HTTPS Agreement etc..Certainly, the network protocol for example can also include the RPC agreement (Remote used on above-mentioned agreement Procedure Call Protocol, remote procedure call protocol), REST agreement (Representational State Transfer, declarative state transfer protocol) etc..
Fig. 2 is the exemplary diagram of the anti-fake contract in the embodiment of the present invention;As shown in Fig. 2, the anti-fake contract paper_ It include contract number 21, contract value 22 and customer name 23 on origin, these three information are that the business key of contract is believed Breath;Contract further includes general clause 24, seal 27, this is the routine information of contract;Contract further include watermark 25, two dimensional code 28 with And concealed code 26, it is the anti-counterfeiting information of contract.
Fig. 3 is the flow diagram of the anti-fake contract verification method in the embodiment of the present invention.As shown in figure 3, the anti-fake conjunction May include the following contents with verification method:
Step S100: obtaining the image of contract to be verified, includes: two dimensional code, contract in the image of the contract to be verified Text, watermark, concealed code.
Wherein, the text of the fixed text of watermark i.e. a string, is attached among text at regular intervals with light font.Two dimension Code is the two-dimension code image added in contract lower right corner fixed coordinates { X, Y }, contains the value of contract number in two dimensional code;It is stealthy Code is that contract processing server carries out HASH calculating acquirement digest value to the binary system entire contents of contract, and digest value is 20 words It saves, 160 binary digits, 1 represents stain in binary digit, and 0 represents white point, and it is every that the sequence of these black-white points is printed to contract The bottom of page prints 4 rows, and row has 40 points with 5 millimeters of row interval, every row, and each 5 millimeters of spacing, the coordinate sequence of printing It is denoted as nowatchcode_xy_serial.
Step S200: identify that the two dimensional code obtains the contract number of the contract to be verified.
Wherein it is possible to obtain information entrained by two dimensional code using two dimensional code in OCR identification technology identification image.
Step S300: body text, watermark text and the concealed code text prestored is obtained according to the contract number.
Wherein, in contract generation phase, server has stored the number and its corresponding text, water of generation contract The information such as print, concealed code, when being verified to contract, based on contract number obtain in server the above- mentioned information that prestore with In the true and false of verifying contract.
Step S400: to the image of the contract to be verified carry out image procossing obtain watermark information, text message and Concealed code information.
Wherein, with watermark enhancing (sharpenings), watermark elimination, seal elimination, OCR technique to the image of contract to be verified into Row processing, and then obtain the watermark information, text message and concealed code information.
Step S500: according to the body text, the watermark text, the concealed code text, the text message, institute It states watermark information and the concealed code information obtains contract verification result.
Through the above technical solution it is known that anti-fake contract verification method provided in an embodiment of the present invention, passes through two dimension Code identification contract number, then transfers the contract dataset prestored according to number in the server, and is obtained by image procossing Contract dataset is compared and then obtains contract verification result it is not necessary to which client inputs network address, the contract number etc. of verifying website Information does not need manually to compare, it is only necessary to and the image for inputting contract to be verified can realize contract verification automatically, time saving and energy saving, The workload for reducing customer authentication contract, improves the accuracy of verifying, can effectively prevent financial risk, guarantee the peace of banking contract Quan Xing.
In addition, being evident that content carries out fake certification by the way that two dimensional code, watermark, concealed code etc. are non-, so that crime point Son is not allowed easy to identify and is forged, the safety of effective guarantee banking contract.
Fig. 4 shows the specific steps of step S500 in Fig. 3.As shown in figure 4, step S500 may include in following Hold:
Step S510: concealed code matching result is obtained according to the concealed code information and the concealed code text;
Step S520: watermark matches result is obtained according to the watermark information and the watermark text;
Step S530: text matching result is obtained according to the text message and the contract text;
Step S540: according to the concealed code matching result, the watermark matches result and the text matching result Obtain contract verification result.
Specifically, it will be prestored in text message and server entrained in the image obtained by image procossing corresponding Text message in the body text of the contract number is compared, and judges whether text message matches with body text.It will lead to Cross the watermark text of the corresponding contract number prestored in watermark information and server entrained in the image that image procossing obtains Originally it is compared, judges whether watermark information matches with watermark text;It will be entrained in the image obtained by image procossing The concealed code text of the correspondence contract number prestored in concealed code information and server is compared, judge concealed code information with Whether concealed code text matches, and when only above-mentioned matching result is true, just can tentatively judge the authenticity of the contract.If its In a matching result be false, then it is assumed that the contract is forged contract.
For the identification precision for further increasing the anti-fake contract verification method, the embodiment of the present invention also provides a kind of anti-fake conjunction Same verification method, this method can also include: on the basis of comprising step shown in Fig. 3 and Fig. 4
Judge whether the text matching result is true.
If so, obtaining the business key message stored in host according to the contract number.
Host information, which is obtained, with the business key message in the body text according to the business key message matches knot Fruit.
Specifically, text message and server entrained in the image obtained by image procossing of the embodiment of the present invention In text message in the body text of the correspondence contract number that prestores it is consistent when, the contract number can be called from host again The business key message to keep accounts, then by from the business key message in business key message that host recalls and body text into Row compares matching, to carry out secondary verifying, can not only verify the authenticity of contract, moreover it is possible to ensure the transaction of contract behind Authenticity prevents bank cashier and client from signing a true contract but the fund of client has been gone to the feelings of other accounts Condition further ensures that service security.
Final verification result is obtained according to the host information matching result and the contract verification result.
If it is not, judging the contract for forged contract.
By using above scheme, it can be realized secondary verifying, further ensure that service security.
It is worth noting that including: two dimensional code, text of Contract, watermark, concealed code in the image of the contract to be verified On the basis of, it generally further include seal.The information such as watermark, seal can form interference to identification text of Contract, therefore, utilize Before OCR technique identifies treaty content, need first to remove seal and watermark.
In an alternative embodiment, step S400 can specifically include content:
Step 1: eliminating the seal in the image of the contract to be verified, obtain seal image.
Specifically, scanning obtains tri- color value of RGB of all pixels in the image of contract to be verified first, to R (red) G (green) B (blue) takes the value of 0-255 respectively, is higher than value 1 of fainting (recommended value 200 is adjusted) to R (red), and G is (green Color) and B (blue) lower than the pixel for value 2 (recommended value 50, adjustable) of fainting switch to tri- color of RGB be 255 color it is (i.e. white Color), eliminate red seal, the picture picture_preprocessed after obtaining seal.
Step 2: the text in seal image being gone to obtain watermarking images described in elimination.
Specifically, gray processing processing is carried out to scanned picture picture_preprocessed, i.e., by institute in scanned picture There is tri- color value of RGB of pixel to switch to the gray value of the 0-255 of a dimension, lower than value 3 of fainting (recommended value 100 is adjusted) Pixel switchs to the color (i.e. white) that tri- color of RGB is 255, eliminates text message, obtains picture_processed2.
Step 3:OCR identification technology identifies that the watermarking images obtain the watermark information;
Step 4: going the watermark in seal image described in elimination, obtain text image.
Specifically, gray processing processing is carried out to picture picture_preprocessed, i.e., by pictures all in scanned picture Tri- color value of RGB of element switchs to the gray value of the 0-255 of a dimension, higher than the pixel of value 3 of fainting (recommended value 100 is adjusted) Switch to the color (i.e. white) that tri- color of RGB is 255, eliminates watermark information, obtain picture_processed1.
Step 5: identifying that the text image obtains the text message based on OCR identification technology;
Step 6: identifying that the image of the contract to be verified obtains the concealed code information based on OCR identification technology.
Specifically, it can be read out according to the setting coordinate pair concealed code of concealed code, read stain and be denoted as 1 white point and be denoted as 0, Form 20 bytes, the data picture_nowatchcode of 160 binary digits, for carrying out concealed code identification.
To fully understand the present invention convenient for those skilled in the art, illustrated using verifying eventually below with reference to Fig. 1 to Fig. 4 Realize the process of contract verification in end.
Realize that the process of contract verification is as follows using verifying terminal:
(1) verifying terminal 3 is scanned or takes pictures to anti-fake contract 2paper_origin, obtains picture picture_ Origin simultaneously uploads to contract processing server 5.
(2) contract processing server 5 is analyzed and processed picture picture_origin, obtains the two of coordinate { X, Y } Code is tieed up, the contract number in two dimensional code is taken out.
(3) based on contract contract processing server 5 numbers body text doc_text, the water for finding the contract retained in it This doc_water of printed text and concealed code text doc_nowatchcode.
(4) contract processing server 5 carries out seal Processing for removing to picture picture_origin, and scanning first obtains Tri- color value of RGB of all pixels in picture_origin picture, takes 0-255's to R (red) G (green) B (blue) respectively Value is higher than value 1 of fainting (recommended value 200 is adjusted) to R (red), and G (green) and B (blue) is lower than 2 (recommended value of value of fainting It is be 50, adjustable) pixel switch to the color (i.e. white) that tri- color of RGB is 255, red seal is eliminated, after obtaining seal Picture picture_preprocessed.
(5) contract processing server 5 carries out gray processing processing to picture picture_preprocessed, i.e., by scanning figure Tri- color value of RGB of all pixels switchs to the gray value of the 0-255 of a dimension in piece, and higher than value 3 of fainting, (recommended value 100, can Adjust) pixel switch to the color (i.e. white) that tri- color of RGB is 255, eliminate watermark information, obtain picture_ processed1。
(6) contract processing server 5 carries out gray processing processing to picture_preprocessed, i.e., by picture_ Tri- color value of RGB of all pixels switchs to the gray value of the 0-255 of a dimension in preprocessed, lower than value 3 of fainting (it is recommended that Value is 100, adjustable) pixel switch to the color (i.e. white) that tri- color of RGB is 255 and eliminate text message, obtain picture_processed2。
(7) contract processing server 5 is using OCR identification technology to picture_processed1 and picture_ Processed2 is scanned and identifies, will identify that body text and watermark are carried out with doc_text and doc_water respectively It compares, obtains text matching mark ismatch_text (true or false) and watermark matches mark ismatch_water (true or false).
(8) contract processing server 5 identifies picture_origin using OCR identification technology, according to concealed code Fixed coordinates nowatchcode_xy_serial read concealed code, read stain and be denoted as 1 white point and be denoted as 0, form 20 bytes, The data picture_nowatchcode of 160 binary digits, and be compared with doc_nowatchcode, obtain concealed code Matching identification ismatch_nowatchcode (true or false).
(9) if in (7) text matching success (ismatch_text=true) if contract processing server 5 based on contract Customer name and the amount of money in number inquiry host account, by the value found and business key message corresponding in doc_text The value of (customer name, the amount of money) is compared, and obtains host information matching identification ismatch_host (true or false).
(10) contract processing server 5 judges ismatch_text, ismatch_water, ismatch_ Whether the value of nowatchcode, ismatch_host are true, if so, echoing this to verifying terminal 3 is true contract, Otherwise echo is the contract that leaves a question open.
By using above-mentioned technical proposal, the time cost of customer authentication contract can reduce, client need not remove bank's net Point is lined up, and is in or can be recognized the contract true and false in the verifying terminal self-help verification of bank, greatly reduces the time of client Cost, the reduction of time cost can also excite the enthusiasm of customer authentication contract, meanwhile, the operation for reducing customer authentication contract is difficult Degree only needs to scan one to contract with mobile phone against contract according to a photo or with the verifying terminal of bank for client Figure can be easily accomplished verifying, not need to manually enter a word, operation reaches extremely simple, this helps some elderly populations It helps very greatly, furthermore, the accuracy and reliability of contract verification is improved, verifying system not only realizes the verification to text of Contract, The verification to concealed code and watermark is also achieved, the verification to host account information is also achieved, false contract can be utterly destroyed A possibility that, allow client thoroughly to trust.
Fig. 5 is the flow diagram one of the anti-fake contract generation method in the embodiment of the present invention.As shown in figure 5, this is anti-fake Contract generation method may include the following contents:
Step S1000: text of Contract is obtained.
Wherein, the text of Contract is by typing terminal typing, comprising: customer name, contract value, contract number, contract class The business key message such as type.
Step S2000: two dimensional code and concealed code are generated according to the text of Contract.
Wherein, the two dimensional code is generated according to the contract number.
In addition, carrying out Hash calculation to the text of Contract obtains the concealed code.
Step S3000: anti-fake contract is generated according to the text of Contract, the two dimensional code and the concealed code.
Specifically, watermark, two dimensional code, concealed code are added to the text of Contract of typing, generates anti-fake contract, and in server These information are saved, specifically:
In order to identify that two dimensional code is convenient, two dimensional code, two dimensional code can be added in the lower right corner fixed coordinates { X, Y } of text of Contract Contain the value of contract number.
Carry out HASH to the binary system entire contents of contract and calculate to obtain digest value, digest value is 20 bytes, 160 two into Position processed, 1 represents stain in binary digit, and 0 represents white point, and the sequence of these black-white points is printed to the bottom of every page of contract, is beaten Print 4 rows, row with 5 millimeters of row interval, every row has 40 points, and each 5 millimeters of spacing, the coordinate sequence of printing is denoted as nowatchcode_xy_serial。
It by using above-mentioned anti-fake contract generation method, can be matched with anti-fake contract verification method, facilitate client certainly Dynamic to realize contract verification, time saving and energy saving, the workload of reduction customer authentication contract improves the accuracy of verifying, high reliablity can It effectively prevents financial risk, guarantees the safety of banking contract.
Fig. 6 is the flow diagram two of the anti-fake contract generation method in the embodiment of the present invention.As shown in fig. 6, this is anti-fake Contract generation method can also include: on the basis of comprising step shown in Fig. 5
Step S4000: watermark is added to the anti-fake contract.
Specifically, the text of the fixed text of watermark i.e. a string, is attached among text at regular intervals with light font.
Step S5000: with an official seal affixed to the anti-fake contract.
Specifically, increase seal graphics to the predeterminated position of text of Contract.
In an alternative embodiment, the generation method of the anti-fake contract can also include: by the institute in text of Contract The business key message of stating is sent to host, so that the host stores the business key message, completes to keep accounts.
In an alternative embodiment, the generation method of the anti-fake contract can also include: to store the text of Contract, be somebody's turn to do Watermark and the concealed code form body text, watermark text and the concealed code text of the corresponding contract.
In an alternative embodiment, the generation method of the anti-fake contract can also include: based on contract type acquisition The general clause of contract, and general clause is added to the corresponding position in text of Contract.
In an alternative embodiment, the generation method of the anti-fake contract can also include: anti-fake by what is ultimately generated Contract is sent to typing terminal.
Based on the same inventive concept, the embodiment of the present application also provides a kind of anti-fake contract verification device, it can be used for reality Anti-fake contract verification method described in existing above-described embodiment, as described in the following examples.Due to anti-fake contract verification device The principle solved the problems, such as is similar to the above method, therefore the implementation of anti-fake contract verification device may refer to the reality of the above method It applies, overlaps will not be repeated.Used below, the software of predetermined function may be implemented in term " unit " or " module " And/or the combination of hardware.Although device described in following embodiment is preferably realized with software, hardware or soft The realization of the combination of part and hardware is also that may and be contemplated.
Fig. 7 is the structural block diagram of the anti-fake contract verification device in the embodiment of the present invention.As shown in fig. 7, the anti-fake contract Verifying device specifically includes: image collection module 10, two dimensional code identification module 20, text obtain module 30, image processing module 40 and authentication module 50.
Image collection module 10 obtains the image of contract to be verified, includes: two dimensional code in the image of the contract to be verified, closes Same text, watermark, concealed code.
Wherein, the text of the fixed text of watermark i.e. a string, is attached among text at regular intervals with light font.Two dimension Code is the two-dimension code image added in contract lower right corner fixed coordinates { X, Y }, contains the value of contract number in two dimensional code;It is stealthy Code is that contract processing server carries out HASH calculating acquirement digest value to the binary system entire contents of contract, and digest value is 20 words It saves, 160 binary digits, 1 represents stain in binary digit, and 0 represents white point, and it is every that the sequence of these black-white points is printed to contract The bottom of page prints 4 rows, and row has 40 points with 5 millimeters of row interval, every row, and each 5 millimeters of spacing, the coordinate sequence of printing It is denoted as nowatchcode_xy_serial.
Two dimensional code identification module 20 identifies that the two dimensional code obtains the contract number of the contract to be verified;
Wherein it is possible to obtain information entrained by two dimensional code using two dimensional code in OCR identification technology identification image.
Text obtains module 30 and obtains body text, watermark text and the concealed code text prestored according to the contract number This;
Wherein, in contract generation phase, server has stored the number and its corresponding text, water of generation contract The information such as print, concealed code, when being verified to contract, based on contract number obtain in server the above- mentioned information that prestore with In the true and false of verifying contract.
Image processing module 40 to the image of the contract to be verified carry out image procossing obtain watermark information, text message with And concealed code information;
Wherein, with watermark enhancing (sharpenings), watermark elimination, seal elimination, OCR technique to the image of contract to be verified into Row processing, and then obtain the watermark information, text message and concealed code information.
Authentication module 50 is believed according to the body text, the watermark text, the concealed code text, the text message, the watermark Breath and the concealed code information obtain contract verification result.
Through the above technical solution it is known that anti-fake contract verification device provided in an embodiment of the present invention, passes through two dimension Code identification contract number, then transfers the contract dataset prestored according to number in the server, and is obtained by image procossing Contract dataset is compared and then obtains contract verification result it is not necessary to which client inputs network address, the contract number etc. of verifying website Information does not need manually to compare, it is only necessary to and the image for inputting contract to be verified can realize contract verification automatically, time saving and energy saving, The workload for reducing customer authentication contract, improves the accuracy of verifying, can effectively prevent financial risk, guarantee the peace of banking contract Quan Xing.
In addition, being evident that content carries out fake certification by the way that two dimensional code, watermark, concealed code etc. are non-, so that crime point Son is not allowed easy to identify and is forged, the safety of effective guarantee banking contract.
In an alternative embodiment, which includes: the first matching unit, the second matching unit, third With unit and authentication unit.
First matching unit obtains concealed code matching result according to the concealed code information and the concealed code text;
Second matching unit obtains watermark matches result according to the watermark information and the watermark text;
Third matching unit obtains text matching result according to the text message and the contract text;
Authentication unit obtains contract according to the concealed code matching result, the watermark matches result and the text matching result Verification result.
Specifically, it will be prestored in text message and server entrained in the image obtained by image procossing corresponding Text message in the body text of the contract number is compared, and judges whether text message matches with body text.It will lead to Cross the watermark text of the corresponding contract number prestored in watermark information and server entrained in the image that image procossing obtains Originally it is compared, judges whether watermark information matches with watermark text;It will be entrained in the image obtained by image procossing The concealed code text of the correspondence contract number prestored in concealed code information and server is compared, judge concealed code information with Whether concealed code text matches, and when only above-mentioned matching result is true, just can tentatively judge the authenticity of the contract.If its In a matching result be false, then it is assumed that the contract is forged contract.
In an alternative embodiment, anti-fake contract verification device further include: judgment module, host data obtain mould Block, key information match module and secondary authentication module.
Judgment module judges whether the text matching result is true;
Host data obtains module when the text matching result is true, according to what is stored in contract number acquisition host Business key message;
Key information match module is led according to the business key message and the business key message in the body text Machine information matching result.
Secondary authentication module obtains final verification result according to the host information matching result and the contract verification result.
Specifically, text message and server entrained in the image obtained by image procossing of the embodiment of the present invention In text message in the body text of the correspondence contract number that prestores it is consistent when, the contract number can be called from host again The business key message to keep accounts, then by from the business key message in business key message that host recalls and body text into Row compares matching, to carry out secondary verifying, can not only verify the authenticity of contract, moreover it is possible to ensure the transaction of contract behind Authenticity prevents bank cashier and client from signing a true contract but the fund of client has been gone to the feelings of other accounts Condition further ensures that service security.
By using above scheme, it can be realized secondary verifying, further ensure that service security.
In an alternative embodiment, in the image of the contract to be verified further include: seal, the image processing module packet Include: seal eliminates unit, watermarking images acquiring unit, watermark recognition unit, text acquiring unit, text recognition unit and hidden Shape code recognition unit.
Seal eliminates unit and eliminates the seal in the image of the contract to be verified, obtains seal image.
The information such as watermark, seal can form interference to identification text of Contract, therefore, using in OCR technique identification contract Before appearance, need first to remove seal and watermark.
Specifically, scanning obtains tri- color value of RGB of all pixels in the image of contract to be verified first, to R (red) G (green) B (blue) takes the value of 0-255 respectively, is higher than value 1 of fainting (recommended value 200 is adjusted) to R (red), and G is (green Color) and B (blue) lower than the pixel for value 2 (recommended value 50, adjustable) of fainting switch to tri- color of RGB be 255 color it is (i.e. white Color), eliminate red seal, the picture picture_preprocessed after obtaining seal.
Watermarking images acquiring unit eliminates the text gone in seal image and obtains watermarking images;
Specifically, gray processing processing is carried out to scanned picture picture_preprocessed, i.e., by institute in scanned picture There is tri- color value of RGB of pixel to switch to the gray value of the 0-255 of a dimension, lower than value 3 of fainting (recommended value 100 is adjusted) Pixel switchs to the color (i.e. white) that tri- color of RGB is 255, eliminates text message, obtains picture_processed2.
Watermark recognition unit is based on OCR identification technology and identifies that the watermarking images obtain the watermark information;
Text acquiring unit eliminates the watermark gone in seal image, obtains text image.
Specifically, gray processing processing is carried out to picture picture_preprocessed, i.e., by pictures all in scanned picture Tri- color value of RGB of element switchs to the gray value of the 0-255 of a dimension, higher than the pixel of value 3 of fainting (recommended value 100 is adjusted) Switch to the color (i.e. white) that tri- color of RGB is 255, eliminates watermark information, obtain picture_processed1.
Text recognition unit is based on OCR identification technology and identifies that the text image obtains the text message;
Concealed code recognition unit identifies that the image of the contract to be verified obtains the concealed code information based on OCR identification technology.
Specifically, it can be read out according to the setting coordinate pair concealed code of concealed code, read stain and be denoted as 1 white point and be denoted as 0, Form 20 bytes, the data picture_nowatchcode of 160 binary digits, for carrying out concealed code identification.
Based on the same inventive concept, the embodiment of the present application also provides a kind of anti-fake contract generating means, it can be used for reality Anti-fake contract generation method described in existing above-described embodiment, as described in the following examples.Due to anti-fake contract generating means The principle solved the problems, such as is similar to the above method, therefore the implementation of anti-fake contract generating means may refer to the reality of the above method It applies, overlaps will not be repeated.Used below, the software of predetermined function may be implemented in term " unit " or " module " And/or the combination of hardware.Although device described in following embodiment is preferably realized with software, hardware or soft The realization of the combination of part and hardware is also that may and be contemplated.
Fig. 8 is the structural block diagram of the anti-fake contract generating means in the embodiment of the present invention.As shown in figure 8, the anti-fake contract Generating means may include the following contents: text obtains module 100, two dimensional code concealed code generation module 200 and anti-fake contract Generation module 300.
Text obtains module 100 and obtains text of Contract.
Wherein, the text of Contract is by typing terminal typing, comprising: customer name, contract value, contract number, contract class The business key message such as type.
Two dimensional code concealed code generation module 200 generates two dimensional code and concealed code according to the text of Contract;
Anti-fake contract generation module 300 generates anti-fake contract according to the text of Contract, the two dimensional code and the concealed code.
Specifically, watermark, two dimensional code, concealed code are added to the text of Contract of typing, generates anti-fake contract, and in server These information are saved, specifically:
In order to identify that two dimensional code is convenient, two dimensional code, two dimensional code can be added in the lower right corner fixed coordinates { X, Y } of text of Contract Contain the value of contract number.
Carry out HASH to the binary system entire contents of contract and calculate to obtain digest value, digest value is 20 bytes, 160 two into Position processed, 1 represents stain in binary digit, and 0 represents white point, and the sequence of these black-white points is printed to the bottom of every page of contract, is beaten Print 4 rows, row with 5 millimeters of row interval, every row has 40 points, and each 5 millimeters of spacing, the coordinate sequence of printing is denoted as nowatchcode_xy_serial。
It by using above-mentioned anti-fake contract generating means, can be matched with anti-fake contract verification method, facilitate client certainly Dynamic to realize contract verification, time saving and energy saving, the workload of reduction customer authentication contract improves the accuracy of verifying, high reliablity can It effectively prevents financial risk, guarantees the safety of banking contract.
In an alternative embodiment, which includes: contract number, the two dimensional code concealed code generation module packet It includes: two dimensional code generation unit.Two dimensional code generation unit generates the two dimensional code according to the contract number.
In an alternative embodiment, which includes: concealed code generation unit, to the conjunction Hash calculation, which is carried out, with text obtains the concealed code.
In an alternative embodiment, anti-fake contract generating means further include: watermark adding module, to the anti-fake contract Add watermark.
Specifically, the text of the fixed text of watermark i.e. a string, is attached among text at regular intervals with light font.
In an alternative embodiment, anti-fake contract generating means further include: module of affixing one's seal is covered to the anti-fake contract Seal.
Specifically, increase seal graphics to the predeterminated position of text of Contract.
In an alternative embodiment, which includes business key message, and the anti-fake contract generating means are also Include: the module that keeps accounts, which be sent to host so that the host stores the business key message, complete into Account.
In an alternative embodiment, anti-fake contract generating means further include: memory module, store the text of Contract, The watermark and the concealed code form body text, watermark text and the concealed code text of the corresponding contract.
In an alternative embodiment, anti-fake contract generating means further include: general clause obtains adding module, root The general clause of contract is obtained according to contract type, and general clause is added to the corresponding position in text of Contract.
In an alternative embodiment, the generating means of the anti-fake contract can also include: contract sending module, will most Throughout one's life at anti-fake contract be sent to typing terminal.
Device, module or the unit that above-described embodiment illustrates can specifically be realized, Huo Zheyou by computer chip or entity Product with certain function is realized.It is a kind of typical to realize that equipment is electronic equipment, specifically, electronic equipment for example can be with For personal computer, laptop computer, cellular phone, camera phone, smart phone, personal digital assistant, media player, Any in navigation equipment, electronic mail equipment, game console, tablet computer, wearable device or these equipment sets Standby combination.
Electronic equipment specifically includes memory, processor and storage on a memory and can in a typical example The computer program run on a processor, the processor realize the authentication of above-mentioned anti-fake contract when executing described program The step of method, alternatively, the step of realizing the generation method of above-mentioned anti-fake contract.
Below with reference to Fig. 9, it illustrates the structural representations for the electronic equipment 600 for being suitable for being used to realize the embodiment of the present application Figure.
As shown in figure 9, electronic equipment 600 includes central processing unit (CPU) 601, it can be according to being stored in read-only deposit Program in reservoir (ROM) 602 is loaded into random access storage device (RAM) from storage section 608) program in 603 and Execute various work appropriate and processing.In RAM603, also it is stored with system 600 and operates required various programs and data. CPU601, ROM602 and RAM603 are connected with each other by bus 604.Input/output (I/O) interface 605 is also connected to bus 604。
I/O interface 605 is connected to lower component: the importation 606 including keyboard, mouse etc.;It is penetrated including such as cathode The output par, c 607 of spool (CRT), liquid crystal display (LCD) etc. and loudspeaker etc.;Storage section 608 including hard disk etc.; And including such as LAN card, the communications portion 609 of the network interface card of modem etc..Communications portion 609 via such as because The network of spy's net executes communication process.Driver 610 is also connected to I/O interface 606 as needed.Detachable media 611, such as Disk, CD, magneto-optic disk, semiconductor memory etc. are mounted on as needed on driver 610, in order to read from thereon Computer program be mounted as needed such as storage section 608.
Particularly, according to an embodiment of the invention, may be implemented as computer above with reference to the process of flow chart description Software program.For example, the embodiment of the present invention includes a kind of computer readable storage medium, it is stored thereon with computer program, The computer program realizes the step of verification method of above-mentioned anti-fake contract when being executed by processor, alternatively, realizing above-mentioned The step of generation method of anti-fake contract.
In such embodiments, which can be downloaded and installed from network by communications portion 609, And/or it is mounted from detachable media 611.
Computer-readable medium includes permanent and non-permanent, removable and non-removable media can be by any method Or technology come realize information store.Information can be computer readable instructions, data structure, the module of program or other data. The example of the storage medium of computer includes, but are not limited to phase change memory (PRAM), static random access memory (SRAM), moves State random access memory (DRAM), other kinds of random access memory (RAM), read-only memory (ROM), electric erasable Programmable read only memory (EEPROM), flash memory or other memory techniques, read-only disc read only memory (CD-ROM) (CD-ROM), Digital versatile disc (DVD) or other optical storage, magnetic cassettes, tape magnetic disk storage or other magnetic storage devices Or any other non-transmission medium, can be used for storage can be accessed by a computing device information.As defined in this article, it calculates Machine readable medium does not include temporary computer readable media (transitory media), such as the data-signal and carrier wave of modulation.
For convenience of description, it is divided into various units when description apparatus above with function to describe respectively.Certainly, implementing this The function of each unit can be realized in the same or multiple software and or hardware when application.
The present invention be referring to according to the method for the embodiment of the present invention, the process of equipment (system) and computer program product Figure and/or block diagram describe.It should be understood that every one stream in flowchart and/or the block diagram can be realized by computer program instructions The combination of process and/or box in journey and/or box and flowchart and/or the block diagram.It can provide these computer programs Instruct the processor of general purpose computer, special purpose computer, Embedded Processor or other programmable data processing devices to produce A raw machine, so that being generated by the instruction that computer or the processor of other programmable data processing devices execute for real The device for the function of being specified in present one or more flows of the flowchart and/or one or more blocks of the block diagram.
These computer program instructions, which may also be stored in, is able to guide computer or other programmable data processing devices with spy Determine in the computer-readable memory that mode works, so that it includes referring to that instruction stored in the computer readable memory, which generates, Enable the manufacture of device, the command device realize in one box of one or more flows of the flowchart and/or block diagram or The function of being specified in multiple boxes.
These computer program instructions also can be loaded onto a computer or other programmable data processing device, so that counting Series of operation steps are executed on calculation machine or other programmable devices to generate computer implemented processing, thus in computer or The instruction executed on other programmable devices is provided for realizing in one or more flows of the flowchart and/or block diagram one The step of function of being specified in a box or multiple boxes.
It should also be noted that, the terms "include", "comprise" or its any other variant are intended to nonexcludability It include so that the process, method, commodity or the equipment that include a series of elements not only include those elements, but also to wrap Include other elements that are not explicitly listed, or further include for this process, method, commodity or equipment intrinsic want Element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that including described want There is also other identical elements in the process, method of element, commodity or equipment.
It will be understood by those skilled in the art that embodiments herein can provide as method, system or computer program product. Therefore, complete hardware embodiment, complete software embodiment or embodiment combining software and hardware aspects can be used in the application Form.It is deposited moreover, the application can be used to can be used in the computer that one or more wherein includes computer usable program code The shape for the computer program product implemented on storage media (including but not limited to magnetic disk storage, CD-ROM, optical memory etc.) Formula.
The application can describe in the general context of computer-executable instructions executed by a computer, such as program Module.Generally, program module includes routines performing specific tasks or implementing specific abstract data types, programs, objects, group Part, data structure etc..The application can also be practiced in a distributed computing environment, in these distributed computing environments, by Task is executed by the connected remote processing devices of communication network.In a distributed computing environment, program module can be with In the local and remote computer storage media including storage equipment.
All the embodiments in this specification are described in a progressive manner, same and similar portion between each embodiment Dividing may refer to each other, and each embodiment focuses on the differences from other embodiments.Especially for system reality For applying example, since it is substantially similar to the method embodiment, so being described relatively simple, related place is referring to embodiment of the method Part explanation.
The above description is only an example of the present application, is not intended to limit this application.For those skilled in the art For, various changes and changes are possible in this application.All any modifications made within the spirit and principles of the present application are equal Replacement, improvement etc., should be included within the scope of the claims of this application.

Claims (24)

1. a kind of verification method of anti-fake contract characterized by comprising
The image of contract to be verified is obtained, includes: two dimensional code, text of Contract, watermark, stealth in the image of the contract to be verified Code;
Identify that the two dimensional code obtains the contract number of the contract to be verified;
Body text, watermark text and the concealed code text prestored is obtained according to the contract number;
Image procossing is carried out to the image of the contract to be verified and obtains watermark information, text message and concealed code information;
According to the body text, the watermark text, the concealed code text, the text message, the watermark information with And the concealed code information obtains contract verification result.
2. the verification method of anti-fake contract according to claim 1, which is characterized in that it is described according to the body text, The watermark text, the concealed code text, the text message, the watermark information and the concealed code information are closed Same verification result, comprising:
Concealed code matching result is obtained according to the concealed code information and the concealed code text;
Watermark matches result is obtained according to the watermark information and the watermark text;
Text matching result is obtained according to the text message and the contract text;
Contract verification knot is obtained according to the concealed code matching result, the watermark matches result and the text matching result Fruit.
3. the verification method of anti-fake contract according to claim 2, which is characterized in that the verification method of the anti-fake contract Further include:
Judge whether the text matching result is true;
If so, obtaining the business key message stored in host according to the contract number;
Host information matching result is obtained according to the business key message in the business key message and the body text;
Final verification result is obtained according to the host information matching result and the contract verification result.
4. the verification method of anti-fake contract according to claim 1, which is characterized in that in the image of the contract to be verified Further include: seal, the image to the contract to be verified carry out image procossing and obtain watermark information, text message and hidden Code information, comprising:
The seal in the image of the contract to be verified is eliminated, seal image is obtained;
The text in seal image is gone to obtain watermarking images described in elimination;
Identify that the watermarking images obtain the watermark information based on OCR identification technology;
The watermark in seal image is gone described in elimination, obtains text image;
Identify that the text image obtains the text message based on OCR identification technology;
Identify that the image of the contract to be verified obtains the concealed code information based on OCR identification technology.
5. a kind of generation method of anti-fake contract characterized by comprising
Obtain text of Contract;
Two dimensional code and concealed code are generated according to the text of Contract;
Anti-fake contract is generated according to the text of Contract, the two dimensional code and the concealed code.
6. the generation method of anti-fake contract according to claim 5, which is characterized in that the text of Contract includes: contract Number, it is described that two dimensional code is generated according to the text of Contract, comprising:
The two dimensional code is generated according to the contract number.
7. the generation method of anti-fake contract according to claim 5, which is characterized in that described raw according to the text of Contract At concealed code, comprising:
Hash calculation is carried out to the text of Contract and obtains the concealed code.
8. the generation method of anti-fake contract according to claim 5, which is characterized in that further include:
Watermark is added to the anti-fake contract.
9. the generation method of anti-fake contract according to claim 5, which is characterized in that further include:
It is with an official seal affixed to the anti-fake contract.
10. the generation method of anti-fake contract according to claim 5, which is characterized in that the text of Contract includes business Key message, the generation method of the anti-fake contract further include:
The business key message is sent to host, so that the host stores the business key message, completes to keep accounts.
11. the generation method of anti-fake contract according to claim 8, which is characterized in that further include:
The text of Contract, the watermark and the concealed code are stored, body text, the watermark text of the corresponding contract are formed Sheet and concealed code text.
12. a kind of anti-fake contract verification device characterized by comprising
Image collection module obtains the image of contract to be verified, includes: two dimensional code, contract in the image of the contract to be verified Text, watermark, concealed code;
Two dimensional code identification module identifies that the two dimensional code obtains the contract number of the contract to be verified;
Text obtains module, and body text, watermark text and the concealed code text prestored is obtained according to the contract number;
Image processing module, to the image of the contract to be verified carry out image procossing obtain watermark information, text message and Concealed code information;
Authentication module, according to the body text, the watermark text, the concealed code text, the text message, the water Official seal breath and the concealed code information obtain contract verification result.
13. anti-fake contract verification device according to claim 12, which is characterized in that the authentication module includes:
First matching unit obtains concealed code matching result according to the concealed code information and the concealed code text;
Second matching unit obtains watermark matches result according to the watermark information and the watermark text;
Third matching unit obtains text matching result according to the text message and the contract text;
Authentication unit is obtained according to the concealed code matching result, the watermark matches result and the text matching result Contract verification result.
14. anti-fake contract verification device according to claim 13, which is characterized in that further include:
Judgment module judges whether the text matching result is true;
Host data obtains module, when the text matching result is true, is obtained in host and is stored according to the contract number Business key message;
Key information match module is led according to the business key message and the business key message in the body text Machine information matching result;
Secondary authentication module obtains finally verifying knot according to the host information matching result and the contract verification result Fruit.
15. anti-fake contract verification device according to claim 12, which is characterized in that in the image of the contract to be verified Further include: seal, described image processing module include:
Seal eliminates unit, eliminates the seal in the image of the contract to be verified, obtains seal image;
Watermarking images acquiring unit goes the text in seal image to obtain watermarking images described in elimination;
Watermark recognition unit identifies that the watermarking images obtain the watermark information based on OCR identification technology;
Text acquiring unit goes the watermark in seal image described in elimination, obtains text image;
Text recognition unit identifies that the text image obtains the text message based on OCR identification technology;
Concealed code recognition unit identifies that the image of the contract to be verified obtains the concealed code information based on OCR identification technology.
16. a kind of anti-fake contract generating means characterized by comprising
Text obtains module, obtains text of Contract;
Two dimensional code concealed code generation module generates two dimensional code and concealed code according to the text of Contract;
Anti-fake contract generation module generates anti-fake contract according to the text of Contract, the two dimensional code and the concealed code.
17. anti-fake contract generating means according to claim 16, which is characterized in that the text of Contract includes: contract Number, the two dimensional code concealed code generation module include:
Two dimensional code generation unit generates the two dimensional code according to the contract number.
18. anti-fake contract generating means according to claim 16, which is characterized in that the two dimensional code concealed code generates mould Block includes:
Concealed code generation unit carries out Hash calculation to the text of Contract and obtains the concealed code.
19. anti-fake contract generating means according to claim 16, which is characterized in that further include:
Watermark adding module adds watermark to the anti-fake contract.
20. anti-fake contract generating means according to claim 16, which is characterized in that further include:
It affixes one's seal module, it is with an official seal affixed to the anti-fake contract.
21. anti-fake contract generating means according to claim 16, which is characterized in that the text of Contract includes that business is closed Key information, the anti-fake contract generating means further include:
Keep accounts module, and the business key message is sent to host, so that the host stores the business key message, it is complete At keeping accounts.
22. anti-fake contract generating means according to claim 19, which is characterized in that further include:
Memory module stores the text of Contract, the watermark and the concealed code, forms the text text of the corresponding contract Originally, watermark text and concealed code text.
23. a kind of electronic equipment including memory, processor and stores the calculating that can be run on a memory and on a processor Machine program, which is characterized in that the processor realizes the described in any item anti-fake conjunctions of Claims 1-4 when executing described program With verification method the step of, alternatively, realize the described in any item anti-fake contracts of claim 5 to 11 generation method step Suddenly.
24. a kind of computer readable storage medium, is stored thereon with computer program, which is characterized in that the computer program quilt The step of verification method of the described in any item anti-fake contracts of Claims 1-4 is realized when processor executes, alternatively, realizing power Benefit requires the step of generation method of 5 to 11 described in any item anti-fake contracts.
CN201910529971.8A 2019-06-19 2019-06-19 Verification method, generation method and the relevant apparatus of anti-fake contract Pending CN110264223A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910529971.8A CN110264223A (en) 2019-06-19 2019-06-19 Verification method, generation method and the relevant apparatus of anti-fake contract

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910529971.8A CN110264223A (en) 2019-06-19 2019-06-19 Verification method, generation method and the relevant apparatus of anti-fake contract

Publications (1)

Publication Number Publication Date
CN110264223A true CN110264223A (en) 2019-09-20

Family

ID=67919232

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910529971.8A Pending CN110264223A (en) 2019-06-19 2019-06-19 Verification method, generation method and the relevant apparatus of anti-fake contract

Country Status (1)

Country Link
CN (1) CN110264223A (en)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110895711A (en) * 2019-11-05 2020-03-20 泰康保险集团股份有限公司 Job entry management method and device
CN112001819A (en) * 2020-08-21 2020-11-27 山东商务职业学院 Small-sized portable mistake and disorder prevention international trade contract scanning device and method
CN112001818A (en) * 2020-08-19 2020-11-27 凯美瑞德(苏州)信息科技股份有限公司 Contract verification method and device, computer equipment and storage medium
CN112115836A (en) * 2020-09-11 2020-12-22 北京金堤科技有限公司 Information verification method and device, computer readable storage medium and electronic equipment
CN113222076A (en) * 2020-01-21 2021-08-06 阿里健康信息技术有限公司 Printing and verifying method, device, system and storage medium
CN113487000A (en) * 2021-07-30 2021-10-08 深圳市链融科技股份有限公司 Contract document and service matching method and device, computer equipment and storage medium
CN113963354A (en) * 2021-12-16 2022-01-21 深圳市活力天汇科技股份有限公司 Method and device for obtaining order number
US11720991B2 (en) 2021-05-20 2023-08-08 International Business Machines Corporation Signing and authentication of digital images and other data arrays

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1952973A (en) * 2006-11-17 2007-04-25 韩少杰 Method and system against false of network identification, verification, supervision and inquiry for graphic context bar code on bank bill
CN102411701A (en) * 2010-09-20 2012-04-11 航天信息股份有限公司 Two-dimensional code array image scanning and identifying method and system for value-added tax special invoice
CN102567764A (en) * 2012-01-13 2012-07-11 中国工商银行股份有限公司 Bill certificate and system for improving electronic image recognition efficiency
US20160055552A1 (en) * 2013-03-26 2016-02-25 China Unionpay Co., Ltd. Generating method, verifying method for electronic bill with anti-fake two dimension (2d) code and system for same
CN106919848A (en) * 2017-03-07 2017-07-04 江苏科大汇峰科技有限公司 A kind of contract method for anti-counterfeit based on mobile terminal fingerprint recognition
CN109461247A (en) * 2018-10-29 2019-03-12 北京慧流科技有限公司 Note validating method and device, electronic equipment and storage medium

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1952973A (en) * 2006-11-17 2007-04-25 韩少杰 Method and system against false of network identification, verification, supervision and inquiry for graphic context bar code on bank bill
CN102411701A (en) * 2010-09-20 2012-04-11 航天信息股份有限公司 Two-dimensional code array image scanning and identifying method and system for value-added tax special invoice
CN102567764A (en) * 2012-01-13 2012-07-11 中国工商银行股份有限公司 Bill certificate and system for improving electronic image recognition efficiency
US20160055552A1 (en) * 2013-03-26 2016-02-25 China Unionpay Co., Ltd. Generating method, verifying method for electronic bill with anti-fake two dimension (2d) code and system for same
CN106919848A (en) * 2017-03-07 2017-07-04 江苏科大汇峰科技有限公司 A kind of contract method for anti-counterfeit based on mobile terminal fingerprint recognition
CN109461247A (en) * 2018-10-29 2019-03-12 北京慧流科技有限公司 Note validating method and device, electronic equipment and storage medium

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
任传成 等: "《健康物联网》", 31 October 2015, 上海:上海科学技术文献出版社 *
魏玉山 等: "《数字版权保护技术研发工程论文选辑》", 31 December 2016, 北京:中国书籍出版社 *

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110895711A (en) * 2019-11-05 2020-03-20 泰康保险集团股份有限公司 Job entry management method and device
CN113222076A (en) * 2020-01-21 2021-08-06 阿里健康信息技术有限公司 Printing and verifying method, device, system and storage medium
CN112001818A (en) * 2020-08-19 2020-11-27 凯美瑞德(苏州)信息科技股份有限公司 Contract verification method and device, computer equipment and storage medium
CN112001818B (en) * 2020-08-19 2024-08-09 凯美瑞德(苏州)信息科技股份有限公司 Contract verification method, contract verification device, computer equipment and storage medium
CN112001819A (en) * 2020-08-21 2020-11-27 山东商务职业学院 Small-sized portable mistake and disorder prevention international trade contract scanning device and method
CN112115836A (en) * 2020-09-11 2020-12-22 北京金堤科技有限公司 Information verification method and device, computer readable storage medium and electronic equipment
CN112115836B (en) * 2020-09-11 2024-07-26 北京金堤科技有限公司 Information verification method and device, computer readable storage medium and electronic equipment
US11720991B2 (en) 2021-05-20 2023-08-08 International Business Machines Corporation Signing and authentication of digital images and other data arrays
CN113487000A (en) * 2021-07-30 2021-10-08 深圳市链融科技股份有限公司 Contract document and service matching method and device, computer equipment and storage medium
CN113963354A (en) * 2021-12-16 2022-01-21 深圳市活力天汇科技股份有限公司 Method and device for obtaining order number
CN113963354B (en) * 2021-12-16 2022-04-12 深圳市活力天汇科技股份有限公司 Method and device for obtaining order number

Similar Documents

Publication Publication Date Title
CN110264223A (en) Verification method, generation method and the relevant apparatus of anti-fake contract
US11030752B1 (en) System, computing device, and method for document detection
US20200259665A1 (en) Transaction data processing method, computing device, and storage medium
KR102406432B1 (en) Identity authentication methods and devices, electronic devices and storage media
CA2925325C (en) Document authentication based on expected wear
CA2588789C (en) Method and system for verifying check images
US9652658B1 (en) Fingerprint check to reduce check fraud
US11367310B2 (en) Method and apparatus for identity verification, electronic device, computer program, and storage medium
US20190377970A1 (en) Digital image generation through an active lighting system
CN107729124A (en) Transaction methods and device, electronic equipment
CN103020506A (en) Key equipment and method integrating photographing and bar code identification technologies
CN104376314B (en) A kind of constructive method towards Google glass Internet of Things web station system
CN111145447A (en) Bank self-service intelligent printing system and method
Wilkinson et al. Use of synthetic discriminant functions for handwritten-signature verification
CN109544325A (en) Switching method, device and the computer equipment of face label system based on data processing
KR20200072070A (en) Electronic device for generating verification model used to verify a user's signature
US20240217255A1 (en) Document Boundary Analysis
US11900755B1 (en) System, computing device, and method for document detection and deposit processing
US20230316795A1 (en) Auto-Document Detection & Capture
US12138944B2 (en) Systems and methods for token authentication
US20230362012A1 (en) Systems and methods for token authentication
US20230362013A1 (en) Systems and methods for token authentication
US20230133702A1 (en) System, Method, and Computer Program Product for Sensitive Data Obfuscation
Tahsin et al. Verifying online signatures through an iterative device independent model
CN118447513A (en) Method and system for automatically identifying and auditing images based on multiple modes

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20190920