CN110264223A - Verification method, generation method and the relevant apparatus of anti-fake contract - Google Patents
Verification method, generation method and the relevant apparatus of anti-fake contract Download PDFInfo
- Publication number
- CN110264223A CN110264223A CN201910529971.8A CN201910529971A CN110264223A CN 110264223 A CN110264223 A CN 110264223A CN 201910529971 A CN201910529971 A CN 201910529971A CN 110264223 A CN110264223 A CN 110264223A
- Authority
- CN
- China
- Prior art keywords
- contract
- text
- fake
- watermark
- image
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/018—Certifying business or products
- G06Q30/0185—Product, service or business identity fraud
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07D—HANDLING OF COINS OR VALUABLE PAPERS, e.g. TESTING, SORTING BY DENOMINATIONS, COUNTING, DISPENSING, CHANGING OR DEPOSITING
- G07D7/00—Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency
- G07D7/005—Testing security markings invisible to the naked eye, e.g. verifying thickened lines or unobtrusive markings or alterations
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07D—HANDLING OF COINS OR VALUABLE PAPERS, e.g. TESTING, SORTING BY DENOMINATIONS, COUNTING, DISPENSING, CHANGING OR DEPOSITING
- G07D7/00—Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency
- G07D7/20—Testing patterns thereon
Landscapes
- Business, Economics & Management (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Engineering & Computer Science (AREA)
- Marketing (AREA)
- Finance (AREA)
- Economics (AREA)
- Strategic Management (AREA)
- Development Economics (AREA)
- General Business, Economics & Management (AREA)
- Accounting & Taxation (AREA)
- Entrepreneurship & Innovation (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Editing Of Facsimile Originals (AREA)
Abstract
The embodiment of the present invention provides verification method, generation method and the relevant apparatus of a kind of anti-fake contract, and it includes: two dimensional code, text of Contract, watermark, concealed code in the image of the contract to be verified which, which includes: the image for obtaining contract to be verified,;Identify that the two dimensional code obtains the contract number of the contract to be verified;Body text, watermark text and the concealed code text prestored is obtained according to the contract number;Image procossing is carried out to the image of the contract to be verified and obtains watermark information, text message and concealed code information;Contract verification result is obtained according to the body text, the watermark text, the concealed code text, the text message, the watermark information and the concealed code information, it does not need client and inputs the information such as network address, the contract number of verifying website, it does not need manually to compare, it is only necessary to which the image for inputting contract to be verified can realize contract verification automatically.
Description
Technical field
The present invention relates to technical field of data processing more particularly to a kind of verification method of anti-fake contract, generation method with
And relevant apparatus.
Background technique
In recent years, contract fraud event frequent occurrence, especially fake, swindle event emerges one after another by bank financing contract.
For financing contract, other than Internetbank channel, which still there are a large amount of contracts in bank, to be signed by cabinet face channel, only a few silver
Row interior employee catches this loophole to inveigle client to buy false finance product in cabinet face, and for the contract that this cabinet face is signed, visitor
Family wants that verifying its true and false needs bank counter to verify, and takes time and effort very much, and verification process relies on manually, it is difficult to ensure objective
Property.
To solve the above problems, some banks, which open, verifies channel on multiparty line, client can be on mobile phone or computer
Inputting contract number, the information such as customer name, essence of a contract or treaty content are fed back to client by bank, but when, client is still
The information such as network address, the contract number of oneself input verifying website are needed, it is then artificial to compare, still compare effort.
Summary of the invention
In view of this, the present invention provides a kind of verification method of anti-fake contract and device, generation method and device, electronics are set
Standby and computer readable storage medium solves to need oneself input to test when client verifies contract by verifying channel on multiparty line
The information such as network address, the contract number of website are demonstrate,proved, then artificial the problem of comparing, still comparing effort.
To achieve the goals above, the present invention adopts the following technical scheme:
In a first aspect, providing a kind of verification method of anti-fake contract, comprising:
Obtain the image of contract to be verified, include: in the image of the contract to be verified two dimensional code, text of Contract, watermark,
Concealed code;
Identify that the two dimensional code obtains the contract number of the contract to be verified;
Body text, watermark text and the concealed code text prestored is obtained according to the contract number;
Image procossing is carried out to the image of the contract to be verified and obtains watermark information, text message and concealed code letter
Breath;
According to the body text, the watermark text, the concealed code text, the text message, watermark letter
Breath and the concealed code information obtain contract verification result.
Further, described to be believed according to the body text, the watermark text, the concealed code text, the text
Breath, the watermark information and the concealed code information obtain contract verification result, comprising:
Concealed code matching result is obtained according to the concealed code information and the concealed code text;
Watermark matches result is obtained according to the watermark information and the watermark text;
Text matching result is obtained according to the text message and the contract text;
It obtains contract according to the concealed code matching result, the watermark matches result and the text matching result and tests
Demonstrate,prove result.
Further, the verification method of the anti-fake contract further include:
Judge whether the text matching result is true;
If so, obtaining the business key message stored in host according to the contract number;
Host information, which is obtained, with the business key message in the body text according to the business key message matches knot
Fruit;
Final verification result is obtained according to the host information matching result and the contract verification result.
Further, in the image of the contract to be verified further include: seal, the image to the contract to be verified
It carries out image procossing and obtains watermark information, text message and concealed code information, comprising:
The seal in the image of the contract to be verified is eliminated, seal image is obtained;
The text in seal image is gone to obtain watermarking images described in elimination;
Identify that the watermarking images obtain the watermark information based on OCR identification technology;
The watermark in seal image is gone described in elimination, obtains text image;
Identify that the text image obtains the text message based on OCR identification technology;
Identify that the image of the contract to be verified obtains the concealed code information based on OCR identification technology.
Second aspect provides a kind of generation method of anti-fake contract, comprising:
Obtain text of Contract;
Two dimensional code and concealed code are generated according to the text of Contract;
Anti-fake contract is generated according to the text of Contract, the two dimensional code and the concealed code.
Further, the text of Contract includes: contract number, described to generate two dimensional code, packet according to the text of Contract
It includes:
The two dimensional code is generated according to the contract number.
Further, this generates concealed code according to the text of Contract, comprising:
Hash calculation is carried out to the text of Contract and obtains the concealed code.
Further, further includes:
Watermark is added to the anti-fake contract.
Further, further includes:
It is with an official seal affixed to the anti-fake contract.
Further, which includes business key message, the generation method of the anti-fake contract further include:
The business key message is sent to host, so that the host stores the business key message, completes to keep accounts.
Further, further includes:
Store the text of Contract, the watermark and the concealed code, formed body text, the watermark text of the corresponding contract with
And concealed code text.
The third aspect provides a kind of anti-fake contract verification device, comprising:
Image collection module obtains the image of contract to be verified, includes: two dimensional code in the image of the contract to be verified, closes
Same text, watermark, concealed code;
Two dimensional code identification module identifies that the two dimensional code obtains the contract number of the contract to be verified;
Text obtains module, and body text, watermark text and the concealed code text prestored is obtained according to the contract number;
Image processing module, to the image of the contract to be verified carry out image procossing obtain watermark information, text message with
And concealed code information;
Authentication module, according to the body text, the watermark text, the concealed code text, the text message, the watermark information
And the concealed code information obtains contract verification result.
Further, which includes:
First matching unit obtains concealed code matching result according to the concealed code information and the concealed code text;
Second matching unit obtains watermark matches result according to the watermark information and the watermark text;
Third matching unit obtains text matching result according to the text message and the contract text;
Authentication unit is closed according to the concealed code matching result, the watermark matches result and the text matching result
Same verification result.
Further, further includes:
Judgment module judges whether the text matching result is true;
Host data obtains module, when the text matching result is true, is obtained in host and is stored according to the contract number
Business key message;
Key information match module is led according to the business key message and the business key message in the body text
Machine information matching result;
Secondary authentication module obtains finally verifying knot according to the host information matching result and the contract verification result
Fruit.
Further, in the image of the contract to be verified further include: seal, the image processing module include:
Seal eliminates unit, eliminates the seal in the image of the contract to be verified, obtains seal image;
Watermarking images acquiring unit eliminates the text gone in seal image and obtains watermarking images;
Watermark recognition unit identifies that the watermarking images obtain the watermark information based on OCR identification technology;
Text acquiring unit eliminates the watermark gone in seal image, obtains text image;
Text recognition unit identifies that the text image obtains the text message based on OCR identification technology;
Concealed code recognition unit identifies that the image of the contract to be verified obtains the concealed code information based on OCR identification technology.
Fourth aspect provides a kind of anti-fake contract generating means, comprising:
Text obtains module, obtains text of Contract;
Two dimensional code concealed code generation module generates two dimensional code and concealed code according to the text of Contract;
Anti-fake contract generation module generates anti-fake contract according to the text of Contract, the two dimensional code and the concealed code.
Further, which includes: contract number, which includes:
Two dimensional code generation unit generates the two dimensional code according to the contract number.
Further, which includes:
Concealed code generation unit carries out Hash calculation to the text of Contract and obtains the concealed code.
Further, further includes:
Watermark adding module adds watermark to the anti-fake contract.
Further, further includes:
It affixes one's seal module, it is with an official seal affixed to the anti-fake contract.
Further, which includes business key message, the anti-fake contract generating means further include:
Keep accounts module, which is sent to host, so that the host stores the business key message, completes
It keeps accounts.
Further, further includes:
Memory module, stores the text of Contract, the watermark and the concealed code, formed the corresponding contract body text,
Watermark text and concealed code text.
5th aspect, provides a kind of electronic equipment, including memory, processor and storage on a memory and can handled
The computer program run on device, the processor realize the step of the verification method of above-mentioned anti-fake contract when executing described program
Suddenly, alternatively, the step of realizing the generation method of above-mentioned anti-fake contract.
5th aspect, provides a kind of computer readable storage medium, is stored thereon with computer program, the computer program
The step of verification method of above-mentioned anti-fake contract is realized when being executed by processor, alternatively, realizing the life of above-mentioned anti-fake contract
The step of at method.
The verification method and device, generation method and device of anti-fake contract provided in an embodiment of the present invention, electronic equipment with
And computer readable storage medium, the verification method include: the image for obtaining contract to be verified, the image of the contract to be verified
In include: two dimensional code, text of Contract, watermark, concealed code;Identify that the two dimensional code obtains the contract volume of the contract to be verified
Number;Body text, watermark text and the concealed code text prestored is obtained according to the contract number;To the contract to be verified
Image carry out image procossing obtain watermark information, text message and concealed code information;According to the body text, the water
Printed text sheet, the concealed code text, the text message, the watermark information and the concealed code information obtain contract verification
As a result.That is: contract number is identified by two dimensional code, the contract dataset prestored is then transferred according to number in the server, and it is logical
The contract dataset that image procossing obtains is crossed to be compared and then obtain contract verification result it is not necessary to which client inputs verifying website
The information such as network address, contract number do not need manually to compare, it is only necessary to which the image for inputting contract to be verified can realize contract automatically
Verifying, it is easy to operate, it is time saving and energy saving, the workload of customer authentication contract is reduced, improves the accuracy of verifying, high reliablity can have
Effect is prevented financial risk, and guarantees the safety of banking contract.
For above and other objects, features and advantages of the invention can be clearer and more comprehensible, preferred embodiment is cited below particularly,
And cooperate institute's accompanying drawings, it is described in detail below.
Detailed description of the invention
In order to illustrate the technical solutions in the embodiments of the present application or in the prior art more clearly, to embodiment or will show below
There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is the application
Some embodiments for those of ordinary skill in the art without creative efforts, can also basis
These attached drawings obtain other attached drawings.In the accompanying drawings:
The system architecture diagram of Fig. 1 embodiment provides to realize the present invention anti-fake contract verification method and generation method;
Fig. 2 is the exemplary diagram of the anti-fake contract in the embodiment of the present invention;
Fig. 3 is the flow diagram of the anti-fake contract verification method in the embodiment of the present invention;
Fig. 4 shows the specific steps of step S500 in Fig. 3;
Fig. 5 is the flow diagram one of the anti-fake contract generation method in the embodiment of the present invention;
Fig. 6 is the flow diagram two of the anti-fake contract generation method in the embodiment of the present invention;
Fig. 7 is the structural block diagram of the anti-fake contract verification device in the embodiment of the present invention;
Fig. 8 is the structural block diagram of the anti-fake contract generating means in the embodiment of the present invention;
Fig. 9 is the structure chart of electronic equipment of the embodiment of the present invention.
Specific embodiment
In order to make those skilled in the art more fully understand application scheme, below in conjunction in the embodiment of the present application
Attached drawing, the technical scheme in the embodiment of the application is clearly and completely described, it is clear that described embodiment is only
The embodiment of the application a part, instead of all the embodiments.Based on the embodiment in the application, ordinary skill people
Member's every other embodiment obtained without making creative work, all should belong to the model of the application protection
It encloses.
It should be understood by those skilled in the art that, the embodiment of the present invention can provide as method, system or computer program
Product.Therefore, complete hardware embodiment, complete software embodiment or reality combining software and hardware aspects can be used in the present invention
Apply the form of example.Moreover, it wherein includes the computer of computer usable program code that the present invention, which can be used in one or more,
The computer program implemented in usable storage medium (including but not limited to magnetic disk storage, CD-ROM, optical memory etc.) produces
The form of product.
It should be noted that term " includes " and " tool in the description and claims of this application and above-mentioned attached drawing
Have " and their any deformation, it is intended that cover it is non-exclusive include, for example, containing a series of steps or units
Process, method, system, product or equipment those of are not necessarily limited to be clearly listed step or unit, but may include without clear
Other step or units listing to Chu or intrinsic for these process, methods, product or equipment.
It should be noted that in the absence of conflict, the features in the embodiments and the embodiments of the present application can phase
Mutually combination.The application is described in detail below with reference to the accompanying drawings and in conjunction with the embodiments.
Currently, some banks, which open, verifies channel on multiparty line, client can input contract volume on mobile phone or computer
Number, the information such as customer name, essence of a contract or treaty content feed back to client by bank, but when, there is still a need for oneself is defeated by client
Enter to verify the information such as network address, the contract number of website, it is then artificial to compare, still compare effort.
To solve the above-mentioned technical problems in the prior art, the embodiment of the present invention provides a kind of verifying of anti-fake contract
Method identifies contract number by two dimensional code, then transfers the contract dataset prestored in the server according to number, and pass through figure
As the net for obtaining contract verification in turn result it is not necessary to which website is verified in client's input is compared in the contract dataset that processing obtains
The information such as location, contract number do not need manually to compare, it is only necessary to which the image for inputting contract to be verified can realize that automatically contract is tested
Card, it is time saving and energy saving, the workload of customer authentication contract is reduced, the accuracy of verifying is improved, can effectively prevent financial risk, is guaranteed
The safety of banking contract.
The system architecture diagram of Fig. 1 embodiment provides to realize the present invention anti-fake contract verification method and generation method.Such as
Shown in Fig. 1, which includes: typing terminal 1, contract processing server 5, verifying terminal 3 and/or mobile phone 4 and host 6.
Wherein, typing terminal 1 is responsible for receiving the contract information of business personnel's typing, and sends information to contract processing clothes
Business device 5, typing terminal can be portable computer, desktop computer, smart phone, Flat electronic equipment etc.;Anti-fake contract 2 is paper
Matter contract paper_origin, contains two dimensional code, watermark, seal, concealed code and text of Contract etc.;Terminal 3 is verified to be responsible for
Anti-fake contract paper_origin is scanned, and scanned picture picture_origin is issued into contract processing server 5, meanwhile,
It verifies terminal 3 to be also responsible for showing verification result, wherein verifying terminal can be the comprehensive service terminal of bank or ATM terminal etc.
Self-help terminal equipment;The effect of mobile phone 4 is similar with verifying terminal, using 4 camera of mobile phone to anti-fake contract paper_
Origin takes pictures, and the picture picture_origin that will take pictures issues contract processing server 5, while being also responsible for showing and test
Demonstrate,prove result.
Contract processing server 5 is for executing anti-fake contract verification method provided in an embodiment of the present invention and/or anti-fake conjunction
Same generation method is specifically responsible for adding the anti-fake letters such as watermark, two dimensional code, concealed code to the text of Contract of typing
Breath, is generated the electronics shelves of anti-fake contract, in contract verification link, is disappeared using watermark enhancing, watermark elimination, seal
It removes, concealed code identification, the technologies such as OCR verify contract, and transfer host account information and carry out account verification;Host 6 is negative
Duty actually keeps accounts and records account information.
Specifically, contract processing server 5 includes anti-fake contract generating means and anti-fake contract verification device, anti-fake conjunction
It is responsible for adding the anti-counterfeiting information such as watermark, two dimensional code, concealed code to the text of Contract of typing with generating means, generates anti-fake contract
Electronics shelves.Anti-fake contract verification device is responsible for being analyzed and processed the scanned picture picture_origin of papery contract, obtains
The two dimensional code of coordinate { X, Y } is taken, the contract number in two dimensional code is taken out, based on contract number finds the contract retained in server
Text, watermark text and concealed code, and image procossing and OCR are carried out to picture_origin and identified, get papery conjunction
Text message together, watermark information, concealed code information, are compared, also, can obtain paper with the corresponding information that server retains
The business key message (contract number, the amount of money, customer name) of matter contract is checked, most therewith by obtaining host account information
After generate verification result.
Typing terminal 1 connects contract processing server 5 and generates anti-fake contract 2, contract processing server 5 connect the record of host 6 and
Account information is transferred, verifying terminal 3 and mobile phone 4 can be scanned and (take pictures) to anti-fake contract 2, and even contract processing server
5 pairs of contracts are verified.
Certainly, it will be appreciated by persons skilled in the art that the mobile phone 4 can also be with camera and communication function
Other terminals replace, such as Flat electronic equipment, portable computer, desktop computer, personal digital assistant (PDA) etc..
Specifically, the contract processing server 5 and verifying terminal 3 and/or mobile phone 4 (or its alternate device) communicate to connect,
The image of contract to be processed can be sent to contract processing service by the verifying terminal 3 and/or mobile phone 4 (or its alternate device)
Device 5, contract processing server 5 can receive the image of the contract to be processed online.The server S 1 can it is online or
The image of contract to be processed is pre-processed offline, include: in the image of contract to be verified two dimensional code, text of Contract, watermark,
Concealed code;Identify that the two dimensional code obtains the contract number of the contract to be verified;It is prestored according to contract number acquisition
Body text, watermark text and concealed code text;Image procossing is carried out to the image of the contract to be verified and obtains watermark letter
Breath, text message and concealed code information;According to the body text, the watermark text, the concealed code text, it is described just
Literary information, the watermark information and the concealed code information obtain contract verification result.Then, contract processing server 5 can
Contract verification result is sent to the verifying terminal 3 and/or mobile phone 4 (or its alternate device) online.The verifying terminal 3
And/or mobile phone 4 (or its alternate device) can receive the contract verification result online.
In addition, the contract processing server 5 and typing terminal 1 communicate to connect, the typing terminal 1 can be by contract information
It is sent to contract processing server 5, contract processing server 5 can receive the contract information online.The server S 1 can
With online or offline pre-process to contract information, based on contract text generates two dimensional code and concealed code;Based on contract just
Text, two dimensional code and concealed code generate anti-fake contract.Then, contract processing server 5 can be online by the anti-fake contract of generation
It is sent to the typing terminal 1.The typing terminal 1 can receive the anti-fake contract online.
The contract processing server 5 and verifying terminal 3 and/or mobile phone 4 (or its alternate device) between, the Contracts Division
Reason server 5 can be used any suitable network protocol with typing terminal 1 and be communicated, and be included in the application submitting day not yet
The network protocol developed.The network protocol for example may include ICP/IP protocol, UDP/IP agreement, http protocol, HTTPS
Agreement etc..Certainly, the network protocol for example can also include the RPC agreement (Remote used on above-mentioned agreement
Procedure Call Protocol, remote procedure call protocol), REST agreement (Representational State
Transfer, declarative state transfer protocol) etc..
Fig. 2 is the exemplary diagram of the anti-fake contract in the embodiment of the present invention;As shown in Fig. 2, the anti-fake contract paper_
It include contract number 21, contract value 22 and customer name 23 on origin, these three information are that the business key of contract is believed
Breath;Contract further includes general clause 24, seal 27, this is the routine information of contract;Contract further include watermark 25, two dimensional code 28 with
And concealed code 26, it is the anti-counterfeiting information of contract.
Fig. 3 is the flow diagram of the anti-fake contract verification method in the embodiment of the present invention.As shown in figure 3, the anti-fake conjunction
May include the following contents with verification method:
Step S100: obtaining the image of contract to be verified, includes: two dimensional code, contract in the image of the contract to be verified
Text, watermark, concealed code.
Wherein, the text of the fixed text of watermark i.e. a string, is attached among text at regular intervals with light font.Two dimension
Code is the two-dimension code image added in contract lower right corner fixed coordinates { X, Y }, contains the value of contract number in two dimensional code;It is stealthy
Code is that contract processing server carries out HASH calculating acquirement digest value to the binary system entire contents of contract, and digest value is 20 words
It saves, 160 binary digits, 1 represents stain in binary digit, and 0 represents white point, and it is every that the sequence of these black-white points is printed to contract
The bottom of page prints 4 rows, and row has 40 points with 5 millimeters of row interval, every row, and each 5 millimeters of spacing, the coordinate sequence of printing
It is denoted as nowatchcode_xy_serial.
Step S200: identify that the two dimensional code obtains the contract number of the contract to be verified.
Wherein it is possible to obtain information entrained by two dimensional code using two dimensional code in OCR identification technology identification image.
Step S300: body text, watermark text and the concealed code text prestored is obtained according to the contract number.
Wherein, in contract generation phase, server has stored the number and its corresponding text, water of generation contract
The information such as print, concealed code, when being verified to contract, based on contract number obtain in server the above- mentioned information that prestore with
In the true and false of verifying contract.
Step S400: to the image of the contract to be verified carry out image procossing obtain watermark information, text message and
Concealed code information.
Wherein, with watermark enhancing (sharpenings), watermark elimination, seal elimination, OCR technique to the image of contract to be verified into
Row processing, and then obtain the watermark information, text message and concealed code information.
Step S500: according to the body text, the watermark text, the concealed code text, the text message, institute
It states watermark information and the concealed code information obtains contract verification result.
Through the above technical solution it is known that anti-fake contract verification method provided in an embodiment of the present invention, passes through two dimension
Code identification contract number, then transfers the contract dataset prestored according to number in the server, and is obtained by image procossing
Contract dataset is compared and then obtains contract verification result it is not necessary to which client inputs network address, the contract number etc. of verifying website
Information does not need manually to compare, it is only necessary to and the image for inputting contract to be verified can realize contract verification automatically, time saving and energy saving,
The workload for reducing customer authentication contract, improves the accuracy of verifying, can effectively prevent financial risk, guarantee the peace of banking contract
Quan Xing.
In addition, being evident that content carries out fake certification by the way that two dimensional code, watermark, concealed code etc. are non-, so that crime point
Son is not allowed easy to identify and is forged, the safety of effective guarantee banking contract.
Fig. 4 shows the specific steps of step S500 in Fig. 3.As shown in figure 4, step S500 may include in following
Hold:
Step S510: concealed code matching result is obtained according to the concealed code information and the concealed code text;
Step S520: watermark matches result is obtained according to the watermark information and the watermark text;
Step S530: text matching result is obtained according to the text message and the contract text;
Step S540: according to the concealed code matching result, the watermark matches result and the text matching result
Obtain contract verification result.
Specifically, it will be prestored in text message and server entrained in the image obtained by image procossing corresponding
Text message in the body text of the contract number is compared, and judges whether text message matches with body text.It will lead to
Cross the watermark text of the corresponding contract number prestored in watermark information and server entrained in the image that image procossing obtains
Originally it is compared, judges whether watermark information matches with watermark text;It will be entrained in the image obtained by image procossing
The concealed code text of the correspondence contract number prestored in concealed code information and server is compared, judge concealed code information with
Whether concealed code text matches, and when only above-mentioned matching result is true, just can tentatively judge the authenticity of the contract.If its
In a matching result be false, then it is assumed that the contract is forged contract.
For the identification precision for further increasing the anti-fake contract verification method, the embodiment of the present invention also provides a kind of anti-fake conjunction
Same verification method, this method can also include: on the basis of comprising step shown in Fig. 3 and Fig. 4
Judge whether the text matching result is true.
If so, obtaining the business key message stored in host according to the contract number.
Host information, which is obtained, with the business key message in the body text according to the business key message matches knot
Fruit.
Specifically, text message and server entrained in the image obtained by image procossing of the embodiment of the present invention
In text message in the body text of the correspondence contract number that prestores it is consistent when, the contract number can be called from host again
The business key message to keep accounts, then by from the business key message in business key message that host recalls and body text into
Row compares matching, to carry out secondary verifying, can not only verify the authenticity of contract, moreover it is possible to ensure the transaction of contract behind
Authenticity prevents bank cashier and client from signing a true contract but the fund of client has been gone to the feelings of other accounts
Condition further ensures that service security.
Final verification result is obtained according to the host information matching result and the contract verification result.
If it is not, judging the contract for forged contract.
By using above scheme, it can be realized secondary verifying, further ensure that service security.
It is worth noting that including: two dimensional code, text of Contract, watermark, concealed code in the image of the contract to be verified
On the basis of, it generally further include seal.The information such as watermark, seal can form interference to identification text of Contract, therefore, utilize
Before OCR technique identifies treaty content, need first to remove seal and watermark.
In an alternative embodiment, step S400 can specifically include content:
Step 1: eliminating the seal in the image of the contract to be verified, obtain seal image.
Specifically, scanning obtains tri- color value of RGB of all pixels in the image of contract to be verified first, to R (red) G
(green) B (blue) takes the value of 0-255 respectively, is higher than value 1 of fainting (recommended value 200 is adjusted) to R (red), and G is (green
Color) and B (blue) lower than the pixel for value 2 (recommended value 50, adjustable) of fainting switch to tri- color of RGB be 255 color it is (i.e. white
Color), eliminate red seal, the picture picture_preprocessed after obtaining seal.
Step 2: the text in seal image being gone to obtain watermarking images described in elimination.
Specifically, gray processing processing is carried out to scanned picture picture_preprocessed, i.e., by institute in scanned picture
There is tri- color value of RGB of pixel to switch to the gray value of the 0-255 of a dimension, lower than value 3 of fainting (recommended value 100 is adjusted)
Pixel switchs to the color (i.e. white) that tri- color of RGB is 255, eliminates text message, obtains picture_processed2.
Step 3:OCR identification technology identifies that the watermarking images obtain the watermark information;
Step 4: going the watermark in seal image described in elimination, obtain text image.
Specifically, gray processing processing is carried out to picture picture_preprocessed, i.e., by pictures all in scanned picture
Tri- color value of RGB of element switchs to the gray value of the 0-255 of a dimension, higher than the pixel of value 3 of fainting (recommended value 100 is adjusted)
Switch to the color (i.e. white) that tri- color of RGB is 255, eliminates watermark information, obtain picture_processed1.
Step 5: identifying that the text image obtains the text message based on OCR identification technology;
Step 6: identifying that the image of the contract to be verified obtains the concealed code information based on OCR identification technology.
Specifically, it can be read out according to the setting coordinate pair concealed code of concealed code, read stain and be denoted as 1 white point and be denoted as 0,
Form 20 bytes, the data picture_nowatchcode of 160 binary digits, for carrying out concealed code identification.
To fully understand the present invention convenient for those skilled in the art, illustrated using verifying eventually below with reference to Fig. 1 to Fig. 4
Realize the process of contract verification in end.
Realize that the process of contract verification is as follows using verifying terminal:
(1) verifying terminal 3 is scanned or takes pictures to anti-fake contract 2paper_origin, obtains picture picture_
Origin simultaneously uploads to contract processing server 5.
(2) contract processing server 5 is analyzed and processed picture picture_origin, obtains the two of coordinate { X, Y }
Code is tieed up, the contract number in two dimensional code is taken out.
(3) based on contract contract processing server 5 numbers body text doc_text, the water for finding the contract retained in it
This doc_water of printed text and concealed code text doc_nowatchcode.
(4) contract processing server 5 carries out seal Processing for removing to picture picture_origin, and scanning first obtains
Tri- color value of RGB of all pixels in picture_origin picture, takes 0-255's to R (red) G (green) B (blue) respectively
Value is higher than value 1 of fainting (recommended value 200 is adjusted) to R (red), and G (green) and B (blue) is lower than 2 (recommended value of value of fainting
It is be 50, adjustable) pixel switch to the color (i.e. white) that tri- color of RGB is 255, red seal is eliminated, after obtaining seal
Picture picture_preprocessed.
(5) contract processing server 5 carries out gray processing processing to picture picture_preprocessed, i.e., by scanning figure
Tri- color value of RGB of all pixels switchs to the gray value of the 0-255 of a dimension in piece, and higher than value 3 of fainting, (recommended value 100, can
Adjust) pixel switch to the color (i.e. white) that tri- color of RGB is 255, eliminate watermark information, obtain picture_
processed1。
(6) contract processing server 5 carries out gray processing processing to picture_preprocessed, i.e., by picture_
Tri- color value of RGB of all pixels switchs to the gray value of the 0-255 of a dimension in preprocessed, lower than value 3 of fainting (it is recommended that
Value is 100, adjustable) pixel switch to the color (i.e. white) that tri- color of RGB is 255 and eliminate text message, obtain
picture_processed2。
(7) contract processing server 5 is using OCR identification technology to picture_processed1 and picture_
Processed2 is scanned and identifies, will identify that body text and watermark are carried out with doc_text and doc_water respectively
It compares, obtains text matching mark ismatch_text (true or false) and watermark matches mark ismatch_water
(true or false).
(8) contract processing server 5 identifies picture_origin using OCR identification technology, according to concealed code
Fixed coordinates nowatchcode_xy_serial read concealed code, read stain and be denoted as 1 white point and be denoted as 0, form 20 bytes,
The data picture_nowatchcode of 160 binary digits, and be compared with doc_nowatchcode, obtain concealed code
Matching identification ismatch_nowatchcode (true or false).
(9) if in (7) text matching success (ismatch_text=true) if contract processing server 5 based on contract
Customer name and the amount of money in number inquiry host account, by the value found and business key message corresponding in doc_text
The value of (customer name, the amount of money) is compared, and obtains host information matching identification ismatch_host (true or false).
(10) contract processing server 5 judges ismatch_text, ismatch_water, ismatch_
Whether the value of nowatchcode, ismatch_host are true, if so, echoing this to verifying terminal 3 is true contract,
Otherwise echo is the contract that leaves a question open.
By using above-mentioned technical proposal, the time cost of customer authentication contract can reduce, client need not remove bank's net
Point is lined up, and is in or can be recognized the contract true and false in the verifying terminal self-help verification of bank, greatly reduces the time of client
Cost, the reduction of time cost can also excite the enthusiasm of customer authentication contract, meanwhile, the operation for reducing customer authentication contract is difficult
Degree only needs to scan one to contract with mobile phone against contract according to a photo or with the verifying terminal of bank for client
Figure can be easily accomplished verifying, not need to manually enter a word, operation reaches extremely simple, this helps some elderly populations
It helps very greatly, furthermore, the accuracy and reliability of contract verification is improved, verifying system not only realizes the verification to text of Contract,
The verification to concealed code and watermark is also achieved, the verification to host account information is also achieved, false contract can be utterly destroyed
A possibility that, allow client thoroughly to trust.
Fig. 5 is the flow diagram one of the anti-fake contract generation method in the embodiment of the present invention.As shown in figure 5, this is anti-fake
Contract generation method may include the following contents:
Step S1000: text of Contract is obtained.
Wherein, the text of Contract is by typing terminal typing, comprising: customer name, contract value, contract number, contract class
The business key message such as type.
Step S2000: two dimensional code and concealed code are generated according to the text of Contract.
Wherein, the two dimensional code is generated according to the contract number.
In addition, carrying out Hash calculation to the text of Contract obtains the concealed code.
Step S3000: anti-fake contract is generated according to the text of Contract, the two dimensional code and the concealed code.
Specifically, watermark, two dimensional code, concealed code are added to the text of Contract of typing, generates anti-fake contract, and in server
These information are saved, specifically:
In order to identify that two dimensional code is convenient, two dimensional code, two dimensional code can be added in the lower right corner fixed coordinates { X, Y } of text of Contract
Contain the value of contract number.
Carry out HASH to the binary system entire contents of contract and calculate to obtain digest value, digest value is 20 bytes, 160 two into
Position processed, 1 represents stain in binary digit, and 0 represents white point, and the sequence of these black-white points is printed to the bottom of every page of contract, is beaten
Print 4 rows, row with 5 millimeters of row interval, every row has 40 points, and each 5 millimeters of spacing, the coordinate sequence of printing is denoted as
nowatchcode_xy_serial。
It by using above-mentioned anti-fake contract generation method, can be matched with anti-fake contract verification method, facilitate client certainly
Dynamic to realize contract verification, time saving and energy saving, the workload of reduction customer authentication contract improves the accuracy of verifying, high reliablity can
It effectively prevents financial risk, guarantees the safety of banking contract.
Fig. 6 is the flow diagram two of the anti-fake contract generation method in the embodiment of the present invention.As shown in fig. 6, this is anti-fake
Contract generation method can also include: on the basis of comprising step shown in Fig. 5
Step S4000: watermark is added to the anti-fake contract.
Specifically, the text of the fixed text of watermark i.e. a string, is attached among text at regular intervals with light font.
Step S5000: with an official seal affixed to the anti-fake contract.
Specifically, increase seal graphics to the predeterminated position of text of Contract.
In an alternative embodiment, the generation method of the anti-fake contract can also include: by the institute in text of Contract
The business key message of stating is sent to host, so that the host stores the business key message, completes to keep accounts.
In an alternative embodiment, the generation method of the anti-fake contract can also include: to store the text of Contract, be somebody's turn to do
Watermark and the concealed code form body text, watermark text and the concealed code text of the corresponding contract.
In an alternative embodiment, the generation method of the anti-fake contract can also include: based on contract type acquisition
The general clause of contract, and general clause is added to the corresponding position in text of Contract.
In an alternative embodiment, the generation method of the anti-fake contract can also include: anti-fake by what is ultimately generated
Contract is sent to typing terminal.
Based on the same inventive concept, the embodiment of the present application also provides a kind of anti-fake contract verification device, it can be used for reality
Anti-fake contract verification method described in existing above-described embodiment, as described in the following examples.Due to anti-fake contract verification device
The principle solved the problems, such as is similar to the above method, therefore the implementation of anti-fake contract verification device may refer to the reality of the above method
It applies, overlaps will not be repeated.Used below, the software of predetermined function may be implemented in term " unit " or " module "
And/or the combination of hardware.Although device described in following embodiment is preferably realized with software, hardware or soft
The realization of the combination of part and hardware is also that may and be contemplated.
Fig. 7 is the structural block diagram of the anti-fake contract verification device in the embodiment of the present invention.As shown in fig. 7, the anti-fake contract
Verifying device specifically includes: image collection module 10, two dimensional code identification module 20, text obtain module 30, image processing module
40 and authentication module 50.
Image collection module 10 obtains the image of contract to be verified, includes: two dimensional code in the image of the contract to be verified, closes
Same text, watermark, concealed code.
Wherein, the text of the fixed text of watermark i.e. a string, is attached among text at regular intervals with light font.Two dimension
Code is the two-dimension code image added in contract lower right corner fixed coordinates { X, Y }, contains the value of contract number in two dimensional code;It is stealthy
Code is that contract processing server carries out HASH calculating acquirement digest value to the binary system entire contents of contract, and digest value is 20 words
It saves, 160 binary digits, 1 represents stain in binary digit, and 0 represents white point, and it is every that the sequence of these black-white points is printed to contract
The bottom of page prints 4 rows, and row has 40 points with 5 millimeters of row interval, every row, and each 5 millimeters of spacing, the coordinate sequence of printing
It is denoted as nowatchcode_xy_serial.
Two dimensional code identification module 20 identifies that the two dimensional code obtains the contract number of the contract to be verified;
Wherein it is possible to obtain information entrained by two dimensional code using two dimensional code in OCR identification technology identification image.
Text obtains module 30 and obtains body text, watermark text and the concealed code text prestored according to the contract number
This;
Wherein, in contract generation phase, server has stored the number and its corresponding text, water of generation contract
The information such as print, concealed code, when being verified to contract, based on contract number obtain in server the above- mentioned information that prestore with
In the true and false of verifying contract.
Image processing module 40 to the image of the contract to be verified carry out image procossing obtain watermark information, text message with
And concealed code information;
Wherein, with watermark enhancing (sharpenings), watermark elimination, seal elimination, OCR technique to the image of contract to be verified into
Row processing, and then obtain the watermark information, text message and concealed code information.
Authentication module 50 is believed according to the body text, the watermark text, the concealed code text, the text message, the watermark
Breath and the concealed code information obtain contract verification result.
Through the above technical solution it is known that anti-fake contract verification device provided in an embodiment of the present invention, passes through two dimension
Code identification contract number, then transfers the contract dataset prestored according to number in the server, and is obtained by image procossing
Contract dataset is compared and then obtains contract verification result it is not necessary to which client inputs network address, the contract number etc. of verifying website
Information does not need manually to compare, it is only necessary to and the image for inputting contract to be verified can realize contract verification automatically, time saving and energy saving,
The workload for reducing customer authentication contract, improves the accuracy of verifying, can effectively prevent financial risk, guarantee the peace of banking contract
Quan Xing.
In addition, being evident that content carries out fake certification by the way that two dimensional code, watermark, concealed code etc. are non-, so that crime point
Son is not allowed easy to identify and is forged, the safety of effective guarantee banking contract.
In an alternative embodiment, which includes: the first matching unit, the second matching unit, third
With unit and authentication unit.
First matching unit obtains concealed code matching result according to the concealed code information and the concealed code text;
Second matching unit obtains watermark matches result according to the watermark information and the watermark text;
Third matching unit obtains text matching result according to the text message and the contract text;
Authentication unit obtains contract according to the concealed code matching result, the watermark matches result and the text matching result
Verification result.
Specifically, it will be prestored in text message and server entrained in the image obtained by image procossing corresponding
Text message in the body text of the contract number is compared, and judges whether text message matches with body text.It will lead to
Cross the watermark text of the corresponding contract number prestored in watermark information and server entrained in the image that image procossing obtains
Originally it is compared, judges whether watermark information matches with watermark text;It will be entrained in the image obtained by image procossing
The concealed code text of the correspondence contract number prestored in concealed code information and server is compared, judge concealed code information with
Whether concealed code text matches, and when only above-mentioned matching result is true, just can tentatively judge the authenticity of the contract.If its
In a matching result be false, then it is assumed that the contract is forged contract.
In an alternative embodiment, anti-fake contract verification device further include: judgment module, host data obtain mould
Block, key information match module and secondary authentication module.
Judgment module judges whether the text matching result is true;
Host data obtains module when the text matching result is true, according to what is stored in contract number acquisition host
Business key message;
Key information match module is led according to the business key message and the business key message in the body text
Machine information matching result.
Secondary authentication module obtains final verification result according to the host information matching result and the contract verification result.
Specifically, text message and server entrained in the image obtained by image procossing of the embodiment of the present invention
In text message in the body text of the correspondence contract number that prestores it is consistent when, the contract number can be called from host again
The business key message to keep accounts, then by from the business key message in business key message that host recalls and body text into
Row compares matching, to carry out secondary verifying, can not only verify the authenticity of contract, moreover it is possible to ensure the transaction of contract behind
Authenticity prevents bank cashier and client from signing a true contract but the fund of client has been gone to the feelings of other accounts
Condition further ensures that service security.
By using above scheme, it can be realized secondary verifying, further ensure that service security.
In an alternative embodiment, in the image of the contract to be verified further include: seal, the image processing module packet
Include: seal eliminates unit, watermarking images acquiring unit, watermark recognition unit, text acquiring unit, text recognition unit and hidden
Shape code recognition unit.
Seal eliminates unit and eliminates the seal in the image of the contract to be verified, obtains seal image.
The information such as watermark, seal can form interference to identification text of Contract, therefore, using in OCR technique identification contract
Before appearance, need first to remove seal and watermark.
Specifically, scanning obtains tri- color value of RGB of all pixels in the image of contract to be verified first, to R (red) G
(green) B (blue) takes the value of 0-255 respectively, is higher than value 1 of fainting (recommended value 200 is adjusted) to R (red), and G is (green
Color) and B (blue) lower than the pixel for value 2 (recommended value 50, adjustable) of fainting switch to tri- color of RGB be 255 color it is (i.e. white
Color), eliminate red seal, the picture picture_preprocessed after obtaining seal.
Watermarking images acquiring unit eliminates the text gone in seal image and obtains watermarking images;
Specifically, gray processing processing is carried out to scanned picture picture_preprocessed, i.e., by institute in scanned picture
There is tri- color value of RGB of pixel to switch to the gray value of the 0-255 of a dimension, lower than value 3 of fainting (recommended value 100 is adjusted)
Pixel switchs to the color (i.e. white) that tri- color of RGB is 255, eliminates text message, obtains picture_processed2.
Watermark recognition unit is based on OCR identification technology and identifies that the watermarking images obtain the watermark information;
Text acquiring unit eliminates the watermark gone in seal image, obtains text image.
Specifically, gray processing processing is carried out to picture picture_preprocessed, i.e., by pictures all in scanned picture
Tri- color value of RGB of element switchs to the gray value of the 0-255 of a dimension, higher than the pixel of value 3 of fainting (recommended value 100 is adjusted)
Switch to the color (i.e. white) that tri- color of RGB is 255, eliminates watermark information, obtain picture_processed1.
Text recognition unit is based on OCR identification technology and identifies that the text image obtains the text message;
Concealed code recognition unit identifies that the image of the contract to be verified obtains the concealed code information based on OCR identification technology.
Specifically, it can be read out according to the setting coordinate pair concealed code of concealed code, read stain and be denoted as 1 white point and be denoted as 0,
Form 20 bytes, the data picture_nowatchcode of 160 binary digits, for carrying out concealed code identification.
Based on the same inventive concept, the embodiment of the present application also provides a kind of anti-fake contract generating means, it can be used for reality
Anti-fake contract generation method described in existing above-described embodiment, as described in the following examples.Due to anti-fake contract generating means
The principle solved the problems, such as is similar to the above method, therefore the implementation of anti-fake contract generating means may refer to the reality of the above method
It applies, overlaps will not be repeated.Used below, the software of predetermined function may be implemented in term " unit " or " module "
And/or the combination of hardware.Although device described in following embodiment is preferably realized with software, hardware or soft
The realization of the combination of part and hardware is also that may and be contemplated.
Fig. 8 is the structural block diagram of the anti-fake contract generating means in the embodiment of the present invention.As shown in figure 8, the anti-fake contract
Generating means may include the following contents: text obtains module 100, two dimensional code concealed code generation module 200 and anti-fake contract
Generation module 300.
Text obtains module 100 and obtains text of Contract.
Wherein, the text of Contract is by typing terminal typing, comprising: customer name, contract value, contract number, contract class
The business key message such as type.
Two dimensional code concealed code generation module 200 generates two dimensional code and concealed code according to the text of Contract;
Anti-fake contract generation module 300 generates anti-fake contract according to the text of Contract, the two dimensional code and the concealed code.
Specifically, watermark, two dimensional code, concealed code are added to the text of Contract of typing, generates anti-fake contract, and in server
These information are saved, specifically:
In order to identify that two dimensional code is convenient, two dimensional code, two dimensional code can be added in the lower right corner fixed coordinates { X, Y } of text of Contract
Contain the value of contract number.
Carry out HASH to the binary system entire contents of contract and calculate to obtain digest value, digest value is 20 bytes, 160 two into
Position processed, 1 represents stain in binary digit, and 0 represents white point, and the sequence of these black-white points is printed to the bottom of every page of contract, is beaten
Print 4 rows, row with 5 millimeters of row interval, every row has 40 points, and each 5 millimeters of spacing, the coordinate sequence of printing is denoted as
nowatchcode_xy_serial。
It by using above-mentioned anti-fake contract generating means, can be matched with anti-fake contract verification method, facilitate client certainly
Dynamic to realize contract verification, time saving and energy saving, the workload of reduction customer authentication contract improves the accuracy of verifying, high reliablity can
It effectively prevents financial risk, guarantees the safety of banking contract.
In an alternative embodiment, which includes: contract number, the two dimensional code concealed code generation module packet
It includes: two dimensional code generation unit.Two dimensional code generation unit generates the two dimensional code according to the contract number.
In an alternative embodiment, which includes: concealed code generation unit, to the conjunction
Hash calculation, which is carried out, with text obtains the concealed code.
In an alternative embodiment, anti-fake contract generating means further include: watermark adding module, to the anti-fake contract
Add watermark.
Specifically, the text of the fixed text of watermark i.e. a string, is attached among text at regular intervals with light font.
In an alternative embodiment, anti-fake contract generating means further include: module of affixing one's seal is covered to the anti-fake contract
Seal.
Specifically, increase seal graphics to the predeterminated position of text of Contract.
In an alternative embodiment, which includes business key message, and the anti-fake contract generating means are also
Include: the module that keeps accounts, which be sent to host so that the host stores the business key message, complete into
Account.
In an alternative embodiment, anti-fake contract generating means further include: memory module, store the text of Contract,
The watermark and the concealed code form body text, watermark text and the concealed code text of the corresponding contract.
In an alternative embodiment, anti-fake contract generating means further include: general clause obtains adding module, root
The general clause of contract is obtained according to contract type, and general clause is added to the corresponding position in text of Contract.
In an alternative embodiment, the generating means of the anti-fake contract can also include: contract sending module, will most
Throughout one's life at anti-fake contract be sent to typing terminal.
Device, module or the unit that above-described embodiment illustrates can specifically be realized, Huo Zheyou by computer chip or entity
Product with certain function is realized.It is a kind of typical to realize that equipment is electronic equipment, specifically, electronic equipment for example can be with
For personal computer, laptop computer, cellular phone, camera phone, smart phone, personal digital assistant, media player,
Any in navigation equipment, electronic mail equipment, game console, tablet computer, wearable device or these equipment sets
Standby combination.
Electronic equipment specifically includes memory, processor and storage on a memory and can in a typical example
The computer program run on a processor, the processor realize the authentication of above-mentioned anti-fake contract when executing described program
The step of method, alternatively, the step of realizing the generation method of above-mentioned anti-fake contract.
Below with reference to Fig. 9, it illustrates the structural representations for the electronic equipment 600 for being suitable for being used to realize the embodiment of the present application
Figure.
As shown in figure 9, electronic equipment 600 includes central processing unit (CPU) 601, it can be according to being stored in read-only deposit
Program in reservoir (ROM) 602 is loaded into random access storage device (RAM) from storage section 608) program in 603 and
Execute various work appropriate and processing.In RAM603, also it is stored with system 600 and operates required various programs and data.
CPU601, ROM602 and RAM603 are connected with each other by bus 604.Input/output (I/O) interface 605 is also connected to bus
604。
I/O interface 605 is connected to lower component: the importation 606 including keyboard, mouse etc.;It is penetrated including such as cathode
The output par, c 607 of spool (CRT), liquid crystal display (LCD) etc. and loudspeaker etc.;Storage section 608 including hard disk etc.;
And including such as LAN card, the communications portion 609 of the network interface card of modem etc..Communications portion 609 via such as because
The network of spy's net executes communication process.Driver 610 is also connected to I/O interface 606 as needed.Detachable media 611, such as
Disk, CD, magneto-optic disk, semiconductor memory etc. are mounted on as needed on driver 610, in order to read from thereon
Computer program be mounted as needed such as storage section 608.
Particularly, according to an embodiment of the invention, may be implemented as computer above with reference to the process of flow chart description
Software program.For example, the embodiment of the present invention includes a kind of computer readable storage medium, it is stored thereon with computer program,
The computer program realizes the step of verification method of above-mentioned anti-fake contract when being executed by processor, alternatively, realizing above-mentioned
The step of generation method of anti-fake contract.
In such embodiments, which can be downloaded and installed from network by communications portion 609,
And/or it is mounted from detachable media 611.
Computer-readable medium includes permanent and non-permanent, removable and non-removable media can be by any method
Or technology come realize information store.Information can be computer readable instructions, data structure, the module of program or other data.
The example of the storage medium of computer includes, but are not limited to phase change memory (PRAM), static random access memory (SRAM), moves
State random access memory (DRAM), other kinds of random access memory (RAM), read-only memory (ROM), electric erasable
Programmable read only memory (EEPROM), flash memory or other memory techniques, read-only disc read only memory (CD-ROM) (CD-ROM),
Digital versatile disc (DVD) or other optical storage, magnetic cassettes, tape magnetic disk storage or other magnetic storage devices
Or any other non-transmission medium, can be used for storage can be accessed by a computing device information.As defined in this article, it calculates
Machine readable medium does not include temporary computer readable media (transitory media), such as the data-signal and carrier wave of modulation.
For convenience of description, it is divided into various units when description apparatus above with function to describe respectively.Certainly, implementing this
The function of each unit can be realized in the same or multiple software and or hardware when application.
The present invention be referring to according to the method for the embodiment of the present invention, the process of equipment (system) and computer program product
Figure and/or block diagram describe.It should be understood that every one stream in flowchart and/or the block diagram can be realized by computer program instructions
The combination of process and/or box in journey and/or box and flowchart and/or the block diagram.It can provide these computer programs
Instruct the processor of general purpose computer, special purpose computer, Embedded Processor or other programmable data processing devices to produce
A raw machine, so that being generated by the instruction that computer or the processor of other programmable data processing devices execute for real
The device for the function of being specified in present one or more flows of the flowchart and/or one or more blocks of the block diagram.
These computer program instructions, which may also be stored in, is able to guide computer or other programmable data processing devices with spy
Determine in the computer-readable memory that mode works, so that it includes referring to that instruction stored in the computer readable memory, which generates,
Enable the manufacture of device, the command device realize in one box of one or more flows of the flowchart and/or block diagram or
The function of being specified in multiple boxes.
These computer program instructions also can be loaded onto a computer or other programmable data processing device, so that counting
Series of operation steps are executed on calculation machine or other programmable devices to generate computer implemented processing, thus in computer or
The instruction executed on other programmable devices is provided for realizing in one or more flows of the flowchart and/or block diagram one
The step of function of being specified in a box or multiple boxes.
It should also be noted that, the terms "include", "comprise" or its any other variant are intended to nonexcludability
It include so that the process, method, commodity or the equipment that include a series of elements not only include those elements, but also to wrap
Include other elements that are not explicitly listed, or further include for this process, method, commodity or equipment intrinsic want
Element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that including described want
There is also other identical elements in the process, method of element, commodity or equipment.
It will be understood by those skilled in the art that embodiments herein can provide as method, system or computer program product.
Therefore, complete hardware embodiment, complete software embodiment or embodiment combining software and hardware aspects can be used in the application
Form.It is deposited moreover, the application can be used to can be used in the computer that one or more wherein includes computer usable program code
The shape for the computer program product implemented on storage media (including but not limited to magnetic disk storage, CD-ROM, optical memory etc.)
Formula.
The application can describe in the general context of computer-executable instructions executed by a computer, such as program
Module.Generally, program module includes routines performing specific tasks or implementing specific abstract data types, programs, objects, group
Part, data structure etc..The application can also be practiced in a distributed computing environment, in these distributed computing environments, by
Task is executed by the connected remote processing devices of communication network.In a distributed computing environment, program module can be with
In the local and remote computer storage media including storage equipment.
All the embodiments in this specification are described in a progressive manner, same and similar portion between each embodiment
Dividing may refer to each other, and each embodiment focuses on the differences from other embodiments.Especially for system reality
For applying example, since it is substantially similar to the method embodiment, so being described relatively simple, related place is referring to embodiment of the method
Part explanation.
The above description is only an example of the present application, is not intended to limit this application.For those skilled in the art
For, various changes and changes are possible in this application.All any modifications made within the spirit and principles of the present application are equal
Replacement, improvement etc., should be included within the scope of the claims of this application.
Claims (24)
1. a kind of verification method of anti-fake contract characterized by comprising
The image of contract to be verified is obtained, includes: two dimensional code, text of Contract, watermark, stealth in the image of the contract to be verified
Code;
Identify that the two dimensional code obtains the contract number of the contract to be verified;
Body text, watermark text and the concealed code text prestored is obtained according to the contract number;
Image procossing is carried out to the image of the contract to be verified and obtains watermark information, text message and concealed code information;
According to the body text, the watermark text, the concealed code text, the text message, the watermark information with
And the concealed code information obtains contract verification result.
2. the verification method of anti-fake contract according to claim 1, which is characterized in that it is described according to the body text,
The watermark text, the concealed code text, the text message, the watermark information and the concealed code information are closed
Same verification result, comprising:
Concealed code matching result is obtained according to the concealed code information and the concealed code text;
Watermark matches result is obtained according to the watermark information and the watermark text;
Text matching result is obtained according to the text message and the contract text;
Contract verification knot is obtained according to the concealed code matching result, the watermark matches result and the text matching result
Fruit.
3. the verification method of anti-fake contract according to claim 2, which is characterized in that the verification method of the anti-fake contract
Further include:
Judge whether the text matching result is true;
If so, obtaining the business key message stored in host according to the contract number;
Host information matching result is obtained according to the business key message in the business key message and the body text;
Final verification result is obtained according to the host information matching result and the contract verification result.
4. the verification method of anti-fake contract according to claim 1, which is characterized in that in the image of the contract to be verified
Further include: seal, the image to the contract to be verified carry out image procossing and obtain watermark information, text message and hidden
Code information, comprising:
The seal in the image of the contract to be verified is eliminated, seal image is obtained;
The text in seal image is gone to obtain watermarking images described in elimination;
Identify that the watermarking images obtain the watermark information based on OCR identification technology;
The watermark in seal image is gone described in elimination, obtains text image;
Identify that the text image obtains the text message based on OCR identification technology;
Identify that the image of the contract to be verified obtains the concealed code information based on OCR identification technology.
5. a kind of generation method of anti-fake contract characterized by comprising
Obtain text of Contract;
Two dimensional code and concealed code are generated according to the text of Contract;
Anti-fake contract is generated according to the text of Contract, the two dimensional code and the concealed code.
6. the generation method of anti-fake contract according to claim 5, which is characterized in that the text of Contract includes: contract
Number, it is described that two dimensional code is generated according to the text of Contract, comprising:
The two dimensional code is generated according to the contract number.
7. the generation method of anti-fake contract according to claim 5, which is characterized in that described raw according to the text of Contract
At concealed code, comprising:
Hash calculation is carried out to the text of Contract and obtains the concealed code.
8. the generation method of anti-fake contract according to claim 5, which is characterized in that further include:
Watermark is added to the anti-fake contract.
9. the generation method of anti-fake contract according to claim 5, which is characterized in that further include:
It is with an official seal affixed to the anti-fake contract.
10. the generation method of anti-fake contract according to claim 5, which is characterized in that the text of Contract includes business
Key message, the generation method of the anti-fake contract further include:
The business key message is sent to host, so that the host stores the business key message, completes to keep accounts.
11. the generation method of anti-fake contract according to claim 8, which is characterized in that further include:
The text of Contract, the watermark and the concealed code are stored, body text, the watermark text of the corresponding contract are formed
Sheet and concealed code text.
12. a kind of anti-fake contract verification device characterized by comprising
Image collection module obtains the image of contract to be verified, includes: two dimensional code, contract in the image of the contract to be verified
Text, watermark, concealed code;
Two dimensional code identification module identifies that the two dimensional code obtains the contract number of the contract to be verified;
Text obtains module, and body text, watermark text and the concealed code text prestored is obtained according to the contract number;
Image processing module, to the image of the contract to be verified carry out image procossing obtain watermark information, text message and
Concealed code information;
Authentication module, according to the body text, the watermark text, the concealed code text, the text message, the water
Official seal breath and the concealed code information obtain contract verification result.
13. anti-fake contract verification device according to claim 12, which is characterized in that the authentication module includes:
First matching unit obtains concealed code matching result according to the concealed code information and the concealed code text;
Second matching unit obtains watermark matches result according to the watermark information and the watermark text;
Third matching unit obtains text matching result according to the text message and the contract text;
Authentication unit is obtained according to the concealed code matching result, the watermark matches result and the text matching result
Contract verification result.
14. anti-fake contract verification device according to claim 13, which is characterized in that further include:
Judgment module judges whether the text matching result is true;
Host data obtains module, when the text matching result is true, is obtained in host and is stored according to the contract number
Business key message;
Key information match module is led according to the business key message and the business key message in the body text
Machine information matching result;
Secondary authentication module obtains finally verifying knot according to the host information matching result and the contract verification result
Fruit.
15. anti-fake contract verification device according to claim 12, which is characterized in that in the image of the contract to be verified
Further include: seal, described image processing module include:
Seal eliminates unit, eliminates the seal in the image of the contract to be verified, obtains seal image;
Watermarking images acquiring unit goes the text in seal image to obtain watermarking images described in elimination;
Watermark recognition unit identifies that the watermarking images obtain the watermark information based on OCR identification technology;
Text acquiring unit goes the watermark in seal image described in elimination, obtains text image;
Text recognition unit identifies that the text image obtains the text message based on OCR identification technology;
Concealed code recognition unit identifies that the image of the contract to be verified obtains the concealed code information based on OCR identification technology.
16. a kind of anti-fake contract generating means characterized by comprising
Text obtains module, obtains text of Contract;
Two dimensional code concealed code generation module generates two dimensional code and concealed code according to the text of Contract;
Anti-fake contract generation module generates anti-fake contract according to the text of Contract, the two dimensional code and the concealed code.
17. anti-fake contract generating means according to claim 16, which is characterized in that the text of Contract includes: contract
Number, the two dimensional code concealed code generation module include:
Two dimensional code generation unit generates the two dimensional code according to the contract number.
18. anti-fake contract generating means according to claim 16, which is characterized in that the two dimensional code concealed code generates mould
Block includes:
Concealed code generation unit carries out Hash calculation to the text of Contract and obtains the concealed code.
19. anti-fake contract generating means according to claim 16, which is characterized in that further include:
Watermark adding module adds watermark to the anti-fake contract.
20. anti-fake contract generating means according to claim 16, which is characterized in that further include:
It affixes one's seal module, it is with an official seal affixed to the anti-fake contract.
21. anti-fake contract generating means according to claim 16, which is characterized in that the text of Contract includes that business is closed
Key information, the anti-fake contract generating means further include:
Keep accounts module, and the business key message is sent to host, so that the host stores the business key message, it is complete
At keeping accounts.
22. anti-fake contract generating means according to claim 19, which is characterized in that further include:
Memory module stores the text of Contract, the watermark and the concealed code, forms the text text of the corresponding contract
Originally, watermark text and concealed code text.
23. a kind of electronic equipment including memory, processor and stores the calculating that can be run on a memory and on a processor
Machine program, which is characterized in that the processor realizes the described in any item anti-fake conjunctions of Claims 1-4 when executing described program
With verification method the step of, alternatively, realize the described in any item anti-fake contracts of claim 5 to 11 generation method step
Suddenly.
24. a kind of computer readable storage medium, is stored thereon with computer program, which is characterized in that the computer program quilt
The step of verification method of the described in any item anti-fake contracts of Claims 1-4 is realized when processor executes, alternatively, realizing power
Benefit requires the step of generation method of 5 to 11 described in any item anti-fake contracts.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910529971.8A CN110264223A (en) | 2019-06-19 | 2019-06-19 | Verification method, generation method and the relevant apparatus of anti-fake contract |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910529971.8A CN110264223A (en) | 2019-06-19 | 2019-06-19 | Verification method, generation method and the relevant apparatus of anti-fake contract |
Publications (1)
Publication Number | Publication Date |
---|---|
CN110264223A true CN110264223A (en) | 2019-09-20 |
Family
ID=67919232
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910529971.8A Pending CN110264223A (en) | 2019-06-19 | 2019-06-19 | Verification method, generation method and the relevant apparatus of anti-fake contract |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110264223A (en) |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110895711A (en) * | 2019-11-05 | 2020-03-20 | 泰康保险集团股份有限公司 | Job entry management method and device |
CN112001819A (en) * | 2020-08-21 | 2020-11-27 | 山东商务职业学院 | Small-sized portable mistake and disorder prevention international trade contract scanning device and method |
CN112001818A (en) * | 2020-08-19 | 2020-11-27 | 凯美瑞德(苏州)信息科技股份有限公司 | Contract verification method and device, computer equipment and storage medium |
CN112115836A (en) * | 2020-09-11 | 2020-12-22 | 北京金堤科技有限公司 | Information verification method and device, computer readable storage medium and electronic equipment |
CN113222076A (en) * | 2020-01-21 | 2021-08-06 | 阿里健康信息技术有限公司 | Printing and verifying method, device, system and storage medium |
CN113487000A (en) * | 2021-07-30 | 2021-10-08 | 深圳市链融科技股份有限公司 | Contract document and service matching method and device, computer equipment and storage medium |
CN113963354A (en) * | 2021-12-16 | 2022-01-21 | 深圳市活力天汇科技股份有限公司 | Method and device for obtaining order number |
US11720991B2 (en) | 2021-05-20 | 2023-08-08 | International Business Machines Corporation | Signing and authentication of digital images and other data arrays |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1952973A (en) * | 2006-11-17 | 2007-04-25 | 韩少杰 | Method and system against false of network identification, verification, supervision and inquiry for graphic context bar code on bank bill |
CN102411701A (en) * | 2010-09-20 | 2012-04-11 | 航天信息股份有限公司 | Two-dimensional code array image scanning and identifying method and system for value-added tax special invoice |
CN102567764A (en) * | 2012-01-13 | 2012-07-11 | 中国工商银行股份有限公司 | Bill certificate and system for improving electronic image recognition efficiency |
US20160055552A1 (en) * | 2013-03-26 | 2016-02-25 | China Unionpay Co., Ltd. | Generating method, verifying method for electronic bill with anti-fake two dimension (2d) code and system for same |
CN106919848A (en) * | 2017-03-07 | 2017-07-04 | 江苏科大汇峰科技有限公司 | A kind of contract method for anti-counterfeit based on mobile terminal fingerprint recognition |
CN109461247A (en) * | 2018-10-29 | 2019-03-12 | 北京慧流科技有限公司 | Note validating method and device, electronic equipment and storage medium |
-
2019
- 2019-06-19 CN CN201910529971.8A patent/CN110264223A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1952973A (en) * | 2006-11-17 | 2007-04-25 | 韩少杰 | Method and system against false of network identification, verification, supervision and inquiry for graphic context bar code on bank bill |
CN102411701A (en) * | 2010-09-20 | 2012-04-11 | 航天信息股份有限公司 | Two-dimensional code array image scanning and identifying method and system for value-added tax special invoice |
CN102567764A (en) * | 2012-01-13 | 2012-07-11 | 中国工商银行股份有限公司 | Bill certificate and system for improving electronic image recognition efficiency |
US20160055552A1 (en) * | 2013-03-26 | 2016-02-25 | China Unionpay Co., Ltd. | Generating method, verifying method for electronic bill with anti-fake two dimension (2d) code and system for same |
CN106919848A (en) * | 2017-03-07 | 2017-07-04 | 江苏科大汇峰科技有限公司 | A kind of contract method for anti-counterfeit based on mobile terminal fingerprint recognition |
CN109461247A (en) * | 2018-10-29 | 2019-03-12 | 北京慧流科技有限公司 | Note validating method and device, electronic equipment and storage medium |
Non-Patent Citations (2)
Title |
---|
任传成 等: "《健康物联网》", 31 October 2015, 上海:上海科学技术文献出版社 * |
魏玉山 等: "《数字版权保护技术研发工程论文选辑》", 31 December 2016, 北京:中国书籍出版社 * |
Cited By (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110895711A (en) * | 2019-11-05 | 2020-03-20 | 泰康保险集团股份有限公司 | Job entry management method and device |
CN113222076A (en) * | 2020-01-21 | 2021-08-06 | 阿里健康信息技术有限公司 | Printing and verifying method, device, system and storage medium |
CN112001818A (en) * | 2020-08-19 | 2020-11-27 | 凯美瑞德(苏州)信息科技股份有限公司 | Contract verification method and device, computer equipment and storage medium |
CN112001818B (en) * | 2020-08-19 | 2024-08-09 | 凯美瑞德(苏州)信息科技股份有限公司 | Contract verification method, contract verification device, computer equipment and storage medium |
CN112001819A (en) * | 2020-08-21 | 2020-11-27 | 山东商务职业学院 | Small-sized portable mistake and disorder prevention international trade contract scanning device and method |
CN112115836A (en) * | 2020-09-11 | 2020-12-22 | 北京金堤科技有限公司 | Information verification method and device, computer readable storage medium and electronic equipment |
CN112115836B (en) * | 2020-09-11 | 2024-07-26 | 北京金堤科技有限公司 | Information verification method and device, computer readable storage medium and electronic equipment |
US11720991B2 (en) | 2021-05-20 | 2023-08-08 | International Business Machines Corporation | Signing and authentication of digital images and other data arrays |
CN113487000A (en) * | 2021-07-30 | 2021-10-08 | 深圳市链融科技股份有限公司 | Contract document and service matching method and device, computer equipment and storage medium |
CN113963354A (en) * | 2021-12-16 | 2022-01-21 | 深圳市活力天汇科技股份有限公司 | Method and device for obtaining order number |
CN113963354B (en) * | 2021-12-16 | 2022-04-12 | 深圳市活力天汇科技股份有限公司 | Method and device for obtaining order number |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110264223A (en) | Verification method, generation method and the relevant apparatus of anti-fake contract | |
US11030752B1 (en) | System, computing device, and method for document detection | |
US20200259665A1 (en) | Transaction data processing method, computing device, and storage medium | |
KR102406432B1 (en) | Identity authentication methods and devices, electronic devices and storage media | |
CA2925325C (en) | Document authentication based on expected wear | |
CA2588789C (en) | Method and system for verifying check images | |
US9652658B1 (en) | Fingerprint check to reduce check fraud | |
US11367310B2 (en) | Method and apparatus for identity verification, electronic device, computer program, and storage medium | |
US20190377970A1 (en) | Digital image generation through an active lighting system | |
CN107729124A (en) | Transaction methods and device, electronic equipment | |
CN103020506A (en) | Key equipment and method integrating photographing and bar code identification technologies | |
CN104376314B (en) | A kind of constructive method towards Google glass Internet of Things web station system | |
CN111145447A (en) | Bank self-service intelligent printing system and method | |
Wilkinson et al. | Use of synthetic discriminant functions for handwritten-signature verification | |
CN109544325A (en) | Switching method, device and the computer equipment of face label system based on data processing | |
KR20200072070A (en) | Electronic device for generating verification model used to verify a user's signature | |
US20240217255A1 (en) | Document Boundary Analysis | |
US11900755B1 (en) | System, computing device, and method for document detection and deposit processing | |
US20230316795A1 (en) | Auto-Document Detection & Capture | |
US12138944B2 (en) | Systems and methods for token authentication | |
US20230362012A1 (en) | Systems and methods for token authentication | |
US20230362013A1 (en) | Systems and methods for token authentication | |
US20230133702A1 (en) | System, Method, and Computer Program Product for Sensitive Data Obfuscation | |
Tahsin et al. | Verifying online signatures through an iterative device independent model | |
CN118447513A (en) | Method and system for automatically identifying and auditing images based on multiple modes |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190920 |