CN109033789B - Method, device and system for generating right-confirming certificate - Google Patents

Method, device and system for generating right-confirming certificate Download PDF

Info

Publication number
CN109033789B
CN109033789B CN201810623530.XA CN201810623530A CN109033789B CN 109033789 B CN109033789 B CN 109033789B CN 201810623530 A CN201810623530 A CN 201810623530A CN 109033789 B CN109033789 B CN 109033789B
Authority
CN
China
Prior art keywords
certificate
uid
identity
asset
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201810623530.XA
Other languages
Chinese (zh)
Other versions
CN109033789A (en
Inventor
宣宏量
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Wenchuangyuan Investment Management Co ltd
Original Assignee
Beijing Wenchuangyuan Investment Management Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Wenchuangyuan Investment Management Co ltd filed Critical Beijing Wenchuangyuan Investment Management Co ltd
Priority to CN201810623530.XA priority Critical patent/CN109033789B/en
Publication of CN109033789A publication Critical patent/CN109033789A/en
Application granted granted Critical
Publication of CN109033789B publication Critical patent/CN109033789B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/33User authentication using certificates

Abstract

The invention relates to a method, a device and a system for generating an authentication certificate, wherein the method comprises the following steps: digitally encrypting the identity information and the first timestamp to generate a digitally encrypted identity certificate, and performing HASH calculation according to the identity certificate to generate a HASH value serving as an identity Uniqueness Identifier (UID); carrying out digital encryption on the asset generation information and the second timestamp to generate a digital encrypted asset certificate, and carrying out HASH calculation according to the asset certificate to generate a HASH value serving as an asset UID; digitally encrypting the legal certificate information and the third timestamp to generate a digitally encrypted legal certificate, and performing HASH calculation according to the legal certificate to generate a HASH value serving as a legal certificate UID; after the identity certificate, the asset certificate and the legal certification document certificate are verified to be authentic by the authority-confirming organization, the identity UID, the asset UID, the legal certification document UID, the right information abstract and the fourth time stamp are digitally encrypted to generate a first authority-confirming certificate.

Description

Method, device and system for generating right-confirming certificate
Technical Field
The present invention relates to the field of information security technologies, and in particular, to a method, an apparatus, and a system for generating an authorization certificate.
Background
The copyright registration full title is work copyright registration, that is, copyright registration is performed on a certain work in a registration organization. In the existing copyright registration certificate, the carrier is a paper digital certificate or an electronic version (picture/PDF format) certificate. The content items and the formats of the paper certificate (first generation registration certificate) and the electronic version certificate (second generation registration certificate) are completely the same, and the printed electronic version certificate is the paper version certificate, as shown in fig. 1.
The existing copyright registration certificate has the following defects:
(1) the information in the paper certificate and the electronic certificate is easy to forge or tamper, and the forged or tampered digital certificate is difficult to identify the authenticity of the paper certificate and the electronic certificate issued by the certificate issuing authority;
(2) because China produces many works every year, some works have the same name, and the names of the rights and interests are also largely the same, the paper certificate and the electronic version certificate can not prove the unique relationship among the works, the data files of the works and the rights and interests on the certificate;
(3) when a work (e.g., a movie work) involves multiple rights, paper and e-plate certificates cannot list all the names of the rights due to space limitations.
Disclosure of Invention
The invention provides a method, a device and a system for generating an authority-confirming certificate based on the problems.
In a first aspect, the present invention provides a method for generating a certificate of authenticity, including: digitally encrypting the identity information and the first timestamp to generate a digitally encrypted identity certificate, and performing HASH calculation according to the identity certificate to generate a HASH value serving as an identity Uniqueness Identifier (UID); carrying out digital encryption on the asset generation information and the second timestamp to generate a digital encrypted asset certificate, and carrying out HASH calculation according to the asset certificate to generate a HASH value serving as an asset UID; digitally encrypting the legal certificate information and the third timestamp to generate a digitally encrypted legal certificate, and performing HASH calculation according to the legal certificate to generate a HASH value serving as a legal certificate UID; and after the identity certificate, the asset certificate and the legal certificate are verified by a right confirming organization, digitally encrypting the identity UID, the asset UID, the legal certificate UID, the right information abstract and a fourth timestamp to generate a first right confirming certificate.
Preferably, the method further comprises the following steps: carrying out digital encryption on the identity certificate, the identity version information, the data file HASH value for recording the identity and the fifth timestamp to generate a digital encrypted identity version certificate, and carrying out HASH calculation according to the identity version certificate to generate an HASH value serving as an identity version UID; after the identity certificate, the identity version certificate, the asset certificate and the legal certificate are verified to be authentic by a right confirming organization, the identity UID, the identity version UID, the asset UID, the legal certificate UID, the right information abstract and a sixth timestamp are digitally encrypted to generate a second right confirming certificate.
Preferably, the method further comprises the following steps: carrying out digital encryption on the asset certificate, the asset version information, the data file HASH value for recording the asset existence and the seventh timestamp to generate a digital encrypted asset version certificate, and carrying out HASH calculation according to the asset version certificate to generate an HASH value serving as an asset version UID; after the identity certificate, the asset version certificate and the legal certificate are verified to be authentic by a right confirming organization, the identity UID, the asset version UID, the legal certificate UID, the right information abstract and an eighth timestamp are digitally encrypted to generate a third right confirming certificate.
Preferably, the method further comprises the following steps: digitally encrypting the legal certification document certificate, the version information of the legal certification document, the data file HASH value of the recorded legal certification document and the ninth timestamp to generate a digitally encrypted legal certification document version certificate, and performing HASH calculation according to the legal certification document version certificate to generate an HASH value serving as a legal certification document version UID; after the identity certificate, the asset certificate, the legal certificate and the legal certificate version certificate are verified to be authentic by a right confirming organization, the identity UID, the asset UID, the legal certificate version UID, the right information abstract and a tenth timestamp are digitally encrypted to generate a fourth right confirming certificate.
Preferably, the identity information includes: the identity certificate includes at least one of an author certificate, an rightful beneficiary certificate, a rightful person certificate, a user certificate, a producer certificate, a proxy certificate, and a rightful authority certificate, and the identity UID includes at least one of an author UID, a rightful person UID, a user UID, a producer UID, a proxy UID, and a rightful authority UID.
Preferably, the method further comprises the following steps: the authority confirming mechanism also verifies whether the identity information of the transferor, the identity information of the transferee and the asset transfer contract information in the second legal certification file are true or not; after the true existence of verification information is determined, obtaining the identity UID and the asset UID according to the identity information of the transferor, the second legal certificate and the first right certificate; and digitally encrypting the identity UID, the asset UID, the legal certificate UID, the transferor identity UID obtained by performing digital encryption and Hash calculation according to the identity information of the transferor, the transferee identity UID obtained by performing digital encryption and Hash calculation according to the identity information of the transferee, the asset right certificate ID in the asset transfer contract information, the right information abstract and the eleventh timestamp to generate a first transfer right certificate.
Preferably, when applied to the use permission of the asset, the method further comprises the following steps: the right-determining organization also verifies whether the identity information of the licensor, the identity information of the licensee and the asset license contract information in the third legal certification file are true or not; when the true existence of verification information is determined, obtaining the identity UID and the asset UID according to the licensor identity information, the third legal certification file and the first right confirmation certificate; and digitally encrypting the identity UID, the asset UID, the first legal certificate UID, the licensor identity UID obtained by performing digital encryption and hash calculation according to the licensor identity information, the licensee identity UID obtained by performing digital encryption and hash calculation according to the licensee identity information, the asset right certificate ID, the right information abstract and the twelfth timestamp in the asset license use contract information to generate a first license right certificate.
Preferably, the legal certificate is used to prove a deterministic correspondence between the identity information and the asset generation information.
Preferably, the timestamp is the time of the certificate generation.
Preferably, the files generated by the certificate are stored with the certificate UID as the file name and dat as the extended file name.
In a second aspect, the present invention provides an apparatus for generating an authorization certificate, including: the first generation module is used for carrying out digital encryption on the identity information and the first timestamp to generate a digital encrypted identity certificate, carrying out HASH calculation according to the identity certificate to generate a HASH value serving as an identity UID; the third generation module is used for carrying out digital encryption on the generation information of the asset and the second timestamp to generate a digital encrypted asset certificate, carrying out HASH calculation according to the asset certificate to generate a HASH value serving as an asset UID; the fifth generation module is used for carrying out digital encryption on the legal certificate information and the third timestamp to generate a digitally encrypted legal certificate, carrying out HASH calculation according to the legal certificate to generate a HASH value serving as a legal certificate UID; and the seventh generation module is used for digitally encrypting the identity UID, the asset UID, the legal certificate UID and the fourth timestamp to generate a first right confirmation certificate after a right confirmation mechanism verifies the authenticity of the identity certificate, the asset certificate and the legal certificate.
Preferably, the method further comprises the following steps: the second generation module is used for digitally encrypting the identity certificate, the identity version information, the data file HASH value and the fifth timestamp for recording the identity, generating a digitally encrypted identity version certificate, and performing HASH calculation according to the identity version certificate to generate an HASH value serving as an identity version UID; the seventh generating module is specifically configured to: after the identity certificate, the identity version certificate, the asset certificate and the legal certificate are verified to be authentic by a right confirming organization, the identity UID, the identity version UID, the asset UID, the legal certificate UID, the right information abstract and a sixth timestamp are digitally encrypted to generate a second right confirming certificate.
Preferably, the method further comprises the following steps: a fourth generation module, configured to digitally encrypt the asset certificate, the asset version information, the HASH value of the data file recording the asset presence, and the seventh timestamp, to generate a digitally encrypted asset version certificate, and perform HASH calculation according to the asset version certificate to generate a HASH value serving as an asset version UID; the seventh generating module is specifically configured to: after the identity certificate, the asset version certificate and the legal certificate are verified to be authentic by a right confirming organization, the identity UID, the asset version UID, the legal certificate UID, the right information abstract and an eighth timestamp are digitally encrypted to generate a third right confirming certificate.
Preferably, the method further comprises the following steps: a sixth generating module, configured to digitally encrypt the legal certification document certificate, the version information of the legal certification document, the HASH value of the data file recording the legal certification document, and the ninth timestamp, to generate a digitally encrypted legal certification document version certificate, perform HASH calculation according to the legal certification document version certificate, and use the generated HASH value as a legal certification document version UID; the seventh generating module is specifically configured to: after the identity certificate, the asset certificate, the legal certificate and the legal certificate version certificate are verified to be authentic by a right confirming organization, the identity UID, the asset UID, the legal certificate version UID, the right information abstract and a tenth timestamp are digitally encrypted to generate a fourth right confirming certificate.
Preferably, when the asset is transferred, the method further comprises the following steps: and the eighth generation module is used for digitally encrypting the identity UID, the asset UID, the legal certificate UID, the transferor identity UID obtained by performing digital encryption and hash calculation according to the transferor identity information, the transferee identity UID obtained by performing digital encryption and hash calculation according to the transferee identity information, the asset right certificate ID, the right information abstract and the eleventh timestamp in the asset transfer contract information to generate a first transfer right certificate.
Preferably, when applied to the use permission of the asset, the method further comprises the following steps: and the ninth generating module is used for digitally encrypting the identity UID, the asset UID, the first legal certificate UID, the licensor identity UID obtained by performing digital encryption and hash calculation according to the licensor identity information, the licensee identity UID obtained by performing digital encryption and hash calculation according to the licensee identity information, the asset right certificate ID in the asset license use contract information, the right information abstract and the twelfth timestamp to generate a first license right certificate.
In a third aspect, the present invention provides a generation system of a certificate of authenticity, comprising the apparatus as described in the embodiments of the second aspect.
The uniqueness identification is carried out on the identity information, the identity version information, the asset generation information, the asset version information, the legal certificate information and the legal certificate version information, so that the uniqueness of the information in the generated right certificate is ensured, and the uniqueness of the encrypted right certificate is ensured; in addition, all information is truly verified through the authority-confirming mechanism, and the authenticity of the information in the generated authority-confirming certificate is guaranteed.
Drawings
FIG. 1 is a sample diagram of a prior art paper certificate and an electronic version certificate;
fig. 2 is a flowchart of a method for generating an authentication certificate according to an embodiment of the present invention;
fig. 3 is a flowchart of another method for generating an authorization certificate according to an embodiment of the present invention;
fig. 4 is a schematic diagram of an apparatus for generating an authentication certificate according to an embodiment of the present invention;
fig. 5 is a schematic diagram of another apparatus for generating an authorization certificate according to an embodiment of the present invention.
Detailed Description
In order to make the technical solutions and advantages of the embodiments of the present invention more clear, the technical solutions of the present invention are further described in detail below with reference to the accompanying drawings and the embodiments.
Before creating the certificate of authenticity, some information necessary for generating the certificate of authenticity is acquired, such as information of generation information of assets, authors, copyright holders, authority of authenticity and the like, the digital encryption is carried out to generate an encrypted certificate, then the Hash calculation is carried out according to the encrypted certificate to generate UID of the information, and then UIDs of all the information are encrypted to obtain the certificate of authenticity.
The certificate of authenticity generated by the invention can be applied to not only a copyright registration certificate, but also certificates issued by various organizations such as a house property registration certificate, a motor vehicle registration certificate, a degree certification certificate, a professional qualification certificate, a trademark certificate, a patent certificate and the like. The embodiment of the invention takes a copyright registration certificate as an example.
Fig. 2 is a flowchart of a method for generating an authentication certificate according to an embodiment of the present invention. As shown in fig. 2, a method for generating a certificate of authority includes the following specific steps:
step S201, digitally encrypting the identity information and the first timestamp to generate a digitally encrypted identity certificate, and performing HASH calculation according to the identity certificate to generate a HASH value as an identity UID.
Optionally, the identity information mainly includes information of an author, an authorized beneficiary, an authorized person, a user, a producer, an agency, an authority for determining authority, and the like.
Alternatively, the identity information may be information such as a name, a fingerprint, a facial recognition feature, a biometric gene, a place of birth, a time of birth, etc. of the individual, and may be information such as a name, a setup time, a setup location, etc. of the organization.
Specifically, the system digitally encrypts the identity information and the time stamp during encryption to generate an encrypted identity certificate, and performs HASH calculation according to the identity certificate to generate a HASH value serving as an identity UID (Unique Identifier). Then, the file generated by the identity certificate is stored with the identity UID as the file name and dat (Digital Assets Token) as the extended file name.
The identity information is not obtained by uniformly carrying out digital encryption and Hash calculation on the information of an author, a right beneficiary, a user, a producer, an agent mechanism and a right confirming mechanism to obtain an identity UID. But the author information in the identity information is digitally encrypted and hashed to obtain an author UID; copyright owner information, a UID of the copyright owner obtained by digital encryption and hash calculation, etc., and these UIDs are then collectively called an identity UID. In addition, since there are more than one author, rightful person, user, and producer in the identity information, there may be a plurality of authors UID, rightful person UID, user UID, and producer UID.
In addition, the first time stamp represents the time stamp when the identity information is encrypted, and the identity certificate generated by digitally encrypting the identity information and the time stamp when the identity information is encrypted has more uniqueness. The acquisition and the play of the second timestamp to the twelfth timestamp used by the identity version certificate, the asset version certificate, the legal document version certificate and the right-confirming certificate generated later are the same as those of the first timestamp, and are not described in detail later.
Step S202, the generation information of the asset and the second time stamp are digitally encrypted to generate a digitally encrypted asset certificate, HASH calculation is carried out according to the asset certificate, and the generated HASH value is used as the UID of the asset.
Specifically, the system digitally encrypts the asset generation information and the time stamp during encryption to generate a digital encrypted asset certificate, and performs HASH calculation according to the asset certificate to generate a HASH value serving as the asset UID. The file generated by the asset certificate is then stored with the asset UID as the file name and dat as the extended file name.
The generation information of the asset may be, for example, an asset name, an asset type, an asset generation time, an asset generation location, an asset content, and the like.
Step S203, the legal certificate information and the third time stamp are digitally encrypted to generate a digitally encrypted legal certificate, HASH calculation is performed according to the legal certificate, and the generated HASH value is used as a legal certificate UID.
Specifically, the system digitally encrypts the legal certificate information and the time stamp during encryption to generate a digitally encrypted legal certificate, and then performs HASH calculation according to the legal certificate to generate a HASH value serving as a legal certificate UID. And then, the file generated by the legal certification file certificate is stored by using the UID of the legal certification file as a file name and using dat as an extended file name.
The legal certification document information may be information such as a name of the legal certification document, a type of the legal certification document, a generation time of the legal certification document, and a generation location of the legal certification document.
Step S204, after the authority-confirming organization verifies the authenticity of the identity certificate, the asset certificate and the legal certification document certificate, the identity UID, the asset UID, the legal certification document UID, the authority information abstract and the fourth time stamp are digitally encrypted to generate a first authority-confirming certificate.
Specifically, since the generated certificate of authenticity cannot determine whether all the information contained therein is truly present, it is necessary to verify whether all the information in the generated certificate of authenticity is truly present before generating the certificate of authenticity. The system requires a certifying authority to verify that the identity, asset and legal certificates are authentic. When the real existence of the information is determined, the system carries out digital encryption on the identity UID, the asset UID, the legal certificate UID and the timestamp for generating the certificate to generate a digital encryption right-confirming certificate.
Wherein, the authority is used for verifying the identity certificate, the asset certificate and the legal certificate as trueness, and the system adds the authority certificate UID into each certificate. And when the subsequently verified identity version certificate, the asset version certificate and the legal certificate version certificate are true, the authority certificate UID is also added into each certificate.
Optionally, identity version information generated according to the identity information may be added to the generated right-confirming certificate, and the specific implementation steps are as follows:
step S205, digitally encrypting the identity certificate, the identity version information, the data file HASH value and the fifth timestamp for recording the identity, generating a digitally encrypted identity version certificate, and performing HASH calculation according to the identity version certificate to generate an HASH value serving as an identity version UID;
specifically, the system digitally encrypts the identity certificate, the identity version information, the data file HASH value for recording the identity and the timestamp during encryption to generate a digitally encrypted identity version certificate, and then performs HASH calculation according to the identity version certificate to generate the HASH value serving as the identity version UID. And then storing the file generated by the identity version certificate by using the identity version UID as the file name and the dat as the extension file name.
The identity version information refers to a carrier of identity information, and can be presented in other ways such as an identity card, a passport, a student card, a micro signal, a QQ number and the like, wherein the identity version information comprises at least one of information such as personal name, identity card number, personal biological gene, family address and the like. The identity version certificate is used for confirming that identity information really exists.
In addition, because the identity version information is different from the contained identity information, the identity version certificates generated by digital encryption are different, and the obtained identity versions UIDs are also different by performing hash calculation. Each identity UID may correspond to multiple identity versions UID, as one person may have multiple certificates of identity.
However, at this time, the authority-confirming certificate generated in step S204 is generated by digitally encrypting the identity UID, the identity version UID, the asset UID, the legal-certificate UID, the right information digest, and the sixth timestamp after the authority verifies the authenticity of the identity certificate, the identity version certificate, the asset certificate, and the legal-certificate-file certificate.
Optionally, the asset version information may also be generated according to the asset generation information and added to the generated right-confirming certificate, and the specific implementation steps are as follows:
step S206, the asset certificate, the asset version information, the data file HASH value and the seventh timestamp for recording the asset existence are digitally encrypted to generate a digitally encrypted asset version certificate, and HASH calculation is performed according to the asset version certificate to generate a HASH value which is used as an asset version UID.
Specifically, the system digitally encrypts the asset certificate, the asset version information, the HASH value of the data file recording the asset presence, and the timestamp during encryption to generate an asset version certificate, and then performs HASH calculation on the asset version certificate to generate a HASH value serving as an asset version UID. And then storing the file generated by the asset version certificate by using the asset version UID as the file name and dat as the extended file name.
The asset version information refers to a carrier of generation information of the asset, and can be presented in text, video, pictures or other versions, wherein the information includes at least one of asset content, asset name, asset type and the like. The asset version certificate is used to confirm that the generated information of the asset actually exists.
In addition, because the version information of the assets is different from the generation information of the assets, the asset version certificates generated by digital encryption are different, and the obtained asset versions UIDs are different by performing hash calculation. Each asset UID may correspond to multiple asset versions UID, as an asset may also have multiple versions that record the asset's existence.
However, at this time, the authority-confirming certificate generated in step S204 is generated by digitally encrypting the identity UID, the asset version UID, the legal-certificate UID, the right information digest, and the eighth timestamp after the authority-confirming entity verifies the authenticity of the identity certificate, the asset version certificate, and the legal-certificate.
Optionally, the version information of the legal certification document may be generated according to the generation information of the legal certification document and added to the generated right-confirming certificate, and the specific implementation steps are as follows:
step S207, the certificate of the legal certification file, the version information of the legal certification file, the HASH value of the data file recording the legal certification file and the ninth timestamp are digitally encrypted to generate a digitally encrypted version certificate of the legal certification file, HASH calculation is performed according to the version certificate of the legal certification file, and the generated HASH value is used as the version UID of the legal certification file.
Specifically, the system digitally encrypts the legal certification document certificate, the version information of the legal certification document, the HASH value of the data file recording the legal certification document, and the timestamp during encryption to generate a legal certification document version certificate, and then performs HASH calculation on the legal certification document version certificate to generate the HASH value as a legal certification document version UID. And then storing the file generated by the legal certificate file version certificate by using the UID of the legal certificate file as a file name and dat as an extended file name.
Legal certification documentation is the definitive correspondence between certification identity information and asset generation information. For example, a legal certificate document proves that the relationship between the author and the work is original, and then provides an original certificate contract; an transferor and a work are in an transferal relationship, and then an asset transfer contract is provided; there is a licensing relationship between the licensor and the work, and then an asset license use contract is provided.
The legal certificate file version information refers to a carrier of generation information of the legal certificate file and can be presented in texts, videos, pictures or other versions. The legal certificate version certificate is used for confirming that the generated information of the legal certificate really exists.
In addition, because the version information of the legal certificate is different from the generation information of the contained legal certificate, the legal certificate version certificate generated by digital encryption is also different, and the obtained legal certificate version UID is different after hash calculation. Each legal certificate UID may correspond to a plurality of legal certificate versions UID, since a legal certificate may also have a plurality of versions in which the legal certificate exists.
However, at this time, the authority-confirming certificate generated in step S204 is generated by digitally encrypting the identity UID, the asset UID, the legal document version UID, the rights information digest, and the tenth timestamp after the authority-confirming authority verifies the authenticity of the identity certificate, the asset certificate, the legal document certificate, and the legal document version certificate.
In addition, two certificates UID can be randomly selected from the three of the identity version UID, the asset version UID and the legal certification file version UID according to the three certificates UID of the identity UID, the asset UID and the legal certification file UID, the five certificates UID are combined with the three certificates UID, and the five certificates UID are added with the authority information abstract and the timestamp to carry out digital encryption to generate the right-confirming certificate.
According to the method for generating the right-confirming certificate shown in fig. 3, the right-confirming certificate can be generated by performing digital encryption according to the identity UID, the identity version UID, the asset version UID, the legal certificate version UID, the rights information abstract and the timestamp.
Because the identity version UID comprises the identity UID, the asset version UID comprises the asset UID and the legal certificate version UID comprises the legal certificate UID, the digital encryption can be carried out according to the identity version UID, the asset version UID, the legal certificate version UID, the rights information abstract and the time stamp to generate the right-confirming certificate.
Therefore, according to the three certificates of the identity version UID, the asset version UID and the law certification file version UID, one or two certificates UID are selected from the identity UID, the asset version UID and the law certification file UID, and the formed certificate UID is added with the ownership information abstract and the time stamp to carry out digital encryption to generate the right-confirming certificate.
In one embodiment, when the asset is transferred, the authority needs to verify whether the random one or two of the identity certificate and the identity version certificate, the random one or two of the asset certificate and the asset version certificate, the random one or two of the legal certification document certificate and the legal certification document version certificate, the identity information of the transferor, the identity information of the transferee and the contract information of the asset transfer are authentic.
When the true existence of the information is determined, the system carries out digital encryption on one or two of the identity UID and the identity version UID, one or two of the asset UID and the asset version UID, one or two of the legal certification file UID and the legal certification file version UID, the identity UID of the transferor obtained by digital encryption and hash calculation according to the identity information of the transferor, the identity UID of the transferee obtained by digital encryption and hash calculation according to the identity information of the transferee, the asset right certificate ID, the right information abstract and the timestamp used for generating the digital certificate, and generates a right transfer certificate.
And when the second transfer is carried out, the transferor information is the first transferee information, and the rest is done in sequence.
In another embodiment, when the generation of the asset is authorized, the authority-confirming authority needs to verify whether the identity certificate or/and the identity version certificate, the random one or two of the asset certificate and the asset version certificate, the random one or two of the legal certificate and the legal certificate version certificate, the licensor identity information, the licensee identity information and the asset license contract information are authentic.
When the true existence of the information is determined, the system carries out digital encryption on one or two of the identity UID and the identity version UID, one or two of the asset UID and the asset version UID, one or two of the legal certification file UID and the legal certification file version UID, the licensor identity UID obtained by digital encryption and hash calculation according to the identity information of the licensee, the licensee identity UID obtained by digital encryption and hash calculation according to the identity information of the licensee, the asset right certificate ID, the right information abstract and the time stamp when the digital certificate is generated, and generates the right certificate.
Wherein, when the licensor who obtains the transfer authorization grants the licensor to use to other people, the transferor information is used as the licensor information.
In addition, HASH calculation is performed according to the authentication certificate, and the generated HASH value is used as the authentication certificate UID. Then, the file generated by the authority-confirming certificate is stored with the authority-confirming UID as the file name and dat as the extended file name.
If the authority verifies that any information is not authentic, the system will not generate the authority certificate and the authority certificate UID.
The uniqueness identification is carried out on the identity information, the identity version information, the asset generation information, the asset version information, the legal certificate information and the legal certificate version information, so that the uniqueness of the information in the generated right certificate is ensured, and the uniqueness of the encrypted right certificate is ensured; in addition, all information is truly verified through the authority-confirming mechanism, and the authenticity of the information in the generated authority-confirming certificate is guaranteed.
Fig. 4 is a schematic diagram of an apparatus for generating an authorization certificate according to an embodiment of the present invention. As shown in fig. 4, the present invention further provides an apparatus for generating an authentication certificate, where the apparatus 400 includes: a first generating module 401, a third generating module 403, a fifth generating module 405, and a seventh generating module 407, where each module is specifically configured to:
the first generation module 401 is configured to digitally encrypt the identity information and the first timestamp to generate a digitally encrypted identity certificate, perform HASH calculation according to the identity certificate, and use a generated HASH value as an identity uniqueness identifier UID;
the third generating module 403 is configured to digitally encrypt the asset generation information and the second timestamp to generate a digitally encrypted asset certificate, perform HASH calculation according to the asset certificate, and generate a HASH value as an asset UID;
the fifth generation module 405 is configured to digitally encrypt the legal certificate information and the third timestamp to generate a digitally encrypted legal certificate, perform HASH calculation according to the legal certificate, and generate a HASH value serving as a legal certificate UID;
the seventh generating module 407 is configured to digitally encrypt the identity UID, the asset UID, the legal certificate UID, the rights information digest, and the fourth timestamp after the authority verifies the authenticity of the identity certificate, the asset certificate, and the legal certificate, so as to generate the first authority certificate.
Optionally, identity version information generated according to the identity information may be added to the seventh generating module 407 to generate the right-confirming certificate, which is as follows:
the second generating module 402 is configured to digitally encrypt the identity certificate, the version information of the identity, the HASH value of the data file recording the existence of the identity, and the fifth timestamp, to generate a digitally encrypted identity version certificate, and perform HASH calculation according to the identity version certificate, so that the generated HASH value is used as the identity version UID.
At this time, the seventh generating module 407 is configured to digitally encrypt the identity UID, the identity version UID, the asset UID, the legal certification file UID, the right information digest, and the sixth timestamp to generate a second right certificate after the authority verifies the authenticity of the identity certificate, the identity version certificate, the asset certificate, and the legal certification file certificate.
Optionally, asset version information generated according to the asset generation information may be added to the seventh generation module 407 to generate the right-confirming certificate, which is as follows:
the fourth generation module 404 is configured to digitally encrypt the asset certificate, the asset version information, the HASH value of the data file recording the asset presence, and the seventh timestamp, generate a digitally encrypted asset version certificate, perform HASH calculation according to the asset version certificate, and use the generated HASH value as the asset version UID.
At this time, the seventh generating module 407 is configured to digitally encrypt the identity UID, the asset version UID, the legal certification file UID, the right information digest, and the eighth timestamp to generate a third right confirmation certificate after the right confirmation authority verifies the authenticity of the identity certificate, the asset version certificate, and the legal certification file certificate.
Optionally, legal certificate version information generated according to the generation information of the legal certificate may be added to the seventh generation module 407 to generate the right-confirming certificate, which is specifically as follows:
the sixth generating module 406 is configured to digitally encrypt the legal certification document certificate, the version information of the legal certification document, the HASH value of the data file recording the legal certification document, and the ninth timestamp, to generate a digitally encrypted legal certification document version certificate, perform HASH calculation according to the legal certification document version certificate, and use the generated HASH value as the legal certification document version UID.
At this time, the seventh generating module 407 is configured to digitally encrypt the identity UID, the asset UID, the legal document version UID, the right information digest, and the tenth timestamp after the authority-confirming authority verifies the authenticity of the identity certificate, the asset certificate, the legal document certificate, and the legal document plaintext version certificate, so as to generate a fourth authority-confirming certificate.
Fig. 5 is a schematic diagram of another apparatus for generating an authorization certificate according to an embodiment of the present invention. The apparatus 500 for generating another kind of certificate of authenticity shown in fig. 5 may further generate a certificate of authenticity by performing digital encryption according to the identity UID generated by the first generation module 401, the identity version UID generated by the second generation module 402, the asset UID generated by the third generation module 403, the asset version UID generated by the fourth generation module 404, the legal certification file UID generated by the fifth generation module 405, the legal certification file version UID generated by the sixth generation module 406, the digest of the right information, and the timestamp.
In one embodiment, when the asset is transferred, the authority needs to verify whether the identity certificate and/or the identity version certificate, the random one or two of the asset certificate and the asset version certificate, the random one or two of the legal document certificate and the legal document version certificate, the identity information of the transferor, the identity information of the transferee and the identity information of the copyright transfer contract information are authentic.
The sixth generating unit 406 is configured to digitally encrypt one or two of the identity UID and the identity version UID, one or two of the asset UID and the asset version UID, one or two of the legal certification file UID and the legal certification file version UID, the transferor identity UID obtained by performing digital encryption and hash calculation according to the transferor identity information, the transferee identity UID obtained by performing digital encryption and hash calculation according to the transferee identity information, the asset right certificate ID, the right information digest, and the timestamp in the asset transfer contract information, and generate a right transfer certificate.
In another embodiment, when the asset is licensed, the authority needs to verify whether the random one or both of the identity certificate and the identity version certificate, the random one or both of the asset certificate and the asset version certificate, the random one or both of the legal certification document certificate and the legal certification document version certificate, the licensor identity information, the licensee identity information, and the asset license contract information are authentic.
The eighth generating unit 408 is configured to digitally encrypt one or both of the identity UID and the identity version UID, one or both of the asset UID and the asset version UID, one or both of the legal certificate file UID and the legal certificate file version UID, the licensee identity UID obtained by performing digital encryption and hash calculation based on the identity information of the licensee, the asset certificate ID, the right information digest, and the timestamp in the asset license contract information, and generate the license certificate.
When the authority-confirming organization verifies that any information is not authentic, the authority-confirming certificate and the authority-confirming certificate UID are not generated.
Alternatively, the generated digital certificate is stored for storage, and the generated digital certificate file is stored with the digital certificate UID as the file name and then dat as the extended file name.
In the device 500, the uniqueness identification is carried out on the identity information, the identity version information, the asset generation information, the asset version information, the legal certificate information and the legal certificate version information to ensure the uniqueness of the information in the certificate of authenticity generated by the generation module, so that the uniqueness of the certificate of authenticity generated by encryption is ensured; in addition, all information is truly verified through the authority-confirming mechanism, and the authenticity of the information in the generated authority-confirming certificate is guaranteed.
The invention also provides a generation system of the certificate of authenticity, all processes of which are realized in the system, and the main processes are as follows: the first generation module 401 is configured to digitally encrypt the identity information and the first timestamp to generate a digitally encrypted identity certificate, perform HASH calculation according to the identity certificate, and use a generated HASH value as an identity uniqueness identifier UID; the second generation module 402 is configured to digitally encrypt the identity certificate, the version information of the identity, the HASH value of the data file recording the existence of the identity, and the fifth timestamp, to generate a digitally encrypted identity version certificate, and perform HASH calculation according to the identity version certificate to generate a HASH value serving as the identity version UID; the third generating module 403 is configured to digitally encrypt the asset generation information and the second timestamp to generate a digitally encrypted asset certificate, perform HASH calculation according to the asset certificate, and generate a HASH value as an asset UID; the fourth generation module 404 is configured to digitally encrypt the asset certificate, the asset version information, the HASH value of the data file recording the asset presence, and the seventh timestamp, to generate a digitally encrypted asset version certificate, and perform HASH calculation according to the asset version certificate to generate a HASH value serving as an asset version UID; the fifth generation module 405 is configured to digitally encrypt the legal certificate and the third timestamp to generate a digitally encrypted legal certificate, perform HASH calculation according to the legal certificate, and generate a HASH value serving as a legal certificate UID; the sixth generating module 406 is configured to digitally encrypt the legal certification document certificate, the version information of the legal certification document, the HASH value of the data file recording the legal certification document, and the ninth timestamp, to generate a digitally encrypted legal certification document version certificate, perform HASH calculation according to the legal certification document version certificate, and use the generated HASH value as a legal certification document version UID; the seventh generating module 407 is configured to digitally encrypt the identity UID, the random one or two of the identity certificate and the identity version certificate, the random one or two of the asset certificate and the asset version certificate, the random one or two of the legal document certificate and the legal document version certificate, the random one or two of the asset UID and the asset version, the random one or two of the legal document UID and the legal document version, the right information digest, and the tenth timestamp after the authority verifies the authenticity of the random one or two of the identity certificate and the identity version certificate, the random one or two of the legal document certificate and the legal document version certificate, and generate the authority certificate.
The uniqueness identification is carried out on the identity information, the identity version information, the asset generation information, the asset version information, the legal certificate information and the legal certificate version information, so that the uniqueness of the information in the generated right certificate is ensured, and the uniqueness of the encrypted right certificate is ensured; and the authenticity of the information in the generated authentication certificate is ensured by the authentication mechanism to authenticate all the information.
It is noted that, herein, relational terms such as first and second, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other identical elements in a process, method, article, or apparatus that comprises the element.
It will be understood by those skilled in the art that all or part of the steps for implementing the above embodiments may be implemented by hardware, or may be implemented by a program instructing relevant hardware, where the program may be stored in a computer-readable storage medium, and the above-mentioned storage medium may be a read-only memory, a magnetic disk or an optical disk, etc.
The above-mentioned embodiments are intended to illustrate the objects, technical solutions and advantages of the present invention in further detail, and it should be understood that the above-mentioned embodiments are merely exemplary embodiments of the present invention, and are not intended to limit the scope of the present invention, and any modifications, equivalent substitutions, improvements and the like made within the spirit and principle of the present invention should be included in the scope of the present invention.

Claims (15)

1. A method for generating a certificate of authenticity, comprising:
digitally encrypting the identity information and the first timestamp to generate an encrypted digital identity certificate, and performing HASH calculation according to the identity certificate to generate a HASH value serving as an identity Uniqueness Identifier (UID);
carrying out digital encryption on the asset generation information and the second timestamp to generate an encrypted digital asset certificate, and carrying out HASH calculation according to the asset certificate to generate a HASH value serving as an asset UID;
digitally encrypting the legal certification document information and the third timestamp to generate an encrypted digital legal certification document certificate, performing HASH calculation according to the legal certification document certificate to generate a HASH value serving as a legal certification document UID, wherein the legal certification document is used for proving a deterministic correspondence between the identity information and the asset generation information;
after the digital identity certificate, the digital asset certificate and the digital legal certification document certificate are verified to be authentic by a right confirming organization, the identity UID, the asset UID, the legal certification document UID, the authority information abstract and a fourth timestamp are digitally encrypted to generate a first right confirming certificate, wherein the timestamp is the time when the digital certificate is generated.
2. The method for generating an entitlement certificate according to claim 1, further comprising: carrying out digital encryption on the digital identity certificate, the identity version information, the data file HASH value for recording the identity and the fifth timestamp to generate an encrypted digital identity version certificate, and carrying out HASH calculation according to the digital identity version certificate to generate an HASH value serving as an identity version UID;
after the authority-confirming organization verifies the authenticity of the digital identity certificate, the digital identity version certificate, the digital asset certificate and the digital legal certification document certificate, the identity UID, the identity version UID, the asset UID, the legal certification document UID, the authority information abstract and a sixth timestamp are digitally encrypted to generate a second authority-confirming certificate.
3. The method for generating an entitlement certificate according to claim 1, further comprising: carrying out digital encryption on the digital asset certificate, the asset version information, the data file HASH value for recording the asset existence and the seventh timestamp to generate an encrypted digital asset version certificate, and carrying out HASH calculation according to the digital asset version certificate to generate an HASH value serving as an asset version UID;
after the digital identity certificate, the digital asset version certificate and the digital legal certification document certificate are verified to be authentic by a right-confirming organization, the identity UID, the asset version UID, the legal certification document UID, the right information abstract and an eighth timestamp are digitally encrypted to generate a third right-confirming certificate.
4. The method for generating an entitlement certificate according to claim 1, further comprising: carrying out digital encryption on the digital legal certification file certificate, the version information of the legal certification file, the data file HASH value for recording the legal certification file and the ninth timestamp to generate an encrypted digital legal certification file version certificate, and carrying out HASH calculation according to the digital legal certification file version certificate to generate an HASH value serving as a legal certification file version UID;
after the authority-confirming organization verifies the authenticity of the digital identity certificate, the digital asset certificate, the digital legal certification document certificate and the digital legal certification plaintext version certificate, the identity UID, the asset UID, the legal certification document version UID, the authority information abstract and a tenth timestamp are digitally encrypted to generate a fourth authority-confirming certificate.
5. The method for generating an entitlement certificate according to claim 1, wherein the identity information includes: the identity certificate includes at least one of an author certificate, an rightful beneficiary certificate, a rightful person certificate, a user certificate, a producer certificate, a proxy certificate, and a rightful authority certificate, and the identity UID includes at least one of an author UID, a rightful person UID, a user UID, a producer UID, a proxy UID, and a rightful authority UID.
6. The method for generating an entitlement certificate according to claim 1, applied to the transfer of assets, further comprising: the authority confirming mechanism also verifies whether the identity information of the transferor, the identity information of the transferee and the asset transfer contract information in the second legal certification file are true or not; after the true existence of verification information is determined, obtaining the identity UID and the asset UID according to the identity information of the transferor, the second legal certificate and the first right certificate;
and digitally encrypting the identity UID, the asset UID, the legal certificate UID, the transferor identity UID obtained by performing digital encryption and Hash calculation according to the identity information of the transferor, the transferee identity UID obtained by performing digital encryption and Hash calculation according to the identity information of the transferee, the asset right certificate ID in the asset transfer contract information, the right information abstract and the eleventh timestamp to generate a first transfer right certificate.
7. The method for generating the entitlement certificate according to claim 1, when applied to the asset license, further comprising: the right-determining organization also verifies whether the identity information of the licensor, the identity information of the licensee and the asset license contract information in the third legal certification file are true or not; when the true existence of verification information is determined, obtaining the identity UID and the asset UID according to the licensor identity information, the third legal certification file and the first right confirmation certificate;
and digitally encrypting the identity UID, the asset UID, the legal certificate UID, the licensor identity UID obtained by performing digital encryption and hash calculation according to the licensor identity information, the licensee identity UID obtained by performing digital encryption and hash calculation according to the licensee identity information, the asset right certificate ID in the asset license use contract information, the right information abstract and the twelfth timestamp to generate a first license right certificate.
8. The method for generating an authentic certificate according to any one of claims 1 to 6, wherein files generated from the digital certificate are stored with the certificate UID as a file name and dat as an extended file name.
9. An apparatus for generating an authentication certificate, comprising:
the first generation module is used for carrying out digital encryption on the identity information and the first timestamp to generate an encrypted digital identity certificate, carrying out HASH calculation according to the identity certificate to generate a HASH value serving as an identity UID;
the third generation module is used for carrying out digital encryption on the generation information of the asset and the second timestamp to generate an encrypted digital asset certificate, carrying out HASH calculation according to the asset certificate to generate a HASH value serving as an asset UID;
a fifth generation module, configured to digitally encrypt the legal document information and the third timestamp to generate an encrypted digital legal document certificate, perform HASH calculation according to the legal document certificate to generate a HASH value, which is used as a legal document UID, where the legal document is used to prove a deterministic correspondence between the identity information and the asset generation information;
and the seventh generation module is used for digitally encrypting the identity UID, the asset UID, the legal certification file UID, the right information abstract and a fourth timestamp to generate a first authority confirmation certificate after the authority confirmation mechanism verifies the authenticity of the digital identity certificate, the digital asset certificate and the digital legal certification file certificate, wherein the timestamp is the time when the digital certificate is generated.
10. The apparatus for generating an entitlement certificate according to claim 9, further comprising:
the second generation module is used for carrying out digital encryption on the digital identity certificate, the identity version information, the data file HASH value and the fifth timestamp for recording the identity to generate an encrypted digital identity version certificate, and carrying out Hash calculation according to the digital identity version certificate to generate an HASH value serving as an identity version UID;
the seventh generating module is specifically configured to: after the authority-confirming organization verifies the authenticity of the digital identity certificate, the digital identity version certificate, the digital asset certificate and the digital legal certification document certificate, the identity UID, the identity version UID, the asset UID, the legal certification document UID, the authority information abstract and a sixth timestamp are digitally encrypted to generate a second authority-confirming certificate.
11. The apparatus for generating an entitlement certificate according to claim 9, further comprising:
a fourth generation module, configured to digitally encrypt the digital asset certificate, the asset version information, the HASH value of the data file recording the asset presence, and the seventh timestamp, to generate an encrypted digital asset version certificate, and perform HASH calculation according to the digital asset version certificate to generate a HASH value serving as an asset version UID;
the seventh generating module is specifically configured to: after the digital identity certificate, the digital asset version certificate and the digital legal certification document certificate are verified to be authentic by a right-confirming organization, the identity UID, the asset version UID, the legal certification document UID, the right information abstract and an eighth timestamp are digitally encrypted to generate a third right-confirming certificate.
12. The apparatus for generating an entitlement certificate according to claim 9, further comprising:
a sixth generating module, configured to digitally encrypt the digital legal certificate, the version information of the legal certificate, the HASH value of the data file recording the legal certificate, and the ninth timestamp, to generate an encrypted digital legal certificate version certificate, perform HASH calculation according to the digital legal certificate version certificate, and use the generated HASH value as a legal certificate version UID;
the seventh generating module is specifically configured to: after the authority-confirming organization verifies the authenticity of the digital identity certificate, the digital asset certificate, the digital legal certification document certificate and the digital legal certification plaintext version certificate, the identity UID, the asset UID, the legal certification document version UID, the authority information abstract and a tenth timestamp are digitally encrypted to generate a fourth authority-confirming certificate.
13. The apparatus for generating an entitlement certificate according to claim 9, when the asset is transferred, further comprising:
and the eighth generation module is used for digitally encrypting the identity UID, the asset UID, the legal certificate UID, the transferor identity UID obtained by performing digital encryption and hash calculation according to transferor identity information, the transferee identity UID obtained by performing digital encryption and hash calculation according to transferee identity information, the asset right confirmation certificate ID, the right information abstract and the eleventh timestamp in the asset transfer contract information to generate a first transfer right confirmation certificate.
14. The apparatus for generating an entitlement certificate according to claim 9, when applied to the asset license, further comprising:
and the ninth generating module is used for digitally encrypting the identity UID, the asset UID, the legal certificate UID, the licensor identity UID obtained by performing digital encryption and hash calculation according to licensor identity information, the licensee identity UID obtained by performing digital encryption and hash calculation according to licensee identity information, the asset right certificate ID in the asset license use contract information, the right information abstract and the twelfth timestamp to generate a first license right certificate.
15. A system for generating a certificate, comprising: the apparatus of any one of claims 9-14.
CN201810623530.XA 2018-06-15 2018-06-15 Method, device and system for generating right-confirming certificate Active CN109033789B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810623530.XA CN109033789B (en) 2018-06-15 2018-06-15 Method, device and system for generating right-confirming certificate

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810623530.XA CN109033789B (en) 2018-06-15 2018-06-15 Method, device and system for generating right-confirming certificate

Publications (2)

Publication Number Publication Date
CN109033789A CN109033789A (en) 2018-12-18
CN109033789B true CN109033789B (en) 2021-01-01

Family

ID=64609908

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810623530.XA Active CN109033789B (en) 2018-06-15 2018-06-15 Method, device and system for generating right-confirming certificate

Country Status (1)

Country Link
CN (1) CN109033789B (en)

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109788309B (en) * 2018-12-25 2021-05-04 陕西优米数据技术有限公司 Video file piracy detection method and system based on block chain technology
CN110188515A (en) * 2019-05-16 2019-08-30 中细软集团有限公司 A kind of block chain network copyright register method and client
CN110932869A (en) * 2019-12-02 2020-03-27 北京合游时空科技有限公司 Method, device and equipment for certificate real-name authentication
CN112651052A (en) * 2020-12-24 2021-04-13 江苏通付盾科技有限公司 Data right confirming method and system based on block chain technology
CN114666063B (en) * 2022-03-21 2023-09-19 矩阵时光数字科技有限公司 Digital asset tracing method based on traditional hash algorithm
CN114362971B (en) * 2022-03-21 2022-06-21 南京大学 Digital asset right confirming and tracing method based on Hash algorithm

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102916971A (en) * 2012-10-31 2013-02-06 重庆君盾科技有限公司 Electronic data curing system and method
CN107070939A (en) * 2017-04-28 2017-08-18 国信嘉宁数据技术有限公司 A kind of internet data security method, system and device

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101800646B (en) * 2010-03-03 2012-07-25 南京优泰科技发展有限公司 Implementation method and system of electronic signature
CN102339370B (en) * 2011-09-14 2016-04-13 福建伊时代信息科技股份有限公司 The security method of electronic document, safety system and verification system
CN103237038B (en) * 2013-05-09 2016-01-13 中国电子科技集团公司第三十研究所 A kind of two-way networking authentication method based on digital certificate
CN107086920A (en) * 2017-06-20 2017-08-22 无锡井通网络科技有限公司 Copyright based on block chain really weighs method

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102916971A (en) * 2012-10-31 2013-02-06 重庆君盾科技有限公司 Electronic data curing system and method
CN107070939A (en) * 2017-04-28 2017-08-18 国信嘉宁数据技术有限公司 A kind of internet data security method, system and device

Also Published As

Publication number Publication date
CN109033789A (en) 2018-12-18

Similar Documents

Publication Publication Date Title
CN109033789B (en) Method, device and system for generating right-confirming certificate
JP4668524B2 (en) A domain-based trust model for content rights management
KR100822596B1 (en) Recording medium having electronic document management program recorded, electronic document management system and electronic document management method
US9298902B2 (en) System, method and program product for recording creation of a cancelable biometric reference template in a biometric event journal record
KR101957064B1 (en) One Time Password based Decryption System for Protecting Personal Information on Blockchain security technology
JP2002312519A (en) Method for preparing application data with photograph of one's face and its executing device and its processing program
US11917071B2 (en) Data protection using universal tagging
CN110826091B (en) File signature method and device, electronic equipment and readable storage medium
CN110992218A (en) Music copyright protection method, device and medium based on block chain
CN112989380A (en) Resource exchange processing method, device, equipment and storage medium
Shakan et al. Verification of university student and graduate data using blockchain technology
US11335109B2 (en) Computing device for document authentication and a method to operate the same
US8799675B2 (en) System and method for electronic certification and authentication of data
US20080282343A1 (en) Digital Rights Management Using Biometric Data
JP2000215280A (en) Identity certification system
Yahya et al. A new academic certificate authentication using leading edge technology
CN108322311B (en) Method and device for generating digital certificate
KR101979337B1 (en) Apparatus and method for certification
JPH11339045A (en) Method for confirming and issuing electronic data, executing device therefor, medium recorded with processing program therefor and electronic data recording medium
Shakila et al. Design and analysis of digital certificate verification and validation using blockchain-based technology
US20210152368A1 (en) Information processing system and information processing method
CN101404573B (en) Authorization method, system and apparatus
CN109033788B (en) Certificate management method and device based on block chain technology
US7421078B2 (en) Valid medium management system
JP7367270B1 (en) Appraisal certification system and appraisal certification method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant