CN109359474A - A method of it being incorporated into fingerprint in a document and is encrypted - Google Patents

A method of it being incorporated into fingerprint in a document and is encrypted Download PDF

Info

Publication number
CN109359474A
CN109359474A CN201811168052.4A CN201811168052A CN109359474A CN 109359474 A CN109359474 A CN 109359474A CN 201811168052 A CN201811168052 A CN 201811168052A CN 109359474 A CN109359474 A CN 109359474A
Authority
CN
China
Prior art keywords
document
handwriting
hash
person
fingerprint
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201811168052.4A
Other languages
Chinese (zh)
Inventor
陆猛
庄玉龙
孙高健
孙艳艳
张伟
郭尚
赵云
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
BEIJING DIANJU INFORMATION TECHNOLOGY Co Ltd
Original Assignee
BEIJING DIANJU INFORMATION TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by BEIJING DIANJU INFORMATION TECHNOLOGY Co Ltd filed Critical BEIJING DIANJU INFORMATION TECHNOLOGY Co Ltd
Priority to CN201811168052.4A priority Critical patent/CN109359474A/en
Publication of CN109359474A publication Critical patent/CN109359474A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Document Processing Apparatus (AREA)

Abstract

The invention proposes one kind to be incorporated into the method that fingerprint is encrypted in a document, comprising: the handwriting information for receiving user's typing acquires person's handwriting point, two extreme coordinates of person's handwriting are put into document;Using the data in the document in addition to person's handwriting as fingerprint, hash is generated, cryptoguard is carried out to the hash, generates hashed value, the hashed value is encrypted string;The hash of significance bit is extracted, being decrypted for encryption is extracted, is compared with the hash content of document, to be verified to document;The hash of all circulations should be identical in extraction, and hashed value and the handwriting data matching of former document structure tree then judge that verification passes through, otherwise verifies and do not pass through.The present invention can forge document to avoid other people.

Description

A method of it being incorporated into fingerprint in a document and is encrypted
Technical field
The present invention relates to file encryption processing technology fields, in particular to a kind of to be incorporated into what fingerprint was encrypted in a document Method.
Background technique
In existing document protection method, especially for the protection of PDF document, lack cipher mode.If encryption is calculated Method discloses, then will lead to other people can hash this document content to be protected, to be forged.How to solve Problem is stated, document is prevented to be forged, is one of current technical issues that need to address.
Summary of the invention
The purpose of the present invention aims to solve at least one of described technological deficiency.
For this purpose, it is an object of the invention to propose a kind of method for being incorporated into fingerprint in a document and being encrypted.
To achieve the goals above, the embodiment of the present invention provides one kind and is incorporated into the side that fingerprint is encrypted in a document Method includes the following steps:
Step S1 receives the handwriting information of user's typing, acquires person's handwriting point, two extreme coordinates of person's handwriting are put into document In;
Step S2 generates hash using the data in the document in addition to person's handwriting as fingerprint, carries out password to the hash Protection, generates hashed value, and the hashed value is encrypted string;
Step S3 extracts the hash of significance bit, extracts being decrypted for encryption, with the hash content of document into Row compares, to verify to document;
Step S4, the hash of all circulations should be identical, the hashed value and handwriting data of former document structure tree in extraction Matching then judges that verification passes through, otherwise verifies and do not pass through.
Further, the hashed value is the string of 20 bytes.
Further, in the step S4, the person's handwriting deforms, then hashed value and handwriting data mismatch, verification Do not pass through.
Further, corresponding information is supplemented other than significance bit, two extreme coordinates of person's handwriting retain significance bit later again Supplement corresponding information.
The method according to an embodiment of the present invention for being incorporated into fingerprint in a document and being encrypted, encrypts document or is signed Name generates hash, and hash cryptoguard generates encrypted string, can be different according to the algorithm of protection, takes out and first solves Hashed value is opened, then verifies document.Others knows coding mode, but does not know Crypted password, can not just encrypt to document, raw At hash, encrypts and be incorporated into.Then document is verified: the hash of significance bit is extracted, extract the progress of encryption Decryption, is compared with the hash content of document.It is put into repetition hashed value in person's handwriting, then encodes, the original text value of document can be with Documentation section is according to circumstances protected, all, document adds the initial value of person's handwriting, according to circumstances multiple-authentication, and hashed value is encryption again, Other side can not forge hashed value, can not be generated with similar approach, so that other people be avoided to forge document.
The additional aspect of the present invention and advantage will be set forth in part in the description, and will partially become from the following description Obviously, or practice through the invention is recognized.
Detailed description of the invention
Above-mentioned and/or additional aspect of the invention and advantage will become from the description of the embodiment in conjunction with the following figures Obviously and it is readily appreciated that, in which:
Fig. 1 is the flow chart for being incorporated into the method that fingerprint is encrypted in a document according to the embodiment of the present invention.
Specific embodiment
The embodiment of the present invention is described below in detail, examples of the embodiments are shown in the accompanying drawings, wherein from beginning to end Same or similar label indicates same or similar element or element with the same or similar functions.Below with reference to attached The embodiment of figure description is exemplary, it is intended to is used to explain the present invention, and is not considered as limiting the invention.,
The present invention proposes that one kind is incorporated into the method that fingerprint is encrypted in a document, and technology can be used in PDF document Protection person's handwriting and the method that is associated of document are incorporated into a kind of method of the fingerprint of document in person's handwriting.
As shown in Figure 1, the method for being incorporated into fingerprint in a document and being encrypted of the embodiment of the present invention, includes the following steps:
Step S1 receives the handwriting information of user's typing, acquires person's handwriting point, two extreme coordinates of person's handwriting are put into document In.
Specifically, the drawing instruction in person's handwriting is lines of the point to another point when person's handwriting is stored in document, have The coordinate of point, A1-A2, P1-P2 have width, there is XY coordinate, and P1, P2 width coordinate is all floating number.
Step S2 generates hash using the data in the document in addition to person's handwriting as fingerprint, carries out password to the hash Protection, generates hashed value, and the hashed value is encrypted string.In one embodiment of the invention, hashed value is 20 words The string of section.
Person's handwriting point has been arrived by software collection, it is known that X1, X2, Y1, Y2, person's handwriting are put into document, and person's handwriting will be removed in document Data in addition do fingerprint (hash, sha1), and part or all of content generates hashed value, and hashed value is one of 20 bytes String.Each byte 8 were compiled to the person's handwriting o'clock (general to retain 2-3) occurred, remaining digit, which is identified the handwriting, not to be influenced.
Supplement corresponding information other than significance bit (usual significance bit use decimal point after after 2), two of person's handwriting Extreme coordinates XY coordinate is supplemented corresponding information after retaining significance bit.Precision can also reach requirement after amplifying enough multiples, Such as 20, after 30 times, person's handwriting or normal, for example significance bit is 3,20.125,20.125678 just it doesn't matter, and 678 can be with It is mapped to bate array and calculates 678,7 minutes, the floating number of decimal point is 0-255.It should be noted that above-mentioned only go out In exemplary purpose.
Step S3 extracts the hash of significance bit, extracts being decrypted for encryption, with the hash content of document into Row compares, to verify to document.
Step S4, the hash of all circulations should be identical, the hashed value and handwriting data of former document structure tree in extraction Matching then judges that verification passes through, otherwise verifies and do not pass through.
Specifically, the inside is arrived in circulation number is compiled, how many hand-written normal point of normal person's handwriting, several hundred have can Can, it can repeat more than once, as soon as the data of point become in person's handwriting, extract and person's handwriting is different, intermediate person's handwriting Data become, change of the person's handwriting of extraction with regard to different, after significance bit.20 bytes and other 20 bytes for having 1 time are not Equally, centre has a byte different, all changes of protection.The hash of all circulations should be identical, original text in extraction The hashed value and handwriting data of generation should be able to match, and if person's handwriting is deformed, verification does not pass through.That is, person's handwriting is sent out Change shape, then hashed value and handwriting data mismatch, and verification does not pass through.
The method according to an embodiment of the present invention for being incorporated into fingerprint in a document and being encrypted, encrypts document or is signed Name generates hash, and hash cryptoguard generates encrypted string, can be different according to the algorithm of protection, takes out and first solves Hashed value is opened, then verifies document.Others knows coding mode, but does not know Crypted password, can not just encrypt to document, raw At hash, encrypts and be incorporated into.Then document is verified: the hash of significance bit is extracted, extract the progress of encryption Decryption, is compared with the hash content of document.It is put into repetition hashed value in person's handwriting, then encodes, the original text value of document can be with Documentation section is according to circumstances protected, all, document adds the initial value of person's handwriting, according to circumstances multiple-authentication, and hashed value is encryption again, Other side can not forge hashed value, can not be generated with similar approach.
In the description of this specification, reference term " one embodiment ", " some embodiments ", " example ", " specifically show The description of example " or " some examples " etc. means specific features, structure, material or spy described in conjunction with this embodiment or example Point is included at least one embodiment or example of the invention.In the present specification, schematic expression of the above terms are not Centainly refer to identical embodiment or example.Moreover, particular features, structures, materials, or characteristics described can be any One or more embodiment or examples in can be combined in any suitable manner.
Although the embodiments of the present invention has been shown and described above, it is to be understood that above-described embodiment is example Property, it is not considered as limiting the invention, those skilled in the art are not departing from the principle of the present invention and objective In the case where can make changes, modifications, alterations, and variations to the above described embodiments within the scope of the invention.The scope of the present invention By appended claims and its equivalent limit.

Claims (4)

1. one kind is incorporated into the method that fingerprint is encrypted in a document, which comprises the steps of:
Step S1 receives the handwriting information of user's typing, acquires person's handwriting point, two extreme coordinates of person's handwriting are put into document;
Step S2 generates hash using the data in the document in addition to person's handwriting as fingerprint, carries out password guarantor to the hash Shield, generates hashed value, and the hashed value is encrypted string;
Step S3 extracts the hash of significance bit, extracts being decrypted for encryption, is compared with the hash content of document It is right, to be verified to document;
Step S4, the hash of all circulations should be identical in extraction, hashed value and the handwriting data matching of former document structure tree, Then judge that verification passes through, otherwise verifies and do not pass through.
2. being incorporated into the method that fingerprint is encrypted in a document as described in claim 1, which is characterized in that the hashed value is The string of 20 bytes.
3. being incorporated into the method that fingerprint is encrypted in a document as described in claim 1, which is characterized in that in the step S4 In, the person's handwriting deforms, then hashed value and handwriting data mismatch, and verification does not pass through.
4. being incorporated into the method that fingerprint is encrypted in a document as described in claim 1, which is characterized in that other than significance bit Corresponding information is supplemented, two extreme coordinates of person's handwriting are supplemented corresponding information after retaining significance bit.
CN201811168052.4A 2018-10-08 2018-10-08 A method of it being incorporated into fingerprint in a document and is encrypted Pending CN109359474A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811168052.4A CN109359474A (en) 2018-10-08 2018-10-08 A method of it being incorporated into fingerprint in a document and is encrypted

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811168052.4A CN109359474A (en) 2018-10-08 2018-10-08 A method of it being incorporated into fingerprint in a document and is encrypted

Publications (1)

Publication Number Publication Date
CN109359474A true CN109359474A (en) 2019-02-19

Family

ID=65348517

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811168052.4A Pending CN109359474A (en) 2018-10-08 2018-10-08 A method of it being incorporated into fingerprint in a document and is encrypted

Country Status (1)

Country Link
CN (1) CN109359474A (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1719373A (en) * 2005-07-27 2006-01-11 深圳市亚略特生物识别科技有限公司 Finger print encryption and decryption method of electron decument
CN101004805A (en) * 2006-01-16 2007-07-25 富士通株式会社 Digital document management system, digital document management method, and digital document management program
CN101488172A (en) * 2009-02-27 2009-07-22 上海凌锐信息技术有限公司 Document handwriting encryption and decryption method and its application terminal
CN101789067A (en) * 2009-12-31 2010-07-28 北京书生国际信息技术有限公司 Electronic document signature protecting method and system
US20100254578A1 (en) * 2009-04-06 2010-10-07 Mercedeh Modir Shanechi Handwriting authentication method, system and computer program
CN107665314A (en) * 2017-09-25 2018-02-06 北京国富安电子商务安全认证有限公司 The trusted processes method and device signed on the electronic document

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1719373A (en) * 2005-07-27 2006-01-11 深圳市亚略特生物识别科技有限公司 Finger print encryption and decryption method of electron decument
CN100520671C (en) * 2005-07-27 2009-07-29 深圳市亚略特生物识别科技有限公司 Finger print encryption and decryption method of electron decument
CN101004805A (en) * 2006-01-16 2007-07-25 富士通株式会社 Digital document management system, digital document management method, and digital document management program
CN101488172A (en) * 2009-02-27 2009-07-22 上海凌锐信息技术有限公司 Document handwriting encryption and decryption method and its application terminal
US20100254578A1 (en) * 2009-04-06 2010-10-07 Mercedeh Modir Shanechi Handwriting authentication method, system and computer program
CN101789067A (en) * 2009-12-31 2010-07-28 北京书生国际信息技术有限公司 Electronic document signature protecting method and system
CN107665314A (en) * 2017-09-25 2018-02-06 北京国富安电子商务安全认证有限公司 The trusted processes method and device signed on the electronic document

Similar Documents

Publication Publication Date Title
Delvaux et al. Helper data algorithms for PUF-based key generation: Overview and analysis
CN105471575B (en) Information encryption and decryption method and device
CN106161006B (en) Digital encryption algorithm
CN102640450B (en) Security token is distributed to method, the method for handling safety token, the security token of key
US20150134971A1 (en) Apparatus and method for decrypting encrypted file
US11227037B2 (en) Computer system, verification method of confidential information, and computer
US20050182946A1 (en) Fast hashing function for pseudo-random generator
CN106776904A (en) The fuzzy query encryption method of dynamic authentication is supported in a kind of insincere cloud computing environment
US20160301524A1 (en) Methods and apparatuses of digital data processing
US9768959B2 (en) Computer security system and method to protect against keystroke logging
CN105359155B (en) Use compression failure password attack
CN108599934A (en) It is a kind of to test safe and secret Enhancement Method for quantum key distribution
CN113449338A (en) Information encryption storage method and system based on block chain
CN107665314B (en) The trusted processes method and device signed on the electronic document
CN104038336A (en) Data encryption method based on 3DES
CN113688399A (en) Firmware digital signature protection method and device, computer equipment and storage medium
KR102258700B1 (en) method and system of smart electronic contracting based on block chain
JP6040780B2 (en) Cryptographic processing apparatus, method and program
Liu et al. Hiding message into DNA sequence through DNA coding and chaotic maps
US11822629B2 (en) Method and apparatus for generating digital identity and storage medium
CN103595523B (en) A file encryption method
CN200983153Y (en) Encryption signature handwriting plate with key
WO2018211475A1 (en) Method for the creation of a document provided with a high-security digital signature
CN109359474A (en) A method of it being incorporated into fingerprint in a document and is encrypted
Katuk et al. An Enhanced Block Pre-processing of PRESENT Algorithm for Fingerprint Template Encryption in the Internet of Things Environment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20190219