CN109359474A - A method of it being incorporated into fingerprint in a document and is encrypted - Google Patents
A method of it being incorporated into fingerprint in a document and is encrypted Download PDFInfo
- Publication number
- CN109359474A CN109359474A CN201811168052.4A CN201811168052A CN109359474A CN 109359474 A CN109359474 A CN 109359474A CN 201811168052 A CN201811168052 A CN 201811168052A CN 109359474 A CN109359474 A CN 109359474A
- Authority
- CN
- China
- Prior art keywords
- document
- handwriting
- hash
- person
- fingerprint
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Document Processing Apparatus (AREA)
Abstract
The invention proposes one kind to be incorporated into the method that fingerprint is encrypted in a document, comprising: the handwriting information for receiving user's typing acquires person's handwriting point, two extreme coordinates of person's handwriting are put into document;Using the data in the document in addition to person's handwriting as fingerprint, hash is generated, cryptoguard is carried out to the hash, generates hashed value, the hashed value is encrypted string;The hash of significance bit is extracted, being decrypted for encryption is extracted, is compared with the hash content of document, to be verified to document;The hash of all circulations should be identical in extraction, and hashed value and the handwriting data matching of former document structure tree then judge that verification passes through, otherwise verifies and do not pass through.The present invention can forge document to avoid other people.
Description
Technical field
The present invention relates to file encryption processing technology fields, in particular to a kind of to be incorporated into what fingerprint was encrypted in a document
Method.
Background technique
In existing document protection method, especially for the protection of PDF document, lack cipher mode.If encryption is calculated
Method discloses, then will lead to other people can hash this document content to be protected, to be forged.How to solve
Problem is stated, document is prevented to be forged, is one of current technical issues that need to address.
Summary of the invention
The purpose of the present invention aims to solve at least one of described technological deficiency.
For this purpose, it is an object of the invention to propose a kind of method for being incorporated into fingerprint in a document and being encrypted.
To achieve the goals above, the embodiment of the present invention provides one kind and is incorporated into the side that fingerprint is encrypted in a document
Method includes the following steps:
Step S1 receives the handwriting information of user's typing, acquires person's handwriting point, two extreme coordinates of person's handwriting are put into document
In;
Step S2 generates hash using the data in the document in addition to person's handwriting as fingerprint, carries out password to the hash
Protection, generates hashed value, and the hashed value is encrypted string;
Step S3 extracts the hash of significance bit, extracts being decrypted for encryption, with the hash content of document into
Row compares, to verify to document;
Step S4, the hash of all circulations should be identical, the hashed value and handwriting data of former document structure tree in extraction
Matching then judges that verification passes through, otherwise verifies and do not pass through.
Further, the hashed value is the string of 20 bytes.
Further, in the step S4, the person's handwriting deforms, then hashed value and handwriting data mismatch, verification
Do not pass through.
Further, corresponding information is supplemented other than significance bit, two extreme coordinates of person's handwriting retain significance bit later again
Supplement corresponding information.
The method according to an embodiment of the present invention for being incorporated into fingerprint in a document and being encrypted, encrypts document or is signed
Name generates hash, and hash cryptoguard generates encrypted string, can be different according to the algorithm of protection, takes out and first solves
Hashed value is opened, then verifies document.Others knows coding mode, but does not know Crypted password, can not just encrypt to document, raw
At hash, encrypts and be incorporated into.Then document is verified: the hash of significance bit is extracted, extract the progress of encryption
Decryption, is compared with the hash content of document.It is put into repetition hashed value in person's handwriting, then encodes, the original text value of document can be with
Documentation section is according to circumstances protected, all, document adds the initial value of person's handwriting, according to circumstances multiple-authentication, and hashed value is encryption again,
Other side can not forge hashed value, can not be generated with similar approach, so that other people be avoided to forge document.
The additional aspect of the present invention and advantage will be set forth in part in the description, and will partially become from the following description
Obviously, or practice through the invention is recognized.
Detailed description of the invention
Above-mentioned and/or additional aspect of the invention and advantage will become from the description of the embodiment in conjunction with the following figures
Obviously and it is readily appreciated that, in which:
Fig. 1 is the flow chart for being incorporated into the method that fingerprint is encrypted in a document according to the embodiment of the present invention.
Specific embodiment
The embodiment of the present invention is described below in detail, examples of the embodiments are shown in the accompanying drawings, wherein from beginning to end
Same or similar label indicates same or similar element or element with the same or similar functions.Below with reference to attached
The embodiment of figure description is exemplary, it is intended to is used to explain the present invention, and is not considered as limiting the invention.,
The present invention proposes that one kind is incorporated into the method that fingerprint is encrypted in a document, and technology can be used in PDF document
Protection person's handwriting and the method that is associated of document are incorporated into a kind of method of the fingerprint of document in person's handwriting.
As shown in Figure 1, the method for being incorporated into fingerprint in a document and being encrypted of the embodiment of the present invention, includes the following steps:
Step S1 receives the handwriting information of user's typing, acquires person's handwriting point, two extreme coordinates of person's handwriting are put into document
In.
Specifically, the drawing instruction in person's handwriting is lines of the point to another point when person's handwriting is stored in document, have
The coordinate of point, A1-A2, P1-P2 have width, there is XY coordinate, and P1, P2 width coordinate is all floating number.
Step S2 generates hash using the data in the document in addition to person's handwriting as fingerprint, carries out password to the hash
Protection, generates hashed value, and the hashed value is encrypted string.In one embodiment of the invention, hashed value is 20 words
The string of section.
Person's handwriting point has been arrived by software collection, it is known that X1, X2, Y1, Y2, person's handwriting are put into document, and person's handwriting will be removed in document
Data in addition do fingerprint (hash, sha1), and part or all of content generates hashed value, and hashed value is one of 20 bytes
String.Each byte 8 were compiled to the person's handwriting o'clock (general to retain 2-3) occurred, remaining digit, which is identified the handwriting, not to be influenced.
Supplement corresponding information other than significance bit (usual significance bit use decimal point after after 2), two of person's handwriting
Extreme coordinates XY coordinate is supplemented corresponding information after retaining significance bit.Precision can also reach requirement after amplifying enough multiples,
Such as 20, after 30 times, person's handwriting or normal, for example significance bit is 3,20.125,20.125678 just it doesn't matter, and 678 can be with
It is mapped to bate array and calculates 678,7 minutes, the floating number of decimal point is 0-255.It should be noted that above-mentioned only go out
In exemplary purpose.
Step S3 extracts the hash of significance bit, extracts being decrypted for encryption, with the hash content of document into
Row compares, to verify to document.
Step S4, the hash of all circulations should be identical, the hashed value and handwriting data of former document structure tree in extraction
Matching then judges that verification passes through, otherwise verifies and do not pass through.
Specifically, the inside is arrived in circulation number is compiled, how many hand-written normal point of normal person's handwriting, several hundred have can
Can, it can repeat more than once, as soon as the data of point become in person's handwriting, extract and person's handwriting is different, intermediate person's handwriting
Data become, change of the person's handwriting of extraction with regard to different, after significance bit.20 bytes and other 20 bytes for having 1 time are not
Equally, centre has a byte different, all changes of protection.The hash of all circulations should be identical, original text in extraction
The hashed value and handwriting data of generation should be able to match, and if person's handwriting is deformed, verification does not pass through.That is, person's handwriting is sent out
Change shape, then hashed value and handwriting data mismatch, and verification does not pass through.
The method according to an embodiment of the present invention for being incorporated into fingerprint in a document and being encrypted, encrypts document or is signed
Name generates hash, and hash cryptoguard generates encrypted string, can be different according to the algorithm of protection, takes out and first solves
Hashed value is opened, then verifies document.Others knows coding mode, but does not know Crypted password, can not just encrypt to document, raw
At hash, encrypts and be incorporated into.Then document is verified: the hash of significance bit is extracted, extract the progress of encryption
Decryption, is compared with the hash content of document.It is put into repetition hashed value in person's handwriting, then encodes, the original text value of document can be with
Documentation section is according to circumstances protected, all, document adds the initial value of person's handwriting, according to circumstances multiple-authentication, and hashed value is encryption again,
Other side can not forge hashed value, can not be generated with similar approach.
In the description of this specification, reference term " one embodiment ", " some embodiments ", " example ", " specifically show
The description of example " or " some examples " etc. means specific features, structure, material or spy described in conjunction with this embodiment or example
Point is included at least one embodiment or example of the invention.In the present specification, schematic expression of the above terms are not
Centainly refer to identical embodiment or example.Moreover, particular features, structures, materials, or characteristics described can be any
One or more embodiment or examples in can be combined in any suitable manner.
Although the embodiments of the present invention has been shown and described above, it is to be understood that above-described embodiment is example
Property, it is not considered as limiting the invention, those skilled in the art are not departing from the principle of the present invention and objective
In the case where can make changes, modifications, alterations, and variations to the above described embodiments within the scope of the invention.The scope of the present invention
By appended claims and its equivalent limit.
Claims (4)
1. one kind is incorporated into the method that fingerprint is encrypted in a document, which comprises the steps of:
Step S1 receives the handwriting information of user's typing, acquires person's handwriting point, two extreme coordinates of person's handwriting are put into document;
Step S2 generates hash using the data in the document in addition to person's handwriting as fingerprint, carries out password guarantor to the hash
Shield, generates hashed value, and the hashed value is encrypted string;
Step S3 extracts the hash of significance bit, extracts being decrypted for encryption, is compared with the hash content of document
It is right, to be verified to document;
Step S4, the hash of all circulations should be identical in extraction, hashed value and the handwriting data matching of former document structure tree,
Then judge that verification passes through, otherwise verifies and do not pass through.
2. being incorporated into the method that fingerprint is encrypted in a document as described in claim 1, which is characterized in that the hashed value is
The string of 20 bytes.
3. being incorporated into the method that fingerprint is encrypted in a document as described in claim 1, which is characterized in that in the step S4
In, the person's handwriting deforms, then hashed value and handwriting data mismatch, and verification does not pass through.
4. being incorporated into the method that fingerprint is encrypted in a document as described in claim 1, which is characterized in that other than significance bit
Corresponding information is supplemented, two extreme coordinates of person's handwriting are supplemented corresponding information after retaining significance bit.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811168052.4A CN109359474A (en) | 2018-10-08 | 2018-10-08 | A method of it being incorporated into fingerprint in a document and is encrypted |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811168052.4A CN109359474A (en) | 2018-10-08 | 2018-10-08 | A method of it being incorporated into fingerprint in a document and is encrypted |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109359474A true CN109359474A (en) | 2019-02-19 |
Family
ID=65348517
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811168052.4A Pending CN109359474A (en) | 2018-10-08 | 2018-10-08 | A method of it being incorporated into fingerprint in a document and is encrypted |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109359474A (en) |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1719373A (en) * | 2005-07-27 | 2006-01-11 | 深圳市亚略特生物识别科技有限公司 | Finger print encryption and decryption method of electron decument |
CN101004805A (en) * | 2006-01-16 | 2007-07-25 | 富士通株式会社 | Digital document management system, digital document management method, and digital document management program |
CN101488172A (en) * | 2009-02-27 | 2009-07-22 | 上海凌锐信息技术有限公司 | Document handwriting encryption and decryption method and its application terminal |
CN101789067A (en) * | 2009-12-31 | 2010-07-28 | 北京书生国际信息技术有限公司 | Electronic document signature protecting method and system |
US20100254578A1 (en) * | 2009-04-06 | 2010-10-07 | Mercedeh Modir Shanechi | Handwriting authentication method, system and computer program |
CN107665314A (en) * | 2017-09-25 | 2018-02-06 | 北京国富安电子商务安全认证有限公司 | The trusted processes method and device signed on the electronic document |
-
2018
- 2018-10-08 CN CN201811168052.4A patent/CN109359474A/en active Pending
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1719373A (en) * | 2005-07-27 | 2006-01-11 | 深圳市亚略特生物识别科技有限公司 | Finger print encryption and decryption method of electron decument |
CN100520671C (en) * | 2005-07-27 | 2009-07-29 | 深圳市亚略特生物识别科技有限公司 | Finger print encryption and decryption method of electron decument |
CN101004805A (en) * | 2006-01-16 | 2007-07-25 | 富士通株式会社 | Digital document management system, digital document management method, and digital document management program |
CN101488172A (en) * | 2009-02-27 | 2009-07-22 | 上海凌锐信息技术有限公司 | Document handwriting encryption and decryption method and its application terminal |
US20100254578A1 (en) * | 2009-04-06 | 2010-10-07 | Mercedeh Modir Shanechi | Handwriting authentication method, system and computer program |
CN101789067A (en) * | 2009-12-31 | 2010-07-28 | 北京书生国际信息技术有限公司 | Electronic document signature protecting method and system |
CN107665314A (en) * | 2017-09-25 | 2018-02-06 | 北京国富安电子商务安全认证有限公司 | The trusted processes method and device signed on the electronic document |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Delvaux et al. | Helper data algorithms for PUF-based key generation: Overview and analysis | |
CN105471575B (en) | Information encryption and decryption method and device | |
CN106161006B (en) | Digital encryption algorithm | |
CN102640450B (en) | Security token is distributed to method, the method for handling safety token, the security token of key | |
US20150134971A1 (en) | Apparatus and method for decrypting encrypted file | |
US11227037B2 (en) | Computer system, verification method of confidential information, and computer | |
US20050182946A1 (en) | Fast hashing function for pseudo-random generator | |
CN106776904A (en) | The fuzzy query encryption method of dynamic authentication is supported in a kind of insincere cloud computing environment | |
US20160301524A1 (en) | Methods and apparatuses of digital data processing | |
US9768959B2 (en) | Computer security system and method to protect against keystroke logging | |
CN105359155B (en) | Use compression failure password attack | |
CN108599934A (en) | It is a kind of to test safe and secret Enhancement Method for quantum key distribution | |
CN113449338A (en) | Information encryption storage method and system based on block chain | |
CN107665314B (en) | The trusted processes method and device signed on the electronic document | |
CN104038336A (en) | Data encryption method based on 3DES | |
CN113688399A (en) | Firmware digital signature protection method and device, computer equipment and storage medium | |
KR102258700B1 (en) | method and system of smart electronic contracting based on block chain | |
JP6040780B2 (en) | Cryptographic processing apparatus, method and program | |
Liu et al. | Hiding message into DNA sequence through DNA coding and chaotic maps | |
US11822629B2 (en) | Method and apparatus for generating digital identity and storage medium | |
CN103595523B (en) | A file encryption method | |
CN200983153Y (en) | Encryption signature handwriting plate with key | |
WO2018211475A1 (en) | Method for the creation of a document provided with a high-security digital signature | |
CN109359474A (en) | A method of it being incorporated into fingerprint in a document and is encrypted | |
Katuk et al. | An Enhanced Block Pre-processing of PRESENT Algorithm for Fingerprint Template Encryption in the Internet of Things Environment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190219 |