FR2854998A1 - Document authentication signature verification having digital document with signature embedded/hidden using scanner together with encrypted personal access code allowing authentication/verification - Google Patents
Document authentication signature verification having digital document with signature embedded/hidden using scanner together with encrypted personal access code allowing authentication/verification Download PDFInfo
- Publication number
- FR2854998A1 FR2854998A1 FR0305668A FR0305668A FR2854998A1 FR 2854998 A1 FR2854998 A1 FR 2854998A1 FR 0305668 A FR0305668 A FR 0305668A FR 0305668 A FR0305668 A FR 0305668A FR 2854998 A1 FR2854998 A1 FR 2854998A1
- Authority
- FR
- France
- Prior art keywords
- signature
- document
- verification
- information
- signatory
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
Abstract
Description
Demande de BrevetPatent application
Signature électronique graphique Certification de documents Graphic electronic signature Certification of documents
INTRODUCTIONINTRODUCTION
Domaine Technique De L'invention Cette invention a pour objet l'apposition d'une signature graphique sous sa forme électronique pour authentifier les échanges documentaires dématérialisés. Ce procédé est utilisable pour la certification de document, la non répudiation par l'émetteur ainsi que l'identification du siqnataire. Cette invention utilise la signature graphique d'une persOnne, la convertit sous sa forme électronique comme support d'informatiora s'appuyant sur un mécanisme de stéganographie, d'empreinte ou condensat et de cryptographie permettant de garantir l'identification du signataire, de rendre ainsi impossible la répudiation du document signé et de vérifier l'intégrité du document c'est % dire sa non altération. 15 La technique de la signature graphique sous forme électronique est utilisée comme support pour le transport des informations cachées propres au document (son condensat) et propres au signataire (ses informations personnelles) et propres à l'ordinateur qui 20 authentifient le signataire et qui garantissent la non-répudiation d'un document ainsi que son authenticité. Technical Field of the Invention The object of this invention is to affix a graphic signature in its electronic form to authenticate dematerialized document exchanges. This process can be used for document certification, non-repudiation by the issuer as well as identification of the receiver. This invention uses the graphic signature of a person, converts it into its electronic form as a medium of information based on a mechanism of steganography, imprint or condensate and cryptography making it possible to guarantee the identification of the signatory, to render thus impossible the repudiation of the signed document and to verify the integrity of the document that is to say its non-alteration. The technique of graphic signature in electronic form is used as a medium for the transport of hidden information specific to the document (its condensate) and specific to the signatory (his personal information) and specific to the computer which 20 authenticate the signatory and which guarantee the non-repudiation of a document as well as its authenticity.
Etat de la technique antérieure Jusqu'à présent la plupart des procédés de signatures électronique 25 - Utilisent le système PKI (Public Key Infrastructure) Infrastructure à clé publique. STATE OF THE PRIOR ART Up to now most electronic signature methods 25 - Use the PKI system (Public Key Infrastructure) Public key infrastructure.
- La signature n'est pas visible - La signature est attachée au document et non dans le document - The signature is not visible - The signature is attached to the document and not in the document
EXPOSESUMMARY
Au contraire de ces trois aspects la présente invention - N'utilise pas le système PKI mais la stéganographie - Rend la signature visible - Cette signature est dans le document et non attachée La stéganographie, utilisée dans ce procédé, permet de dissimuler des informations dans l'image représentant la signature graphique sous sa forme électronique de telle façon que l'existence même des informations n'attire pas l'attention. Le procédé de stéganographie permet de rendre les informations impossibles à extraire, ce qui le rend équivalant à la cryptologie. Par contre ce procédé ne demande pas de mot de passe ou de clé pour en extraire les informations, ce qui simplifie son utilisation entre deux personnes car aucune échange de clé n'est nécessaire au préalable ni gestion de clé. La stéganographie est définie simplement par un algorithme secret. Unlike these three aspects, the present invention - Does not use the PKI system but steganography - Makes the signature visible - This signature is in the document and not attached Steganography, used in this process, makes it possible to hide information in the image representing the graphic signature in its electronic form in such a way that the very existence of the information does not attract attention. The steganography process makes it impossible to extract information, which makes it equivalent to cryptology. By cons this process does not require a password or key to extract the information, which simplifies its use between two people because no key exchange is necessary beforehand or key management. Steganography is defined simply by a secret algorithm.
Le procédé qui garanti qu'un fichier électronique est authentique est son empreinte. Cette empreinte est un condensat - en anglais " hash " - c'est à dire un résumé mathématique sous forme d'une matrice de chiffre. Le calcul est fait de telle manière que si une information a été modifiée son empreinte est modifiée et ne 50 correspond plus a l'empreinte originale enregistrée à la création du document. L'avantage d'utiliser ce condensat est sa taille très réduite quelle que soit la taille du document, ce qui permet son intégration par stéganographie dans la signature graphique sous sa forme électronique. The process which guarantees that an electronic file is authentic is its imprint. This imprint is a condensate - in English "hash" - ie a mathematical summary in the form of a matrix of figures. The calculation is made in such a way that if an item of information has been modified, its fingerprint is modified and no longer corresponds to the original fingerprint recorded when the document was created. The advantage of using this condensate is its very reduced size whatever the size of the document, which allows its integration by steganography in the graphic signature in its electronic form.
La figure 1 représente le procédé de signature A et de vérification B Le procédé repose sur l'utilisation de 2 outils: Un outil de signature, et d'incrustation d'informations cachées, utilisé par le signataire identifié par son code d'accès. FIG. 1 represents the signature A and verification B method. The method is based on the use of 2 tools: A signature tool, and an inlay of hidden information, used by the signatory identified by his access code.
Un outil de vérification et de désincrustation utilisé par le destinataire public. A verification and descaling tool used by the public recipient.
A- Le procédé de signature électronique fonctionne de la façon suivante: 1) Création et paramétrage de l'outil A Lors de la première utilisation le signataire doit numériser sa signature graphique soit en utilisant un numérisateur connecté à un système d'information (scanner), soit en signant directement sur une table à numériser. On lui demande ensuite de saisir des informations personnelles, ainsi qu'un code d'accès personnel,. A- The electronic signature process works as follows: 1) Creation and configuration of the tool A During the first use the signatory must digitize his graphic signature either by using a digitizer connected to an information system (scanner) , or by signing directly on a table to digitize. They are then asked to enter personal information, as well as a personal access code.
certaines de ces informations. Ce code d'accès sera aussi utilisé pour exprimer la volonté du signataire d'utiliser sa signature graphique sous sa forme électronique. Toutes les informations sont ainsi stéganographiées dans la signature, l'ensemble, étant réinséré dans le document lui-même. some of this information. This access code will also be used to express the signatory's desire to use his graphic signature in its electronic form. All the information is thus steganographed in the signature, the whole being reinserted in the document itself.
2) Apposition d'une signature: Lorsque le signataire veut signer un document électronique, Il va utiliser pour sa rédaction un outil de traitement de texte, par 80 exemple MSWordTm. Après la saisie de son document (1D) il utilisera un outil d'insertion (A) objet du présent procédé qui insérera le graphique numérique de sa signature (2S) incluant les informations décrites plus haut. Ensuite il certifiera le document avec sa signature en entrant, (à l'invitation) son code 85 d'utilisateur. Ce procédé de certification (3AS) rajoute dans la signature les informations relatives au document lui-même; son nom, la date de la signature ainsi que son condensat. Le document est sauvegardé et prêt à être envoyé à son ou ses destinataires. 2) Affixing a signature: When the signatory wants to sign an electronic document, He will use for his writing a word processing tool, for example MSWordTm. After entering his document (1D) he will use an insertion tool (A) object of this process which will insert the digital graphic of his signature (2S) including the information described above. Then he will certify the document with his signature by entering (at the invitation) his user code 85. This certification process (3AS) adds information relating to the document itself to the signature; its name, the date of signature and its condensate. The document is saved and ready to be sent to its recipient (s).
B- Vérification d'une signature par le destinataire: go90 A la réception du document signé, le destinataire utilise son outil de traitement de texte. Il peut lire à l'écran le document et aussi vérifier l'authenticité de celui-ci ainsi que l'identit4 du signataire. En utilisant l'outil de vérification, Le système sera capable d'extraire certaines informations (10R) 95 stéganographiées dans la signature comme le condensat réalisé lors de la certification par le signataire, et les informations relatives au signataire. Le condensat extrait sera comparé au condensat du document affiché. Si les deux condensats sont égaux, le document est vérifié et validé, conforme à l'original, dans le cas contraire il est invalide, c'est à dire qu'une modification a été effectuée après certification par le signataire (et avant la vérification par le destinataire). B- Verification of a signature by the recipient: go90 On receipt of the signed document, the recipient uses his word processing tool. He can read the document on the screen and also verify its authenticity as well as the signer's identity. Using the verification tool, the system will be able to extract certain information (10R) 95 steganographed in the signature such as the condensate produced during the certification by the signatory, and the information relating to the signatory. The condensate extracted will be compared with the condensate of the document displayed. If the two condensates are equal, the document is verified and validated, conforms to the original, otherwise it is invalid, i.e. a modification has been made after certification by the signatory (and before verification by the recipient).
Claims (4)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
FR0305668A FR2854998A1 (en) | 2003-05-12 | 2003-05-12 | Document authentication signature verification having digital document with signature embedded/hidden using scanner together with encrypted personal access code allowing authentication/verification |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
FR0305668A FR2854998A1 (en) | 2003-05-12 | 2003-05-12 | Document authentication signature verification having digital document with signature embedded/hidden using scanner together with encrypted personal access code allowing authentication/verification |
Publications (1)
Publication Number | Publication Date |
---|---|
FR2854998A1 true FR2854998A1 (en) | 2004-11-19 |
Family
ID=33306283
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
FR0305668A Pending FR2854998A1 (en) | 2003-05-12 | 2003-05-12 | Document authentication signature verification having digital document with signature embedded/hidden using scanner together with encrypted personal access code allowing authentication/verification |
Country Status (1)
Country | Link |
---|---|
FR (1) | FR2854998A1 (en) |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5606609A (en) * | 1994-09-19 | 1997-02-25 | Scientific-Atlanta | Electronic document verification system and method |
US5765176A (en) * | 1996-09-06 | 1998-06-09 | Xerox Corporation | Performing document image management tasks using an iconic image having embedded encoded information |
WO2000011834A1 (en) * | 1998-08-25 | 2000-03-02 | Schlumberger Industries, S.A. | Graphic digital signatures |
-
2003
- 2003-05-12 FR FR0305668A patent/FR2854998A1/en active Pending
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5606609A (en) * | 1994-09-19 | 1997-02-25 | Scientific-Atlanta | Electronic document verification system and method |
US5765176A (en) * | 1996-09-06 | 1998-06-09 | Xerox Corporation | Performing document image management tasks using an iconic image having embedded encoded information |
WO2000011834A1 (en) * | 1998-08-25 | 2000-03-02 | Schlumberger Industries, S.A. | Graphic digital signatures |
Non-Patent Citations (1)
Title |
---|
GRAEME J PROUDLER: "Authentication and display of signatures on electronic documents (Graeme J Proudler)", RESEARCH DISCLOSURE, KENNETH MASON PUBLICATIONS, HAMPSHIRE, GB, vol. 358, no. 19, February 1994 (1994-02-01), XP007119590, ISSN: 0374-4353 * |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
KR20090122657A (en) | Public key infrastructure method for preventing forgery of document using character recognition | |
WO2014154109A1 (en) | Generating method, verifying method for electronic bill with anti-fake two dimension (2d) code and system for same | |
TW200629846A (en) | System and method for verifying digital signatures on certificates | |
US20060242693A1 (en) | Isolated authentication device and associated methods | |
RU2346395C2 (en) | Cryptographically protected personal identification | |
JP2006157914A (en) | Document authentication method, detectable document generation method and apparatus and program | |
WO2003103211A3 (en) | Layered security in digital watermarking | |
JP2000215171A (en) | System and method for authentication | |
CN103678960B (en) | Method and device for adding digital copyright information to data file | |
KR20200096136A (en) | Method of authentication, server and electronic identity device | |
TW200537891A (en) | Document signature method & system | |
WO2015196642A1 (en) | Data encryption method, decryption method and device | |
EP2216729B1 (en) | Method and system for protection of user information registers for use in electoral processes | |
EP3316162B1 (en) | Method and system for creating an electronic signature of a document associated to a person by means of the voice print of the person, and corresponding method for verifying the electronic signature | |
TW200813772A (en) | Processing equipment for authentication system, authentication system and operation method thereof | |
EP2954449B1 (en) | Digitised handwritten signature authentication | |
US20050226460A1 (en) | Method and system for frequency domain watermarking using a phase based filter signature | |
FR2854998A1 (en) | Document authentication signature verification having digital document with signature embedded/hidden using scanner together with encrypted personal access code allowing authentication/verification | |
JP2003134108A (en) | Electronic signature, apparatus and method for verifying electronic signature, program and recording medium | |
CN115299010A (en) | Method and apparatus for verifying data integrity | |
FR3014225A1 (en) | METHOD AND DEVICE FOR SECURING ACCESS TO A MESSAGE | |
US20090044018A1 (en) | Section Inclusion and Section Order Authentication Method for Computer Electronic Documents | |
JP2000331077A (en) | Electronic seal system and method for identifying individual of seal impression and seal | |
AU748808B2 (en) | 3D human subject identification and authentication system | |
Rodríguez et al. | Scanned documents secure authentication based on simple watermarking |