FR2854998A1 - Document authentication signature verification having digital document with signature embedded/hidden using scanner together with encrypted personal access code allowing authentication/verification - Google Patents

Document authentication signature verification having digital document with signature embedded/hidden using scanner together with encrypted personal access code allowing authentication/verification Download PDF

Info

Publication number
FR2854998A1
FR2854998A1 FR0305668A FR0305668A FR2854998A1 FR 2854998 A1 FR2854998 A1 FR 2854998A1 FR 0305668 A FR0305668 A FR 0305668A FR 0305668 A FR0305668 A FR 0305668A FR 2854998 A1 FR2854998 A1 FR 2854998A1
Authority
FR
France
Prior art keywords
signature
document
verification
information
signatory
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
FR0305668A
Other languages
French (fr)
Inventor
Yves Burnod
Fabrice Lalande
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
PICTURE CERTIFICATION COM E
Original Assignee
PICTURE CERTIFICATION COM E
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by PICTURE CERTIFICATION COM E filed Critical PICTURE CERTIFICATION COM E
Priority to FR0305668A priority Critical patent/FR2854998A1/en
Publication of FR2854998A1 publication Critical patent/FR2854998A1/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures

Abstract

The digital signature verification process has the signature embedded and hidden (4) in the document. Signature images (6) are attached to the document together with the digital version of the document (1). The signature is digitized with a scanner and personal access code embedded and encrypted. Authentication and verification of the signature can then be controlled.

Description

Demande de BrevetPatent application

Signature électronique graphique Certification de documents  Graphic electronic signature Certification of documents

INTRODUCTIONINTRODUCTION

Domaine Technique De L'invention Cette invention a pour objet l'apposition d'une signature graphique sous sa forme électronique pour authentifier les échanges documentaires dématérialisés. Ce procédé est utilisable pour la certification de document, la non répudiation par l'émetteur ainsi que l'identification du siqnataire. Cette invention utilise la signature graphique d'une persOnne, la convertit sous sa forme électronique comme support d'informatiora s'appuyant sur un mécanisme de stéganographie, d'empreinte ou condensat et de cryptographie permettant de garantir l'identification du signataire, de rendre ainsi impossible la répudiation du document signé et de vérifier l'intégrité du document c'est % dire sa non altération. 15 La technique de la signature graphique sous forme électronique est utilisée comme support pour le transport des informations cachées propres au document (son condensat) et propres au signataire (ses informations personnelles) et propres à l'ordinateur qui 20 authentifient le signataire et qui garantissent la non-répudiation d'un document ainsi que son authenticité.  Technical Field of the Invention The object of this invention is to affix a graphic signature in its electronic form to authenticate dematerialized document exchanges. This process can be used for document certification, non-repudiation by the issuer as well as identification of the receiver. This invention uses the graphic signature of a person, converts it into its electronic form as a medium of information based on a mechanism of steganography, imprint or condensate and cryptography making it possible to guarantee the identification of the signatory, to render thus impossible the repudiation of the signed document and to verify the integrity of the document that is to say its non-alteration. The technique of graphic signature in electronic form is used as a medium for the transport of hidden information specific to the document (its condensate) and specific to the signatory (his personal information) and specific to the computer which 20 authenticate the signatory and which guarantee the non-repudiation of a document as well as its authenticity.

Etat de la technique antérieure Jusqu'à présent la plupart des procédés de signatures électronique 25 - Utilisent le système PKI (Public Key Infrastructure) Infrastructure à clé publique.  STATE OF THE PRIOR ART Up to now most electronic signature methods 25 - Use the PKI system (Public Key Infrastructure) Public key infrastructure.

- La signature n'est pas visible - La signature est attachée au document et non dans le document  - The signature is not visible - The signature is attached to the document and not in the document

EXPOSESUMMARY

Au contraire de ces trois aspects la présente invention - N'utilise pas le système PKI mais la stéganographie - Rend la signature visible - Cette signature est dans le document et non attachée La stéganographie, utilisée dans ce procédé, permet de dissimuler des informations dans l'image représentant la signature graphique sous sa forme électronique de telle façon que l'existence même des informations n'attire pas l'attention. Le procédé de stéganographie permet de rendre les informations impossibles à extraire, ce qui le rend équivalant à la cryptologie. Par contre ce procédé ne demande pas de mot de passe ou de clé pour en extraire les informations, ce qui simplifie son utilisation entre deux personnes car aucune échange de clé n'est nécessaire au préalable ni gestion de clé. La stéganographie est définie simplement par un algorithme secret.  Unlike these three aspects, the present invention - Does not use the PKI system but steganography - Makes the signature visible - This signature is in the document and not attached Steganography, used in this process, makes it possible to hide information in the image representing the graphic signature in its electronic form in such a way that the very existence of the information does not attract attention. The steganography process makes it impossible to extract information, which makes it equivalent to cryptology. By cons this process does not require a password or key to extract the information, which simplifies its use between two people because no key exchange is necessary beforehand or key management. Steganography is defined simply by a secret algorithm.

Le procédé qui garanti qu'un fichier électronique est authentique est son empreinte. Cette empreinte est un condensat - en anglais " hash " - c'est à dire un résumé mathématique sous forme d'une matrice de chiffre. Le calcul est fait de telle manière que si une information a été modifiée son empreinte est modifiée et ne 50 correspond plus a l'empreinte originale enregistrée à la création du document. L'avantage d'utiliser ce condensat est sa taille très réduite quelle que soit la taille du document, ce qui permet son intégration par stéganographie dans la signature graphique sous sa forme électronique.  The process which guarantees that an electronic file is authentic is its imprint. This imprint is a condensate - in English "hash" - ie a mathematical summary in the form of a matrix of figures. The calculation is made in such a way that if an item of information has been modified, its fingerprint is modified and no longer corresponds to the original fingerprint recorded when the document was created. The advantage of using this condensate is its very reduced size whatever the size of the document, which allows its integration by steganography in the graphic signature in its electronic form.

La figure 1 représente le procédé de signature A et de vérification B Le procédé repose sur l'utilisation de 2 outils: Un outil de signature, et d'incrustation d'informations cachées, utilisé par le signataire identifié par son code d'accès.  FIG. 1 represents the signature A and verification B method. The method is based on the use of 2 tools: A signature tool, and an inlay of hidden information, used by the signatory identified by his access code.

Un outil de vérification et de désincrustation utilisé par le destinataire public.  A verification and descaling tool used by the public recipient.

A- Le procédé de signature électronique fonctionne de la façon suivante: 1) Création et paramétrage de l'outil A Lors de la première utilisation le signataire doit numériser sa signature graphique soit en utilisant un numérisateur connecté à un système d'information (scanner), soit en signant directement sur une table à numériser. On lui demande ensuite de saisir des informations personnelles, ainsi qu'un code d'accès personnel,.  A- The electronic signature process works as follows: 1) Creation and configuration of the tool A During the first use the signatory must digitize his graphic signature either by using a digitizer connected to an information system (scanner) , or by signing directly on a table to digitize. They are then asked to enter personal information, as well as a personal access code.

certaines de ces informations. Ce code d'accès sera aussi utilisé pour exprimer la volonté du signataire d'utiliser sa signature graphique sous sa forme électronique. Toutes les informations sont ainsi stéganographiées dans la signature, l'ensemble, étant réinséré dans le document lui-même.  some of this information. This access code will also be used to express the signatory's desire to use his graphic signature in its electronic form. All the information is thus steganographed in the signature, the whole being reinserted in the document itself.

2) Apposition d'une signature: Lorsque le signataire veut signer un document électronique, Il va utiliser pour sa rédaction un outil de traitement de texte, par 80 exemple MSWordTm. Après la saisie de son document (1D) il utilisera un outil d'insertion (A) objet du présent procédé qui insérera le graphique numérique de sa signature (2S) incluant les informations décrites plus haut. Ensuite il certifiera le document avec sa signature en entrant, (à l'invitation) son code 85 d'utilisateur. Ce procédé de certification (3AS) rajoute dans la signature les informations relatives au document lui-même; son nom, la date de la signature ainsi que son condensat. Le document est sauvegardé et prêt à être envoyé à son ou ses destinataires.  2) Affixing a signature: When the signatory wants to sign an electronic document, He will use for his writing a word processing tool, for example MSWordTm. After entering his document (1D) he will use an insertion tool (A) object of this process which will insert the digital graphic of his signature (2S) including the information described above. Then he will certify the document with his signature by entering (at the invitation) his user code 85. This certification process (3AS) adds information relating to the document itself to the signature; its name, the date of signature and its condensate. The document is saved and ready to be sent to its recipient (s).

B- Vérification d'une signature par le destinataire: go90 A la réception du document signé, le destinataire utilise son outil de traitement de texte. Il peut lire à l'écran le document et aussi vérifier l'authenticité de celui-ci ainsi que l'identit4 du signataire. En utilisant l'outil de vérification, Le système sera capable d'extraire certaines informations (10R) 95 stéganographiées dans la signature comme le condensat réalisé lors de la certification par le signataire, et les informations relatives au signataire. Le condensat extrait sera comparé au condensat du document affiché. Si les deux condensats sont égaux, le document est vérifié et validé, conforme à l'original, dans le cas contraire il est invalide, c'est à dire qu'une modification a été effectuée après certification par le signataire (et avant la vérification par le destinataire).  B- Verification of a signature by the recipient: go90 On receipt of the signed document, the recipient uses his word processing tool. He can read the document on the screen and also verify its authenticity as well as the signer's identity. Using the verification tool, the system will be able to extract certain information (10R) 95 steganographed in the signature such as the condensate produced during the certification by the signatory, and the information relating to the signatory. The condensate extracted will be compared with the condensate of the document displayed. If the two condensates are equal, the document is verified and validated, conforms to the original, otherwise it is invalid, i.e. a modification has been made after certification by the signatory (and before verification by the recipient).

Claims (4)

REVENDICATIONS 1. Procédé numérique de signature et d'incrustation caché (4) pour inclure de façon invisible, dans l'image des signatures attachées à un document (6) , des paramètres codés du document original (1), caractérisé en ce qu'il consiste à : 1 numériser 5 lors de la première utilisation, par le signataire, sa signature graphique à l'aide d'un scanner la signature restant conforme visuellement à la signature originale. 2 saisir des informations personnelles, ainsi qu'un code d'accès personnel, , les informations incrustées dans la signature étant cryptées à l'aide 10 du procédé de signature précité, ces informations étant suffisantes pour contrôler ultérieurement, grâce à un procédé de vérification, l'authentification du signataire et l'intégrité du document depuis sa signature.  1. digital method of signature and hidden inlay (4) to include in an invisible manner, in the image of the signatures attached to a document (6), coded parameters of the original document (1), characterized in that consists in: 1 digitizing 5 during the first use, by the signatory, his graphic signature using a scanner the signature remaining visually conform to the original signature. 2 enter personal information, as well as a personal access code, the information embedded in the signature being encrypted using the aforementioned signature method, this information being sufficient for later checking, thanks to a verification process , the authentication of the signatory and the integrity of the document since its signature. 2. Procédé selon la revendication 1 caractérisé en ce que la signature graphique inclut également des informations sur l'acte de signature (horodatage, numéro d'ordre du document signé, numéro de série propre à l'ordinateur utilisé par le signataire, paramètres caractérisant le signataire). 20  2. Method according to claim 1 characterized in that the graphic signature also includes information on the act of signature (time stamp, serial number of the signed document, serial number specific to the computer used by the signatory, parameters characterizing the signatory). 20 3. Procédé selon les revendications 1 et 2 caractérisé en ce qu'il calcule un paramètre (condensat) spécifique au document original, qu'il le crypte et l'inclut de façon invisible dans la signature pour la vérification ultérieure de l'intégrité du 25 document depuis sa signature.3. Method according to claims 1 and 2 characterized in that it calculates a parameter (condensate) specific to the original document, that it encrypts and includes it invisibly in the signature for the subsequent verification of the integrity of the 25 document since its signature. 4. Procédé selon les revendications 1, 2 et 3 caractérisé en ce qu'il utilise la stéganographie pour cacher des informations dans la signature sans modifier l'aspect visuel celle-ci, ces informations étant impossibles à reconstituer sans exploiter le dispositif de signature du signataire.  4. Method according to claims 1, 2 and 3 characterized in that it uses steganography to hide information in the signature without modifying the visual appearance thereof, this information being impossible to reconstruct without using the signature device of the signatory.
FR0305668A 2003-05-12 2003-05-12 Document authentication signature verification having digital document with signature embedded/hidden using scanner together with encrypted personal access code allowing authentication/verification Pending FR2854998A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
FR0305668A FR2854998A1 (en) 2003-05-12 2003-05-12 Document authentication signature verification having digital document with signature embedded/hidden using scanner together with encrypted personal access code allowing authentication/verification

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
FR0305668A FR2854998A1 (en) 2003-05-12 2003-05-12 Document authentication signature verification having digital document with signature embedded/hidden using scanner together with encrypted personal access code allowing authentication/verification

Publications (1)

Publication Number Publication Date
FR2854998A1 true FR2854998A1 (en) 2004-11-19

Family

ID=33306283

Family Applications (1)

Application Number Title Priority Date Filing Date
FR0305668A Pending FR2854998A1 (en) 2003-05-12 2003-05-12 Document authentication signature verification having digital document with signature embedded/hidden using scanner together with encrypted personal access code allowing authentication/verification

Country Status (1)

Country Link
FR (1) FR2854998A1 (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5606609A (en) * 1994-09-19 1997-02-25 Scientific-Atlanta Electronic document verification system and method
US5765176A (en) * 1996-09-06 1998-06-09 Xerox Corporation Performing document image management tasks using an iconic image having embedded encoded information
WO2000011834A1 (en) * 1998-08-25 2000-03-02 Schlumberger Industries, S.A. Graphic digital signatures

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5606609A (en) * 1994-09-19 1997-02-25 Scientific-Atlanta Electronic document verification system and method
US5765176A (en) * 1996-09-06 1998-06-09 Xerox Corporation Performing document image management tasks using an iconic image having embedded encoded information
WO2000011834A1 (en) * 1998-08-25 2000-03-02 Schlumberger Industries, S.A. Graphic digital signatures

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
GRAEME J PROUDLER: "Authentication and display of signatures on electronic documents (Graeme J Proudler)", RESEARCH DISCLOSURE, KENNETH MASON PUBLICATIONS, HAMPSHIRE, GB, vol. 358, no. 19, February 1994 (1994-02-01), XP007119590, ISSN: 0374-4353 *

Similar Documents

Publication Publication Date Title
KR20090122657A (en) Public key infrastructure method for preventing forgery of document using character recognition
WO2014154109A1 (en) Generating method, verifying method for electronic bill with anti-fake two dimension (2d) code and system for same
TW200629846A (en) System and method for verifying digital signatures on certificates
US20060242693A1 (en) Isolated authentication device and associated methods
RU2346395C2 (en) Cryptographically protected personal identification
JP2006157914A (en) Document authentication method, detectable document generation method and apparatus and program
WO2003103211A3 (en) Layered security in digital watermarking
JP2000215171A (en) System and method for authentication
CN103678960B (en) Method and device for adding digital copyright information to data file
KR20200096136A (en) Method of authentication, server and electronic identity device
TW200537891A (en) Document signature method & system
WO2015196642A1 (en) Data encryption method, decryption method and device
EP2216729B1 (en) Method and system for protection of user information registers for use in electoral processes
EP3316162B1 (en) Method and system for creating an electronic signature of a document associated to a person by means of the voice print of the person, and corresponding method for verifying the electronic signature
TW200813772A (en) Processing equipment for authentication system, authentication system and operation method thereof
EP2954449B1 (en) Digitised handwritten signature authentication
US20050226460A1 (en) Method and system for frequency domain watermarking using a phase based filter signature
FR2854998A1 (en) Document authentication signature verification having digital document with signature embedded/hidden using scanner together with encrypted personal access code allowing authentication/verification
JP2003134108A (en) Electronic signature, apparatus and method for verifying electronic signature, program and recording medium
CN115299010A (en) Method and apparatus for verifying data integrity
FR3014225A1 (en) METHOD AND DEVICE FOR SECURING ACCESS TO A MESSAGE
US20090044018A1 (en) Section Inclusion and Section Order Authentication Method for Computer Electronic Documents
JP2000331077A (en) Electronic seal system and method for identifying individual of seal impression and seal
AU748808B2 (en) 3D human subject identification and authentication system
Rodríguez et al. Scanned documents secure authentication based on simple watermarking