TW402713B - A delivering system for classified documents with ownership - Google Patents

A delivering system for classified documents with ownership Download PDF

Info

Publication number
TW402713B
TW402713B TW87114280A TW87114280A TW402713B TW 402713 B TW402713 B TW 402713B TW 87114280 A TW87114280 A TW 87114280A TW 87114280 A TW87114280 A TW 87114280A TW 402713 B TW402713 B TW 402713B
Authority
TW
Taiwan
Prior art keywords
information
document
ownership
audit
transmitted
Prior art date
Application number
TW87114280A
Other languages
Chinese (zh)
Inventor
Guo-Jen Fan
Jen-Hua Sung
Original Assignee
Ind Tech Res Inst
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ind Tech Res Inst filed Critical Ind Tech Res Inst
Priority to TW87114280A priority Critical patent/TW402713B/en
Application granted granted Critical
Publication of TW402713B publication Critical patent/TW402713B/en

Links

Abstract

A delivering system is used to deliver unsent documents between senders and receivers. We usually need two public notary organizations, one is fair gold key preservation center; and the other is fair storage apparatus. Fair gold key preservation center is responsible for saving gold key with ownership of senders and fair storage apparatus is responsible for publishing those corresponding examined info of certificated documents for receivers to conveniently proceed checking process.It should be at the same time that we have to issue examined info and comments/signature related info as well to fair storage apparatus as senders deliver their own documents. Fair storage apparatus will redeliver comments/signature related info back to the fair gold key preservation center to conveniently examine comments/signature related info according to those saved gold key with ownership of senders. If the certification is correct, fair storage apparatus will publish the examined info for the senders to audit.

Description

402713 ------- 五、發明説明(ί ) 本發明係有關於-種電子化文件傳輪方法,特別是 具有所1權證明保護機制之文件傳輸方法,能夠在—般 數位簽章(digital signatUfe)遭到偽造和破壞的情況下, 仍然能夠達到文件傳輪確認的目的。 在電子化文件傳輸過程中,為了達到文件來源認證 和確保文件完整性的目的,數㈣章是最f見的一種保 護機制。目前實施數位簽章的方法有很多,目前較常見 者包括了 RSA、DSA、E1G贿i #等。—般數位簽章所 採用的是不對稱金錄,也就是包括了用來進行簽章動作 的私密簽章金餘以及用來進行驗證動作的公開驗證金 鑰。發文方的私密簽章金鑰是由本身加以保管,當對某 一資料產絲錢章後,收文方便透心^可以取得的 公開驗證金鑰,來驗證此數位簽章是否確實由笋文方所 產生。 "402713 ------- V. Description of the invention (ί) The present invention relates to a method for transferring files electronically, in particular a method for transferring files with a protection mechanism for proof of title, which can be digitally signed and stamped. (Digital signatUfe) In the case of forgery and destruction, the purpose of file transfer confirmation can still be achieved. In the process of electronic file transmission, in order to achieve the purpose of document source certification and to ensure the integrity of the document, several chapters are the most common type of protection mechanism. There are many ways to implement digital signatures. The more common ones include RSA, DSA, and E1G bribery. —General digital signatures use asymmetric gold records, that is, the private signature balance used for signature actions and the public verification key used for verification actions. The issuer ’s private signature key is kept by itself. When a piece of money is produced for a certain document, the receipt is convenient and transparent. ^ A public verification key that can be obtained to verify whether the digital signature is indeed issued by the author. Produced. "

請 先 閲 ψ 意 事 項 再 填 寫 本 頁 袈 訂 經濟部中央標準局員工消費合作社印製 -第1圖表示一般數位簽章保護程序的示意圖,其中 表不發文方A欲送出文件1至收文方8。發文方A可以 利用其自身的私密㈣金餘AS以及文件1的内容(或是 其^己資料),透過數位簽章產生器1G處理後產生數位 簽章3。揍著發文件可以將文件1和數位簽章3合併成 傳送資料5’送到收文方b。蚊件B此時則可:利用 發文方A的公開驗證金鍮Ap,在數位簽章驗證器2〇中 對所接收到的訊息進行驗證,如果驗證結果R表示成功, =文件確實是由發文方所送出,同時在傳輪過程中並未 遭到竄改。此外,發文方A在送出傳送資料5時,也可 本紙張尺賴财國「Α4· ( 2^^: 釐) 40^713Please read the notices and fill in this page first. Printed by the Consumer Standards Cooperative of the Central Bureau of Standards of the Ministry of Economic Affairs-Figure 1 shows the schematic diagram of the general digital signature protection procedure, where the sender A wants to send documents 1 to the recipient 8 . The sender A can use his own private key Jinyu AS and the contents of file 1 (or his own data) to generate a digital signature 3 after processing by the digital signature generator 1G. By sending the document, the document 1 and the digital signature 3 can be combined into a transmission document 5 'and sent to the recipient b. Mosquito B can then: use the public verification of the sender A to verify the received message in the digital signature validator 20, if the verification result R indicates success, = the document was indeed issued by the sender It was sent by Fang, and was not tampered with during the round. In addition, when the sender A sends out the transmission data 5, the paper rule can also be based on the country ’s wealth "Α4 · (2 ^^: 厘) 40 ^ 713

經濟部中央標準局員工消費合作社印製 二利用,稱錢歧收文方的公開驗證⑽進行加密的 性理’藉此可以進-步提高資料傳輸的保密性以及完整 在此保護機财,主要是基於除了能夠擁有發文方 ^之私密^章金料人外,其他人是無法製作出正確的 數位簽章。然而料-份重要性較高的文件而言, ,望能夠提供數錢㈣㈣外,㈣具有另—層的保 護,本發明所提出的所有權證明即是-種比數位簽章更 加嚴格的保護措施。 有鐘於此,本發明之主要目的,在於提供一種 所有權證㈣護機㈣文件傳輪方法以及系統,除^;可 =達到-般數位簽章的安全特性之外,同時也可以達到 =於發文方和收文方兩方同時«的效果,兼以所有權 =月難以傷造的特性,在-般數位簽章的安全性遭到; =的情況下,所有權㈣尚可吨供—道更有效的i 徂噹擔w w 代® 一禋具有所有權證明 ::機制之文件傳輸方法,用以在發文方和收文方之間 據此待傳文件所個別產生的稽核資訊專: 所有權證明料金鑰和待傳文件所產生 公正金錄保管中心以及八個公正單位,分別為Printed by the Consumer Cooperative of the Central Bureau of Standards of the Ministry of Economic Affairs, it is said that the public verification of the recipients of the money and the encrypted nature of the data can be used to further improve the confidentiality of data transmission and protect the financial assets intact here. Based on the fact that apart from being able to own the private ^ chapter of the author, the other person cannot make the correct digital signature. However, for materials of higher importance, it is hoped that it can provide a few dollars in addition to another layer of protection. The proof of ownership proposed by the present invention is a stricter protection measure than a digital signature. . With this in mind, the main purpose of the present invention is to provide a method and system for transferring a certificate of ownership, a protector, and a file, in addition to the security features of ^; which can achieve-the general digital signature, and can also achieve = The issuer and the recipient are both «the effect of«, and the property of ownership = month is difficult to create, and the security of the digital signature is affected; in the case of =, the ownership can still be provided-more effective I 徂 当 担 ww 代 ® Once you have a proof of ownership :: mechanism for file transfer method, which is used to individually generate audit information between the sender and the recipient based on the documents to be transmitted. The fair record keeping center and eight fair units generated by the transfer of documents are:

心疋用來儲存發文方的所有權證明驗證錢,所有權IMy heart is used to store the issuer's proof of ownership verification money, ownership I

經 濟 部 中 央 標 準 員 工 消 費 再 衽 印 製 402713 —~~~--— 五、發明説明(3) =:::τ明簽署金錄為對應金錄。因此, 公開式儲存裝置=:::過:,機關則提供-核資料,讓收文方能夠進行稽核之用也。之文件所對應的稽 文件料hi敎方送出待傳 的稽核資訊和簽署資==分別對應於這些待傳文件 金錄保管中心。此時,八=::的絲資訊再送到公正 存的所有權驗證金鑰,管中心則是根據所館機關中ΐ 將驗證結果傳送回到公正儲存正儲存機關2澄結果表示確實是由發文方所簽署,公 _,用以提供該收開放式儲存 . 0 ^ 文方稽核之用。藉此,無論是收 另外,如果是傳輸同一筆待傳文件 杜 :广文件所對應的稽核資訊間可以具有一既定二牛 .係’㈣公正储存_可以確保各龍資訊間的 性,防止其他偽造資料的插入。 、 待傳文件的稽核資訊格式可以設定如下.第一广 件所對應的稽核資訊包括發文方的辨識碼、第—^ 的文件序號和彙記資料、以及利用發文方的-個私密簽The central government department of the Ministry of Economic Affairs's consumption expenses were reprinted 402713 — ~~~ --— V. Description of the invention (3) = ::: τ Ming signed the gold record as the corresponding gold record. Therefore, the public storage device = :::::, the authority provides-nuclear data, so that the recipient can perform auditing. The audit documents corresponding to the documents shall be submitted with the audit information and signing capital to be transmitted == Corresponding to these pending documents, respectively, the Golden Record Custody Center. At this time, the eight = :: silk information is then sent to the fair ownership verification key, and the management center sends the verification result back to the fair storage and positive storage authority according to the institution ’s authority. 2 The result indicates that it was indeed issued by the author. Signed, public_, used to provide the open storage of the receipt. 0 ^ text side audit. With this, whether it is to receive in addition, if it is transmitting the same document to be transmitted: the audit information corresponding to the wide file can have a predetermined two cattle. Department '㈣ fair storage _ can ensure the sexuality of the dragon information and prevent other Falsified data insertion. The audit information format of the document to be transmitted can be set as follows. The audit information corresponding to the first document includes the issuer's identification code, the document serial number and remittance information of the first ^, and a private signature using the issuer.

本紙張尺石 • I - I -I · I __ I · ; ^-----^--- (請先閲讀背面之注意事項再填寫本頁) • ί... *可 I ..1 I ί . .I -1 ml . 402713This paper ruler • I-I -I · I __ I ·; ^ ----- ^ --- (Please read the notes on the back before filling in this page) • ί ... * 可 I ..1 I ί.. I -1 ml. 402713

章金餘(數位簽章),對於辨識碼和此文件之文件序號所 產生的數位簽章。其他文件所對應的稽核資訊分別包括 發文方的辨識碼、其他文件的文件序號和彙記資料,以 及所有權證明驗證金鑰和前_份文件之彙記資料的互斥 或值。 另外,簽署資訊是由稽核資訊的彙記資料,利用所 有權證明簽署金錄所編碼產生。. 另外,發文方送出待傳文件至該收文方時,可以同 時送出所有«明至收文方,此所有權證明係由稽核資 訊,利用所有權證明簽署金鑰所編碼產生。另外,在發 文方中可以包括一資訊隱藏單元,用以將所有權證明併 入待傳文件中產生偽裝資料,—併送到收文方;而收文 方則可以包括-資訊抽取單元,用來從偽裝資料中抽出 所有權證明。 圖式之簡單說明: 一為使本發明之上述目的、特徵和優點能更明顯易 經濟部中央標準局員Η消費合作杜印製 馇,下文特舉一較佳實施例,並配合所附圖式,作詳細 說明如下: 第1圖表示一般數位簽章保護程序的示意圖。 第2圖表示本發明第一實施例之文件傳輸系統中的 資料流圖。 第3圖表示本發明第一實施例之文件傳輸方法的網 路傳輸流程圖。 __ 6 本張尺度適用中國國家標準(c叫从規格㈤X别公 402713Zhang Jinyu (digital signature), the digital signature generated by the identification code and the file serial number of this document. The audit information corresponding to the other documents includes the issuer's identification code, the document serial number and remittance information of the other documents, and the mutual exclusion or value of the proof of ownership verification key and the remittance data of the previous document. In addition, the signing information is generated by the audit data of the exchange of information, using the certificate of ownership to sign and record the code generated. In addition, when the sender sends the document to be transmitted to the recipient, he can also send all «Ming to the recipient" at the same time. This certificate of ownership is generated by auditing the information and using the certificate of ownership signing key. In addition, the sender may include an information hiding unit to incorporate the proof of ownership into the document to be transmitted to generate disguised information—and send it to the recipient; and the recipient may include an -information extraction unit to remove from the disguise Proof of ownership is extracted from the data. Brief description of the drawings: First, in order to make the above-mentioned objects, features, and advantages of the present invention more obvious, it is easy for members of the Central Standards Bureau of the Ministry of Economic Affairs (consumer cooperation to print). A preferred embodiment is given below in conjunction with the drawings. The detailed description is as follows: Figure 1 shows a schematic diagram of a general digital signature protection program. Fig. 2 shows a data flow diagram in the file transfer system of the first embodiment of the present invention. Fig. 3 shows a network transmission flowchart of a file transmission method according to the first embodiment of the present invention. __ 6 This standard applies to Chinese national standards (c is called from specification ㈤X Begong 402713

五、發明説明(5 弟4圖表示本發明第 示意圖。 第5圖表示本發明第 的資料流圖》 施例中之資料隱藏程序的 賓'掩•例中之文件傳輸系統中 付號說明: 產生[文2:動3〜數位簽章’ 5〜傳輸資料;1〇〜數位簽章 TKC = 章驗證器;A〜發文方;B〜收文方; TKC〜公正金鑰保管中心;TSA〜 隱藏處理器;14〜第一 RS編⑽.τ储存機關,12〜貧訊 ” 一 弟Rs編碼盗,16〜第二RS編碼器; 2〜貢訊抽取處㈣;24〜第_ Rs編碼u 解碼器。 實施例: 經濟部中央標準局員工消費合作社印製. /本發明之具有所有權證明保護機制的文件傳輪方法 和系統中’主要是利用發文方的不對稱金餘,亦即所有 權證明簽署金鑰以及所有權證明驗證金输,分別利用不 同的公正單位來處理,藉此可以確保每一筆由發文方送 到收文方的文件,都被認證過並且記錄下來,所以能夠 達到保障傳輸雙方訊息交換的目的。以下配合圖式,詳 細說明本發明之實施例。 【第一實施例】 第2圖表示本發明第一實施例之文件傳輪系統中的 本紙張尺度朝中_家縣(CNS ) a規格(21 q χ 297公慶) 402713 經濟部中央標準局員工消費合作社印製 五、發明説明(6 ) 資料流圖。如第2圖所示,文件傳輸系統中除了發文方 A和收文方B之外,還包括了另外兩個單位,分別是公 正金鑰保管中心(Trusted Key Center’以下簡稱tkc)以 及公正儲存機關(Trusted Storage Authority,以下簡稱 TSA)。TKC是用來健存發文方的所有權證明驗證金錄, TSA則疋用來儲存所有權證明(經由所有權證明簽署金鑰 所處理後的資料)以及發文的稽核資料,稍後配合圖式詳 細說明TKC以及TSA在文件傳輸過程中的作用。 在s兑明之前,首先定義後續說明中所採用之符號, 其中,X、Y可以分別表示為第2圖中四個單元(發文方、 收文方、TKC和TSA)中任一者.: A、Β、TKC、TSA〜分別表示發文方、收文方、 公正金錄保管中心以及公正儲存機關的識別碼; X->Y:M〜表示由單元X傳送訊息μ至單元γ; Rx〜由單元X所決定的亂數; Kx〜單元X的對稱金鑰; ΧΡ、Xs ~單元X的公開金鑰以及私密金输(數位簽章用); 單元X的所有權證明簽署金鑰以及所V. Description of the invention (Figure 5 and Figure 4 show the schematic diagram of the present invention. Figure 5 shows the data flow diagram of the present invention. "The data hiding procedure in the embodiment of the present invention is described in the example of the file transfer system: Generate [Text 2: Move 3 ~ Digital Signature '5 ~ Transfer Data; 10 ~ Digital Signature TKC = Chapter Validator; A ~ Sender; B ~ Receiver; TKC ~ Justice Key Custody Center; TSA ~ Hide Processor; 14 ~ first RS code τ. Τ storage mechanism, 12 ~ poor news "First brother Rs code stealing, 16 ~ second RS encoder; 2 ~ Gongxun extraction place; 24 ~ first _ Rs code u decoding Example: Printed by the Consumer Cooperative of the Central Standards Bureau of the Ministry of Economic Affairs. / The method and system for transferring documents with the ownership certificate protection mechanism of the present invention 'is mainly using the asymmetric balance of the issuer, that is, the ownership certificate is signed The key and the proof of ownership verify the gold loss, which are processed by different impartial units. This can ensure that each document sent by the sender to the recipient is authenticated and recorded, so it can ensure the transmission of the information of both parties. The purpose of the change. The following describes the embodiment of the present invention in detail with reference to the drawings. [First Embodiment] FIG. 2 shows that the paper size in the document transfer system of the first embodiment of the present invention is toward the middle of the paper_ 家 县 (CNS ) a specification (21 q χ 297 public holidays) 402713 Printed by the Consumer Cooperative of the Central Standards Bureau of the Ministry of Economic Affairs 5. Description of the invention (6) Data flow diagram. As shown in Figure 2, except for the sender A and the receiver in the file transmission system In addition to Party B, it also includes two other units, namely the Trusted Key Center '(tkc) and the Trusted Storage Authority (TSA). TKC is used to save documents. Party ’s proof of ownership verification gold record, TSA is not used to store the proof of ownership (data processed by the proof of ownership signing key) and the audit data of the post. The TKC and TSA will be explained in detail later in the process of file transmission with the help of drawings Before s is cleared, first define the symbols used in the subsequent description, where X and Y can be respectively expressed as the four units in Figure 2 (issuer, Recipient, TKC, and TSA): A, B, TKC, TSA ~ Represents the identifier of the sender, recipient, fair depository storage center, and fair storage institution; X- > Y: M ~ Means that the message μ is transmitted by the unit X to the unit γ; Rx ~ the random number determined by the unit X; Kx ~ the symmetric key of the unit X; XP, Xs ~ the public key of the unit X and the private gold input (for digital signature ); Certificate of ownership of the unit X signing key and all

XX

XX

OP 有權證明驗證金鑰; Κ(Μ):表示使用對稱金鑰κ對於訊息]v[進行加密 和解密; Κ[Μ]:表示利用金鑰Κ對於訊息Μ進行加密和解 密,加密時是採用其中的公開金鑰,解密時是採用其中 本紙張尺度適用中國國家標準(CMS ) A4規格(21〇';<297公缝) (請先閱讀背面之注意事項再填寫本頁) ¥ 訂 "The OP has the right to prove the authentication key; κ (Μ): means to use the symmetric key κ to encrypt and decrypt the message] v [; κ [Μ]: means to use the key K to encrypt and decrypt the message Μ. The public key is used, and the paper size is applied in accordance with the Chinese National Standard (CMS) A4 specification (21〇 '; < 297 cm). (Please read the precautions on the back before filling this page) "

五、發明説明(1 ) 402713 的私密金鑰; Κ{Μ}:表示利用金鑰K對於訊息μ進行簽章和驗 證,簽章時是採用其中的私密金鑰,驗證時是採用其中 的公開金鑰; Η(Μ):表示訊息Μ的彙記資料,彙記資料與產生 其之訊息間具有相當高的相關性,亦即如果訊息本身改 變後,彙記資料也會跟著改變,可用來判斷文件是否經 過竄改;V. Description of the invention (1) 402713's private key; K {M}: signifies and uses the key K to sign and verify the message μ. The private key is used for signing and the publicity is used for verification. Key: Η (Μ): Representation of the rendition data of message M. There is a very high correlation between the remittance data and the message that generated it, that is, if the message itself changes, the remittance data will also change and can be used to Determine whether the file has been tampered with;

Mi、Si〜第i份文件及其文件序號; INF〇i〜第i份文件的稽核資訊,其中i21(INF0Q 设為常數〇) 〇 在第2、3圖所示的是發文方a要傳送文件至收文 方B的情況,文件Mi表示待傳文件中的第土份文件。其 中’每個單元(包括A、B、TKC、TSA)都擁有各自的數 位簽章金鑰對,例如發文方A的Ap和As,收文方B的 Bp和Bs ’公正金鑰保管中心TKC的TKCp和TKCs,以 及公正儲存機關TSA的TSAP和TSAs。這些金鑰對中的 a開金輪(Ap、BP、TKCP、TSAP)皆公佈在ρκΐ的架構下, 供任何人查詢取用。另外,發文方4另外具有用來簽署 文件的所有權證明簽署金鑰A〇s以及用來驗證的所 證明驗證金鑰Α〇ρβ . # 在文件傳輸系統開始運作之前,發文方Α先將其 所有權證明驗證金鑰A〇p傳送到TKC註冊(即第2圖中 的11、第3圖中的m)。必須注意的是,此—註冊程 本纸張尺度 (請先閲讀背面之注意事項再填寫本頁) 經濟、部中央標準局員工消費合作社印製 -------^—.------^衣-------訂 J-----ο--------- iLir.Mi, Si ~ the i-th document and its document serial number; INF〇i ~ the i-th document audit information, where i21 (INF0Q is set to a constant 〇) In the case of transmitting the file to the recipient B, the file Mi indicates the first soil file in the file to be transmitted. Among them, 'Each unit (including A, B, TKC, TSA) has its own digital signature key pair, such as Ap and As of the sender A, Bp and Bs of the recipient B' TKCp and TKCs, as well as TSAPs and TSAs of the TSA. The a-round gold wheels (Ap, BP, TKCP, TSAP) of these key pairs are published in the structure of ρκΐ for anyone to query and access. In addition, the issuer 4 also has a certificate of ownership signing key A 0s for signing the document and a proven authentication key A 0ρβ for verification. # Before the file transfer system starts to operate, the issuer A first takes ownership The certification verification key Ap is transmitted to the TKC registration (ie, 11 in Fig. 2 and m in Fig. 3). It must be noted that this is the paper size of the registration process (please read the notes on the back before filling this page) Printed by the Consumer Cooperatives of the Central Bureau of Standards of the Ministry of Economy and Economy -------- ^ -.--- --- ^ 衣 ------- Order J ----- ο --------- iLir.

五、發明説明(g) 料 經濟部中央標準局員工消費合作社印製 402713 必/頁達到又方都無法否認的要求,因此必 離線作業的方式進杆 ^ + 木用 式進仃。另外’發文方只需要在TKC上註 冊-次所有權證明驗證錢A。?,之後傳送其他文件時, 都不需要另外再進行註冊。此時II可表示為: (II) A~>TKC : Aop(其巾A0P也可以利用TKCp加密 處理後傳輸) 在發文方A每次傳送文件之前,都必須先製作此 文件的稽核魏。在本實_巾,各份文件所對應的稽 核資訊格式如下。 第一份文件(Μι)的發文稽核資訊INFC^包括下列資 發文方A身份的識別碼:a 2 ·第一份文件Μι的文件序號:& 3 .第一份文件Μ!的文件彙記資料: 4 ·發文方A利用本身數位簽章私密金鑰as,對於 識別碼和文件序號兩者合併所作的數位簽章;As{A||Si} 因此,其稽核資訊INFOdA,S,,, 除了第一份文件Μ!之外,其他份文件%的發文稽 核資訊INFO;包括下列資料: 1 .發文方A身份的識別碼·· a 2 .第i份文件Μ;的文件序號:Si 3 ·第i份文件Μ;的文件彙記資料:H(Mi) 4 .發文方A的所有權證明驗證金錄ap和前一份 10 Μ氏張尺度適用中國國家標準(CNS ) A4規格(210X297公釐) (請先閲讀背面之注意事項再填寫本頁)V. Description of the invention (g) Material Printed by the Consumer Cooperatives of the Central Standards Bureau of the Ministry of Economic Affairs 402713 Must / pages meet the requirements that neither party can deny, so it must be operated offline ^ + Wood type. In addition, the issuer only needs to register on the TKC-sub-certificate of ownership to verify the money A. ? , You do n’t need to register separately when transferring other files later. At this time, II can be expressed as: (II) A ~> TKC: Aop (the towel A0P can also be encrypted with TKCp and transmitted after transmission). Before the sender A transmits the file, he must make an audit of this file. In this document, the audit information format corresponding to each document is as follows. Posting audit information INFC ^ of the first document (Mι) includes the following identification number of the issuer A: a 2 · Document serial number of the first document Mι: & 3. Document remittance of the first document M! Documents: 4 · Issuer A uses his digital signature private key as, a digital signature made by combining the identification code and the document serial number; As {A || Si} Therefore, its audit information INFOdA, S ,,, In addition to the first document M !, the other documents% of the document audit information INFO; including the following information: 1. Identification number of the issuer A identity ... a 2. Document i; document number: Si 3 · Document i of the i-th document M; H (Mi) 4. Issuer A's certificate of ownership verification gold record ap and the previous 10 M-sheet scale are applicable to China National Standard (CNS) A4 specifications (210X297) Li) (Please read the notes on the back before filling in this page)

402713 A7 經濟部中央標準局員工消費合作社印製 B7 五、發明説明(7) 文件之稽核資訊的彙記資料之間的互斥或值: AP ㊉ H(INFOm) 因此,其稽核資訊INF〇i=(A,Si,H(Mi), AP㊉H(INF〇i—〇)。 在發文方A傳送某一份文件Mi到收文方B時(即 第2圖中的13),發文方A會將此文件所對應的稽核資 訊以及一簽署資訊送到TSA(即第2圖中的12、第3圖 中的121.)。其中12和13的傳輸動作可以表示如下。 (12) A^TSA : TSAp[Kat]- Kat(A,TSS,S;,INFOi,AoJHGNFOi)}), AS{H(A,TSS,Si,INFOi,AoJI^INFOi)})} 對TSA而言,可以利用其丰身的私密金鑰TSAs先 解出KAT,.再利用KAT解出其所加密的各項資訊。在這 些加密的資訊中,INFO;表示對應於此一文件叫的稽核 資訊,而Aos{H(INF〇i)}表示簽署資訊,在本實施例中 是由發文方A利用其本身的所有權證明簽署金鑰Aos, 對於其稽核資訊INFOi的彙記資料進行簽署所產生。然 而本實施例並非用以限定本發明之範圍,例如使用其他 資料利用所有權證明簽署金鑰Aos來產生其簽署資訊, 也可以達到相同的目的。 (13) A—B : Bp[Kab], Kab(A,B,Μ;,八05{1则丨}), AS{H(A,B,Μ;,AodlNFOJ)} 對於收文方B而言,可以利用其本身的私密金鑰Bs (讀先閱讀背面之注意事項再填寫本頁) »- 、?τ 本纸張尺度適用中國國家標準(CNS ) Α4規格(jlOXW7公釐) 經濟部中央標準局員工消費合作社印製 402713 Αν B7 五、發明説明(β ) 先解出KAB,再利用KAB解出其所加密的各項資訊。在 這些加密的資訊中,Mi表示此文件的詳細内容,而 AoJINFOJ表示所有權證明資訊,在本實施例中是由發 文方A利用其本身的所有權證明簽署金鑰Aos,對於其 稽核資訊INFOi進行簽署所產生。然而本實施例並非用 以限定本發明之範圍,例$使用其他資料利用所有權證 明簽署金鑰AQS來產生其所有權證明,也可以達到相同 的目的。 當TSA接收到來自發文方A的稽核資訊INFOi以 及簽署資訊AoJHGNFOi)}時,會先確定是否真正是由 發文方所簽署發出。由於TSA本身沒有可以用來驗證的 所有權證明驗證金錄A〇p ’所以必須請求TKC的協助。 因此,TSA將簽署資訊Aos{H(INF〇i)}以及發文方的識 別碼A送交TKC來確認稽核資訊是否正確(第2圖中的 14、第3圖中的141)。 (14) TSA—TKC : TKCP[KTT], KTT(TSA,TKC,RTSA,A,AodHCINFOj)}), TSAs{H(TSA,TKC’ RTSA,A,AoJHGNFOi)})} 對於TKC而言,可以利用其本身的私密金鑰TKCS 先解出κττ,再利用κττ解出其所加密的各項資訊,其 中包括了表示發文方辨識碼的Α以及其所簽署出的簽署 資訊 AosiHClNFOi)}。 此時,TKC可以根據發文方辨識碼A找出其所對 應的所有權證明驗證金鑰Α0Ρ,再利用所有權證明驗證 本紙張尺度適用中國國家標準(CNS ) Α4規格(210Χ297公釐) (請先閱讀背面之注意事項再填寫本頁) ¥ 、1Τ 402713 A7 B7 五、發明説明(//) 金鑰A0P,由簽署資訊AodHClNFOi)}中解出稽核資訊 INFOi的彙記資訊,亦即HCINFOi)。接著,再將此解出 訊息(或是驗證結果)送回TSA(第2圖中的15、第3圖中 的 151)。 (15) TKC-VTSA : Κπ(ΤΚ。,TSA,RTSA,A,HONFOi)), TKCS{H(TKC,TSA,A,H(INF〇i))} 此時,TSA本身可以根據實際的稽核資訊INFO;產 生其彙記資訊,以便檢查由TKC所傳來的Η(ΙΝΡΟ〇是 否正確。如果此時TSA確認了的確是由發文方所簽署出 來的簽署資訊,TSA會將稽核資訊以下列格式儲存到稽 核資料庫中,做為發文方A的稽核串列之新增項目: (INFO;,0(㊉INFOM,Aos{INF〇i}) 假設發文方A共發出N份文件至收文方B,此時TSA 所維護的對應稽核串列為: (INFO!,INFC^INFO。,AqJINFOJ) (INF02,INF02㊉INFO!,Aos{INF02}) (info3,info3㊉INF〇2,Aos{INF03}) (INFOn_i,INFOn,INFOn_2 ’ AodlNFCVJ) (INFOn,INFOn®INFCVi,Aos{INFOn}) 其中每一項與其前後項之間都具有一定的關連性, 此一關連性是用來防止偽造的文件插入合法文件串列 中。在本實施例中,各項與其前後項的關係分別是: 與前項的關連性:INFOM=(INF〇i ㊉ INFOijeiNFOi 13 本纸張尺度適用中國國家標準(CNS ) A4現格(210X29*7公釐) (請先閱讀背面之注意事項再填寫本頁) .衣.402713 A7 Printed by the Consumer Cooperative of the Central Bureau of Standards of the Ministry of Economics B7 V. Explanation of the invention (7) Mutual exclusion or value between the records of the audit information of the document: AP ㊉ H (INFOm) Therefore, its audit information INF〇i = (A, Si, H (Mi), AP㊉H (INF〇i—〇). When sender A sends a certain document Mi to receiver B (ie, 13 in Figure 2), sender A will send The audit information and signature information corresponding to this document are sent to TSA (12 in Figure 2 and 121 in Figure 3). The transmission actions of 12 and 13 can be expressed as follows. (12) A ^ TSA: TSAp [Kat]-Kat (A, TSS, S ;, INFOi, AoJHGNFOi)}), AS {H (A, TSS, Si, INFOi, AoJI ^ INFOi)})} For TSA, you can take advantage of its richness The private key TSAs of KZK first extracts the KAT, and then uses KAT to solve the encrypted information. Among these encrypted information, INFO; represents the audit information corresponding to this document, and Aos {H (INF〇i)} represents the signing information. In this embodiment, the author A uses its own certificate of ownership The signing key Aos is generated by signing the audit information of its audit information INFOi. However, this embodiment is not intended to limit the scope of the present invention. For example, using other materials to generate the signing information by using the ownership certificate signing key Aos to achieve the same purpose. (13) A—B: Bp [Kab], Kab (A, B, M ;, 05 (1) 丨), AS {H (A, B, M ;, AodlNFOJ)} For the receiver B , You can use its own private key Bs (read the precautions on the back before filling this page) »-,? Τ This paper size applies the Chinese National Standard (CNS) Α4 specification (jlOXW7 mm) Central Standard of the Ministry of Economic Affairs Printed by the Bureau's Consumer Cooperatives 402713 Αν B7 V. Explanation of Invention (β) Solution KAB first, and then use KAB to solve its encrypted information. Among the encrypted information, Mi indicates the detailed content of this document, and AoJINFOJ indicates the proof of ownership information. In this embodiment, the issuer A uses his own certificate of ownership to sign the key Aos, and signs his audit information INFOi Produced. However, this embodiment is not intended to limit the scope of the present invention. For example, using other materials to generate a certificate of ownership by signing the key AQS with the certificate of ownership, the same purpose can be achieved. When TSA receives the audit information INFOi and the signature information AoJHGNFOi)} from the sender A, it will first determine whether it was actually signed and issued by the sender. Since TSA itself does not have a proof of ownership verification gold record A0p 'that can be used for verification, it must request the assistance of TKC. Therefore, TSA sends the signed information Aos {H (INF〇i)} and the sender's identification code A to TKC to confirm whether the audit information is correct (14 in Figure 2 and 141 in Figure 3). (14) TSA-TKC: TKCP [KTT], KTT (TSA, TKC, RTSA, A, AodHCINFOj)}), TSAs {H (TSA, TKC 'RTSA, A, AoJHGNFOi)})} For TKC, you can Use its own private key TKCS to solve κττ first, and then use κττ to solve the encrypted information, including A, which indicates the sender's identification code, and the signed information AosiHClNFOi)}. At this time, TKC can find the corresponding proof of ownership verification key A0P according to the sender's identification code A, and then use the proof of ownership to verify that this paper size applies to the Chinese National Standard (CNS) A4 specification (210 × 297 mm) (please read first Note on the back, please fill in this page again) ¥, 1T 402713 A7 B7 V. Description of the invention (//) Key A0P, from the signature information AodHClNFOi)}, the audit information INFOi's record information (ie, HCINFOi). Then, send this solution (or verification result) back to TSA (15 in Figure 2 and 151 in Figure 3). (15) TKC-VTSA: Kπ (TK, TSA, RTSA, A, HONFOi)), TKCS {H (TKC, TSA, A, H (INF〇i))} At this time, TSA itself can be audited based on actual INFO; Generate its remittance information to check whether the Η (ΙΝΡΟ〇) sent by TKC is correct. If TSA confirms that it is indeed the signed information signed by the issuer, TSA will audit the information in the following format Stored in the audit database as an additional item in the auditing series of sender A: (INFO ;, 0 (㊉INFOM, Aos {INF〇i}) Suppose sender A sends N documents to receiver B in total, At this time, the corresponding audit string maintained by TSA is: (INFO !, INFC ^ INFO., AqJINFOJ) (INF02, INF02㊉INFO !, Aos {INF02}) (info3, info3㊉INF〇2, Aos {INF03}) (INFOn_i, INFOn , INFOn_2 'AodlNFCVJ) (INFOn, INFOn®INFCVi, Aos {INFOn}) Each of these items has a certain correlation with its predecessors, and this correlation is used to prevent forged documents from being inserted into the legal file sequence In this embodiment, the relationship between each item and its predecessor is: Relevance to the previous item: INFOM = (INF〇 i ㊉ INFOijeiNFOi 13 This paper size is applicable to Chinese National Standard (CNS) A4 (210X29 * 7mm) (Please read the precautions on the back before filling this page). Clothing.

、tT 經濟部中央標準局員工消費合作社印製 402713 五、發明説明(p ) 與後項的關連性:INFOi+1<A,Si+1,H〇V[i+1:),AopeHCINFOO) 由TSA針對每份文件所記錄的稽核串列項目可以 用來確認是否由發文方A所發出,並且將稽核資料庫儲 存於一開放式的儲存裝置中,此時收文方B可以透過公 開查詢的方式來調閱(如第2圖中的16、第3圖中的161), 藉此確認其為合法文件。 經濟部中央標準局員工消費合作社印製 第3圖表示本發明第一實施例之文件傳輸方法的網 路傳輸流程圖。如圖所示,當發文方A要傳送第丨份文 件軋至收文方b時,發文方必須先送其所有權證明驗 證金鑰入⑽至TKc(m)。接著,發文方A會將文件 送到收文方並且將其對應的稽核資訊和簽署資 訊送到TSA(I21)eTSA會將其中的簽署資訊送到tkc 進行驗證(141),而TKC則會將驗證後的結果送回 TSA(I51)。如果驗證結果正確,則TSA則會將此文件所 對應的稽核資訊公開出來’由收文方B進行事後的確認 (161)二至於其他的文件%〜叫依照相同的程序進行處 理。藉此,由㈣文方可以透過TSA所公告的稽核資訊 來續認文件是由發文方所發出’而發文方也可以透過數 位簽早的技術來確保只有收文方可以正確解出資料,因 此可以保障雙方在文件傳輸上合法性。 【弟一貫施例】 ▲雖然、在第—實施例中,已經說明了如何利用所有權 设明來進仃文件傳輸的系統和方法,而在本實施例中, __ 14 Α7 Β7 402713 ---------- - 五、發明説明(, TT printed by the Consumer Cooperatives of the Central Standards Bureau of the Ministry of Economic Affairs 402713 V. Relevance of the invention description (p) to the following item: INFOi + 1 < A, Si + 1, HOV [i + 1 :), AopeHCINFOO) The auditing serial items recorded by TSA for each document can be used to confirm whether the issuer A has issued it, and the audit database is stored in an open storage device. At this time, the receiver B can use public inquiry. Check it out (such as 16 in Figure 2 and 161 in Figure 3) to confirm that it is a legal document. Printed by the Consumer Cooperative of the Central Standards Bureau of the Ministry of Economics Fig. 3 shows a network transmission flowchart of a file transmission method according to the first embodiment of the present invention. As shown in the figure, when the sender A wants to send the first document to the receiver b, the sender must first send its proof of ownership verification key to TKc (m). Then, the sender A will send the document to the recipient and send the corresponding audit information and signature information to TSA (I21). ETSA will send the signature information to tkc for verification (141), and TKC will send the verification The result is returned to TSA (I51). If the verification result is correct, the TSA will release the audit information corresponding to this document ’after the confirmation by the recipient B (161) Second, as for the other documents, it will be processed according to the same procedure. In this way, the author can use the audit information announced by the TSA to renew the recognition that the document was issued by the author, and the author can also use digital early signing technology to ensure that only the recipient can correctly extract the data, so it can Ensure the legality of both parties in file transfer. [Consistent Example] ▲ Although, in the first embodiment, the system and method of how to use the ownership setting to perform file transmission has been described, but in this embodiment, __ 14 Α7 Β7 402713 ---- -------V. Description of invention (

則進—步利用資《藏的技術,進—步保護由發 A 2到收文方B的所有權證明部分,藉此強化資 岔性。 資訊隱藏技術近年來已成為—項熱門的議題,在資 料安全、著作權健上都有其應㈣必要性。資訊隱藏 技術與傳統的資料保密技術在概念稍有不同,並將需要 保密的資訊(秘密資訊)隱藏在其他資訊(虛擬資訊、)内而只 允許有Μ秘密資訊權限較用者,透㈣訊抽取的方 式取得此秘密資訊4於其他人就只能看到虛擬資訊的 内容。 經 濟 部 中 標 準 局 員 工 消 t 合 社 印 製Then further use the technology of asset collection to further protect the portion of the proof of ownership from issue A 2 to recipient B, thereby strengthening the fortune. Information hiding technology has become a hot topic in recent years, and it has its own necessity in terms of data security and copyright protection. Information hiding technology is slightly different in concept from traditional data confidentiality technology, and hides the information that needs to be kept secret (secret information) in other information (virtual information, etc.) and only allows users who have the right to make secret information available. By extracting this secret information, other people can only see the contents of the virtual information. Printed by the Ministry of Economic Affairs

在本實施例中,主要是應用資訊隱藏技術在發文方 Α送出文件本身和其所有權證明至收文方Β的傳輪上。 因此’文件(MJ視為虛擬資訊,而所有權證明(Α⑽丨INF〇j) 則視為秘密資訊。另外,本實施例中是將秘密資訊隱藏 在以Reed-Solomon Code(以下簡稱RS碼)所編碼的虛擬 資矾中,並且仍然能夠保持Rs碼的錯誤更正特性。rs 編碼是由Reed和Solomon在I960年所發表的一種錯誤 檢查碼,目前在通訊系統中使用相當廣泛。詳言之,一 個錯誤可更正的(n’k)RS碼指的是長度為k的原始資料, 經過編碼後成為長度n的資料碼,當這些資料碼在傳輸 過程中出現t=(n-k)/2個以下錯誤時,可以經击一定的程 序將錯誤還原’其細節可參考Β· Wicker and V.K.Bhargave, Reed-Solomon Codes and Their Applications,1994,此處 不再贅述。 15 ( CNS ) Α4» ( 210X297^7In this embodiment, the information hiding technology is mainly used on the transfer wheel where the sender A sends the document itself and its ownership certificate to the receiver B. Therefore, the 'document' (MJ is regarded as virtual information, and the proof of ownership (Α⑽ 丨 INF〇j) is regarded as secret information. In addition, in this embodiment, the secret information is hidden in a Reed-Solomon Code (hereinafter referred to as RS code)). The coded virtual information can still maintain the error correction characteristics of the Rs code. The rs code is an error check code published by Reed and Solomon in I960. It is currently widely used in communication systems. In detail, a Error-correctable (n'k) RS codes refer to the original data of length k. After encoding, they become data codes of length n. When these data codes are transmitted, t = (nk) / 2 or less errors occur. You can restore the error by clicking a certain program. For details, please refer to Beta Wicker and VKBhargave, Reed-Solomon Codes and Their Applications, 1994, which will not be repeated here. 15 (CNS) Α4 »(210X297 ^ 7

經濟部中央標準局員工消費合作社印製 402713 所示’發文方具有資訊隱藏處理器η、 為碼器14和第二RS編碼器16’·收文方B中則 具有對應的資訊抽取處理器22 、 二RS解碼器26。其中’第一 R S解馬器24和第 的編碼器,第—以解碼器對=147cRS(ni’ki) θ * ^ 24為其對應的解碼器;第二 ’第二RS解碼器26 文件%經過第一 RS編喝器14進行以㈨編 碼後的貧料碼’以及所有權證明AQs{iNFQi}經過第 編石㈣16進行啊…編石馬後的資料瑪,分別送—入資 職藏處理器12。在資訊隱藏處理器12中則包括一产 機,產生器’其利用一金鑰、做為隨機種子如响,產 生:系列在文件Mi編碼後資料碼中的相關位置,用以 表不所有權證明編碼後資料碼所要插入的 :入合併的處理後,可產生-合併的偽《料,透過1 傳送到收文方B。另外,在收文方0的資訊抽取處理器 22中’也是採用相同的金鑰、來產生相同的位置序列。 ^圖所示,傳制蚊方B的㈣資料,可以直接透過 第二RS解碼器24進行解碼,產生所需要的文件%。 另—方面’資訊抽取處理ϋ 22透過相同的麵h,可 ,以產生實際插入的位置序列,藉此解出所有權證明的資 料碼。最後再利用第二.Rs解碼器26,解出所需要的所 有權證明AoJINFOJ。The Consumer Cooperative of the Central Bureau of Standards of the Ministry of Economic Affairs printed 402713 'The sender has an information hiding processor η, is the encoder 14 and the second RS encoder 16'. The receiver B has a corresponding information extraction processor 22, Two RS decoders 26. Among them, the “first RS decoder 24 and the first encoder, the first—decoder pair = 147cRS (ni'ki) θ * ^ 24 as its corresponding decoder; the second” second RS decoder 26 file% After the first RS editor and drinker 14 carries out the poor material code after 后 encoding, and the proof of ownership AQs {iNFQi} is performed through the first editor ㈣16 ... The data horse after the edit of the horse is sent separately to the occupational processor 12. The information hiding processor 12 includes a production machine, which uses a key as a random seed to generate a series of relevant positions in the data code after the Mi encoding of the file, which is used to indicate the proof of ownership. The data code to be inserted after encoding: After being merged, a pseudo-material that is merged can be generated and transmitted to the receiver B through 1. In addition, the information extraction processor 22 of the receiver 0 also uses the same key to generate the same position sequence. ^ As shown in the figure, the maggot data of the mosquito recipe B can be directly decoded by the second RS decoder 24 to generate the required file%. On the other hand, the information extraction process ϋ 22 can generate the sequence of positions actually inserted through the same face h, thereby solving the data code of the proof of ownership. Finally, the second .Rs decoder 26 is used to solve the required ownership certificate AoJINFOJ.

402713 --- 五、發明説明f /6 在使用RS(ni,k)對 忍的可更正錯誤數量為二;進行編料,所容 傳輸時所需要的可更正f誤數乂/2 °此時’假設在實際 以用來進行資料障藏的=為〜(其小於…所以可 心了貝机、臧的資料空間 度來看,也就是所有權證明 另一個角 進杆鎞满% 私士》 os( NF0J在經過RS(n2,k2) ::碼後的所有賢料量%,必須要 =況下’即使在實際資料傳輸時有tp個錯誤,甚。至 :時全部存在於所有權證明A〇s{卿〇j所插入的位置 ^仍f可以利用RS碼的錯誤更正能力來進行更正的 =’ t生正確的f料碼。此時,所有權證明AQs{膽〇i} 的原始 料長度k2St-3t。在眚降虛田 一 p在貫際應用上’ tp值可以根據 貫際傳輸環境來決定,而 足向ni ki、n2、k2則是由文件本 身以及其所有權證明的實際大小來決定。 本案所述之資訊隱藏技術以RS編碼技術為例,但 本發明亦可適祕其他具有錯誤更正功能的編碼方法。 舉例說明如下:假設圖4中’第—RS編碼器14為一 rs (1024, 512)編碼器,因而具有 t= ( 1〇24—512) /2 = 256 經濟部中央標準局員工消費合作社印製 位元錯誤更正功能。假設傳輸實際可能發生之錯誤數為 tp=56位元,故可隱藏資訊數為256 一 56=2〇〇位元。假 設Aos{INFO}經第二RS編碼器16編碼後為一 2〇〇位元, 此時資訊隱藏處理器12可由KH,決定200個位置,將 第二RS編碼器16之編碼結果(2〇〇 bits ),取代第一 rs 編碼器14中由ΚΗ決定的200對應的位置。由KH決定 位置的過程’可經由適當的雜湊函數處理。為方便說明, 17 本紙張尺度適用中國國家標準(CNS ) A4規格(210X297公釐)402713 --- V. Description of the invention f / 6 When using RS (ni, k), the number of correctable errors that can be tolerated is two; the number of correctable f errors required for transmission is 乂 / 2 ° this Shi's assumption is that in practice, the data used for data hiding = is ~ (It is less than ... So it ’s okay to see the data space of the shell machine and the zang. From the perspective of the data space, that is, the proof of ownership is another corner full. os (NF0J after passing RS (n2, k2) ::% of all the material content%, must be = case 'even if there are tp errors in the actual data transmission, and even: all exist in the proof of ownership A 〇s {卿 〇j inserted position ^ f can still use the RS code error correction ability to make corrections = 't produce the correct f material code. At this time, the original material length of the proof of ownership AQs {胆 〇i} k2St-3t. In the application of the surging virtual field p, the tp value can be determined according to the transmission environment, and the direction ni ki, n2, and k2 are determined by the actual size of the file itself and its proof of ownership. The information hiding technology described in this case uses RS coding technology as an example, but the present invention can also be applied to other technologies The encoding method of the error correction function. An example is as follows: Assume that the "# -RS encoder 14 in Fig. 4 is an rs (1024, 512) encoder, so it has t = (104-512) / 2 = 256 Ministry of Economic Affairs The Central Standards Bureau staff consumer cooperative prints the bit error correction function. Assume that the actual number of errors that may occur during transmission is tp = 56 bits, so the number of hideable information is 256-56 = 200 bits. Assume Aos {INFO} After being encoded by the second RS encoder 16, it is 200 bits. At this time, the information hiding processor 12 can determine 200 positions by KH, and replace the encoding result (200 bits) of the second RS encoder 16. The position corresponding to 200 determined by KΗ in the first rs encoder 14. The process of determining the position by KH can be processed by an appropriate hash function. For the convenience of explanation, 17 This paper size applies the Chinese National Standard (CNS) A4 specification (210X297 Mm)

4Q27U4Q27U

五、發明説明(/6) ^/中Kh直接列舉所有隱藏資訊的位置’舉例說明如 〇 :-郎編瑪器14輸出如下:⑷…。。…。 第二RS編碼器16輸出如下:(ι 1 0 0 0 )V. Description of the invention (/ 6) ^ / Kh directly lists all the positions of the hidden information 'as an example, such as 〇:-The Lang editor 14 output is as follows: ⑷ ... . …. The output of the second RS encoder 16 is as follows: (ι 1 0 0 0)

Kh 如下' 資訊隱藏處理器12可將第一 Φ ^ ^ 弟RS編碼态14的輸出 中弟,,6, 8, 9位元,依次帶換為第二Rs編碼器16 的輸出,故資訊隱藏處理器12之輸出應為:(Qi 〇 go ^0 〇…);並進行資料傳輸。 ~ 接收方在取得上述資料後,經由第- RS解石馬器24 可解碼取得文件M。另一方面,上述資料送入資訊抽取 處理器22.後,資訊抽取處理器22可根據^決定隱藏 貝5fL之位置(1,3, 6, 8, 9,…),將其相對應位置資訊取出 (1 1 0 0 0 …),即可獲得 A〇s{INF〇}。 第5圖表示本發明第二實施例中之文件傳輸系統中 的資料流圖,其與第2圖所示的情況大致相同,兩者間 僅在於13以13加以取代,亦即所有權證明是利用資訊 經濟部中央標準局員工消費合作社印製 隱藏技術隱藏在文件的内容中。各傳輸的詳細内容表示 如下: (11) A->TKC : A〇p (12) A—TSA : TSAp[Kat],Kh is as follows' The information hiding processor 12 can convert the output of the first Φ ^ ^ ^ RS code state 14 to the middle digit, 6, 8, 9 bits, in order to the second Rs encoder 16 output, so the information is hidden The output of the processor 12 should be: (Qi 〇go ^ 0 〇 ...); and perform data transmission. ~ After receiving the above information, the receiver can decode and obtain the file M via the -RS calcite horse 24. On the other hand, after the above data is sent to the information extraction processor 22., the information extraction processor 22 can determine the position (1, 3, 6, 8, 9, ...) of the hidden shell 5fL according to ^, and the corresponding position information Take out (1 1 0 0 0…), you can get A〇s {INF〇}. FIG. 5 shows a data flow diagram in the file transfer system in the second embodiment of the present invention, which is substantially the same as the situation shown in FIG. 2 except that 13 is replaced by 13, that is, the proof of ownership is used The hidden technology printed by the Consumer Cooperatives of the Central Standards Bureau of the Ministry of Information Economy is hidden in the contents of the document. The detailed contents of each transmission are shown as follows: (11) A- &TK; TKC: A〇p (12) A-TSA: TSAp [Kat],

Kat(A ’ TSS ’ Si,INFO; ’ Aos{H(INF〇i)}), AS{H(A ’ TSS ’ Si,INFOj,AoJHCINFOi)})} 18 本紙張尺度適用中國國家標率(CNS ) A4規格(21〇Χ:297公釐) 402713 a7 ____ B7 五、發明説明(/7 ) (13,)A->B : Bp[Kab,KH],Kat (A 'TSS' Si, INFO; 'Aos {H (INF〇i)}), AS {H (A' TSS 'Si, INFOj, AoJHCINFOi)})} 18 This paper standard applies to China's national standard (CNS ) A4 specification (21〇 ×: 297 mm) 402713 a7 ____ B7 V. Description of the invention (/ 7) (13,) A- > B: Bp [Kab, KH],

Kab(A,B,ΚΗ<Μί,AoJINFOi}〉)’ AS{H(A,B,K/Mi,Ac^INFOJ〉)} (14) TSA-^TKC : TKCP[KXT] » KTT(TSA,TKC,RTSA,A,AodHQNFOi)}) ’ TSAs{H(TSA,TKC,RTSA,A,AoJEKINFOi)})} (15) TKC—TSA : KTT(TKC,TSA,RTSA ’ A,H(INF〇i)), TKCS{H(TKC,TSA,A,HQNFOi))} 其中,KH<Mi,Aos{INF〇i}>表示將所有權證明 Aos{INF〇i}隱藏在文件Μ;的偽裝資料。藉此,在使用RS 碼進行文件傳輸的情況下,可以將所有權證明直接隱藏 在一般文件的傳輸過程中,在不需要額外處理所有權證 明的情況下,達到簡化文件處理的作業。 .本發明雖以一較佳實施例揭露如上,然其並非用以 限定本發明,任何熟習此項技藝者,在不脫離本發明之 精神和範圍内,當可做些許的更動與潤飾,因此本發明 之保護範圍當視後附之申請專利範圍所界定者為準。 — .!'-----__ Mfel· 5 J (請先閱讀背面之注意事項再填寫本頁) I ΙΕΙ..-ΕΕΕ·~1_Ι1-Ι 經濟部中央標準局員工消費合作社印製 本紙張尺度適用中國國家標準(CNS ) A4規格(210X297公釐)Kab (A, B, KΗ < Μί, AoJINFOi}>) 'AS {H (A, B, K / Mi, Ac ^ INFOJ>)} (14) TSA- ^ TKC: TKCP [KXT] »KTT (TSA, TKC, RTSA, A, AodHQNFOi)}) 'TSAs {H (TSA, TKC, RTSA, A, AoJEKINFOi)})) (15) TKC-TSA: KTT (TKC, TSA, RTSA' A, H (INF〇i )), TKCS {H (TKC, TSA, A, HQNFOi))} Among them, KH < Mi, Aos {INF〇i} > indicates that the ownership certificate Aos {INF〇i} is hidden in the file M; In this way, in the case of using the RS code for file transmission, the ownership certificate can be directly hidden in the general file transmission process, and the operation of simplifying file processing can be achieved without additional processing of the ownership certificate. Although the present invention is disclosed as above with a preferred embodiment, it is not intended to limit the present invention. Any person skilled in the art can make some modifications and decorations without departing from the spirit and scope of the present invention. The protection scope of the present invention shall be determined by the scope of the attached patent application. —.! '-----__ Mfel · 5 J (Please read the notes on the back before filling out this page) I ΙΕΙ ..- ΕΕΕ · ~ 1_Ι1-Ι Printed by the Consumers' Cooperative of the Central Bureau of Standards of the Ministry of Economic Affairs This paper is suitable for China National Standard (CNS) A4 specification (210X297 mm)

Claims (1)

402713 經 濟 央 標 準 局 員 工 消 合 作 社 、申請專利範圍 、1 一種具有所有權證明保護機制之文件傳輸方法, 用以在-發文方和一收文方之間傳遞至少一待傳文 其包括下列步驟: 正單:存該發文方之一所有權證明驗證金鑰於-第一公If 由該發文方送出該待傳文件至該收文方並且送 二別對應於該待傳文件之稽核資訊和簽署資訊至一第二 ’其中簽署資訊係透過該發文方之-所有權證 ,鑰所編碼產生,該所有權證明驗證金鑰和該所 有權證明簽署金鑰為對應金鑰; 位該第二公正單位送出該簽署資訊至該第一公正單 Α正單位根據所儲存的該發文方之該所有權 驗-=’一驗證該第二公正單位所傳來之該簽署資訊; 位;:及一公正單位將驗證結果傳送至該第二公正單 當驗證結果表示正確時,該第二公正單位將稽核資 =存於1放式儲存裝置中,用以提供該收文方稽核 立中^待tir利範圍第1項所述之文件傳輸方法’ 關ΓΓ 應之各稽核資訊間具有—既定數學 關係,用以保持各稽核資訊間的順序性。 3.如申請專利範圍第1項所述之文件傳輸方法, 其中在儲存該發文方之所有權證明驗證金=一公 2〇 Μ402713 Employees' cooperatives of the Central Bureau of Economic Standards, patent application scope, 1 A file transfer method with a proof of ownership protection mechanism, used to pass at least one pending message between the sender and a recipient, which includes the following steps: : Save one of the issuers' proof of ownership verification key in the first public. If the issuer sends the document to be transmitted to the receiver and send the audit information and signature information corresponding to the document to the first Second, where the signing information is generated by the issuer ’s certificate of ownership, key encoding, the proof of ownership verification key and the proof of ownership signing key are the corresponding keys; the second impartial unit sends the signing information to the The first fairness unit A is based on the stored ownership of the issuer-= '-verifies the signature information sent by the second fairness unit; and; and a fairness unit transmits the verification result to the first When the verification result is correct, the second impartial unit will store the audit funds = in a 1-level storage device to provide the recipient's audit The file transfer method described in item 1 of Lizhong ^ Tir's Scope 关 关 ΓΓ should have a predetermined mathematical relationship between the audit information to maintain the orderness between the audit information. 3. The file transfer method as described in item 1 of the scope of patent application, wherein the verification fee of the certificate of ownership of the issuing party is stored = one public 20 Μ 頁 ιτ 本紙張尺度適用中關家Α4祕Τ1ϋ297公釐)- k濟部中央標準局員工消費合作社印製 402713 1 , D8 六、申請專利範圍 正單位之步驟中,係由該發文方透過離線方式,註冊該 所有權證明驗證金鑰於該第一公正單位。 4·如申請專利範圍第1項所述之文件傳輸方法, 其中該待傳文件中之第一份文件所對應之稽核資訊包括 該發文方之辨識碼、該第一份文件之文件序號和彙記資 料、以及利用該發文方之一簽章私密金鑰,對於該發文 方之辨識碼和該第一份文件之文件序號的數位簽章,並 且該待傳文件中之其他文件所對應之稽核資訊分別包括 該發文方之辨識碼、該其他文件之文件序號和彙記資 料,以及該所有權證明驗證金鑰和前一份文件之囊記資 料的互斥或值。 5·如申請專利範圍第1項所述之文件傳輸方法, 其中由該發文方傳送該稽核資訊至該第二公正單位之步 驟中,該稽核資訊係利用該發文方之一私密金鑰進行編 碼,在該第二公正單位接收該稽核資訊後,利用對應於 該私密金鑰之一公開金鑰進行解碼,解出該稽核資訊。 6.如申請專利範圍第1項所述之文件傳輸方法, 其中該簽署資訊是由該稽核資訊之彙記資料,利用該所 有權證明簽署金鑰所編碼產生。 7 ·如申請專利範圍第1項所述之文件傳輸方法, 其中由該第二公正單位傳送該簽署資訊至該第一公正單 位之步驟中,該簽署資訊係利用該第一公正單位之一私 密金鑰進行編碼,在該第一公正單位接收該簽署資訊 後,利用對應於該私密金鑰之一公開金鑰進行解碼,解 本紙張尺度適用中國國家標準(CNS ) A4規格(210X297公釐) I—I-.---—— (请先間讀背面之注意事項再填寫本頁) -訂 Λί 40271Page ιτ This paper size applies to Zhongguanjia A4 Secret T1Τ297mm)-Printed by the Consumers' Cooperative of the Central Bureau of Standards of the Ministry of Economic Affairs 402713 1, D8 VI. In the process of applying for a patent unit, the issuer will use the offline method , Register the proof of ownership verification key with the first impartial unit. 4. The file transmission method as described in item 1 of the scope of patent application, wherein the audit information corresponding to the first document in the document to be transmitted includes the identification code of the issuer, the document serial number and the exchange of the first document The data, and the digital signature of the issuer ’s identification code and the document serial number of the first document using the private key of one of the issuers, and the corresponding audit of the other documents in the document to be transmitted The information includes the issuer's identification code, the document serial number and remittance information of the other document, and the mutual exclusion or value of the proof of ownership verification key and the encapsulation data of the previous document. 5. The file transmission method as described in item 1 of the scope of patent application, wherein in the step of transmitting the audit information to the second impartial unit by the issuer, the audit information is encoded using a private key of the issuer After the second impartial unit receives the audit information, it decodes it using a public key corresponding to one of the private keys to extract the audit information. 6. The file transmission method as described in item 1 of the scope of patent application, wherein the signature information is generated by the remittance data of the audit information using the ownership certification signing key. 7. The file transmission method according to item 1 of the scope of patent application, wherein in the step of transmitting the signed information by the second impartial unit to the first impartial unit, the signed information uses the privacy of one of the first impartial units The key is encoded, and after the first impartial unit receives the signed information, it is decoded using a public key corresponding to one of the private keys. The paper size of the solution applies the Chinese National Standard (CNS) A4 specification (210X297 mm) I—I -.---—— (Please read the precautions on the back before filling this page) -Order Λί 40271 申請專利範圍 出該簽署資訊。 經濟部中央標準局員工消費合作社印裝 甘/·如巾請專利範圍第1項所述之文件傳輸方法, 其中由該發文方送出該待傳文件至該收文方之步驟中, 所㈣㈣至該收文方之步驟,該所有權證 斗、〇稽核資訊’利用該所有權證明簽署金鑰所編碼 屋生。 ”如中請專利範圍第8項所述之文件傳輸方法, 其中尚包括-資訊隱藏步驟’由該 該所有權證明併人該待傳文件後產生—偽裝資料,用= :送至該收文方;以及一資訊抽取步驟,由該收文方 仃,用以從該偽裝資料中抽出該所有權證明。 1〇·如中請專利範圍第9項所述之文件傳輸方法, 其中該資訊隱藏步驟包括下列步驟: 利用RS、編碼方式,、編碼該待傳文件,產生 一 編碼資料; 利用RS編碼方式,編碼該所有權證明,產生一第 一編碼資料; &根據-隱藏金餘和-亂數產生器,蚊在第一編碼 貝料中插入該第二編碼資料之複數位置·;以及 根據所蚊之複數位置,將該第二編碼㈣併入該 第一編碼資料,產生該偽裝資料; 並且該資訊抽取步驟包括下列步驟: 利用RS解碼方式’解闕偽裝資料,還原產生該 待傳文件; -·r - < ------------訂 (請先閲讀背面之注意事項再填寫本1) 22The scope of patent application is the signature information. Printed by the Consumer Cooperative of the Central Standards Bureau of the Ministry of Economic Affairs. The file transfer method described in item 1 of the patent scope, where the issuer sends the document to be transmitted to the recipient. The recipient's steps are to use the ownership certificate and audit information to 'use the ownership certificate to sign the housing code. "As mentioned in the patent application, the file transfer method described in item 8, which further includes-the information hiding step 'produced after the proof of ownership and the document to be transmitted-disguised information, with =: sent to the recipient; And an information extraction step for the recipient to extract the proof of ownership from the disguised information. 10. The file transmission method as described in item 9 of the patent scope, wherein the information hiding step includes the following steps : Using RS, encoding method, encoding the file to be transmitted to generate an encoded data; using RS encoding method, encoding the proof of ownership to generate a first encoded data; & according to-hidden golden surplus and-random number generator, The mosquito inserts the plural position of the second coded data in the first coded shell material; and according to the plural position of the mosquito, merges the second code into the first coded data to generate the disguised data; and the information is extracted The steps include the following steps: Use the RS decoding method to 'disassemble the disguised data and restore the file to be transmitted;-· r-< ------------ Order (please read the back first) Notes then fill out this 1) 22 A8 B8 C8 D8 經濟部中央標準局貝工消費合作社印裝 402713 申請專利範園 根據該隱藏金输和該亂數產生器,判斷出該偽裝資 料中’該第一編碼資料所插入之複數位置; 根據所判斷之複數位置,由該偽裝資料抽出該第二 編碼資料;以及 利用RS解碼方式,解碼該第二編碼資料,還原產 生該所有權證明。 11 . 一種具有所有權證明保護機制之文件傳輸系 統,用以傳遞至少一待傳文件,其包括: 、 一發文裝置,其具有該待傳文件、根據該待傳文件 所分別產生之稽核資訊、以及根據一所有權證明簽署金 鑰和該待傳文件所產生之簽署資訊; 一收文裝置,用以接收該發文裝置所送出之該待傳 文件; 一第一公正單位,用以儲存該發文裝置之一所有權 證明驗證金鑰,該所有權證明驗證錢和該所有權證明 簽署金餘為對應金錄;以及 -第二公正單位,具有一公開式儲存裝置,用以在 該發文裝置送出該待傳文件至該收文裝置時接收該發 文裝置所送出對應之該稽核資訊和該簽署資訊並且將 該簽署資訊送至該第-公正單位’ _該所有權證明驗 證金錄檢驗該簽署資訊,當該簽署資訊正確時則將其 對應之該稽核資訊儲料該公開式儲存裝置上,用以提 供該收文方稽核之用。 12.如申請專利範圍第11項所述之文件傳輸系統, 23 良紙張尺度適用中國國家標準(CNS ) ( 2败297公董- (請先聞讀背面之注$項再填寫本頁)A8 B8 C8 D8 Printed by the Central Standards Bureau of the Ministry of Economic Affairs, Shellfish Consumer Cooperative, printed 402713. The patent application park judges the plural positions in the camouflage data based on the hidden gold loss and the random number generator; According to the determined plural positions, the second encoded data is extracted from the disguised data; and the RS encoded method is used to decode the second encoded data to restore and generate the ownership certificate. 11. A file transmission system with a proof-of-ownership protection mechanism for transmitting at least one file to be transmitted, comprising:, a document issuing device having the file to be transmitted, audit information generated based on the file to be transmitted, and A signing key generated according to a certificate of ownership and signature information generated by the document to be transmitted; a receiving device to receive the to-be-transmitted document sent by the sending device; a first impartial unit to store one of the sending devices Proof of ownership verification key, the proof of ownership verification money and the balance of ownership certificate signing are the corresponding gold records; and-the second impartial unit has an open storage device for sending the to-be-transmitted document to the sending device When the receiving device receives the corresponding auditing information and the signature information sent by the sending device and sends the signature information to the-impartial unit '_ the certificate of ownership verification record checks the signature information, and when the signature information is correct, Store the corresponding audit information on the open storage device to provide the receiver's audit Purposes. 12. As for the file transmission system described in item 11 of the scope of patent application, 23 good paper standards are applicable to Chinese National Standards (CNS) (2 loses 297 public directors-(please read the note $ on the back before filling out this page) 402713 A8 B8 C8 D8 經濟部中央橾準局員工消費合作社印製 六、申請專利範園 其中該待傳文件所對應之各稽核資訊間具有一既定數學 關係’用以保持各稽核資訊間的順序性。 13.如申請專利範圍第u項所述之文件傳輸系統, 其中該待傳文件中之第一份文件所對應之稽核資訊包括 該發文裝置之辨識碼、該第一份文件之文件序號和彙記 資料、以及利用該發文方之4章私密金输,對於該發 文裝置之辨識碼和該第一份文件之文件序號的數位簽 章’並且騎敎件巾之其他文件料應之稽核資訊分 別包括該發文裝置之義碼、該其他文件之文件序號和 彙記資料,以及該所有權證明驗證金鑰和前一份文件之 彙記資料的互斥或值。 14·如申請專利範圍第㈣所述之文件傳輸系統, 其中該^署資訊是由該稽核資訊之囊記資料,利用該所 有權證明簽署金鑰所編碼產生。 15·如申請專利範圍第u項所述之文件傳輸系統, 其中該發文裝置尚包括對應於每-待傳文件之所有權證 明,其與該待傳文件—併送至該收文裝置,該所有權證 明係由對應之該稽核資訊’利用該所有權證明簽署金繪 所編碼產生。 16.如申請專利範圍第15項所述之文件傳輸系統, 其中該發文裝置包括一資訊隱藏單元,用以將該所有權 證明併人該待傳文件後產生-偽裝資料,一併送至該收 文方’該收文裝置包括一資訊插取置;m 取皁兀,用以從該偽裝 資料中抽出該所有權證明。 - · 24 - 本紙張尺度適用中國國家標準(CNS ) A4規格( 210X297公釐了〜-- (請先閲讀背面之注意事項再填寫本頁)402713 A8 B8 C8 D8 Printed by the Consumers 'Cooperative of the Central Procurement Bureau of the Ministry of Economic Affairs 6. Application for a patent park where the audit information corresponding to the document to be transmitted has a predetermined mathematical relationship' to maintain the orderliness of the audit information . 13. The file transmission system as described in item u of the scope of patent application, wherein the audit information corresponding to the first document in the document to be transmitted includes the identification code of the document issuing device, the document serial number and the sink of the first document Record the data, and use the private financial loss of Chapter 4 of the issuer, the digital signature of the identification number of the device and the document serial number of the first document, and the audit information required for other documents of the riding towel Including the code of the sending device, the serial number of the other file and the remittance data, and the mutual exclusion or value of the proof of ownership verification key and the remittance data of the previous file. 14. The file transmission system as described in the second paragraph of the scope of patent application, wherein the information of the agency is generated by the encapsulation data of the audit information and encoded by the ownership certification signing key. 15. The file transmission system as described in item u of the scope of the patent application, wherein the document issuing device further includes a certificate of ownership corresponding to each document to be transmitted, and the document to be transmitted—and sent to the document receiving device, the certificate of ownership It is generated by the corresponding audit information 'using the certificate of ownership to sign the golden picture. 16. The file transmission system according to item 15 of the scope of patent application, wherein the document sending device includes an information hiding unit for generating the disguised information after combining the certificate of ownership with the document to be transmitted, and sending it to the receipt together. Fang 'The receiving device includes an information inserting device; m extracts a message to extract the proof of ownership from the disguised information. -· 24-This paper size is in accordance with China National Standard (CNS) A4 specification (210X297mm ~~ (Please read the precautions on the back before filling this page) -訂 M、-Order M,
TW87114280A 1998-08-28 1998-08-28 A delivering system for classified documents with ownership TW402713B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
TW87114280A TW402713B (en) 1998-08-28 1998-08-28 A delivering system for classified documents with ownership

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
TW87114280A TW402713B (en) 1998-08-28 1998-08-28 A delivering system for classified documents with ownership

Publications (1)

Publication Number Publication Date
TW402713B true TW402713B (en) 2000-08-21

Family

ID=21631185

Family Applications (1)

Application Number Title Priority Date Filing Date
TW87114280A TW402713B (en) 1998-08-28 1998-08-28 A delivering system for classified documents with ownership

Country Status (1)

Country Link
TW (1) TW402713B (en)

Similar Documents

Publication Publication Date Title
ES2875391T3 (en) Issuance of virtual documents on a blockchain
CN106452756B (en) Can the safe Quick Response Code construction verification method of off-line verification and device
US10896412B2 (en) Trustless physical cryptocurrency
US6081610A (en) System and method for verifying signatures on documents
ES2275702T3 (en) DIGITAL RECEIPT OF A TRANSACTION.
ES2352743T3 (en) ELECTRONIC METHOD FOR STORAGE AND RECOVERING ORIGINAL AUTHENTICATED DOCUMENTS.
US20070168291A1 (en) Electronic negotiable documents
US6944770B2 (en) Methods and systems for generating and validating value-bearing documents
US6708893B2 (en) Multiple-use smart card with security features and method
US20140254796A1 (en) Method and apparatus for generating and/or processing 2d barcode
JP3853528B2 (en) Authentication management system and authentication management method
GB2423854B (en) Portable security transaction protocol
BRPI0411286B1 (en) system for authenticating a cardholder business transaction with a merchant on an electronic network; data structure to carry information and method for business transaction authentication
JP2004023796A (en) Selectively disclosable digital certificate
NO332206B1 (en) Document authentication method and device
TW200813846A (en) Radio frequency identification system and method
JPH03505032A (en) Card computer control system
US20110296191A1 (en) Method for securely drawing up a virtual multiparty contract capable of being physically represented
GB2297856A (en) Electronic negotiable documents
TWI578253B (en) System and method for applying financial certificate using a mobile telecommunication device
US20050021474A1 (en) System for authenticating self-authenticating documents
JPH10135943A (en) Portable information storage medium, verification method and verification system
US11070378B1 (en) Signcrypted biometric electronic signature tokens
EP0808535B1 (en) Electronic negotiable documents
JPH09223210A (en) Portable information storage medium and authentication method and authentication system using the same

Legal Events

Date Code Title Description
GD4A Issue of patent certificate for granted invention patent
MM4A Annulment or lapse of patent due to non-payment of fees