AR120392A1 - Método y código para la autenticación de documentos - Google Patents

Método y código para la autenticación de documentos

Info

Publication number
AR120392A1
AR120392A1 ARP200103062A ARP200103062A AR120392A1 AR 120392 A1 AR120392 A1 AR 120392A1 AR P200103062 A ARP200103062 A AR P200103062A AR P200103062 A ARP200103062 A AR P200103062A AR 120392 A1 AR120392 A1 AR 120392A1
Authority
AR
Argentina
Prior art keywords
document
visual mark
token
identity
card
Prior art date
Application number
ARP200103062A
Other languages
English (en)
Inventor
Alex Breton
Original Assignee
Colop Digital Gmbh
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Colop Digital Gmbh filed Critical Colop Digital Gmbh
Publication of AR120392A1 publication Critical patent/AR120392A1/es

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/16Program or content traceability, e.g. by watermarking
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/33User authentication using certificates
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/321Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
    • H04L9/3213Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority using tickets or tokens, e.g. Kerberos
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2151Time stamp
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/60Digital content management, e.g. content distribution
    • H04L2209/608Watermarking

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Multimedia (AREA)
  • Technology Law (AREA)
  • Editing Of Facsimile Originals (AREA)
  • Accessory Devices And Overall Control Thereof (AREA)
  • Facsimiles In General (AREA)
  • Storage Device Security (AREA)
  • Document Processing Apparatus (AREA)
  • Credit Cards Or The Like (AREA)

Abstract

Método y ficha (3) para corroborar un documento (25), el método comprende: tener una ficha registrada (3) con una identidad de la ficha, donde la ficha (3) es capaz de imprimir marcas visuales, obtener (18) un identificador de documentos basado en al menos la identidad de la ficha y un registro horario, codificar (19) al identificador del documento en una marca visual (24), aplicar la marca visual (24) al documento (25), obtener (27) una copia del documento (25) con o sin la marca visual (24), y almacenar la copia asociada con el identificador del documento. La ficha (3) comprende un almacenamiento que contiene una identidad de la ficha y una unidad de impresión, donde la ficha está configurada para recibir una marca visual (24) que codifica un identificador del documento asociado con la identidad de la ficha y para imprimir la marca visual recibida (24). Y método para verificar un documento (41) que tiene una marca visual correspondiente (42).
ARP200103062A 2019-11-04 2020-11-04 Método y código para la autenticación de documentos AR120392A1 (es)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
EP19206951.6A EP3816828A1 (en) 2019-11-04 2019-11-04 Method and token for document authentication

Publications (1)

Publication Number Publication Date
AR120392A1 true AR120392A1 (es) 2022-02-09

Family

ID=68426329

Family Applications (1)

Application Number Title Priority Date Filing Date
ARP200103062A AR120392A1 (es) 2019-11-04 2020-11-04 Método y código para la autenticación de documentos

Country Status (7)

Country Link
US (1) US20220414199A1 (es)
EP (2) EP3816828A1 (es)
JP (1) JP2023500496A (es)
CN (1) CN114600103A (es)
AR (1) AR120392A1 (es)
BR (1) BR112022007110A2 (es)
WO (1) WO2021089598A1 (es)

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070050696A1 (en) * 2003-03-31 2007-03-01 Piersol Kurt W Physical key for accessing a securely stored digital document
US8037310B2 (en) 2004-11-30 2011-10-11 Ricoh Co., Ltd. Document authentication combining digital signature verification and visual comparison
US7999657B2 (en) * 2009-12-07 2011-08-16 Konica Minolta Systems Laboratory, Inc. Image registration method for image comparison and document authentication
US9268969B2 (en) * 2013-08-14 2016-02-23 Guardtime Ip Holdings Limited System and method for field-verifiable record authentication
US10110385B1 (en) * 2014-12-22 2018-10-23 Amazon Technologies, Inc. Duress signatures
WO2016113694A1 (en) * 2015-01-16 2016-07-21 Atul Gupta Document verification system

Also Published As

Publication number Publication date
JP2023500496A (ja) 2023-01-06
EP3816828A1 (en) 2021-05-05
WO2021089598A1 (en) 2021-05-14
CN114600103A (zh) 2022-06-07
US20220414199A1 (en) 2022-12-29
EP4055501A1 (en) 2022-09-14
BR112022007110A2 (pt) 2022-07-05

Similar Documents

Publication Publication Date Title
BR112017017518A2 (pt) sistema de registro de documento seguro encoberto
SG11201906389RA (en) Information authentication method and system
PH12015502548A1 (en) Apparatus and method for reading a document and printing a mark thereon
EA201690449A1 (ru) Система подтверждения подлинности финансовых инструментов и документов
RU2012149425A (ru) Способ и устройство для обеспечения безопасности документов
AR105404A1 (es) Sistema y método para validar la autoría de una sesión de firma electrónica
CN102509142A (zh) 一种验证印章用章事实及印鉴真伪的防伪方法
JP2017526195A5 (es)
CO2020011909A2 (es) Método y sistema de verificacion automática de la autenticidad de documentos
AR120392A1 (es) Método y código para la autenticación de documentos
Winter et al. Securing physical documents with digital signatures
Musviyanti et al. Women on board, firm size and cash holding: Empirical evidence from the developing country
CL2020001065A1 (es) Método de autenticación de un documento de identidad de un individuo y opcionalmente autenticación de dicho individuo
DE602008001949D1 (de) Werkzeug zur Authentifizierung von Dokumenten, Anwendungsverfahren dieses Werkzeugs und der Dokumente, die mit diesem/diesen Verfahren erzeugt wurden
CN101226578B (zh) 一种文件信息隐藏与识别追踪的方法及装置
EA200100193A1 (ru) Способ подтверждения подлинности информации
BR112018076405A2 (pt) sistema de provisionamento, assinatura e verificação de documento eletrônico, método de provisionamento e assinatura de documento eletrônico e método de verificação de autenticidade de documento eletrônico
Hatmawan et al. Saving behavior in Islamic banking the moderation religiosity
AR118174A1 (es) Credencial de acceso verificable
Herli FACTORS AFFECTING FINANCIAL PERFORMANCE OF VILLAGE OWNED ENTERPRISES: A CASE STUDY IN THE DISTRICT OF ROCK SUMENEP
RU2591655C1 (ru) Способ контроля целостности и подлинности электронных документов текстового формата, представленных на твердых носителях информации
CN108875870B (zh) 二进制图形编码的创建、认证方法及系统
MX2021003495A (es) Sistema y metodo de identificacion automatica de documentos fotocopiados.
WO2019155309A3 (en) Signing method system and/or device
Soleh Factors Causing Legal Inefective Rule Making Procedures