CN101329750A - Method for generating and verifying anti-false stamp with file content protection function - Google Patents

Method for generating and verifying anti-false stamp with file content protection function Download PDF

Info

Publication number
CN101329750A
CN101329750A CNA2008100484945A CN200810048494A CN101329750A CN 101329750 A CN101329750 A CN 101329750A CN A2008100484945 A CNA2008100484945 A CN A2008100484945A CN 200810048494 A CN200810048494 A CN 200810048494A CN 101329750 A CN101329750 A CN 101329750A
Authority
CN
China
Prior art keywords
seal
information
sealer
content
check
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CNA2008100484945A
Other languages
Chinese (zh)
Other versions
CN101329750B (en
Inventor
肖攸安
刘泉
周祖德
李方敏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Wuhan University of Technology WUT
Original Assignee
Wuhan University of Technology WUT
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Wuhan University of Technology WUT filed Critical Wuhan University of Technology WUT
Priority to CN2008100484945A priority Critical patent/CN101329750B/en
Publication of CN101329750A publication Critical patent/CN101329750A/en
Application granted granted Critical
Publication of CN101329750B publication Critical patent/CN101329750B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Abstract

The invention relates to a generation and verification method of an anti-fake seal, with a protection function to document contents. The method comprises three stages of a key generation stage, a document sealing stage and a seal verification and identification stage, wherein, in the key generation stage, through the cooperation of a seal issuing mechanism and a seal affixer, a private seal key which is only known by the sealer, information which is to be identified by the seal and a public key verification code, and a public verification key of the sealer which is publicly available are generated and the stage can undergo during the registration of a user; in the document sealing stage, the sealer seals a document required to be sealed according to the demand; in the seal verification and identification stage, the identity of the document sealed is verified. The method also has the advantages of verifiability, tampering resistance and counterfeit resistance of the content of electronic signature technology as well as the visual advantage of the traditional seal, and successfully overcomes the shortcoming of the existing sealing system. The generation and verification method can be widely applied to the occasions that require seal and signature such as document counterfeiting resistance, certificate counterfeiting resistance, instrument counterfeiting resistance, etc.

Description

Security stamp with file content protection function generates and verification method
Technical field
The invention belongs to electronic information technology and field of computer technology, is that a kind of security stamp with file content protection function generates and verification method specifically.
Background technology
From " imperial jade seal " of historical emperor's special use, " official prevents great seal ", scholar poet's " the collected books chapter " and " painting and calligraphy chapter " of office of yamen, until the seal of the units at different levels of today, individual's signet, seal is being played the part of considerable role always.As proof of identification with confirm one of important means of expression, seal not only has the legal effect equal with handwritten signature, but also the switch order function of the power that realized affixing one's seal, promptly the owner of seal can the through committing others come " affixing one's seal " as representative.But, because seal designs is simple in structure, font specification makes people be easy to carve up to the mark seal and comes out, this causes falsification of seal to become easy, so falsification of seal and file content, usurps seal or the abuse seal phenomenon of swindling happens occasionally.
In order to solve the anti-pseudo problem of seal, various anti-counterfeit method for stamp have appearred now, for example: the patent No. is that 200410013443.0 Chinese patent " the anti-digital special seal of anti-counterfeiting of usurping " and application number are that 200710049646.9 Chinese patent application " automatic counting type signet " discloses a class install numbering machine additional in seal, control the number of times of affixing one's seal by automatic numeration, and then reach the affix one's seal purpose of behavior of control, but these two kinds of methods rely on strict management system strongly, thereby very impracticable.Application number be 02125942.9 Chinese patent application " water print anti-fake stamp " disclose a kind of seal that utilizes macromolecular material to cover to contain specific watermark carry out false proof, so its cost costliness.The patent No. is that 99108170.6 Chinese patent " a kind of visual not and seal and engrating process thereof that can the authorization information true and false " has been announced a kind of use miniature carving technology, installs concealed fluorescent liquid on seal additional, utilizes ultraviolet ray to come false proof seal, complicated operation.The patent No. is that 200410069296.9 Chinese patent " perspective information anti-fake print and verification tool thereof and verification method and security stamp " discloses a kind of security stamp based on perspective information anti-fake print; The patent No. is that 92111127.4 Chinese patent " a kind of seal and method for production thereof that has the body local characteristic pattern ", the patent No. are that Chinese patent " anti-counterfeit method for stamp " that 96111545.9 Chinese patent " manufacturing the method and the seal thereof of anti-fake finger print stamp " and application number are 02135846.X_ has announced that all a class uses the human body fingerprint pattern to carry out seal making method false proof and that differentiate, but fingerprint pattern is forged too easily, and is therefore also impracticable.Application number is 00104581.4 Chinese patent application " discrimination method of the seal true and false ", application number is 00114155.4 the Chinese patent application " making of computer network seal, use, network validation and monitoring and managing method " and application number be that 00119300.7 Chinese patent application " a kind of engrating process of seal and computer control infosystem thereof " all discloses a class by add extraneous information string (seal verification yard) for seal, mode by on-line equiries (Help by Phone or network inquiry) is differentiated the method for the seal chapter surface information true and false, but is forged equally easily.Above-mentioned these methods have passes through to revise seal structure; with pass through to use special material; what have passes through the miniature carving technology; what have utilizes human body biological characteristics; what have passes through extras, and what also have passes through the true and false that seal is protected in on-line equiries, but because these anti-counterfeit method for stamp cost costlinesses; use loaded down with trivial details, thereby very impracticable.Along with the progress of scanning, engraving and printing technique, imitated these seal designs no longer have been difficult.In addition,, therefore have these methods now and can not prevent distorting of file content, can not fundamentally solve forgery, abuse and usurp the problem of seal because seal designs and file content that these methods generated do not have direct correlation.
Along with the development of infotech, in the every field relevant with information such as e-commerce system, electronic government affairs system, information safety system, network communicating system, electronic signature technology is one of extremely basic technology.It has simulated the function of real-life handwritten signature, not only have abilities such as authentication, source discriminating, resisting denying, anti-forgery, and can also carry out integrated authentication to the data text, and can guarantee authenticity, security, reliability and the legitimacy of electronic message, thereby has very significant meaning for the normal operation of guarantee information system.In many countries, comprise China, electronic signature has all obtained jurally admitting that its security is beyond any doubt.But in actual life, seal still is people's a custom, so how add abilities such as the authentication that is similar to electronic signature, the discriminating of originating, resisting denying, anti-forgery for common seal, guarantee authenticity, security, reliability and the legitimacy of the content of paper document, thoroughly solve that file is distorted, seal is forged, seal is usurped or problem such as seal abuse, will have very significant meaning for the safe operation that ensures social life.
At present, effort through the lot of domestic and foreign scholar, some solutions have appearred, for example: the patent No. is 200310115956.8 Chinese patent " two-dimensional bar code anti-fake bill special seal and anti-fake bill information are veritified network system ", application number is 00138013.3 patented claim " a kind of 2 D-code seal ", application number is that 200610038420.4 patented claim " two-dimensional encrypted seal " and application number are that 200610056931.9 patented claim " two-dimensional encrypted seal " has announced that all a class utilizes the two-dimension code figure to store wright's information of seal, contents such as owner's information and anti-counterfeiting characteristic information, use special-purpose deciphering equipment by online query or manually judge the true and false of seal than reciprocity mode, its shortcoming is that the two-dimension code figure only is used to guarantee the true and false of seal chapter surface information, therefore can't guarantee that the file content of being signed and issued is not distorted, also uncontrollable behavior of usurping and abusing seal; In addition, along with the development of infotech, the lawless person can forge seal by methods such as scanning, printing and engravings according to the seal designs that is obtained fully.
The patent No. is that 99816827.0 Chinese patent " legitimacy protection of electronic document and printed copy thereof " has been described a kind of a kind of method and apparatus of protecting electronic media and paper medium document legitimacy.This method adopts special sensitization or photosensitive composition, and the digital signature of document and synopsis are appended in the photosensitive material specific in the document, uses specialized equipment to differentiate and extract, and has increased application cost greatly.The described equipment complexity of this method, method is loaded down with trivial details, thereby very impracticable.Application number be 5388158 and 2001037455 United States Patent (USP) all described a class with the Word message of document behind overcompression, scrambled, use two-dimensional bar code or digital watermark technology, be stored in the specific region of paper document separately, be used to realize that the safety of paper document produces and discriminating.But these class methods have two defectives, the one, and for the user, institute's canned data is recessive, if there is not specialized equipment, the user can't directly obtain relevant authentication information; The 2nd, these two kinds of authentication patterns that method generated do not possess seal shape commonly used, deviate from people's use habit fully, thereby practicality are relatively poor.
Application number be 200310103202.0 Chinese patent " a kind of new anti-counterfeiting method for file of affixing one's seal " disclose a kind of HASH of utilization function with the file characteristic value be placed in the seal impression external carry out false proof; its shortcoming is because the HASH function is disclosed; its operation result is only relevant with file content; and it is irrelevant with user key; therefore anyone can forge document and seal according to file content, does not possess false proof and protective capability.Application number is that the Chinese patent application " based on the digital sealing system of public key algorithm " of 02125320.X discloses a kind of digital sealing system based on public key algorithm, be characterized in utilizing digital signature technology, by the network on-line inquiry mode, by manually comparing the authenticating documents and the seal true and false by data.Application number is that 02116778.8 Chinese patent application " a kind of new anti-counterfeit method for stamp " discloses a kind of compress-encrypt technology of utilizing and deposits the graph text information of file in bar code or two-dimension code, by the network on-line inquiry mode, by the method for manually comparing the authenticating documents content true and false by data.Therefore these two kinds of methods depend on network strongly, do not having network, can't differentiate and verify under network is relatively poor or network interrupts the situation.
Application number is that 200310109857.9 Chinese patent application " digital sealing system " then discloses a kind of security stamp system based on digital watermark technology, be characterized in carrying out digital signature by key content to document, the signature result is embedded among the seal image in the mode of digital watermarking, reading watermark by special extras differentiates, thereby cost costliness, be subjected to various interference easily, and impracticable.
And the patent No. is 03114673.2 Chinese patent " a kind of method for designing of digital electric seal ", the patent No. is 01132372.8 Chinese patent " a kind of digital anti-fake method ", the patent No. is 200310109482.6 Chinese patent " application process of timestamp in remote signature system ", the patent No. is 200510021291.3 Chinese patent " based on the generation and the verification method of the E-seal of fragile watermark ", the patent No. is 200510027649.3 Chinese patent " method of number of files word signature and realization E-seal and handwritten signature ", application number is that 200710067643.8 Chinese patent application " a kind of electronic signature authentication method in conjunction with digital certificate and seal " all depend on the trusted third party authentication center strongly, can only be used for based on network electronic transaction, environment such as E-Government can't satisfy the anti-counterfeit of seals demand of actual life.
The term explanation:
Employed relational language is described as follows among the present invention:
The power of attorney: the original owner who refers to the right of affixing one's seal authorizes the file that the sealer exercises the right of affixing one's seal, and it comprises the contents such as usable range, term of life and other relevant authorization details of seal.
Seal identifying information: be used for everyone identity of identifying stamp for information about.For private seal, the seal identifying information comprises that name, telephone number, address, the identification card number of seal identification serial number, seal everyone (being the sealer), valid period, seal usable range and restriction, the seal of seal sign and issue the contents such as information of mechanism.For the unit official seal, the seal identifying information comprises organizational structure's sign indicating number of seal identification serial number, organization, WorkPhone, the contact person of unit, unit address, unit and the information that legal person's code, unit network address, seal are signed and issued mechanism, the valid period of seal, mandate sealer name, telephone number and power of attorney's content of this seal.And for procurator's seal, the seal identifying information comprises the valid period of seal identification serial number, agent's name, telephone number, address, identification card number, power of attorney, seal, information that seal is signed and issued mechanism and former owner's contents such as seal identifying information.
High-Dimensional Bar Code: canned data is different in one direction with bar code, and High-Dimensional Bar Code can make full use of the bar code pattern space, canned data on a plurality of directions.Known High-Dimensional Bar Code comprises types such as 1.5 dimension bar codes, two-dimensional bar, colorful two-dimensional bar code, three-dimensional barcode at present.
The private key of affixing one's seal: be used to finish the private cipher key of the process of affixing one's seal, generated by sealer oneself, thereby have only sealer oneself to know this key, need keep properly, can not reveal, anyone not will be appreciated that the value of this key for other.
Whether legal verification public key: verification public key is signed and issued mechanism and sealer's cooperation by seal and is produced, be used for for any third-party authentication file key of affixing one's seal, thereby can openly issue by all means.
Critical area: be used to judge the important area of the file content true and false, as synopsis, keyword, critical data etc.
Summary of the invention
The object of the present invention is to provide a kind of trusted third party authentication center that need not; need not network support; can in electronic document and paper document, generate and verify; realize that the authenticity verification of file content and the security stamp with file content protection function of integrity protection generate and verification method; to overcome the deficiency of existing anti-counterfeit of seals and file protection technique and method, solve that the existing existing file of seal is distorted, seal is forged, seal is usurped or problem such as seal abuse.
For achieving the above object, the present invention includes that key generates, file is affixed one's seal and three phases is differentiated in the seal checking, wherein, the purpose of key generation phase is to sign and issue mechanism by seal to cooperate with sealer A, the private key of affixing one's seal that generation has only sealer A oneself to know, and by seal identifying information and PKI check code, verification public key that can disclosed sealer A, this stage can carry out when the user registers; File affix one's seal the purpose in stage be the sealer as required, the file of affixing one's seal at concrete needs is finished and is affixed one's seal; The purpose in seal checking discriminating stage then is to differentiate the true and false of the file that covered chapter.
For the key generation phase, its concrete steps are as follows:
According to can disclosed seal identifying information SI, sign and issue mechanism through seal and cooperate with sealer, generate PKI check code PS, private key SK and verification public key PK affix one's seal.Wherein, PKI check code PS is used to check the true and false of verification public key; And the private key SK that affixes one's seal has only sealer oneself to know, need keep properly to leak; Verification public key PK is then combined by seal identifying information SI and PKI parameter PI, can openly issue by all means.
Affix one's seal the stage for file, its concrete steps are as follows:
1. the source document of affixing one's seal for needs is determined its critical area, and extracts the content KA of critical area;
2. utilize the private key of affixing one's seal that the content of critical area is signed, form critical area digital signature KS;
3. the check information OI that will be combined to form source document with verification public key PK, critical area content KA and the digital signature KS thereof of seal identifying information;
4. the check information OI to source document carries out compressed encoding by the compression method of arranging, and gets compressed information CI;
5. utilize the Error Correction of Coding algorithm of agreement that compressed information CI is handled, generate additional error correction information AI;
6. by compressed information CI and additional error correction information AI thereof, form embedding information EI;
7. according to the information of embedding EI, generate High-Dimensional Bar Code picture HP.
8. High-Dimensional Bar Code picture HP is embedded in the basic seal picture, forms the security stamp picture of source document;
9. utilize equipment such as printer, printing machine, the security stamp picture that is generated is outputed on the assigned address of source document, finish the process of affixing one's seal.
For the seal checking discriminating stage, its concrete steps are as follows:
1. utilize the mobile phone of band camera function that the file seal is partly taken pictures, obtain High-Dimensional Bar Code picture HP;
2. from High-Dimensional Bar Code picture HP, separate out the embedding information EI that includes;
3. from embed information EI, isolate compressed information CI and additional error correction information AI;
4. utilize the error correction decoding algorithm of agreement and the decompression method of agreement, according to additional error correction information AI, CI decodes to compressed information, obtain the check information OI of source document, if failure then reports an error and withdraws from, prompting adopts alternate manner to come the authenticating documents true and false;
5. separate out verification public key PK, critical area content KA and the digital signature KS thereof of band seal identifying information from the check information OI of source document;
6. check and verify the true and false of seal identifying information among the PKI PK, if false, then report an error and withdraw from;
7. check whether critical area content KA is consistent with file content, if do not meet, supporting paper is distorted, and reports an error and withdraws from;
8. according to seal identifying information and file content among the verification public key PK, check the legitimacy of behavior of affixing one's seal, i.e. the behavior of affixing one's seal of whether in extent of competence that the seal identifying information is identified and time range, exercising; If illegal, then report an error and withdraw from;
9. according to verification public key PK, critical area content KA, whether KS is correct for checking critical area digital signature, if incorrect, then report an error and withdraw from, otherwise, illustrate that this document and seal are real, be the legal behavior of affixing one's seal that the sealer exercises in extent of competence.
The present invention is based on electronic signature technology,, proposed a kind of security stamp and made and the checking discrimination method with file content protection function by the certificate of authority, electronic signature technology, error correction information technology, High-Dimensional Bar Code technology and traditional seal are combined.This method has advantages such as the content of electronic signature technology can be verified, anti-tamper, anti-forgery simultaneously, but also possessed the visual advantage of traditional seal, and instead abuse, can print, duplicate advantages such as transmission, successfully solved the existing deficiency of existing seal system, and simple to operate, safe and efficient, adapted to people's daily use habit preferably, can be widely used in that file is false proof, certificate false proof, bill anti-counterfeit etc. all need the occasion of seal and signature, have good application prospects.
Description of drawings
Fig. 1 is the file of the present invention process flow diagram of affixing one's seal.
Fig. 2 is a seal checking process flow diagram of the present invention.
Fig. 3 is the last security stamp sample that generates in the embodiments of the invention.
Embodiment
For convenience of the understanding of the present invention, the invention will be further described below in conjunction with drawings and Examples, but this embodiment should not be construed as limitation of the present invention.
Embodiment:
The background of present embodiment is to suppose that need utilize method described in the invention to add on a house purchase contract sets one's seal.Embodiment by key generate, file is affixed one's seal and the seal checking differentiates that three phases forms.Wherein, the key generation phase carries out when the user registers, and its objective is that signing and issuing mechanism by seal cooperates with sealer, generates the private key of affixing one's seal that has only sealer oneself to know, and form verification public key that can disclosed sealer by seal identifying information and PKI check code.File affix one's seal the purpose in stage be the sealer as required, the file of affixing one's seal at concrete needs is finished and is affixed one's seal.The purpose in seal checking discriminating stage then is to differentiate the true and false of the file that covered chapter.
In the present embodiment, selected is elliptic curve cryptosystem, and its cipher system parameter is as follows: selected at random 192 big prime number p, elliptic curve E (GF (p)): y 2=x 3+ ax+b (modp) is a safety elliptic curve that is defined on the finite field gf (p), on it basic point of picked at random be G=(x, y), the rank of elliptic curve E are n=#E (GF (p)), r is the big prime factor of n.
Wherein:
p=6277101735386680763835789423207666416083908700390324961279
a=592616546630905635115220920655548752905575269097021663719
b=4804233895280899388319973107961190048453702796229268188014
n=165186887773333704311468142720121385129365739211127201127
r=165186887773333704311468142720121385129365739211127201127
x=767497456867608967492675205059054232203172713727662547906
y=773339505718536040565224929606618157393578012863049959916
Here, suppose that it is SK that seal is signed and issued the private key of mechanism SA, be positive integer at random, the PKI PK that it is corresponding less than r-1 SA=SK SA* G.
Simultaneously, in the present embodiment, system's agreement uses the SHA-1 algorithm as default hash digest algorithm, and the EC-DSA algorithm is as default ordinary electronic signature algorithm.
The first step: the key generation phase, its objective is that signing and issuing mechanism by seal cooperates with sealer, generate the key formed by affix one's seal private key SK and verification public key PK to (SK PK), finishes registration process, and concrete operations are as follows:
1. the sealer generate can disclosed individual seal identity identification information ID, content comprises: name, telephone number, address, the identification card number of seal everyone (being the sealer), the contents such as valid period, seal usable range and restriction of seal.
2. positive integer k less than number r-1 of sealer's picked at random is calculated the registration parameter K A=k * G, and it is sent to seal together with individual seal identity identification information ID sign and issue mechanism.
3. seal is signed and issued mechanism after having examined the request registration information of being received of being submitted to by the sealer, positive integer k less than number r-1 of picked at random s, calculating sealer's PKI parameter PI=k s* G+K A
4. seal is signed and issued mechanism according to the in-line coding rule, for the seal that will sign and issue is issued seal identification serial number sn.
5. seal is signed and issued mechanism and is signed and issued contents such as the self information SA of mechanism according to sealer's individual seal identity identification information ID, seal identification serial number sn and seal, generates relevant clientage's seal identifying information SI, promptly SI=(ID, sn, SA).
6. seal is signed and issued mechanism and is used SHA-1 hash digest algorithm Hash (), and calculating PKI check code PS=(Hash (SI, PI) * k s+ SK SA) mod r, and with seal parameter S P=(SI, PI PS) send to the clientage.
7. the sealer receive sign and issue the seal parameter S P that mechanism sends by seal after, therefrom separate out oneself PKI parameter PI and the seal PKI PK that signs and issues mechanism SAEtc. information, use SHA-1 hash digest algorithm Hash (), checking equation PS * G=Hash (SI, PI) * (PI-K A)+PK SAWhether set up; If be false, should require seal to sign and issue mechanism and resend the seal parameter; If set up, then carry out the 8. small step of this step;
8. the sealer is after the correctness of the seal parameter S P that has confirmed to be received, calculate oneself the private key SK=PS+Hash that affixes one's seal (SI, PI) * k and verification public key PK=(SI, PI), then sealer's key to be (SK, PK); The private key SK that wherein affixes one's seal can only have sealer oneself to know, need keep properly and can not leak, and verification public key PK then can openly issue by all means;
Second step: the file part of affixing one's seal its objective is house purchase contract is added a cover individual signet:
1. the house purchase contract of affixing one's seal for needs is determined its critical area (as house type, room rate is handed over the room date etc.), and extracts the content KA of critical area;
2. utilize the private key SK that affixes one's seal, employing EC-DSA algorithm is signed to the content KA of critical area, forms critical area digital signature KS;
3. the check information OI that will be combined to form house purchase contract with verification public key PK, critical area content KA and the digital signature KS thereof of seal identifying information;
4. adopt the LZMA compression method that check information OI is carried out compressed encoding, get compressed information CI;
5. utilize the Alternant error correction algorithm that compressed information CI is handled, generate additional error correction information AI;
6. combine by compressed information CI and additional error correction information AI thereof, form embedding information EI;
7. according to the information of embedding EI, utilize modified high density two-dimensional bar code algorithm, generate two-dimensional bar code picture HP based on QR-Code thought;
8. two-dimensional bar code picture HP is embedded in the basic signet picture, forms the security stamp picture SP of source document;
9. utilize equipment such as printer or printing machine, the security stamp picture that is generated is outputed on the assigned address of source document, can finish the process of affixing one's seal.
In this stage, the security stamp sample of Sheng Chenging as shown in Figure 3 at last.
The 3rd step: when needs are checked the true and false of house purchase contract file (can be original paper, also can be copy), follow following steps:
1. utilize the mobile phone of band camera function that the seal of house purchase contract is partly taken pictures, obtain from two-dimensional bar code picture HP;
2. from take resulting two-dimensional bar code picture HP, separate out the embedding information EI that includes;
3. from embed information EI, isolate compressed information CI and additional error correction information AI;
4. utilize Alternant error correction algorithm and LZMA decompression algorithm method, according to additional error correction information AI, CI decodes to compressed information, obtain the check information OI of house purchase contract, if failure then reports an error, the alternate manner of migrating (as the on-line equiries mode) is verified the contract true and false;
5. separate out verification public key PK, critical area content KA and the digital signature KS thereof of band seal identifying information from check information OI;
6. check and verify the true and false of seal identifying information SI among the PKI PK, if false, then report an error and withdraw from;
7. check whether critical area content KA is consistent with the content of house purchase contract, if do not meet, supporting paper is distorted, and reports an error and withdraws from;
8. according to seal identifying information and house purchase contract among the verification public key PK, check the legitimacy of behavior of affixing one's seal,, then report an error and withdraw from if illegal;
9. sign and issue the PKI PK of mechanism according to verification public key PK, PKI parameter PI and seal SAEtc. information, and the content KA of critical area, according to the EC-DSA algorithm, whether KS is correct for checking critical area digital signature, if incorrect, then report an error and withdraws from, otherwise, illustrate that this house purchase contract is real, be the legal behavior of affixing one's seal that the sealer exercises in extent of competence.
Clearly, the present invention is not limited to the foregoing description, but can change under the situation that does not break away from invention scope and thought and revise.
The content that this instructions is not described in detail belongs to and well known to a person skilled in the art prior art.

Claims (5)

1, a kind of security stamp with file content protection function generates and verification method, comprise that key generates, file is affixed one's seal and three phases is differentiated in the seal checking, wherein, the key generation phase is to sign and issue mechanism by seal to cooperate with sealer, generation has only that sealer oneself knows affix one's seal private key and by seal identifying information and PKI check code, disclosed sealer's verification public key, this stage carries out when the user registers; The file stage of affixing one's seal be the sealer as required, the file of affixing one's seal at concrete needs is finished and is affixed one's seal; The seal checking discriminating stage then is the true and false of differentiating the file that covered chapter.
2, the security stamp with file content protection function as claimed in claim 1 generates and verification method, and it is characterized in that: the concrete steps of key generation phase are as follows:
According to disclosed seal identifying information, sign and issue mechanism through seal and cooperate with sealer, generate PKI check code, affix one's seal private key and verification public key, wherein, the PKI check code is used to check the true and false of verification public key; And the private key of affixing one's seal has only sealer oneself to know, need keep properly to leak; Verification public key is then formed by seal identifying information and PKI parameter combinations, can openly issue by all means.
3, the security stamp with file content protection function as claimed in claim 1 or 2 generates and verification method, it is characterized in that: the affix one's seal concrete steps in stage of file are as follows:
First step: for the source document that needs are affixed one's seal, determine its critical area, and extract the content of critical area;
Second step: utilize the private key of affixing one's seal that the content of critical area is signed, form the critical area digital signature;
Third step: will be combined to form the check information of source document with verification public key, critical area content and the digital signature thereof of seal identifying information;
The 4th step: the check information to source document carries out compressed encoding by the compression method of arranging, and gets compressed information;
The 5th step: utilize the Error Correction of Coding algorithm of agreement that compressed information is handled, generate additional error correction information;
The 6th step:, form embedding information by compressed information and additional error correction information thereof;
The 7th step:, generate the High-Dimensional Bar Code picture according to embedding information;
The 8th step: the High-Dimensional Bar Code picture is embedded in the basic seal picture, forms the security stamp picture of source document;
The 9th step: utilize equipment such as printer, printing machine, the security stamp picture that is generated is outputed on the assigned address of source document, finish the process of affixing one's seal.
4, the security stamp with file content protection function as claimed in claim 3 generates and verification method, it is characterized in that: the concrete steps in seal checking discriminating stage are as follows:
The first step: utilize the mobile phone of band camera function that the file seal is partly taken pictures, obtain the High-Dimensional Bar Code picture;
Second step: from High-Dimensional Bar Code picture HP, separate out the embedding information that includes;
The 3rd step: from embed information EI, isolate compressed information and additional error correction information;
The 4th step: utilize the error correction decoding algorithm of agreement and the decompression method of agreement,, compressed information is decoded according to additional error correction information, obtain the check information of source document, if failure then reports an error and withdraws from, prompting adopts alternate manner to come the authenticating documents true and false;
The 5th step: verification public key, critical area content and the digital signature thereof of separating out band seal identifying information from the check information of source document;
The 6th step: check and verify the true and false of seal identifying information in the PKI, if false, then report an error and withdraw from;
The 7th step: check whether the critical area content is consistent with file content, if do not meet, supporting paper is distorted, and reports an error and withdraws from;
The 8th step: according to seal identifying information and the file content in the verification public key, check the legitimacy of behavior of affixing one's seal, i.e. the behavior of affixing one's seal of whether in extent of competence that the seal identifying information is identified and time range, exercising.If illegal, then report an error and withdraw from;
The 9th step: according to verification public key, critical area content, whether checking critical area digital signature is correct, if incorrect, then report an error and withdraws from, otherwise, illustrate that this document and seal are real, be the legal behavior of affixing one's seal that the sealer exercises in extent of competence.
5, the security stamp with file content protection function as claimed in claim 1 generates and verification method, and it is characterized in that: its concrete steps are:
The first step: the key generation phase, its objective is that signing and issuing mechanism by seal cooperates with sealer, generate the key formed by affix one's seal private key SK and verification public key PK to SK, PK, finish registration process, concrete operations are as follows:
(1) sealer generate can disclosed individual seal identity identification information ID, content comprises: the valid period of the proprietary name of seal, telephone number, address, identification card number, seal, seal usable range and limiting content;
(2) positive integer k less than number r-1 of sealer's picked at random is calculated the registration parameter K A=k * G, and it is sent to seal together with individual seal identity identification information ID sign and issue mechanism;
(3) seal is signed and issued mechanism after having examined the request registration information of being received of being submitted to by the sealer, positive integer k less than number r-1 of picked at random s, calculating sealer's PKI parameter PI=k s* G+K A
(4) seal is signed and issued mechanism according to the in-line coding rule, for the seal that will sign and issue is issued seal identification serial number sn;
(5) seal is signed and issued mechanism and is signed and issued the self information SA of mechanism content according to sealer's individual seal identity identification information ID, seal identification serial number sn and seal, generates relevant clientage's seal identifying information SI, promptly SI=(ID, sn, SA);
(6) seal is signed and issued mechanism and is used SHA-1 hash digest algorithm Hash (), and calculating PKI check code PS=(Hash (SI, PI) * k s+ SK SA) mod r, and with seal parameter S P=(SI, PI PS) send to the clientage;
(7) sealer receive sign and issue the seal parameter S P that mechanism sends by seal after, therefrom separate out oneself PKI parameter PI and the seal PKI PK that signs and issues mechanism SAInformation is used SHA-1 hash digest algorithm Ha sh (), and checking equation PS * G=Hash (SI, PI) * (PI-K A)+PK SAWhether set up; If be false, should require seal to sign and issue mechanism and resend the seal parameter; If set up, then carry out (8) small step of this step;
(8) sealer is after the correctness of the seal parameter S P that has confirmed to be received, calculate oneself the private key SK=PS+Hash that affixes one's seal (SI, PI) * k and verification public key PK=(SI, PI), then sealer's key to be (SK, PK); The private key SK that wherein affixes one's seal can only have sealer oneself to know, need keep properly and can not leak, and verification public key PK then can openly issue by all means,
Second step: file is affixed one's seal the stage, its objective is the need source document of affixing one's seal is added a cover individual signet:
(1) source document of affixing one's seal for needs is determined its critical area, and extracts the content KA of critical area;
(2) utilize the private key SK that affixes one's seal, employing EC-DSA algorithm is signed to the content KA of critical area, forms critical area digital signature KS;
(3) the check information OI that will be combined to form source document with verification public key PK, critical area content KA and the digital signature KS thereof of seal identifying information;
(4) adopt the LZMA compression method that check information OI is carried out compressed encoding, get compressed information CI;
(5) utilize the Alternant error correction algorithm that compressed information CI is handled, generate additional error correction information AI;
(6) combine by compressed information CI and additional error correction information AI thereof, form embedding information EI;
(7) according to the information of embedding EI, utilize modified high density two-dimensional bar code algorithm, generate two-dimensional bar code picture HP based on QR-Code thought;
(8) two-dimensional bar code picture HP is embedded in the basic signet picture, forms the security stamp picture SP of source document;
(9) utilize printer or printing machine equipment, the security stamp picture that is generated outputed on the assigned address of source document, can finish the process of affixing one's seal,
The 3rd step: the seal checking discriminating stage is followed following steps:
(1) utilizes the mobile phone of band camera function that the seal of required seal checking document of identify is partly taken pictures, obtain from two-dimensional bar code picture HP;
(2) from take resulting two-dimensional bar code picture HP, separate out the embedding information EI that includes;
(3) from embed information EI, isolate compressed information CI and additional error correction information AI;
(4) utilize Alternant error correction algorithm and LZMA decompression algorithm method, according to additional error correction information AI, CI decodes to compressed information, obtain the check information OI of required seal checking document of identify, if failure, then report an error, the alternate manner of migrating is verified the required seal checking document of identify true and false;
(5) separate out verification public key PK, critical area content KA and the digital signature KS thereof that is with the seal identifying information from check information OI;
(6) check and verify the true and false of seal identifying information SI among the PKI PK, if false, then report an error and withdraw from;
(7) check whether critical area content KA is consistent with the content of required seal checking document of identify, if do not meet, supporting paper is distorted, and reports an error and withdraws from;
(8) according to seal identifying information among the verification public key PK and required seal checking document of identify, check the legitimacy of behavior of affixing one's seal,, then report an error and withdraw from if illegal;
(9) sign and issue the PKI PK of mechanism according to verification public key PK, PKI parameter PI and seal SAInformation, and the content KA of critical area are according to the EC-DSA algorithm, whether KS is correct for checking critical area digital signature, if incorrect, then report an error and withdraws from, otherwise, illustrate that this required seal checking document of identify is real, be the legal behavior of affixing one's seal that the sealer exercises in extent of competence.
CN2008100484945A 2008-07-24 2008-07-24 Method for generating and verifying anti-false stamp with file content protection function Expired - Fee Related CN101329750B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2008100484945A CN101329750B (en) 2008-07-24 2008-07-24 Method for generating and verifying anti-false stamp with file content protection function

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2008100484945A CN101329750B (en) 2008-07-24 2008-07-24 Method for generating and verifying anti-false stamp with file content protection function

Publications (2)

Publication Number Publication Date
CN101329750A true CN101329750A (en) 2008-12-24
CN101329750B CN101329750B (en) 2011-08-24

Family

ID=40205550

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2008100484945A Expired - Fee Related CN101329750B (en) 2008-07-24 2008-07-24 Method for generating and verifying anti-false stamp with file content protection function

Country Status (1)

Country Link
CN (1) CN101329750B (en)

Cited By (37)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101951365A (en) * 2010-08-30 2011-01-19 清华大学 Network information counterfeiting issuing system, counterfeiting receiving system, and counterfeiting system and method
CN102333303A (en) * 2011-05-30 2012-01-25 上海合合信息科技发展有限公司 Method of acquiring information about contact persons from network based on check information
CN102647423A (en) * 2012-04-12 2012-08-22 熊楚渝 Identifying method and system of digital signature and seal
CN101763613B (en) * 2009-10-23 2012-08-29 北京派瑞根科技开发有限公司 Method for signing on mixed electronic bill
CN103903037A (en) * 2012-12-27 2014-07-02 刘广群 Dynamic-two-dimension-code generation method used for digitalization of paper-based voucher
CN104143054A (en) * 2013-05-10 2014-11-12 韩光明 Picture generation method and picture verification method
CN104320263A (en) * 2014-11-12 2015-01-28 贺瑞 Electronic authorization letter implementation and checking method, server and system
TWI484814B (en) * 2011-11-25 2015-05-11 Univ Nat Cheng Kung Forming mehtod of nfc anti-fake frame for identity validation and encryption/decryption of digital image protection
CN105022967A (en) * 2014-04-28 2015-11-04 捷码数位科技股份有限公司 Device, system and method for identifying digital signature represented by signature identifier
CN105022953A (en) * 2014-04-28 2015-11-04 捷码数位科技股份有限公司 System for generating visualized electronic authentication file, system for verifying visualized electronic authentication file, method for generating visualized electronic authentication file and method for verifying visualized electronic authentication file
CN105635049A (en) * 2014-10-29 2016-06-01 航天信息股份有限公司 Anti-counterfeit tax control method and device based on client identifier password
CN106161482A (en) * 2016-09-29 2016-11-23 广州鹤互联网科技有限公司 A kind of electronic endorsement verification method and system
CN106161483A (en) * 2016-09-29 2016-11-23 广州鹤互联网科技有限公司 A kind of electronic endorsement verification method and system
CN106209922A (en) * 2016-09-29 2016-12-07 广州鹤互联网科技有限公司 A kind of electronic endorsement verification method and system
CN106453295A (en) * 2016-09-29 2017-02-22 广州鹤互联网科技有限公司 Electronic signature verification method and system
CN106921644A (en) * 2016-06-23 2017-07-04 阿里巴巴集团控股有限公司 The verification method and device of client data file
CN106951943A (en) * 2017-03-13 2017-07-14 江苏信源久安信息科技有限公司 Believable electronic contract is printed as paper contract and restores the method for electronic contract again
CN107171808A (en) * 2017-06-14 2017-09-15 北京市档案局 A kind of verification method and device of electronic record authenticity
CN107229879A (en) * 2017-06-05 2017-10-03 北京网证科技有限公司 Electronics confirmation request automatic generation method and system based on safe Quick Response Code
CN108833116A (en) * 2018-06-20 2018-11-16 甘肃万维信息技术有限责任公司 A kind of method of Electronic Signature
CN108985364A (en) * 2018-07-05 2018-12-11 招银云创(深圳)信息技术有限公司 Verification method, device, computer equipment and the storage medium of sealed files
CN109177545A (en) * 2018-11-13 2019-01-11 安徽玺信科技有限公司 A kind of anti-counterfeit tracking type seal
CN109389198A (en) * 2018-09-05 2019-02-26 航天信息股份有限公司 A kind of invoice information storage method and system based on planar bar code technology
CN109409110A (en) * 2018-10-18 2019-03-01 胡金钱 A kind of electronic document signature method, device, equipment and readable medium
CN109428855A (en) * 2017-08-22 2019-03-05 武汉矽感科技有限公司 Seal all-in-one machine and its control method
CN109583889A (en) * 2018-11-09 2019-04-05 阮静 Seal or signature recognition system based on block chain
CN109743180A (en) * 2019-01-04 2019-05-10 贵州大学 Based on state it is close act on behalf of signature method
CN109829269A (en) * 2018-12-26 2019-05-31 平安科技(深圳)有限公司 Method, apparatus and system based on E-seal authenticating electronic documents
CN112070636A (en) * 2020-09-09 2020-12-11 西南交通大学 Image electronic contract signing and verifying method with multistage evidence chain
CN113500863A (en) * 2021-08-18 2021-10-15 江苏图码信息科技有限公司 Seal with built-in information image code and application system thereof
CN113592694A (en) * 2021-07-26 2021-11-02 海明联合能源集团矩网科技有限公司 Encrypted seal and bar-shaped data secondary encryption method
CN114444129A (en) * 2021-12-28 2022-05-06 航天信息股份有限公司 Method and system for dynamically controlling electronic seal
CN114940028A (en) * 2022-05-05 2022-08-26 沈阳利为智能科技中心 Intelligent stamp three-dimensional kaleidoscope lock and anti-counterfeiting method thereof
CN115374422A (en) * 2022-10-26 2022-11-22 四川蜀天信息技术有限公司 Anti-disclosure electronic signature verification method based on block chain
CN116402475A (en) * 2023-06-06 2023-07-07 北京建科研软件技术有限公司 Method and system for generating hand-written signature by gradually locking regional and regional rights
CN116756723A (en) * 2023-08-16 2023-09-15 鼎铉商用密码测评技术(深圳)有限公司 Electronic signature method and device, storage medium and electronic equipment
CN114444129B (en) * 2021-12-28 2024-04-19 航天信息股份有限公司 Method and system for dynamically controlling electronic seal

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107256365A (en) * 2017-07-04 2017-10-17 烟台大学 One kind protection citizen ID certificate copy technology for safely applying

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1389786A (en) * 2002-07-24 2003-01-08 苏盛辉 Digital signal system based on public cipher key algorithm
CN1635533A (en) * 2003-12-30 2005-07-06 刘瑞祯 Digital stamp system

Cited By (51)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101763613B (en) * 2009-10-23 2012-08-29 北京派瑞根科技开发有限公司 Method for signing on mixed electronic bill
CN101951365B (en) * 2010-08-30 2014-03-26 清华大学 Network information counterfeiting issuing system, counterfeiting receiving system, and counterfeiting system and method
CN101951365A (en) * 2010-08-30 2011-01-19 清华大学 Network information counterfeiting issuing system, counterfeiting receiving system, and counterfeiting system and method
CN102333303A (en) * 2011-05-30 2012-01-25 上海合合信息科技发展有限公司 Method of acquiring information about contact persons from network based on check information
WO2012162940A1 (en) * 2011-05-30 2012-12-06 上海合合信息科技发展有限公司 Parity information-based method for acquiring contact information from network
TWI484814B (en) * 2011-11-25 2015-05-11 Univ Nat Cheng Kung Forming mehtod of nfc anti-fake frame for identity validation and encryption/decryption of digital image protection
CN102647423A (en) * 2012-04-12 2012-08-22 熊楚渝 Identifying method and system of digital signature and seal
CN103903037A (en) * 2012-12-27 2014-07-02 刘广群 Dynamic-two-dimension-code generation method used for digitalization of paper-based voucher
CN104143054B (en) * 2013-05-10 2017-02-08 韩光明 Picture generation method and picture verification method
CN104143054A (en) * 2013-05-10 2014-11-12 韩光明 Picture generation method and picture verification method
CN105022967A (en) * 2014-04-28 2015-11-04 捷码数位科技股份有限公司 Device, system and method for identifying digital signature represented by signature identifier
CN105022953A (en) * 2014-04-28 2015-11-04 捷码数位科技股份有限公司 System for generating visualized electronic authentication file, system for verifying visualized electronic authentication file, method for generating visualized electronic authentication file and method for verifying visualized electronic authentication file
CN105635049A (en) * 2014-10-29 2016-06-01 航天信息股份有限公司 Anti-counterfeit tax control method and device based on client identifier password
CN105635049B (en) * 2014-10-29 2019-07-09 航天信息股份有限公司 Tax-supervise system method and apparatus based on client identification password
CN104320263B (en) * 2014-11-12 2018-11-06 贺瑞 The realization of electronic authorization certificate of entrustment, checking method, server and system
CN104320263A (en) * 2014-11-12 2015-01-28 贺瑞 Electronic authorization letter implementation and checking method, server and system
CN106921644A (en) * 2016-06-23 2017-07-04 阿里巴巴集团控股有限公司 The verification method and device of client data file
CN106921644B (en) * 2016-06-23 2020-09-01 阿里巴巴集团控股有限公司 Client data file verification method and device
CN106161482A (en) * 2016-09-29 2016-11-23 广州鹤互联网科技有限公司 A kind of electronic endorsement verification method and system
CN106161483A (en) * 2016-09-29 2016-11-23 广州鹤互联网科技有限公司 A kind of electronic endorsement verification method and system
CN106209922A (en) * 2016-09-29 2016-12-07 广州鹤互联网科技有限公司 A kind of electronic endorsement verification method and system
CN106453295A (en) * 2016-09-29 2017-02-22 广州鹤互联网科技有限公司 Electronic signature verification method and system
CN106209922B (en) * 2016-09-29 2020-01-21 恒大智慧科技有限公司 Electronic signature verification method and system
CN106951943B (en) * 2017-03-13 2020-03-17 江苏信源久安信息科技有限公司 Method for printing credible electronic contract into paper contract and recovering electronic contract
CN106951943A (en) * 2017-03-13 2017-07-14 江苏信源久安信息科技有限公司 Believable electronic contract is printed as paper contract and restores the method for electronic contract again
CN107229879A (en) * 2017-06-05 2017-10-03 北京网证科技有限公司 Electronics confirmation request automatic generation method and system based on safe Quick Response Code
CN107171808B (en) * 2017-06-14 2018-07-20 北京市档案局 A kind of verification method and device of electronic record authenticity
CN107171808A (en) * 2017-06-14 2017-09-15 北京市档案局 A kind of verification method and device of electronic record authenticity
CN109428855B (en) * 2017-08-22 2023-11-17 上海矽感信息科技(集团)有限公司 Seal integrated machine and control method thereof
CN109428855A (en) * 2017-08-22 2019-03-05 武汉矽感科技有限公司 Seal all-in-one machine and its control method
CN108833116A (en) * 2018-06-20 2018-11-16 甘肃万维信息技术有限责任公司 A kind of method of Electronic Signature
CN108833116B (en) * 2018-06-20 2021-07-09 中电万维信息技术有限责任公司 Electronic signature method
CN108985364A (en) * 2018-07-05 2018-12-11 招银云创(深圳)信息技术有限公司 Verification method, device, computer equipment and the storage medium of sealed files
CN108985364B (en) * 2018-07-05 2020-12-08 招银云创(深圳)信息技术有限公司 Verification method and device for stamped file, computer equipment and storage medium
CN109389198A (en) * 2018-09-05 2019-02-26 航天信息股份有限公司 A kind of invoice information storage method and system based on planar bar code technology
CN109409110A (en) * 2018-10-18 2019-03-01 胡金钱 A kind of electronic document signature method, device, equipment and readable medium
CN109583889A (en) * 2018-11-09 2019-04-05 阮静 Seal or signature recognition system based on block chain
CN109177545A (en) * 2018-11-13 2019-01-11 安徽玺信科技有限公司 A kind of anti-counterfeit tracking type seal
CN109829269A (en) * 2018-12-26 2019-05-31 平安科技(深圳)有限公司 Method, apparatus and system based on E-seal authenticating electronic documents
CN109743180A (en) * 2019-01-04 2019-05-10 贵州大学 Based on state it is close act on behalf of signature method
CN112070636A (en) * 2020-09-09 2020-12-11 西南交通大学 Image electronic contract signing and verifying method with multistage evidence chain
CN112070636B (en) * 2020-09-09 2023-03-21 西南交通大学 Image electronic contract signing and verifying method with multistage evidence chain
CN113592694A (en) * 2021-07-26 2021-11-02 海明联合能源集团矩网科技有限公司 Encrypted seal and bar-shaped data secondary encryption method
CN113500863A (en) * 2021-08-18 2021-10-15 江苏图码信息科技有限公司 Seal with built-in information image code and application system thereof
CN114444129A (en) * 2021-12-28 2022-05-06 航天信息股份有限公司 Method and system for dynamically controlling electronic seal
CN114444129B (en) * 2021-12-28 2024-04-19 航天信息股份有限公司 Method and system for dynamically controlling electronic seal
CN114940028A (en) * 2022-05-05 2022-08-26 沈阳利为智能科技中心 Intelligent stamp three-dimensional kaleidoscope lock and anti-counterfeiting method thereof
CN115374422A (en) * 2022-10-26 2022-11-22 四川蜀天信息技术有限公司 Anti-disclosure electronic signature verification method based on block chain
CN116402475A (en) * 2023-06-06 2023-07-07 北京建科研软件技术有限公司 Method and system for generating hand-written signature by gradually locking regional and regional rights
CN116756723A (en) * 2023-08-16 2023-09-15 鼎铉商用密码测评技术(深圳)有限公司 Electronic signature method and device, storage medium and electronic equipment
CN116756723B (en) * 2023-08-16 2024-01-09 鼎铉商用密码测评技术(深圳)有限公司 Electronic signature method and device, storage medium and electronic equipment

Also Published As

Publication number Publication date
CN101329750B (en) 2011-08-24

Similar Documents

Publication Publication Date Title
CN101329750B (en) Method for generating and verifying anti-false stamp with file content protection function
US9268969B2 (en) System and method for field-verifiable record authentication
CN102201100B (en) Object anti-counterfeiting method and system
US20050132194A1 (en) Protection of identification documents using open cryptography
CN102037676A (en) Secure item identification and authentication system and method based on unclonable features
JPH06176036A (en) Method for forming duplication which can be authenticated
CN104268742A (en) Official seal fake detection method and device based on network digital certificate and network lookup
CN108229596A (en) Combined two-dimension code, digital certificates carrier, generation, reading device and method
CN1421814A (en) Digital anti-fake method
CN101977319B (en) Method for generating and authenticating hidden video tags based on video characteristics and digital signatures
CN100592684C (en) An efficient authorization electronic signature method without authentication center
CN108171023B (en) Digital watermark 'physical and electrical integrated' seal processing system
CN103810457A (en) Offline license anti-counterfeiting method based on reliable digital signature and two-dimensional code
CN101388767A (en) Certificate false proof method based on light weight digital signature scheme
CN106951943A (en) Believable electronic contract is printed as paper contract and restores the method for electronic contract again
CN105760722A (en) Watermark embedding electronic signature generation method and platform
CN104408502A (en) Two-dimension code generation method, two-dimension code generation device, two-dimension code verification method and two-dimension code verification device based on CPK (Combined Public Key)
CN102842053B (en) A kind of false proof figure code label and manufacture method thereof
Huang et al. Efficient QR code authentication mechanism based on Sudoku
CN109658582B (en) Safe and novel voter qualification certificate and use verification method thereof
CN105912894B (en) A method of it is anti-fake that passport NO. being used for E-seal printed text
CN1321507C (en) Soft certification anti-false method based on graphic code primary and secondary signet series information association mechanism
Jueneman et al. Biometrics and digital signatures in electronic commerce
CN115396117A (en) Block chain based tamper-proof electronic document signing and verifying method and system
CN101059887A (en) A bank card number and the second magnetic track main account number creation method and reading method

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20110824

Termination date: 20140724

EXPY Termination of patent right or utility model