CN104376252B - Content verification method based on digital signature code - Google Patents
Content verification method based on digital signature code Download PDFInfo
- Publication number
- CN104376252B CN104376252B CN201310349633.9A CN201310349633A CN104376252B CN 104376252 B CN104376252 B CN 104376252B CN 201310349633 A CN201310349633 A CN 201310349633A CN 104376252 B CN104376252 B CN 104376252B
- Authority
- CN
- China
- Prior art keywords
- stamped signature
- code
- digital
- signature code
- stamped
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
- 238000012795 verification Methods 0.000 title claims abstract description 78
- 238000000034 method Methods 0.000 title claims abstract description 47
- 230000009977 dual effect Effects 0.000 claims abstract description 31
- 238000007689 inspection Methods 0.000 claims description 16
- 235000013399 edible fruits Nutrition 0.000 claims description 2
- 238000010586 diagram Methods 0.000 description 25
- 238000012360 testing method Methods 0.000 description 12
- 230000007246 mechanism Effects 0.000 description 10
- 230000008859 change Effects 0.000 description 8
- 238000005516 engineering process Methods 0.000 description 6
- 230000006870 function Effects 0.000 description 6
- 238000003860 storage Methods 0.000 description 5
- 241000721047 Danaus plexippus Species 0.000 description 4
- 230000005540 biological transmission Effects 0.000 description 4
- 230000000694 effects Effects 0.000 description 4
- PCHJSUWPFVWCPO-UHFFFAOYSA-N gold Chemical compound [Au] PCHJSUWPFVWCPO-UHFFFAOYSA-N 0.000 description 4
- 239000010931 gold Substances 0.000 description 4
- 229910052737 gold Inorganic materials 0.000 description 4
- 238000004519 manufacturing process Methods 0.000 description 4
- 230000033228 biological regulation Effects 0.000 description 3
- 238000012790 confirmation Methods 0.000 description 3
- 230000005611 electricity Effects 0.000 description 3
- 230000036541 health Effects 0.000 description 3
- 238000010295 mobile communication Methods 0.000 description 3
- 238000003825 pressing Methods 0.000 description 3
- 230000008569 process Effects 0.000 description 3
- 241000894007 species Species 0.000 description 3
- 238000012546 transfer Methods 0.000 description 3
- 244000097202 Rathbunia alamosensis Species 0.000 description 2
- 235000009776 Rathbunia alamosensis Nutrition 0.000 description 2
- 230000009471 action Effects 0.000 description 2
- 238000004364 calculation method Methods 0.000 description 2
- 238000004891 communication Methods 0.000 description 2
- 230000006835 compression Effects 0.000 description 2
- 238000007906 compression Methods 0.000 description 2
- 238000003745 diagnosis Methods 0.000 description 2
- 238000009826 distribution Methods 0.000 description 2
- 235000013305 food Nutrition 0.000 description 2
- 230000006872 improvement Effects 0.000 description 2
- 238000011835 investigation Methods 0.000 description 2
- 238000004806 packaging method and process Methods 0.000 description 2
- 238000012856 packing Methods 0.000 description 2
- IRLPACMLTUPBCL-KQYNXXCUSA-N 5'-adenylyl sulfate Chemical compound C1=NC=2C(N)=NC=NC=2N1[C@@H]1O[C@H](COP(O)(=O)OS(O)(=O)=O)[C@@H](O)[C@H]1O IRLPACMLTUPBCL-KQYNXXCUSA-N 0.000 description 1
- OKTJSMMVPCPJKN-UHFFFAOYSA-N Carbon Chemical compound [C] OKTJSMMVPCPJKN-UHFFFAOYSA-N 0.000 description 1
- VEXZGXHMUGYJMC-UHFFFAOYSA-M Chloride anion Chemical compound [Cl-] VEXZGXHMUGYJMC-UHFFFAOYSA-M 0.000 description 1
- VYZAMTAEIAYCRO-UHFFFAOYSA-N Chromium Chemical compound [Cr] VYZAMTAEIAYCRO-UHFFFAOYSA-N 0.000 description 1
- XEEYBQQBJWHFJM-UHFFFAOYSA-N Iron Chemical compound [Fe] XEEYBQQBJWHFJM-UHFFFAOYSA-N 0.000 description 1
- 241001465754 Metazoa Species 0.000 description 1
- 244000061176 Nicotiana tabacum Species 0.000 description 1
- 235000002637 Nicotiana tabacum Nutrition 0.000 description 1
- 208000031481 Pathologic Constriction Diseases 0.000 description 1
- 229910017435 S2 In Inorganic materials 0.000 description 1
- 238000006127 Vicarious substitution reaction Methods 0.000 description 1
- 230000002159 abnormal effect Effects 0.000 description 1
- 230000004913 activation Effects 0.000 description 1
- 230000032683 aging Effects 0.000 description 1
- 230000004075 alteration Effects 0.000 description 1
- 210000001367 artery Anatomy 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 210000005252 bulbus oculi Anatomy 0.000 description 1
- 238000004422 calculation algorithm Methods 0.000 description 1
- 229910052799 carbon Inorganic materials 0.000 description 1
- 230000001413 cellular effect Effects 0.000 description 1
- 238000006243 chemical reaction Methods 0.000 description 1
- 238000013329 compounding Methods 0.000 description 1
- 238000004590 computer program Methods 0.000 description 1
- 238000010276 construction Methods 0.000 description 1
- 239000004035 construction material Substances 0.000 description 1
- 238000005336 cracking Methods 0.000 description 1
- 238000000151 deposition Methods 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 238000011156 evaluation Methods 0.000 description 1
- 238000004880 explosion Methods 0.000 description 1
- 210000000887 face Anatomy 0.000 description 1
- 239000003205 fragrance Substances 0.000 description 1
- 210000004247 hand Anatomy 0.000 description 1
- 210000003128 head Anatomy 0.000 description 1
- 229940056582 human hair preparation Drugs 0.000 description 1
- 230000006698 induction Effects 0.000 description 1
- 230000010354 integration Effects 0.000 description 1
- 238000012423 maintenance Methods 0.000 description 1
- 235000012054 meals Nutrition 0.000 description 1
- 238000002156 mixing Methods 0.000 description 1
- 239000000203 mixture Substances 0.000 description 1
- 238000000465 moulding Methods 0.000 description 1
- 230000006855 networking Effects 0.000 description 1
- 230000008520 organization Effects 0.000 description 1
- 235000021110 pickles Nutrition 0.000 description 1
- 238000012545 processing Methods 0.000 description 1
- 230000001737 promoting effect Effects 0.000 description 1
- 230000005180 public health Effects 0.000 description 1
- 230000001105 regulatory effect Effects 0.000 description 1
- 239000011150 reinforced concrete Substances 0.000 description 1
- 230000002787 reinforcement Effects 0.000 description 1
- 230000003014 reinforcing effect Effects 0.000 description 1
- 230000008439 repair process Effects 0.000 description 1
- 238000011160 research Methods 0.000 description 1
- 230000004044 response Effects 0.000 description 1
- 210000001525 retina Anatomy 0.000 description 1
- 238000005096 rolling process Methods 0.000 description 1
- 230000035943 smell Effects 0.000 description 1
- 238000011144 upstream manufacturing Methods 0.000 description 1
- 210000001215 vagina Anatomy 0.000 description 1
- 238000010200 validation analysis Methods 0.000 description 1
- 210000003462 vein Anatomy 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/45—Structures or tools for the administration of authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2107—File encryption
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Computer Hardware Design (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Multimedia (AREA)
- Technology Law (AREA)
- Storage Device Security (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
A kind of content verification method based on digital signature code, comprises:One endorses step, is endorsed using one first private key pair one first digital content, to produce one first digital signature corresponding with this first digital content and one first stamped signature code;One dual stamped signature step, first according to this this first digital signature of the first stamped signature code verification, one second private key is recycled to be endorsed again according to this first stamped signature code, to produce one second corresponding digital signature and one second stamped signature code, between this first stamped signature code and this second stamped signature code, there is a connection, and form a stamped signature code-group, and this first digital signature and this second digital signature form a digital signature group and a verification step, according in this stamped signature code-group at least one, verify at least one in this digital signature group.The present invention can easily confirm the true and false of digital content endorsed.
Description
Technical field
The invention relates to a kind of content verification method, particularly relate to a kind of content verification based on digital signature code
Method.
Background technology
On 2 23rd, 2013 reports of United Daily News, the Ministry of Internal Affairs represents:" natural person's voucher IC-card combines convenient super business's service mesh
The convenience store of front cooperation, 4791 unifications providing ibon service including the whole nation surpass business's retail sales, the whole nation provides FamiPort clothes
The convenient super business of 2830 whole family of business, the whole nation provide life-ET and 1252 Lai Erfu of large-scale compounding machine service to surpass business's retail sales,
With OK convenience store Taibei city wherein 5 branch.”.Illustrate in news that government energetically guides natural person's voucher IC-card
Enter among the daily life of the people.But, when inspecting published many patents at present, such as encryption and decryption technology, digital certificate,
During asymmetric key digital signature etc., due to excessively complicated using program, using upper more inconvenience for common people, thus
Abandon the use of related stamped signature and encryption and decryption functions.In fact, rigorous asymmetric key digital signature mechanism such as natural person with
Card IC-card, be the important tool of the Government Electronic thoughts administration, through some improvement after can also easily inter-trade,
And use in common people's daily life.
Content of the invention
Therefore, the purpose of the present invention, is to provide a kind of content verification method based on digital signature code.
Then the content verification method based on digital signature code for the present invention is it is adaptable to one has the server of data base,
Comprise endorse step, a dual stamped signature step and a verification step.
This step of endorsing, is endorsed using one first private key pair one first digital content, to produce and this first numeral
One first corresponding digital signature of content and one first stamped signature code, then by this first digital content, the first digital signature
And first stamped signature code upload to this server data base.
This dual stamped signature step, first according to this this first digital signature of the first stamped signature code verification, recycles one second private
Key is endorsed again according to this first stamped signature code, to produce one second corresponding digital signature and one second stamped signature code
And it is uploaded to the data base of this server, between this first stamped signature code and this second stamped signature code, there is a connection, and formed
One stamped signature code-group, and this first digital signature and this second digital signature form a digital signature group.
This verification step, according at least one of this stamped signature code-group, verifies at least one of this digital signature group.
The beneficial effects of the present invention is:The present invention is carried out repeatedly to digital content in different forms using multiple private keys
Endorse, to produce multiple associated stamped signature codes and digital signature, the user of the true and false to be confirmed simply enters above-mentioned
Stamped signature code, you can easily confirm the true and false of digital content endorsed.
Brief description
Fig. 1 is a flow chart, and the first, second, the 5th and the 7th preferred embodiment of the present invention is described;
Fig. 2 is a flow chart, and the 3rd preferred embodiment of the present invention is described;
Fig. 3 is a flow chart, and the 4th preferred embodiment of the present invention is described;
Fig. 4 is a flow chart, and the 6th preferred embodiment of the present invention is described;
Fig. 5 is an Operation interface diagram, and first and second digital content of the present invention is described;
Fig. 6 is an Operation interface diagram, illustrates to produce the first digital signature;
Fig. 7 is an Operation interface diagram, illustrates to produce the first stamped signature code;
Fig. 8 is an Operation interface diagram, and line data base is described;
Fig. 9 is an Operation interface diagram, and write into Databasce success is described;
Figure 10 is an Operation interface diagram, illustrates to verify the first digital signature;
Figure 11 is an Operation interface diagram, illustrates to produce the second digital signature;
Figure 12 is an Operation interface diagram, database of descriptions field;
Figure 13 is an Operation interface diagram, database of descriptions field;
Figure 14 is an Operation interface diagram, illustrates to verify stamped signature code-group;
Figure 15 is an Operation interface diagram, and input document IC-card number is described;
Figure 16 is an Operation interface diagram, illustrates to download voucher (public key);
Figure 17 is an Operation interface diagram, illustrates to verify stamped signature;
Figure 18 is an Operation interface diagram, illustrates that display is proved to be successful information;
Figure 19 is an Operation interface diagram, illustrates to show stamped signature people and checking unit;
Figure 20 is an Operation interface diagram, illustrates to show first, second digital content being proved to be successful;
Figure 21 is an Operation interface diagram, and player display preset data content is described;
Figure 22 is an Operation interface diagram, and player display network address is described;
Figure 23 is an Operation interface diagram, illustrates to input custom identifying code (the first stamped signature code);
Figure 24 is an Operation interface diagram, illustrates to select certificate file;
Figure 25 is an Operation interface diagram, illustrates to show certificate file;
Figure 26 is an Operation interface diagram, illustrates to show stamped signature people and checking unit;
Figure 27 is an Operation interface diagram, illustrates to show webpage (digital content);And
Figure 28 is a schematic diagram, and a check that can see corrigendum date and two stamped signature people is described.
Specific embodiment
Below in conjunction with the accompanying drawings and embodiment the present invention is described in detail it is noted that, in the following description content
In, similar element is to be represented with being identically numbered.
Refering to Fig. 1, the first preferred embodiment based on the content verification method of digital signature code for the present invention is it is adaptable to one
There is the server (not shown) of data base, comprise endorse step S1, dual stamped signature step S2 and a verification step S3.With
The lower computer (not shown) using a terminating machine software program having been loaded with realizing the present invention and this there is data base
Server, coordinate " the dynamic business card of Li Mushan " character file(Archives and shelves described later, are typically expressed as in the term of continent
" file ")Further illustrate the details when carrying out " more signing " for this method.This dynamic business card is one (the first) digital content
(digital content), content is academic title, the time in this position and the affiliated company of Mr. Li Mushan.
First, in this step S1 of endorsing, endorsed using one first private key pair one first digital content, to produce and to be somebody's turn to do
Corresponding one first digital signature of first digital content and one first stamped signature code, then by this first digital content, the first number
Word stamped signature and the first stamped signature code upload to this server data base.
In this step, the management personnel of the affiliated company of Mr. Li Mushan, by voucher IC-card, insert the card reader of computer
In, then click " generation stamped signature ", endorsed using this dynamic business card of the first private key pair in this voucher IC-card, this one endorses
The method that process produces digital signature with known use voucher IC-card is identical, so repeating no more.Then, complete it endorsing
Afterwards, this computer uploads this first digital content, the first digital signature and the first stamped signature code to this server, preferably real at this
Apply in example, this server is arranged at Hinet company, this terminating machine software program is according to dbip (data base IP), dbna (number
According to library name), dbacc (data base's account number), dbpwd (database password), link to this server.After uploading success,
This terminating machine software program display information:" stamped signature data write into Databasce success!", server returns a storage successful information
To computer, and stamped signature code " 16472455 " produced by Computer display.This 16472455 stamped signature code is
This first stamped signature code.In this preferred embodiment, this voucher IC-card is Ministry of Economic Affaris's industry and commerce voucher card, for providing this first private
To be endorsed, this first stamped signature code is the word string digital including 8 to key, or is converted to bar code form it is also possible to pass through
One QR Code (Quick Response Code) generator or software (not shown), by produced stamped signature code with QR
The form of Code presents, and its form and producing method are not limited with the present embodiment.
Then, in this dual stamped signature step S2, first according to this this first digital signature of the first stamped signature code verification, recycle
One second private key is endorsed again according to this first stamped signature code, to produce corresponding one second digital signature and one second
Stamped signature code upload to this server data base.This first stamped signature code and this second stamped signature code have a connection, and shape
Become a stamped signature code-group, and this first digital signature and this second digital signature form a digital signature group.Using this second
Before private key is endorsed again according to this first stamped signature code, updating this first digital content is one second digital content, makes
This second stamped signature code is to should the second digital content.And, this first private key and the second private key be belong to same user (or
Same company) same private key.
Changed because the academic title of Mr. Li Mushan is existing, so when carrying out dual stamped signature step S2, affiliated company
Management personnel first pass through the computer having been loaded with terminating machine software program, carry out checking sub-step S21, by inputting first
Stamped signature code " 16472455 ", is downloaded for verifying the data needed for the first digital signature by server, including this dynamic business card
(the first digital content) and this first digital signature, is then obtained the card number of industrial and commercial voucher card by the data base of server
" MT00000001252127 ", then by Ministry of Economic Affaris " credentials download and query webpage " according to this card number download one correspond to this
First public key of one private key(This first public key is among the voucher downloaded), to verify the first digital signature, this proof procedure
Also verify that the method for digital signature is identical with known use voucher IC-card, so repeating no more.It is proved to be successful and can continue to hold
Ensuing sub-step S22 of endorsing of row is that is to say, that carry out during dual stamped signature step S2 it is necessary to first be verified first using computer
Front (first) digital signature.After a successful authentication, computer screen shows " stamped signature people:The limited public affairs of Taiwan high-order net share
Department ", " checking unit:Industrial and commercial credential management " center ", allows next person to be endorsed confirm the status of the previous person of endorsing, that is, this first
Private key everyone (being same people in this preferred embodiment).Now, screen display " stamped signature is proved to be successful ", and " Li Mu
The dynamic business card on mountain " also during be downloaded in computer.
Then, in sub-step S22 of endorsing, management personnel click " renewal stamped signature " in the form of terminating machine software program,
" the dynamic business card of Li Mushan " character file of input redaction, i.e. the second digital content, then input previous label in input field
Chapter code, i.e. this first stamped signature code 16472455.It is inserted into and the industry and commerce voucher of identical Ministry of Economic Affaris in this endorses step
Card, then clicks on " updating stamped signature content ", and now, " the dynamic business card of Li Mushan " of this redaction produces the second number in a computer
Word stamped signature and the second stamped signature code, 16472686, and it is uploaded to this server, and this second stamped signature code and the first stamped signature code
Between set up a connection in the data base of server, to form the label including this second stamped signature code and the first stamped signature code
Chapter code-group.Similarly, due to the corresponding relation between this connection, and stamped signature code and digital signature, this second numeral is signed
Also form one between chapter and the first digital signature and include this second digital signature and the first numeral label in the data base of server
The digital signature group of chapter.
Then, in this verification step S3, according in this stamped signature code-group at least one, verify in this digital signature group at least
One.In this step, any user wanting confirmation " the dynamic business card of Li Mushan " true and false, can be according in this stamped signature code-group
The first stamped signature code, by this connection, verify the first digital signature in this digital signature group and the second digital signature, and
To this second digital content.After the completion of the checking of this second digital signature, and then verify the first digital signature.This user exists
Load the computer of this terminating machine software program, clicked " checking stamped signature ", then input this first stamped signature code
" 16472455 ", download this second digital signature by this server, and after finding card number in the data base of this server, then by
" credentials download and query webpage " of Ministry of Economic Affaris downloads the public key (being also called voucher) of stamped signature corresponding with this private key, then point
Hit button to be verified, after being proved to be successful, screen display " stamped signature people:Taiwan high-order net limited company, checking are single
Position:Industrial and commercial credential management " center ".Then, computer is successfully downloaded " the dynamic business card of Li Mushan " and is shown on screen.Because being
Same private key is endorsed, so voucher also can be downloaded by inputting this second stamped signature code " 16472686 ".But display
Stamped signature code on (being sent out) paper namecard or the online business card is with the optimal also optimum of the first stamped signature code.
" unusual fluctuation state shown in dynamic business card by redaction:From on 2 19th, 2013, Li Mushan is promoted to Taibei branch company
Business assistant manager " can confirm that Mr. Li Mushan in the business assistant manager that 2 months 19 days has been Taibei branch company afterwards.It is this above
First aspect of bright first preferred embodiment.
Significantly, since after carrying out this sub-step S22 of endorsing, this second stamped signature code and the first stamped signature code
Between there is a connection in the data base of server, it is also possible to be connected to the therefore after inputting this second stamped signature code
One stamped signature code, to download the first digital signature and corresponding prototype version " the dynamic business card of Li Mushan " and second simultaneously
Digital signature and " the dynamic business card of Li Mushan " of corresponding redaction, complete certification in the public key decoding passing through respectively to download
Afterwards, can confirm that " the dynamic business card of Li Mushan " of this two version all belongs to truly, and check dynamic business card in annotation time permissible
The position unusual fluctuation of solution Mr. Li Mushan.This is the second aspect of the present invention first preferred embodiment.
According to " letter alarm " report:Liu Yonghong pretends to be People Daily agency's pair using the employee's card altered and the business card privately printed
Editor-in-chief, pretends to be People Daily agency leader to deceive to obtain 620,000 yuan of RMB to help people to handle affairs to run after fame, Liu Yonghong is sentenced by Dongcheng law court
Fixed-term imprisonment 12 years.On March 28th, 2013 Today Evening is reported:" Zhao Xiyong pretends to be State Council high-ranking official to swindle four provinces, more than 2 years
Come, with oneself once in automobile industry working experience, and well understanding of national policy is investigated everywhere, be local economy "
Arteries and veins ", until March 8 this year, is penetrated by Research Office of the State Council, ' false imperial envoy ' Zhao ' director ' ".If the present invention is able to popularization and application,
This generation pretending to be event then can be avoided.
Refering to Fig. 1, the present invention is equally comprised based on the second preferred embodiment of the content verification method of digital signature code
One endorses step S1, dual stamped signature step S2 and a verification step S3.
Need to have wrongly write check content when financial institution faces cabinet below to change, carry out the situation of " multiple label ", enter one
Step explanation this method.Check in this preferred embodiment and bank first have an agreement as needing company and commissarial confirmation
Can come into force.
First, in this step S1 of endorsing, endorsed using one first private key pair one first digital content, to produce and to be somebody's turn to do
One first corresponding digital signature of first digital content and one first stamped signature code, then by this first digital content, first
Digital signature and the first stamped signature code upload to this server data base.In this step, the check withheld is swept by bank
Retouch and save as " altered cheque content .pdf on line " archives and pass to the company opening this check, that is, in this first numeral
Hold, then utilize a private key pair of company should " altered cheque content .pdf on line " archives be endorsed, signed with producing (first)
Chapter code " 453D321D " and the first digital signature " SignFile.pdf ", are then uploaded to this server.Preferably implement at this
In example, this first private key is provided by the industrial and commercial voucher card of company.
Then, in this dual stamped signature step S2, first according to this this first digital signature of the first stamped signature code verification, recycle
One second private key is endorsed again according to this first stamped signature code, to produce corresponding one second digital signature and one second
Stamped signature code upload to this server data base.Between this first stamped signature code and this second stamped signature code, there is a connection,
And form a stamped signature code-group, and this first digital signature and this second digital signature form a digital signature group.Should utilizing
After second private key is endorsed again according to this first stamped signature code, this first stamped signature code phase corresponding with the second stamped signature code
The first same digital content.And, this first private key and the second private key are different private keys.In this step, company is intended to this
" altered cheque content .pdf on line " archives carry out " multiple label ", and therefore corporate operations personnel should prior to the input of terminating machine software program
First stamped signature code " 453D321D ", by this first digital signature " SignFile.pdf " and " altered cheque content .pdf on line "
It is downloaded to computer, to carry out verifying sub-step 21.In checking sub-step 21, management personnel first by Ministry of Economic Affaris " under voucher
Carry and query webpage " download corresponding public key (public key is being downloaded among voucher), if this first numeral can be signed by this public key really
Zhang Xiekai, is endorsed by company before expression really.Then carry out endorsing sub-step S22, and the representative representing company is using genus
(second) private key pair in his natural person's voucher card should " altered cheque content .pdf on line " be endorsed, to produce second again
Digital signature and the second stamped signature code " 4B19332C ", and it is uploaded to the data base of this server.
Then, in this verification step S3, according in this stamped signature code-group at least one, verify in this digital signature group extremely
Few one.This preferred embodiment is according to the first stamped signature code in this stamped signature code-group, by this connection, verifies this number
The first digital signature in word stamped signature group and the second digital signature, and obtain this first digital content.In this step, people from bank
Whether the check after member is intended to confirm this corrigendum has obtained company and commissarial accreditation, therefore has been loaded with this at any one
The computer of terminating machine software program, inputs the first stamped signature code informed by corporate operations personnel or representative
" 453D321D ", due to there is a connection between this second stamped signature code and the first stamped signature code, therefore can be by server count
According to finding corresponding card number (source of the second private key and the first private key) in storehouse, it is respectively in this preferred embodiment
" TP03120322092065 " and " MT00000001252127 ", bank personnel can be according to this by the " credentials download and looking into of Ministry of Economic Affaris
Ask webpage " download to corresponding second public key and the first public key.Then, then by server download this second digital signature and first
Digital signature, and first using the second public key decryptions, it is then used by the first public key decryptions, if success, representing should " change on line
Ticket content .pdf " archives are really through company and commissarial accreditation.In this preferred embodiment, data base includes following hurdle
Position, schematically as follows:
Stamped signature code | Card number | Digital signature | Connect |
453D321D | TP03120322092065 | SignFile.pdf | 4B19332C |
4B19332C | MT00000001252127 | SignFile2.pdf | 453D321D |
Figure 28 is the schematic diagram of this check it can be seen that corrigendum date, and two stamped signature people.
It should be noted that " multiple sign " used in this preferred embodiment with used in the first good embodiment " more
The difference of label " is, the first private key when " more signing " and the second private key are that same people (or company, legal person) owns, and " multiple label "
When for different people (or company, legal person) own.In addition, when " more sign ", this first digital content is updated to redaction or not
The electronic record of same format, when " multiple sign ", the first numeral for identical content that this first private key and the second private key are endorsed
Content.All it is uploaded to the server of bank with the first private key, so bank personnel is looked into after endorsing after endorsing and with the second private key
The Business Name of this check is opened, you can learn this first stamped signature code in the data base asking bank.
In this preferred embodiment, written agreement is agreed to bank money order, is propped up in advance for company, the personal bank with contact
In ticket, various subpoena, when client there occurs that some minor errors (for example the date wrongly writes) are corrected for using the present invention filling in,
Client is just not required to as in person carried seal to return bank's corrigendum in the past.When the method for the present invention makes client right the wrong more just
Profit, also saves the daily workload of bank cashier.
In addition, the present invention can be used with contract or insurance, when insurer has part information unusual fluctuation, such as personal phase
Pass information unusual fluctuation, or even such as beneficiary change, insurance coverage and insurant etc., and these unusual fluctuations need each side party's
Agree to, under agree to according to legal provisions and with written agreement in advance, insurance company parent need not must go to party because of insurance regulation
Place asks its change of in person signing, and has been issued to the digital signature of insurance use using government, when company can save insurance operation
Between with oily grid electricity fee cost.The construction of policy (as each change and payment) of checking insurance company and checking declaration form content are through supervisor
Appraise and decide for each time (code) of office falls within present invention scope applicatory.
Refering to Fig. 2, the 3rd preferred embodiment based on the content verification method of digital signature code for the present invention, comprise one and add
Sign step S1, dual stamped signature step S2, multiple stamped signature step S4 and a verification step S3.With this first and second preferably real
The difference applying example is, also has multiple stamped signature step S4, first basis between this dual stamped signature step S2 and verification step S3
This this second digital signature of the second stamped signature code verification, recycles one the 3rd private key to carry out again adding according to this second stamped signature code
Sign, to produce one the 3rd digital signature and one the 3rd stamped signature code, and the 3rd stamped signature code is added into this stamped signature code-group, should
3rd digital signature is added into this digital signature group.For example, when having the 3rd stamped signature people that is to say, that the 3rd stamped signature people
When carrying out " multiple label ", set and between each of data base of this server digital signature code, have a connection, index or a meter
Calculation machine routine data makes to be associated between described digital signature code, and when there being the 4th stamped signature people, the rest may be inferred.Similarly, exist
When carrying out " more signing ", set in the data base of this server, more sign generation each time or custom stamped signature code is once produced with front
Raw or custom stamped signature code has a connection with associated.It is noted that for example more being signed in the 3rd stamped signature people
Before, corresponding be a secondary entitled docx of shelves Microsoft Word archives (the first digital content), more signed into
A corresponding MP4 archives (the second digital content) can be updated to after work(.
Same taking check as a example, when with bank be about set in addition to company representative people, company in addition it is also necessary to the 3rd people
When agreeing to this check ability effective force, after carrying out this endorse step S1 and dual stamped signature step S2, the 3rd people can be prior to this
Checking sub-step S41 in multiple stamped signature step S4 first inputs this second stamped signature code to test to this second digital signature
Then the digital archives of this check are carried out using (the 3rd) private key in its natural person's voucher by card in sub-step S42 of endorsing again
Endorse, to produce the 3rd digital signature and the 3rd stamped signature code, and be uploaded to this server.In the data base of this server,
In this stamped signature code-group, the first stamped signature code, the second stamped signature code and the 3rd stamped signature code, and there is connection each other.Should
Digital signature group includes the first digital signature, the second digital signature and the 3rd digital signature.
Then, in this verification step S3, due to this connection, bank office staff either pass through this first stamped signature code, second
Stamped signature code or the 3rd stamped signature code, or wherein appoint the two, even all, all this first numeral can be downloaded by this server
Stamped signature, the second digital signature and the 3rd digital signature, and verified.Certainly, it is suitable for more than three people situation.
Refering to Fig. 3, the 4th preferred embodiment based on the content verification method of digital signature code for the present invention, comprise one and add
Sign step S1, dual stamped signature step S2, expiry date verification step S5 and a verification step S3.This dual stamped signature step S2
Confirm that sub-step S23, checking sub-step S21 and are endorsed sub-step S22 including an expiry date.
Its difference from this first, second preferred embodiment is, this first stamped signature code corresponded to for one first effect duration
Limit, before carrying out checking sub-step S21 or this verification step S3 in this dual stamped signature step S2, this server first checks at present
Whether the time alreadys exceed this first expiry date, if inspection result is yes, represents that this first stamped signature code is invalid and stops
Only verify, if inspection result is no, represent that this first stamped signature code is effective and continues checking.In the same manner, this second stamped signature generation
Corresponding one second expiry date of code, before carrying out this verification step, this server first checks whether the current time alreadys exceed
This second expiry date, if inspection result is yes, represents that this second stamped signature code is invalid and stops checking, if inspection result
It is no, represent that this second stamped signature code is effective and continues checking.
As, in step S1 of endorsing taking " the dynamic business card of Li Mushan " in the first aspect of the first preferred embodiment as a example,
Its affiliated company first sets one (the first) expiry date and is stored in the data base of this server when this dynamic business card is endorsed,
Now this pen data in data base can include the field of one (the first) expiry date, and such as 2013/9/20.Then, dual at this
Stamped signature step S2, when company is intended to be endorsed again, after inputting this first stamped signature code, confirms sub-step in expiry date
S23 can first check whether the current time alreadys exceed this first stamped signature code (first) expiry date.If now surpassed
Cross expiry date, represent that the previous data endorsed is expired, lose credibility, therefore there is no need to be endorsed again.Phase
Instead, if not less than expiry date, carry out verifying sub-step S21, related data is downloaded to enter to the first digital signature
Row checking, if success, then is endorsed with the second private key, and is set one second expiry date.
Similarly, when any human desires confirms the true and false of this dynamic business card with the second stamped signature code, in this verification step S3
Expiry date verification step S5 before, inputting this server after this second stamped signature code can be by data base stored second
(second) expiry date of stamped signature code and current Time transfer receiver, if the current time already exceed this expiry date then it represents that should
Second stamped signature code is expired, loses effect, therefore cannot determine the true and false of this dynamic business card.If on the contrary, mesh after comparing
The front time not less than this (second) expiry date, then enters this verification step S3, and this second digital signature is verified, when testing
Demonstrate,prove successfully then it represents that this dynamic business card is real.
Refering to Fig. 1, the 5th preferred embodiment based on the content verification method of digital signature code for the present invention, this is preferably real
Apply example and show how one to be divided in advance two MP3 music multimedia shelves carry out by stamped signature code-group with digital signature group
" more signing ", and coordinate the user interface of the present invention to further illustrate.Next, with Taiwan artist Miss Zhang Shaohan one
As a example the MP3 voice files of 3.12MB.
5th preferred embodiment based on the content verification method of digital signature code for the present invention, comprises step of endorsing
S1, dual stamped signature step S2 and a verification step S3.
In this step S1 of endorsing, endorsed using one first private key pair one first digital content, with produce with this first
One first corresponding digital signature of digital content and one first stamped signature code, then by this first digital content, the first numeral
Stamped signature and the first stamped signature code upload to this server data base.
In this preferred embodiments, this first private key comes from a voucher IC-card, is Ministry of Economic Affaris's industry and commerce voucher card, it is connected to
One mobile computer, has been loaded with realizing a terminating machine software program of the present invention.User is first grasped using Windows
The WINRAR compression shelves software making system is divided into Zhang Shaohan mp3 digital music shelves 100 as shown in desktop in Fig. 5 as in Fig. 5
A 1.69MB " Zhang Shaohan part1.rar " shelves 103 (the first digital content), with another 1.38MB's " Zhang Shaohan
Part2.rar " shelves 113 (the second digital content).Click option " generation stamped signature " 101, screen display goes out an entitled generation stamped signature
Form, as shown in fig. 6, clicking button 102:Selection will be endorsed archives choose the Zhang Shaohan part1.rar shelves on desktop
103, in the password of input field 104 input document IC-card, then, click button 105:Produce Electronic Signature, now voucher IC-card
Card reader because execution stamped signature flashing light occurs, window state row 106 show:" starting to produce Electronic Signature " (digital signature).
Then, as shown in fig. 7, window state row 106 show:" starting to produce Electronic Signature identifying code " (stamped signature code).Then, as schemed
Shown in 8, window state row 106 show:" line data Kucheng's work(!!In write data, please wait a moment ... ".When the form shape in Fig. 9
State row 106 show:" stamped signature data write into Databasce success!!", data base returns a storage successful information and calculates to notes type
Machine, as shown in Fig. 9 information boxes 110, " producing Electronic Signature success ", and the produced first stamped signature code of stamped signature success;
“72245B3E”.
Refering to Fig. 1 and Figure 10, in this dual stamped signature step S2, first signed according to this first numeral of this first stamped signature code verification
Chapter, recycles one second private key to be endorsed again according to this first stamped signature code, is signed with one second numeral producing corresponding
Chapter and one second stamped signature code upload, to the data base of this server, have between this first stamped signature code and this second stamped signature code
There is a connection, and form a stamped signature code-group, and this first digital signature and this second digital signature form a digital signature group.
And, before being endorsed again according to this first stamped signature code using this second private key, increase one second digital content newly extremely
The data base of this server.
In this step, using same Ministry of Economic Affaris industry and commerce voucher card with the Zhang Shaohan part2.rar shelves 113 of 1.38MB (the
Two digital contents) carry out " more signing ", and newly-increased Zhang Shaohan part2.rar shelves 113, " input previous Electronic Signature in input field
Identifying code " 112:" 72245B3E ", then, input and endorse Zhang Shaohan part1.rar shelves 103 when this Ministry of Economic Affaris industry and commerce voucher
The password of card, after clicking button " updating stamped signature content " 114, when window state row 106 show:" checking stamped signature success!!", this
Step inputs this first stamped signature code " 72245B3E " in mobile computer, and is sent to the data base of server, completes down
Carry for verifying that data needed for this first digital signature, to mobile computer, verifies this first digital signature, verify into
Work(can continue executing with sub-step S22 of endorsing and test it is necessary to first carry out before sub-step 22 that is to say, that execution each time is endorsed
Demonstrate,prove sub-step S21, what the checking of using terminal machine software program had previously produced the first digital content of the first digital signature is
Accurate.Then, flashing light in the card reader of voucher IC-card, and now the window state row 106 in Figure 11 show:" update
Stamped signature content, is stored in data base's success!!”.Then, server returns a storage successful information, such as Figure 11 information boxes 117:
" update stamped signature content, be stored in data base's success!!" shown in, and stamped signature code " 72A331C6 " produced by stamped signature success.This
Individual " 72A331C6 " stamped signature code is the second stamped signature code.
Figure 12 and Figure 13 is that in display Hinet Microsoft SQL database storing step, each has stored data.
Refering to field title VerifyCode in Figure 12, ID2181 arranges 72245B3E corresponding to 2185 row, is the first stamped signature code.Field
Title VerifyCode, ID2190 arranges 72A331C6 corresponding to 2193 row, is the second stamped signature code.The EncData field of Figure 12,
It is that this first digital content is converted into two-symbol data that ID2181 arranges to 2185 row, is stored in data after being sent to server
Storehouse.The DecData field of Figure 12, it is that this second digital content is converted into two-symbol data that ID2190 arranges to 2193 row, transmission
It is stored in data base to server.
Refering to Fig. 1 and Figure 14, this verification step S3, according in this stamped signature code-group at least one, verify this digital signature
In group at least one.According to the first stamped signature code in this stamped signature code-group, by this connection, verify in this digital signature group
First digital signature and the second digital signature, and obtain this first digital content and this second digital content.
Want the user of download this mp3 archives of certification, in this terminating machine software program, click option " download voucher "
118, screen display goes out the form 119 of one entitled " download voucher ".In input field " Electronic Signature identifying code please be input " 120, will
" 72245B3E " (first stamped signature code) inputs, and then push button " obtaining card number by data base " 121, stamped signature people's voucher IC-card
Card number display field 122 shows " MT00000001252127 ", and this card number is also printed on the outward appearance of industrial and commercial voucher card, and MT means that it is
Industrial and commercial voucher card.After clicking the button " going to " 123 of industrial and commercial credentials download network address, triggering one preset browsing device connects upper Ministry of Economic Affaris
" credentials download and query webpage ", such as Figure 15, in the input field " voucher IC card numbers " 124 of webpage, by voucher IC card numbers:
MT00000001252127 inputs, then as Figure 16, after pressing " download " button 125 in webpage, credentials download to desktop.
Then, refering to Figure 17, in the form returning to terminating machine software program, click option " checking stamped signature ", screen display goes out one and entitled tests
The form of signed certificate chapter, continues to click option " selection certificate file ", just now from Ministry of Economic Affaris website on certificate file input desktop
The voucher downloaded in webpage, then clicks button " checking Electronic Signature " 126, now, such as Figure 18, screen display one information boxes
127, content is " checking stamped signature success ", after pressing determination key, refering to Figure 19 and Figure 20, screen display stamped signature people:Taiwan high-order
Net limited company, checking unit:Industrial and commercial credential management center.At the same time, screen display is downloaded to C:ICheck catalogue
In VerifyCert.rar shelves 128.The Zhang Shaohan part1.rar of the 1.69MB in archives 128 and Fig. 5 that this is proved to be successful
Shelves 103 (the first digital content) content is identical, the multimedia shelves VerifyCert1.rar shelves that in Figure 20, another is proved to be successful
129 (the second digital contents) are identical with Zhang Shaohan part2.rar shelves 113 contents of the 1.38MB in Fig. 5.Click
VerifyCert1.rar shelves 129, will hear that pen electricity plays the mp3 music shelves of Zhang Shaohan.Refering to Figure 21 and 22, play Zhang Shao
During containing this section of music shelves, preset information contents 130 " the Zhang Shaohan mandate yam network sky being proved to be successful can be shown by discontinuous
Empty ", and " iCheck network address ".
Refering to Fig. 4 and Fig. 6, the 6th preferred embodiment based on the content verification method of digital signature code for the present invention, bag
Endorse step S1, dual stamped signature step S2, an a preset times verification step S6 and verification step S3 containing one.This dual stamped signature
Sub-step S22 that step S2 includes preset times checking sub-step S24, checking sub-step S21 and is endorsed.It is with the 5th relatively
The difference of good embodiment is, this first stamped signature code corresponds to one first preset times, is carrying out this dual stamped signature step S2
In checking sub-step S21 or this verification step S3 before, this server first checks whether this first stamped signature code defeated
Enter to exceed this first preset times, if inspection result is yes, stop checking, if inspection result is no, continue checking.Similar
Ground, this second stamped signature code corresponds to one second preset times, before carrying out this verification step S3, this server first check this
Whether two stamped signature codes have been enter into exceeding this second preset times, if inspection result is yes, stop checking, if checking knot
Fruit is no, then continue checking.
Endorse in step S1 at this, user can be default secondary in selectionbar 107 input one first of effective degree at this moment
Number is so that this first stamped signature code is to should the first preset times.Similarly, one can also be inputted in this endorses sub-step S22
Second preset times are so that this second stamped signature code is to should the second preset times.And due to this first stamped signature code and this
Between two stamped signature codes, there is a connection, and form a stamped signature code-group, therefore in this preferred embodiment, this preset times meeting
With the latter, that is, based on this second preset times, when this first preset times is set as 5 times, judge in this step S24 without departing from
Preset times, and be able to be set as 2 times it is desirable to download and the user of this mp3 archives of certification is tested at this in the second preset times
Card step S3, according to the first stamped signature code in this stamped signature code-group, by this connection, verifies first in this digital signature group
Digital signature and the second digital signature, and when obtaining this first digital content and this second digital content, this first number can be judged
Word content and this second digital content are after sub-step S22 that carries out endorsing, if be all downloaded beyond 2 times, if NO, just enter
Row this verification step S3.
By " whether checking network audiovisual program service website has using illegal piracy video " IFPI IFPI
International always 2013/03/26 news release:" after being scanned for for keyword with any one singer's name plus ' mp3 ', homepage
Still there is substantial amounts of illegal connection in Search Results, ".Understand accordingly, the present invention, for the illegal download of mp3, has very big sending out
Wave, room for improvement.
Refering to Fig. 1, the 7th preferred embodiment based on the content verification method of digital signature code for the present invention, comprise one and add
Sign step S1, dual stamped signature step S2 and a verification step S3.Then, cooperation one website and webpage checking flow process further illustrates
The present invention.It should be noted that in this preferred embodiment, the first digital signature code of this generation, the second digital signature code,
All custom and produce by user.
In this step S1 of endorsing, endorsed using one first private key pair one first digital content, with produce with this first
One first corresponding digital signature of digital content and one first stamped signature code, then by this first digital content, the first numeral
Stamped signature and the first stamped signature code upload to this server data base.
In this preferred embodiment, this first private key comes from Taiwan high-order net limited company industry and commerce voucher card, should
First digital content is webpage shelves, on January 6th, 2013, is endorsed and produced this first numeral and sign by this first private key
Chapter code, its content by user institute custom for 12345ABCD.
In this dual stamped signature step S2, first according to this this first digital signature of the first stamped signature code verification, recycle one the
Two private keys are endorsed again according to this first stamped signature code, to produce one second corresponding digital signature and one second stamped signature
Code upload, to the data base of this server, has a connection between this first stamped signature code and this second stamped signature code, and shape
Become a stamped signature code-group, and this first digital signature and this second digital signature form a digital signature group.Preferably implement at this
In example, this second private key comes from payment company on a line, and it carries out this checking sub-step according to the first stamped signature code 12345ABCD
After the completion of rapid S21, then sub-step S22 that carries out endorsing.
In this verification step S3, according in this stamped signature code-group at least one, verify at least one in this digital signature group.
In this preferred embodiment, string webpage hyper linking is had to write " iCheck Home Network when the person that browses webpage sees a webpage upper right corner
Page identifying code 12345ABCD ", point is even after this hyper linking, the person that browses webpage first download enable the present invention a terminating machine soft
Part program, it connects to the Hinet server database storing the custom identifying code of 12345ABCD.Figure 23 to Figure 27 is to use
In this preferred embodiment of explanation.When the terminating machine software program starting, click:Download voucher, screen display goes out an entitled " download
The form of voucher " such as Figure 23, in input field:" Electronic Signature identifying code please be input ", 12345ABCD stamped signature code (namely
First stamped signature code) input, push button:After " card number is obtained by data base ", stamped signature people's voucher IC card numbers display field:
" MT00000001252127 ", after clicking the button " going to " of an entitled industry and commerce credentials download network address in Figure 23, terminating machine is just
Connected using a preset browsing device " credentials download and the query webpage " of upper Ministry of Economic Affaris, input " MT00000001252127, with
Card selects to be downloaded to the desktop of such as terminating machine.Then, click option in the form returning to terminating machine software program:" checking electricity
Sub- stamped signature ", such as Figure 24, screen display goes out the form of an entitled checking stamped signature, continues to click an option:Select certificate file,
Certificate file inputs the voucher just now downloaded from Ministry of Economic Affaris's website and webpage on desktop, in input field " if there being oneself of countersigning officer
Order code please input ":12345ABCD, hits and selects button:Checking Electronic Signature, such as Figure 25, computer screen shows and is downloaded to C:\
VerifyCert.html shelves in iCheck catalogue, such as Figure 26, screen display stamped signature people:Taiwan high-order net limited company,
Checking unit:Industrial and commercial credential management center.Then the content automatically opening up VerifyCert.htm shelves is as shown in figure 27.This enforcement
Example can have at least one to sign people again, i.e. pay company on this line, be proved to be successful and download at least one and related to webpage (set
Have password) multimedia shelves or the shelves unrelated with webpage such as multimedia advertising shelves.Can also raise one's voice through one when being proved to be successful
Device sends sound to inform user, and such as " being proved to be successful, stamped signature people Taiwan high-order net limited company " is to have recognized
Demonstrate,prove successfully.
Reported according to China Times's on December 6th, 2012:Well-known Blogger " Pickles princess " spreads out of article, picture meet with another
Name Blogger " family matters queen " is usurped, picture, after renaming, is published on the blogger of oneself.Www.chinanews.com 2013 2 months 27
Day:" certain website is palmed off《I is singer》The name of column group, carries out SMS prize drawing business, obtains illicit income.", permissible
Understand that the present invention is very helpful for the checking of the webpage true and false.
The occasion of other application of the present invention such as " real estate DNA ".Refer to provide real estate Electronic Signature such as product using the present invention
Matter QC, presell, dealing, lease net price login, bank loan.When the digital signature code in input advertisement is it may be verified that have or not
The following file processing through digital signature with as guarantee, such as each important construction material certificate of guarantee (survey report, reinforcing bar
"dead" pollution testimonial, reinforced concrete test report, the report of mixed mud comprcssive strength, premixing mixed mud quality guarantee
Book, mixed mud chloride ion content examining report book, haunted house investigation proof etc.).Using input validation code of the present invention, it is proved to be successful
When, can also show that the digital signature data that board of trustee club is signed includes each family plane graph, each family net price logs in record, administration commission is every
Administration fee record is paid in session record, resident family of administration commission, (stamped signature and board of trustee do to the record of management company of administration commission in such as management company
Multiple label can be made), building monthly income with expenditure, building repair record, building bulletin record etc..Administration commission is to use organization credentials
IC-card does stamped signature.New house or old room, all can set up one and build thing DNA, provide all electronics in the relevant house of house purchaser to house
Stamped signature mark is demonstrate,proved, be not necessary to when selling room in the future time-consuming go for data to prove room rate, have real estate DNA to may prove because losing to sell and
It is not necessary to pay the tax that need not pay.Real estate DNA be also used in letting agency business, be used in bank to mortgage money melt formality,
The formality of mortgage loan.One stamped signature code (identifying code) of input will show this praedial DNA, more sign and complete with multiple label
To praedial checking.
Or, it is also possible to apply the invention to " object is cracked down on counterfeit goods ".High price object or the checking of special object:(a) thing
The manufacturer of part or whole seller are to one password of setting in Word or Excel or PDF " archives "." archives " also set volume
Collect a password, archives just cannot be edited by others.B () is realizing a terminating machine of the present invention (may also be the mobile phone of a buyer)
Software program, the buyer of object after the scene of selling inputs identifying code (product serial number on such as object) 12345678,
After the seller retailer of checking " live " and manufacturer's status success, one " archives " are just downloaded in terminating machine and open this
" archives ", but the case password that is this moment still in short supply could open " archives ".Buyer now requires seller retailer's use to be proved to be successful
Email address in downloaded retailer's " voucher " afterwards, (live) sends an Email to buyer, and buyer receives retailer's
Whether the E-mail address comparing retailer after Email is correct.C () then, buyer is selling live input product sequence number
(that is, identifying code 12345678), download the public key of encryption, after clicking " encryption " option, select " to do with the owner of voucher
After the button of encryption contact " option, this software will Email to voucher main body (namely manufacturer), wait voucher owner (raw
Business men) reply Email to this " archives " password of buyer and be used for can file opening success, this moment verify complete.Can open
" archives " every content in Viewed file for buyer's (before price gold) and object main points afterwards.Then manufacturer does more to sign and goes
After the new password of change archives and new content, if during the product serial number 12345678 of wired upper input, just will run into because " shelves
Case " has separately newly set the situation of password " password bad and cannot open ".The present invention is used in anti-distributor or ruffian with likelihood
Packaging internal memory fake products.Verify production upstream company, middle reaches mid-game business, downstream distributor, prevent mid-game business or distributor from altering life
Produce data.The current authorised dealer register of checking production company.2 months 19 days telegrams of www.chinanews.com are led:" national consumers' association group in 2012
Knit and accept Chinese liquor complaint 1038, just have 1 to be related to personation problem in every 5 complaints, some operators are turned on the banner of sale monopoly,
Sell personation tobacco and wine to consumer, part high price famous brand of wine becomes the severely afflicated area of personation.”.Another " thing is cracked down on counterfeit goods " example be
Be equipped with one (at least) (custom) identifying code in outside the packing box of thing or in packing box, identifying code can be tear after or erasing
Just observable identifying code (such as QR code) after going, identifier A sells website or manufacture with what membership password entered this thing
Businessman's affiliate web site of this thing, identifying code is inputted after website and webpage by identifier, and website will Email mono- multi-medium file
To identifier A, after identifier A is proved to be successful using identifying code, one " multi-medium file " is just downloaded to terminating machine to password B
In and open this " multi-medium file ", but the case password that is this moment still in short supply could open " multi-medium file ", identifier is defeated
If can open after entering password B is exactly to complete the checking of cracking down on counterfeit goods to this thing.The content of multimedia opened, has the manufacturer of this thing
Various explanations to this thing.
On April 23rd, 2013 Sina's science and technology news:" only 2012, Chinese Alibaba (Taobao) just provided line to the police
Rope is related to 72 brand article information altogether, 1.7 hundred million yuans of case-involving total amount, arrests suspect's total number of persons 324 people, clique's number
43.”.For the certification of article genuine-fake, it is also the adaptable scope of the present invention.
Then illustrate that other can complete the software of the present invention, the layout of hardware and apply.Endorsed in the present invention
The computer of step S1, dual stamped signature step S2 and verification step S3 is all not limited to same computer, this terminal of any loading
The computer of machine software program, terminating machine, tablet PC, even intelligent mobile phone all can be used for completing the present invention.
Relevant " other hardware ":Terminating machine for example handheld-type intelligent type device, personal digital assistant device (PDA), one
Google acoustic control intelligent eyeglass device.Terminating machine may also be intelligence (high image quality such as 4K, 3D) TV, Apple iTV or an intelligence
Can watch device, information kiosk (kiosk), handheld game device, digital frame, Apple iPAD, cash register (terminal) machine (POS),
Network equipment (network device), vehicular computer, (containing electronic chart) vehicle navigation device, (data base) service
Device, high in the clouds computing device or multimedia messages machine, multimedia messages machine can be the use nature being for example placed on convenience store
The multimedia messages machine of people's voucher IC-card.The present invention may be present in the associated component of hardware unit of an access terminals machine.This
Invention can also be deployed in the computing device of any species and form.
Relevant " being verified with mobile phone, hand held readers ":There is such as one (JAVA) in mobile phone, hand held readers device
Touch-control APP operates software to connect the Microsoft MSSQL data base of a server through an ActiveX program, in this server
Equipped with the software realizing the present invention or hardware, the result is back to and is shown in mobile phone, hand held readers.
About " the connected data base's species of server, the data storing ":The title of the database software using is illustrated such as
Microsoft SQL, SyBase, DB2, Oracle, Informix, PostgreSQL, MySQL, mSQL, a high in the clouds device simultaneously have
There are data base, Microsoft SkyDrive high in the clouds or the Google high in the clouds of calculation function, but not limited to this, store up in the data base of server
Data base's field documentary IC card numbers of depositing, name, e-mail box, IC-card voucher sequence number, IC-card holder's identity card
Number, digital signature encryption data, digital signature ciphertext data, stamped signature code (identifying code), custom stamped signature code (identifying code),
Expiry date, preset times, have verified that number of times, have verified that the date, more sign or signs again the front stamped signature code being used, answer label
Person's name, again label data, the secondary shelves name type of archives of endorsing.
About " stamped signature and encryption and decryption mechanism, digital certificate and IC-card ":The algorithm being used is also not necessarily limited to RSA, such as
DSA, ECDSA, ECDSA or P52 are all applicable to the present invention.Voucher IC-card can be contact or contactless (vicariouss)
The chip credit card or chip fiscard.The digital signature mechanism that smart card (such as ISO7816 specification) of the present invention is supported is non-right
Title formula encryption and decryption RSA mechanism, DSA mechanism or any one mechanism.Digital certificate (digital certificate, also someone be translated into
Electronic certificate or digital certificate), generally include ID, voucher sequence number serial number, valid period expiration
Period, the information information related to the issuer of sufficient vouchers originator and voucher finger print data
Fingerprint data etc..The voucher of IC smart card can also use EAP transport layer (EAP-Transport Layer
Security (EAP-TLS) protocol) transmission data.In addition, after the step of the password of input natural person's voucher IC-card,
If if having (natural person) voucher in terminating machine, a step (not shown) can be connect and abrogate key function to internal affairs subordinate load
Ledger and confirmation status data, and whether inspect card out of date.
In each preferred embodiment, the source of described private key and public key is that a token system with third party's public credibility is sent out
Job service main frame, can be to be set up in Ministry of Internal Affairs's natural person's credential management center, Ministry of Economic Affaris's industry and commerce credential management center, tissue
And intracardiac in group's credential management center, doctor thing credential management center or government's arbitrary legal person voucher, or it is erected at other people
Intracardiac in the credential management of battalion dealer, credential management the department such as credit card, China Unionpay card, the Ren Minyin of such as financial circles IC-card
Financial instruments IC-card that row financial IC card, Tianjin and Bank of China are issued, proficiency machine telecommunication operator, a well-known game company
IC-card, the IC-card of a chain cafe.Industrial and commercial voucher IC-card, natural person's voucher IC-card, tissue and group's voucher IC-card use
API (Application Program Interface) program is using the provided download of Hinet company, and uses
The one card management tool software (HICOS Token Utility) of the user side voucher IC-card that Hinet provides, for example
HiCOS Client v2.1.8.exe archives.Private key can be previously stored in a voucher IC-card or be stored in realizes the present invention
There is in software a software program of the equal function of private key.At least one data of private key associated, for example, include voucher IC-card
Card number, name, e-mail box, IC-card voucher sequence number, IC-card holder's identity card number, the high in the clouds correlation of IC-card holder
Data.Can be using a USB (the Universal Serial Bus) ciphering and deciphering device containing documentary or a USB flash memory
(flash memory) device or a USB security token device with the intelligent equal function of fixture.
About " digital content endorsed ":Can be audio content (Audio Content), video content (Movie
Content), drawing (Graphics Content), image (Image Content), word (Text Content), or by
Above-mentioned format combination form or encoded (digital compression) content.Encoded digital media content is for example logical
Cross computer operation, distribution and conversion (broadcasting), and be transmitted between computer network, the example bag of Digital Media type
Include:Windows Media Audio (WMA), Windows Media Video (WMV), MP3, JPEG and AVI.And it is relevant
The Digital Media type that Windows Media Player is supported.The archive content endorsed can be to do increasing to content to add deduct
Few.It is that numeral (multimedia) archives are endorsed in each embodiment, but being also not necessarily limited to can be to more than one numeral
Multi-medium file does continuous way and endorses, and this continuously endorses can be all same identifying code, i.e. stamped signature code, or each quilt
The archives endorsed each have an identifying code.
This first, second digital content can be the archives of any pair shelves name, such as txt, pdf, docx, png,
Png, xps, gif, eml, jpg, gif, pub, rar, xml etc..Digital signature can be executed to any digital document archives
Endorse it is also possible to read all or part of data from any digital document archives to produce digital signature and stamped signature generation
Code.Any digital document archives do the content more signed or sign again after change and can be full content or portion in physical objects
Divide content.Can also increase or decrease.
Relevant " how inputting digital signature code ":The input method of the present invention is included using keyboard, touch-control, acoustic control (sound
Stricture of vagina) identification, retina, slide-mouse, human-body biological identification (as fingerprint), abnormal smells from the patient identification, audio frequency, password, infrared ray, sensing eyeball shifting
Move and be fed back to mobile device(Namely smart mobile phone, tablet PC, digital camera etc., vehicular computer, contain electronic chart
Vehicle navigation device), the picture rolling on display, at least one in gesture etc..
About " producing the mode of stamped signature code and the type of stamped signature code ":For convenience of explanation, described identifying code, or
It is custom identifying code, refer to is all stamped signature code.It is not limited to produce using One-Way Hash Function, or custom with user
Mode.And, its type is not limited to one or mixing of Arabic numerals, symbol, length, various countries' font etc., digital signature code
Type can be any type of code via reading, storage, identification, computing after input terminal machine.When using, " Yahoo believes
When this four traditional Chinese words of breath " are custom stamped signature code (custom identifying code), be stored in data base is exactly that " Yahoo believes
This four words of breath ".Likewise, being to test when using " group of Alibaba " this 6 word simplified Chinese characters or other Japanese or Korean
When card code or custom identifying code, be stored in the data base being connected with server is exactly simplified Chinese character or Japanese or Korean.Plus
Identifying code produced by label or custom identifying code (stamped signature code), when being stored in data base it is necessary to label with present use
Chapter code differs, if if identical, the information that server will return during an identifying code has been used is whole to computer
In the screen of terminal.But the server differing just is not limited by identical identifying code.Stamped signature code can be via any one method
With system encryption.
About " species of server and quantity ":Using the cloud database with computing and server capability, such as one
Store the high in the clouds data server of the various data of sufferer.Server can be a multimedia video server or data, services
Device.Data server can also be provided in one (hand-held) running gear.Can use and include at least one server
Data base and at least one token system send out and Job Server.
About " terminating machine has the role at stamped signature end and verifying end ":Produce the terminating machine of stamped signature code, or computer is same
When be also server (data base) end, i.e. server end (data base) is also stamped signature end.Server end (data base) may also be to be tested
Card end.Any terminal machine all can be as stamped signature end and verifying end.In addition, can go automatically equipped with a computer program in server end
The digital content of at least more than one is done with the required parameters after stamped signature, stamped signature code, connection server data base being connected
Value, stamped signature data Email are to other-end machine.Realize can setting a regular timing journey automatically in terminating machine in the software of the present invention
Sequence, this program goes to execute checking (checking using the identifying code (digital signature code) previously having had verified that and voucher (public key) again
As having or not new more label, multiple label), and by regular for the result time display, and the result is stored into terminating machine simultaneously certainly
Move and be sent to other terminating machines.
About " display of the result, method and display end ":The result of stamped signature checking and data are with least one display
Method, snapshot, SMS, audio-visual, video etc., network is sent to other at least one station terminal machines and shows, and so at least two
Platform above terminating machine user can know who has done a result to what digital content immediately, or will verify
Result passes to which people (terminating machine) to be known.If in addition, execution checking success, terminal screen show at least one under
The content carrying, and show at least one of terminal screen picture.If execution digital signature checking failure, in terminal
Machine storage the content in the reason screen display failure.
Relevant " browser, webpage and e-book ":Using web page tools, such as vernier, slip over show tools, situation instrument,
Dynamically invite instrument, bifurcation thixotroping show tools etc., make in a webpage, an Electronic Paper (book), one kind of the archives of a unlatching
Slip over (hover over reveal) with slide-mouse vernier, parked, touch-control is parked or slide-mouse hits choosing (once or secondary) in more than one
Behind the vicinity of the word content of media, show an action key containing content presentation, after pressing action key, browser
The required parameters value that just (or another unlatching one new form) is connected by a website, download server database.Terminating machine makes
Browser can be Microsoft Internet Explorer, Google Chrome, Mozilla Firefox,
Apple Safari or Opera.Software for realizing the present invention can set and be installed in browser.
About " connection of terminating machine and network ":The present invention can use any existing network facilities, such as ISDN,
Internet, intranet, extranet, wireless network, VPN, bluetooth, Local Area Network (LAN), Wide Area Network
(WAN), metropolitan area network (MAN, metropolitan area network), phone wireless communication networks, public switched telephone
Network (PSTN), business's internet, IP network and/or 3G, 4G network.
About " connection of terminating machine and wireless telecommunication system ":The present invention can be via a wireless telecommunication system, for example, but not
It is limited to:GSM, GPRS, CDMA, WIMAX, PHS, Wi-Fi, wireless (radio) technology, such as radio frequency identification (RFID) or low coverage
Connect one from wireless telecommunications (NFC), bluetooth (Bluetooth), infrared ray (infrared), WLAN, AMPS, TDMA, UMTS etc.
Close network, at least one terminating machine being connected with wireless telecommunication system such as handheld wire-less apparatus (mobile phone), a credential management
The heart, such as Ministry of Internal Affairs's IC-card credential management center, and connect at least one server with commercial activity.For example using integration
Packet radio technology GPRS (General Packet Radio Service) Mobile Communications network, connection activation communicates
The wireless communication base platform that service dealer is set up.The side of desktop PC, mobile computer or tablet PC online
Formula can also be to carry out wireless networking connection via mobile phone.Present invention resides in smart card such as SIM used in mobile phone telecommunications industry
Using asymmetric encryption and decryption mechanism in card, i.e. using digital signature credential mechanism in SIM cards of mobile phones.
The present invention allows user can rapid, immediately, effectively and easily judge the multimedia true and false, execution to " people, thing,
The Dynamic Identification of the various information authenticity such as thing ".Use the software realizing the present invention, be one can to provide the motor-driven of proving program
Property, one kind of convenience there is the Electronic Signature application tool with ISO/IEC as standard of " universality with comprehensive purposes ".Energy
Enough easily and be generally performed in the whole people, each businessman, each inter-agency, particularly can be used in " people of various countries, businessman and mechanism " right
The checking of the Electronic Signature that the people of " China ", each businessman, the voucher IC-card of each mechanism are endorsed, and the phase can make tribute to GDP
Offer.
The technical field further illustrating the present invention is not to be only applicable to a certain enclosed single (for example declaring dutiable goods) application
System or single service platform, and it is intended to reach the high usage of whole people's popularization, and certain be practiced in daily life
Used in a comprehensive purposes application tool.
Further, since the present invention has the good suitability, future, user can be using the handss using the method for the present invention
Held device, immediately and be performed quickly " people, thing, thing " is cracked down on counterfeit goods, is not limited to the application scenario that the present invention is proposed at present,
And be also possible to and derive more extensive, easily application mode.Compare with other digital signature use patterns on the market, this
Invention not only can allow the program of checking information public credibility significantly simplify, for having immediately solving, subtracting of ageing information
Few both sides of supply and demand dispute, promotes the utilization output value of product, and effectively checking is counterfeit, can also derive further more extensive just
Sharp application mode.
In addition, it is also possible to apply the invention to following occasion, such as it is applied to the status of person " test know cell phone incoming call ", not
Before answering cell phone is called or mobile phone has shown call missing, mobile phone Mobile Communications service dealer or the Crinis Carbonisatus called
Go out that first news in brief contains identifying code and database parameter shelves can connect the mobile phone to reception for the network address of download, verify caller
Real status.When data base is the data base servicing dealer using mobile phone Mobile Communications, can be sent by the server at dealer end
Display caller's status information, to the mobile phone of reception people, by the application of the present invention, because of " no caller identification ", and will not be missed
Answer important incoming call, be more desirable to make " the swindle incoming call of illegal status " to be able to be checked.Except using the transmission of mobile phone news in brief, other
For example utilize E-mail, Twitter (tweets), facebook (Facebook), microblogging, (LINE) mobile telephone instant communication software, " micro-
Soft Inform ation " center ", high in the clouds (as Microsoft SkyDrive), network send voice messaging or video, support that the mobile phone of many people group chat is chatted
Its software etc..
It is applied to " whether checking network audiovisual program service website has using illegal piracy video ", on December 23rd, 2012
The Beijing News is reported:" Cheng Long acts the leading role《The 12 symbolic animals associated with a 12 year cycle》Just show, but piracy early has occurred on world-wide web.Beijing broadcasts
Film and television office represents, 17 no cards are engaged in network audiovisual program service website using illegal piracy video, and these websites are all
Illegal website overseas.The website of Beijing area registration just reaches hundreds of thousands, needs regulatory measure constantly to strengthen.”.
It is applied to " consumer's end checking registered trade mark and mark chapter, checking performance bond people and content, checking personalogy experience
And the various licenses true and false whether of an established trade mark with license timeliness phase, commodity such as doctor's operation, anti-Du's item verification prove adulterium, test
The true and false of card network address and web page contents producer, the designer verifying a certain design and authorized content, checking publication print media
Or the status of multimedia advertising person and ad content are in case Du Bufa publishes people.”.
" all rights reserved TAOBAONET.COM " that such as point is selected in the bottom of webpage can verify that the electronics label of TAOBAONET
Zhang Renyu relevant information, for example, click " value-added telecom service business licence:Zhejiang W2-20080224 " is it may be verified that " Zhejiang W2-
20080224 " Electronic Signature people and relevant information.Single webpage can be endorsed and verify for netizen, can be in all websites
Each webpage uses more to sign and verifies for netizen.
It is applied to " dynamic certificate ", the present invention proposes a kind of multimedia certificate of innovation, i.e. the dynamic certificate of Electronic Signature, checking (tool
Effect duration) gift token of hard copy form or electronic multimedia shelves, valuable certificate, coupon, reward voucher, admission ticket." dynamic certificate " i.e.
Shi Tongzhi consumer or businessman field salesperson, the content of (include network download) certificate whether have newer using regulation,
Promotional offer, improve certificate instant effectiveness and solve certificate onsite application when it may happen that dispute.In a paper be printed on reduce the price excellent
Favour but be to be printed on " this reward voucher belongs to dynamic certificate " on businessman's leaflet of validity period, bearer of this note is using testing of being printed on certificate
Card code and connection network address are verified that (1) this expired certificate is expired and whether are had forbearance.(2) place to use, occupation mode, points for attention
Whether have altered.(3) preferential having or not subtracts, and then can download further and show the provided renewal of this businessman after being proved to be successful
Preferential and Commdity advertisement.
" alleged sending to the status of live people etc., thing, thing " is applied on on-site verification work distribute leaflets and " checking is pressed outdoors
People's things of doorbell ", verifies to business card in embodiment, can have trustee's appointment & performance to not recognizing but having to call oneself further
Content (people's things) is verified.Before not opening the door, or it is desirable to first be visited with mobile phone checking before money not being consigned to the people visiting
Maintainer with send company's status, photo, maintenance content and date.The people of (or gathering of visiting) passes " a status please outdoors
With work distribute leaflets content " give your mobile phone (terminating machine).Mobile phone news in brief receives an identifying code and a data base can connect net
Location, touch-control APP application interface program software program (can coordinate pinup picture use) through realizing the present invention reads into mobile phone (terminal
Machine) after, verify the real status passing news in brief to your person and send single digital media content.
It is applied to " ticket checking ", " number and list are arrived in checking scene ", this is the application examples that stamped signature people is also identifier.Example
As Taiwan High Speed Rail, platform ferrum, tourist coach, be built into after the other NFC induction apparatuss in compartment doorway close for mobile phone after passenger loading,
The each item data being detected be communicated wirelessly to high ferro server database be sent on car the PDA of ticket checker or
Among mobile phone, test the booking relevant information knowing each rider, the every content on entity ticket, download passenger's appearance if necessary
Multi-medium file.
If monarch A does not also climb up high-speed railway but uninscribed ticket wants that being given to monarch B takes, and monarch A (steps in the website input of high ferro
Record) monarch B phone number, that is, cellular phone numbers (MSISDN), and input in high ferro webpage and related transfer the possession of ticket letter
Breath, the server of high ferro will complete to transfer the possession of to execute more to sign.
Free Times on April 12nd, 2013 is reported:" timing explosion thing seen unexpectedly by high ferro train ".The present invention can be with respect to real name
The factor such as not convenient of ticket processed, strengthens the trace ability to ruffian for the high ferro, increases the trust to high ferro dimension peace for the passenger.
" on 01 20th, 2013 reports of Epoch Times:University students have a winter vacation the date going home to celebrate the New Year or the Spring Festival, Shandong Rizhao university science and technology
The thousands of students in garden have but unfortunately bought false ticket, meet with difficulty of going home.”.
On 01 16th, 2013 South Daily reports:" Railway Station in Guangzhou public security office smashes up manufacturing and selling of the counterfeit goods ticket major case den, pays altogether
Obtain false train ticket, bus ticket 9.26 ten thousand.”.
The set of such as any one group or party (meal), use a mobile phone or a PDA just permissible in venue
Test and know and (member) number name that real-time statistic is reported for work at present and related data.
It is applied to " true verification platform ", the content of a multi-medium file is endorsed (i.e., again through at least client
Sign), finally endorse through platform (can be a website or a notary) again.Platform is that to sign people again be also one simultaneously for last position
Position can then continue to be the people of more label.
Be applied to " checking registered trade mark photograph, the music copyright power of attorney, SGS check authenticated unit core can code and content,
Haunted house investigation prove, organic farm products, carbon footprint label certificate, the excellent agricultural product in CAS Taiwan, (any kind of) power of attorney,
Agreement, (personal) medical records information, medical prescription pad, medical diagnosiss statement, electronic health record, invention patent certificate (state/power
Sharp unusual fluctuation), photo, picture, chant music, electronic record, books, the real copyright owner of e-book, current possessor, and
Content, purpose and scope that checking authorizes.”.The multi-medium file of transmission in network, if statement has copyright, appoints without agreement
Meaning distribution is exactly illegal.It is used in and notarize to notary or group of copyright intermediary or register.
It is applied to obligee and achieve and endorse (more label, multiple label) for checking and proof to relating to infringement website data.(overseas)
The real status of the owner of website and webpage and producer is available for everybody and immediately verifies (as the 7th preferred embodiment), protecting and
Improve the intellectual property correlation output value.
It is applied to " platform disclosed in every contribution detail flow direction whole process ".Using the software realizing the present invention, one is contributed money
In first unit terminal machine execution first label receiving contribution, the amount of money contributed money by this pen, if there being and continue to be divided into (or with become)
Different n pen gold flow to the second payee and n-th payee, then by second payee's terminating machine and n-th
Payee's terminating machine makees individually multiple label.When the identifying code (the first stamped signature code) that contributor for example uses " the first label " can be tested
Demonstrate,prove the detailed whole courses of his this contribution are open, including such as " receipt, flow direction, using content, use object with using remaining
Volume ", can advantageously and be verified the whole typing of information at different levels contributed money using more label and multiple label.
On May 5th, 2013 Beijing Times is reported, and centenarian Guan Yinghan 100,000 yuan of RMB of donations in Shenyang is deposited to red ten
Word meeting, because pass is English-Chinese has query to contribution whereabouts, the Red Cross of Shenyang City replies it is impossible to distinguish the flow direction of contribution, draws
Send out network to discuss warmly.The Red Cross of Shenyang City sole duty deputy chairman place Shandong is said:" Yaan earthquake, can only on the red meeting in city searching platform
Find the money item comprising a few individual's contribution volumes, without everyone detail.Always put down unless there are really comprehensive
Platform is it is ensured that the whole typing of information at different levels.Such platform not yet really builds up.The not only Red Cross, China does not also have any big
Type charity can accomplish that every contribution is whole open.”
It is applied to " platform of tissue and group, the such as platform of trade council member unusual fluctuation state ".According to Continental Area China
Medical practitioner's law regulation, the administrative department of public health that matriculation should be arrived in the professional place of doctor's change handles alternation procedure.In Taiwan
In city administrative area, the doctor of legal operation or the neck tool certificate of competency, all obtains and freely applies for into doctor trade council.Sufferer uses the present invention
In the speciality for example verifying that A doctor is called oneself, its first sign be using Department of Health's institute's management and control and the doctor thing related to A doctor with
Card IC-card, the second label (multiple label) are the tissue of doctor trade council being added using A doctor and group's voucher IC-card.
Beijing Sina website on 2 11st, 2,013 one Zhao's surname of report is pretended to be doctor to visit to Mr. Shi Mr. and Mrs to see a doctor and take this opportunity
Promote guarantor and deceive 3000 yuan of strong product of RMB.
On December 6th, 2012 Ming Newspaper special news, buy false doctor's paper and seal in Taobao, sick-leave certificates are filled in data,
Impress and emit label doctor's signature.Zhong Guang News Network on December 26th, 2012, the report close doctor of woods surname itself only had educational background in state, was engaged in
Tooth molding is made for many years, to borrow board with the Chen dentist of 70 years old, woods surname close doctor diagnosis and treatment sufferer people more than 2,900, is accused of swindleness neck political affairs
The up to ten million unit of mansion health care expense.Woods surname close doctor pay 130,000 yuan of Chen dentist New Taiwan Currency every month.
Be applied to " net purchase, net clap, purchase by group or collect purchase conclude the transaction before and after, but each quasi- negotiator oneself is carried out with each other
Verify real real name status, the transaction content of each negotiator, protect buyer, the seller and credit card side.”.Checking network is handed over
Whether easily ATM remits money success in case ATM swindles.Verify the state withholdd, state of paying by instalments.Maximum in ecommerce
One of problem is that commodity are counterfeit, if the buyer of network has bought to directly find seller by buyer during counterfeit merchandise and ask repaying, reduces net
Stand and the management manpower of each side expends.
It is applied to " system of real name being voluntarily responsible for by website user ", the content of multimedia to message endorses (more sign, sign again),
In case Du's netizen's mat anonymous way is after (lie) speech is stayed in website, the content relating to infringement is but reprinted again and again and is endangered society.Test
The personal declaration (original text) of the status of card web documents author (reporter) content, checking.
Free Times on May 22nd, 2013, report Miss Dong write out " Fei Lao buys box lunch and refused " article in facebook, caused
The nearly 80,000 people's musters of network are reprinted, and are proved to fake!Miss Dong is summoned to court by Jing Zhongshan branch office of Taibei city and appears in court, and refuses to sell luxuriant and rich with fragrance labor box lunch
Literary composition, heavy losses Taiwan image.
Standing Committee of National People's Congress passes through " with regard to the decision of Strengthens network information protection " it is desirable to network service provides within 2012
The control that person's reinforcement releases news to user, if finding, illegal information should stop transmitting immediately, preserves relative recording to supervisor
Section report, violator can revoke licence, shut down web sites or investigate the people, criminal responsibility.The content that network anonymous user uploads, net
Network ISP must labor intensive inspection and need to bear illegal information immediately do not stop transmit legal responsibility.
It is applied to " system of real name being voluntarily responsible for by the sender of Express Logistics ", (multimedia) content posting part is endorsed,
In case Du Bufa article, danger prohibit the piggybacking logistics of (malicious) product.
It is applied to " clerical mistakes are more signed on line ", bank clients correct the minor error facing cabinet operation as shown in the Examples,
And company please clients right the wrong via on line.
It is applied to " verifying the DNA related to people's things ", such as vehicle DNA, verified whether " non-soaked Vehicle Certificate is bright ", sold car
Mileage proves, custom identifying code can be the part number of car, verifies whether to be really genuine goods when buying part to garage
Rather than buy booty." the inspection record table " of car proves.
Real estate DNA.2013/04/07 China Times's report:" Taichung one room once had the outer labor of female to hang oneself in doors death,
Sold with house owner and during room, do not inform it is that " haunted house " carries announcement.
Tai Zhongdi institute concludes, and sentences and should pay for more than 2,080,000 yuan to house-purchase person.”.United Daily News 2013/04/25 is reported:" high
The one female lecturer's homicide case house in male city, Chen Shuzhen was bought by intermediary, and what discovery was bought later is that haunted house carries announcement, and Kaohsiung Di Yuan tries
Sentence intermediary company and compensate 2,250,000 yuan.”.
It is applied to " entrust and hire out (multiple label) power of attorney, consignment (the signing again) power of attorney, and political affairs competent authority of cities and counties
(server) can immediately be verified the power of attorney and grant tenant and do Companies Registry and move into and move out.”.
It is applied to that " check sheet, company are to the related application of the file of client, board of shareholders record, shareholder's certificate of entrustment, stock business
Book.”.
It is applied to " time of checking diploma content and content alteration ", after being proved to be successful, can download and play the many of correlation
Media.TVBS news on April 27th, 2012 is reported:The awards of generic name " autumn excellent food criticism meeting gold medal ", originally core is sent out
Unit Bu Shi cuisines group or evaluation, but family's plane publication, and dismissed for 1991, on network, there is a " entry blank ",
Fill in and can add prize-giving, but amount of donation is 70,000 6 thousand yuan, equal in a disguised form spending money on prize.Indicate on the packaging and cover medal,
As food gold medal, gold-lettered signboard prize, the first quality are encouraged, part awards are of unknown origin, do not indicate unit of awarding prizes, get the prize time continuously
All do not state clearly.
It is applied to " the every educational background experience in checking curriculum vitae table (including webpage resume) ".Save employer or manpower
Intermediary company checks time and the manpower of original, and job hunter is not required to application and reissues diploma original.Leaving office (or on-job) proves
Electronic Signature:The number of original hard copy is no longer limited.Such as Word shelves resume suggestion is using password and setting Edit Password.
It is applied to " (window) on-site verification somatopsychic disturbance person, student, soldier's foreign nationality's residence certificate and content "
China Times's on May 11st, 2013 is reported:Can be rated as the maximum forgery Foreign Resident's Certificate head Cao's Dehong in full court gulf, two
Year partly to introduce hundreds illegally outer labor, therefrom to exploit commission, monthly at least 2,000,000 yuan of income, to make a profit and be up to 60,000,000 yuan.
In sum, the present invention carries out multiple endorsing to digital content in different forms using multiple private keys, to produce
Raw multiple associated stamped signature codes and digital signature, as long as the user of the true and false to be confirmed inputs according to this stamped signature code correspond to
Software after, you can easily confirm the true and false of digital content endorsed, so the purpose of the present invention really can be reached.
Claims (14)
1. a kind of content verification method based on digital signature code is it is adaptable to one has the server of a data base, its feature
It is, the method comprises the steps of:
One endorses step, is endorsed using one first private key pair one first digital content, to produce and this first digital content
One first corresponding digital signature and one first stamped signature code, then by this first digital content, the first digital signature and
One stamped signature code upload to this server data base;
One dual stamped signature step, first according to this this first digital signature of the first stamped signature code verification, recycles one second private key root
Endorsed again according to this first stamped signature code, with produce one second corresponding digital signature and one second stamped signature code and on
It is loaded onto the data base of this server, between this first stamped signature code and this second stamped signature code, there is a connection, and form label
Chapter code-group, and this first digital signature and this second digital signature form a digital signature group;And
One verification step, according at least one of this stamped signature code-group, verifies at least one of this digital signature group.
2. the content verification method based on digital signature code as claimed in claim 1 it is characterised in that:In this dual stamped signature
In step, before being endorsed again according to this first stamped signature code using this second private key, update this first digital content
For one second digital content, make this second stamped signature code to should the second digital content.
3. the content verification method based on digital signature code as claimed in claim 2 it is characterised in that:In this verification step
In, according to the first stamped signature code in this stamped signature code-group, by this connection, verify that the first numeral in this digital signature group is signed
Chapter and the second digital signature, and obtain this second digital content.
4. the content verification method based on digital signature code as claimed in claim 1 it is characterised in that:In this dual stamped signature
In step, before being endorsed again according to this first stamped signature code using this second private key, increase one second digital content newly
Data base to this server.
5. the content verification method based on digital signature code as claimed in claim 4 it is characterised in that:In this verification step
In, according to the first stamped signature code in this stamped signature code-group, by this connection, verify that the first numeral in this digital signature group is signed
Chapter and the second digital signature, and obtain this first digital content and this second digital content.
6. the content verification method based on digital signature code as claimed in claim 1 it is characterised in that:This first private key and
Second private key is the same private key belonging to same user.
7. the content verification method based on digital signature code as claimed in claim 1 it is characterised in that:In this dual stamped signature
In step, after being endorsed again according to this first stamped signature code using this second private key, this first stamped signature code and
Two stamped signature codes correspond to identical first digital content.
8. the content verification method based on digital signature code as claimed in claim 7 it is characterised in that:In this verification step
In, according to the first stamped signature code in this stamped signature code-group, by this connection, verify that the first numeral in this digital signature group is signed
Chapter and the second digital signature, and obtain this first digital content.
9. the content verification method based on digital signature code as claimed in claim 1 it is characterised in that:This first private key and
Second private key is different private keys.
10. the content verification method based on digital signature code as claimed in claim 1 it is characterised in that:The method is also wrapped
It is contained in the multiple stamped signature step between this dual stamped signature step and verification step, this multiple stamped signature step is first according to this second label
This second digital signature of chapter code verification, recycles one the 3rd private key to be endorsed again according to this second stamped signature code, to produce
Raw one the 3rd digital signature and one the 3rd stamped signature code, and the 3rd stamped signature code is added into this stamped signature code-group, the 3rd number
Word stamped signature is added into this digital signature group.
11. the content verification method based on digital signature code as claimed in claim 1 it is characterised in that:This first stamped signature
Code corresponds to one first expiry date, before the checking sub-step in carrying out this dual stamped signature step or this verification step, should
Server first checks whether the current time alreadys exceed this first expiry date, if inspection result is yes, represents this first stamped signature
Code is invalid and stops checking, if inspection result is no, represents that this first stamped signature code is effective and continues checking.
The 12. content verification methods based on digital signature code as claimed in claim 1 it is characterised in that:This second stamped signature
Code corresponds to one second expiry date, and before carrying out this verification step, this server first checks whether the current time has surpassed
Crossing this second expiry date, if inspection result is yes, representing that this second stamped signature code is invalid and stops checking, if checking knot
Fruit is no, represents that this second stamped signature code is effective and continues checking.
The 13. content verification methods based on digital signature code as claimed in claim 1 it is characterised in that:This first stamped signature
Code corresponds to one first preset times, before the checking sub-step in carrying out this dual stamped signature step or this verification step, should
Server first checks whether the number of times that this first stamped signature code has been enter into exceedes this first preset times, if inspection result is
It is then to stop checking, if inspection result is no, continue checking.
14. the content verification method based on digital signature code as claimed in claim 1 it is characterised in that:This second stamped signature
Code corresponds to one second preset times, and before carrying out this verification step, this server has first checked this second stamped signature code
Whether the number of times being transfused to exceedes this second preset times, if inspection result is yes, stops checking, if inspection result is no,
Then continue checking.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310349633.9A CN104376252B (en) | 2013-08-12 | 2013-08-12 | Content verification method based on digital signature code |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310349633.9A CN104376252B (en) | 2013-08-12 | 2013-08-12 | Content verification method based on digital signature code |
Publications (2)
Publication Number | Publication Date |
---|---|
CN104376252A CN104376252A (en) | 2015-02-25 |
CN104376252B true CN104376252B (en) | 2017-03-01 |
Family
ID=52555154
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201310349633.9A Expired - Fee Related CN104376252B (en) | 2013-08-12 | 2013-08-12 | Content verification method based on digital signature code |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN104376252B (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
TWI637322B (en) * | 2017-12-14 | 2018-10-01 | 開曼群島商庫幣科技有限公司 | Method of updating firmware of closed storage device |
Families Citing this family (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106960346A (en) * | 2016-01-11 | 2017-07-18 | 茂邦电子有限公司 | The carrying device and its application process of network trading are carried out with running gear for individual |
WO2017153495A1 (en) * | 2016-03-08 | 2017-09-14 | Appii Pty Ltd | A system and method for creating a database of independently validated educational and work experience profiles (curricula vitae) using blockchain smart contracts |
CN106330863B (en) * | 2016-08-11 | 2020-05-19 | 武汉益模科技股份有限公司 | Management method and system for realizing instant online countersigning of multi-party conference |
JP7126822B2 (en) * | 2017-12-18 | 2022-08-29 | Line株式会社 | Program, information processing method, and information processing apparatus |
CN108288162A (en) * | 2018-01-15 | 2018-07-17 | 安趣盈(上海)投资咨询有限公司 | A kind of security authentication systems and method |
CN110046524A (en) * | 2019-04-16 | 2019-07-23 | 昆山丘钛微电子科技有限公司 | A kind of processing method of data, device, electronic equipment and medium |
CN113139197B (en) * | 2021-04-27 | 2024-05-28 | 上海淇玥信息技术有限公司 | Project label checking method and device and electronic equipment |
CN115879136B (en) * | 2023-02-09 | 2023-06-06 | 蒲惠智造科技股份有限公司 | Cloud data protection method |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101018117A (en) * | 2006-02-11 | 2007-08-15 | 鸿富锦精密工业(深圳)有限公司 | Webpage log encryption system and method |
CN101022339A (en) * | 2007-03-23 | 2007-08-22 | 郭传真 | Electronic sign stamp identifying method combined with digital centifi cate and stamp |
CN101037059A (en) * | 2003-07-03 | 2007-09-19 | 北京东方金鹰信息科技股份有限公司 | Method for realizing stamp for signature and the system managing method for realizing the same |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1390005A (en) * | 2001-06-06 | 2003-01-08 | 陈杰 | Safety marking network system and its data processing method |
-
2013
- 2013-08-12 CN CN201310349633.9A patent/CN104376252B/en not_active Expired - Fee Related
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101037059A (en) * | 2003-07-03 | 2007-09-19 | 北京东方金鹰信息科技股份有限公司 | Method for realizing stamp for signature and the system managing method for realizing the same |
CN101018117A (en) * | 2006-02-11 | 2007-08-15 | 鸿富锦精密工业(深圳)有限公司 | Webpage log encryption system and method |
CN101022339A (en) * | 2007-03-23 | 2007-08-22 | 郭传真 | Electronic sign stamp identifying method combined with digital centifi cate and stamp |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
TWI637322B (en) * | 2017-12-14 | 2018-10-01 | 開曼群島商庫幣科技有限公司 | Method of updating firmware of closed storage device |
Also Published As
Publication number | Publication date |
---|---|
CN104376252A (en) | 2015-02-25 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
TWI614636B (en) | Content verification method based on digital signature code | |
CN104376252B (en) | Content verification method based on digital signature code | |
US11727226B2 (en) | Digital identity system | |
EP4165855B1 (en) | Systems and methods for building blockchains for verifying assets for smart contracts | |
Abou Jaoude et al. | Blockchain applications–usage in different domains | |
US12020178B2 (en) | Method and apparatus for information representation, exchange, validation, and utilization through digital consolidation | |
US10594484B2 (en) | Digital identity system | |
US20200013073A1 (en) | Systems and methods for using codes and images within a blockchain | |
AU2019348201B2 (en) | System, devices, and methods for acquiring and verifying online information | |
WO2016128569A1 (en) | Digital identity system | |
JP2014515142A (en) | Method and system for authenticating an entity by a terminal | |
JP2002334162A (en) | System for managing person and object information | |
Soner et al. | Exploring blockchain and smart contract technology for reliable and secure land registration and record management | |
US20230259919A1 (en) | Review engine verification with non-fungible authentication tokens | |
Bhardwaj et al. | Direct benefit transfer using Aadhaar: improving transparency and reducing corruption | |
Kshetri | Blockchains with Chinese characteristics | |
CN111985905B (en) | Socialization manpower resource management system and method based on blockchain technology | |
Fort et al. | Chinese business and the Internet: The infrastructure for trust | |
Elhag et al. | Blockchain and cryptocurrency technology in the Saudi Arabia | |
US20240012944A1 (en) | System and method for authenticating certificates using nfts | |
Coelho | Blockchain-based reputation models for e-commerce: a systematic literature review | |
Sharma | Digital Locker-A study on the Paperless Future | |
AU2023206308A1 (en) | Digital consolidation | |
ESCAP | Harmonized development of legal and regulatory systems for e-commerce in Asia and the Pacific: current challenges and capacity-building needs | |
Mushi | Impact of E-commerce on the Legal Regime in Tanzania. A Case Study of the Law of Contracts in Tanzania vis-à-vis on-line Contracts made in Dar-es-Salaam Region |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20170301 Termination date: 20210812 |
|
CF01 | Termination of patent right due to non-payment of annual fee |