CN107025412B - Method for preventing illegal mobile use of credit mark - Google Patents

Method for preventing illegal mobile use of credit mark Download PDF

Info

Publication number
CN107025412B
CN107025412B CN201610060751.1A CN201610060751A CN107025412B CN 107025412 B CN107025412 B CN 107025412B CN 201610060751 A CN201610060751 A CN 201610060751A CN 107025412 B CN107025412 B CN 107025412B
Authority
CN
China
Prior art keywords
credit
strokes
dot
symbols
character
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201610060751.1A
Other languages
Chinese (zh)
Other versions
CN107025412A (en
Inventor
吴建明
唐文凯
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN201610060751.1A priority Critical patent/CN107025412B/en
Priority to PCT/CN2016/103386 priority patent/WO2017128784A1/en
Publication of CN107025412A publication Critical patent/CN107025412A/en
Application granted granted Critical
Publication of CN107025412B publication Critical patent/CN107025412B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures

Abstract

A method for preventing illegal mobile use of exclusive credit mark belongs to the anti-counterfeiting technical field, and is characterized in that a hexadecimal array formed by 'point' symbols is used, and a virtual middle line of each character stroke handwriting is determined in a track distribution coordinate of a character stroke with specificity in a credit mark image; the 'point' symbols of hexadecimal numbers are arranged and written into the strokes of the credit marks along the confirmed virtual middle line to generate a new exclusive credit mark for preventing illegal mobile use, and then the new exclusive credit mark is synthesized into an electronic document to be signed.

Description

Method for preventing illegal mobile use of credit mark
The technical field is as follows:
the invention relates to an anti-counterfeiting technology of a credit document, in particular to a method for preventing a credit mark from being illegally and movably used, which is a technical scheme of a Chinese patent ZL200710121845.6 invention named as a credit mark random line generating method.
Background art:
the Chinese patent No. ZL200710121845.6 and the patent with the invention name of 'Credit mark random line generating method' are explained in the background technology as follows:
the "exchange of benefits between human societies, which often uses a certificate with a credit token, i.e. what we usually say" stamped documents "or" signed documents ", is required.
The Chinese government stipulates that 'the documents are sealed to be effective', a large number of documents are sealed in government work, and a large number of contracts are sealed in business work of enterprises.
Other countries have regulations such as the use of seals or badges, or the use of personal signatures.
In daily life, a common seal or badge only represents a unit, a mechanism or an individual, and the seal or badge only displays the name of the unit, the mechanism or the individual in use and has no relation with the content of a signed document.
The usual personal signature also has no data-wise relation to the identified file content.
The above-mentioned seal, logo, or personal signature, we may refer to them collectively as "credit mark".
In the presence of high-technology components such as modern high-precision scanners, computer image processing software, automatic engraving machines, photosensitive exposure machines and the like, seals and logos are very easy to scan, copy and forge, and copied patterns are consistent and cannot be identified.
The personal signature may also be written in imitation so that it is hard to distinguish between true and false.
In the popularization and implementation of global e-government and e-commerce, the traditional credit identification method of stamping and personal signature can be combined into an office computer information system, an electronic signature mode is used, electronic image files of the stamp, the badge and the personal signature are inserted into the electronic files, and then the electronic files with the stamp, the badge and the personal signature are printed by using computer-controlled image-text printing equipment (such as a color printer).
However, electronic images of a seal, a logo, and a personal signature signed by such a method are easily scanned and copied once printed on a paper document, and thus authenticity cannot be identified. "
The above is a description of the patent background art of the invention of Chinese patent No. ZL200710121845.6 entitled "Credit Mark random streak Generation method".
In order to solve the problem that the credit identification is copied and copied illegally and used movably so as to forge credit documents, the Chinese patent No. ZL200710121845.6 and the invention named as the credit identification random line generating method provide a credit identification random line generating method, so that a credit identification pattern signed on paper can carry a digital signature random digital line with unique pattern characteristics, thereby effectively preventing, identifying and attacking illegal actions of forging the credit identification.
The method of the patent comprises the following steps: converting the digital signal of the digital signature into an analog signal, and then overlapping the analog signal with the analog signal of the exclusive credit mark to generate a unique 'line' method; the anti-counterfeiting technology is suitable for not only a seal but also a personal signature.
In the content of the specific implementation manner, the authenticity verification method is described in four steps:
the anti-counterfeiting detection steps are as follows:
the first step is as follows: setting a common scanner 600DPI and above, RGB color scanning seal stamp.
The second step is that: magnifying and checking the printed text image obtained by scanning to see whether a line track exists or not, and not regarding the printed text image as counterfeit: and if so, continuing.
The third step: obtaining the hash value of the electronic file or the plain text content of the credit identification file, encrypting the hash value by using the asymmetric key of the digital certificate of a credit identification unit, and regenerating the 'digital signature digital streak line' aiming at the credit identification according to the generation parameters and rules of the 'digital signature streak line' of the credit identification.
The fourth step: and (3) making the group of digital signature random digital lines, overlapping the digital signature random digital lines on the credit mark to be verified, observing the superposition condition of the line tracks, and judging the credit mark (such as a seal) to be true when the line tracks are superposed.
The above is the testing procedure of the Chinese patent with patent number ZL200710121845.6 and invention name 'Credit mark random line generating method'.
The credit mark mainly comprises a signature and a seal. The standard and style of east and west seals are generally national or custom, then the name of legal unit with literal meaning is added, the name of legal unit is the basic element for proving the specificity of 'credit mark', and is a character or letter group formed by thinner strokes. The specificity of the personal signature handwriting is the personal writing style, no specific standard requirement exists, a writing and signing pen with the diameter of 0.3-0.5 is generally used for daily signature, and the writing strokes also have thickness change along with artistry.
The digital signature in the information security technology system is represented by hexadecimal numbers, namely "0, 1, 2, 3, 4, 5, 6, 7, 8, 9, A, B, C, D, E, F".
Hexadecimal numbers are difficult to write in the special character strokes of the credit marks. For example, a sign pen with a diameter of 0.3mm writes only 0.3mm thick text strokes; the international printing equipment uses color separation dots with 300DPI resolution, one color separation dot (or called pixel) is 0.00846 mm and is approximately 0.01 mm, a 0.3mm thick character stroke needs 3 color separation dots to represent, a hexadecimal number is to be distinguished in one stroke, a space of 7 pixels is at least needed, such as a letter 'E', and a number formed by 5 pixels is written in the space of 7 pixels, so that the appearance characteristics of credit marks such as signature handwriting and the like can be damaged.
However, if the hexadecimal digital code of the digital signature in the information security technology system can be directly extracted from the special mark of the credit mark of 'signature and seal', namely the character strokes, the steps of anti-counterfeiting inspection can be reduced, and the method is direct and rapid.
The above technical effects cannot be achieved using the prior known art.
The invention content is as follows:
the invention provides a method for preventing credit marks from being illegally used by moving on the basis of the patent scheme of the Chinese invention patent number ZL200710121845.6 and the invention name 'credit mark random line generating method', which can directly extract hexadecimal digits of a digital signature from a special stroke track of the credit marks, simplify the steps of an authenticity identification program and is direct and fast.
The 3 basic technical conditions implemented by the technical scheme of the invention are as follows:
1. the hash function can calculate fixed-length data from any computer data with different fixed lengths, and is irreversible.
2. The width of the character stroke of the exclusive credit mark for signing and sealing is more than or equal to 0.3mm, the stroke with the width of 0.3mm can be calculated according to the 300PDI requirement of printing images of printing equipment, and the stroke can be composed of 3 pixel points. The resolution effect of 300DPI pixels can meet the technical requirements of color separation screen printing of printing machinery and the color smoothness and definition of human vision.
3. In the development of human culture, different digital representation methods are generated. For example, Chinese character representation methods such as 'one, two and three', Arabic numerals '1, 2 and 3', Roman numerals 'I, II and III', and the like. In the history of modern science and technology development, there is a radio code rule represented by 'dots' and 'lines', namely a Morse code which is composed of dots 'and lines', has no pronunciation and represents a method for a wireless transmission striking key. In addition, an electronic digital computer is a digital circuit system, which represents two different circuit states by levels, namely "0" and "1" in terms of abstraction, i.e., binary calculation rules for the computer.
Morse code representation rules for hexadecimal digits (see table 1):
TABLE 1 Morse code expression rules for hexadecimal digits
Hexadecimal digit Morse code
1 · ----
2 ·· ---
3 ··· --
4 ··· -
5 ·····
6 - ····
7 -- ···
8 --- ··
9 ---- ·
0 -----
A · -
B - ···
C - · - ·
D - ··
E ·
F ·· - ·
The code represents a line "-" in the rule, and is deformed into 2 points "-, so that a code group consisting of deformed Morse code" point "symbols of hexadecimal code characters can be obtained (see Table 2), as follows:
TABLE 2 code groups of morphed Morse code "dot" symbols of hexadecimal code characters
Figure BSA0000126484870000051
Figure BSA0000126484870000061
The spacing between each symbol defines: "· · · can be composed in 3 points to distinguish the point characteristics of the symbol. The above deformed Morse code set composed of "points" is characterized in that the "points" are expressed by using pixel points of computer images as basic units. A set of dots represents a number, each separated by a space-defining symbol to distinguish.
Table 3 binary conversion hexadecimal rule represented by "0" and "1" of computer
Figure BSA0000126484870000062
Figure BSA0000126484870000071
In the above-mentioned computer binary expression rule, "0" is represented by 1 point "·," 1 "is represented by 2 points" · ", that is, a binary code group consisting of" point "symbols of hexadecimal code characters can be obtained (see table 4), as follows:
TABLE 4 visualization of computer binary represented rules in "Point" notation
Hexadecimal digit Visualizing binaries represented by 'dot' symbols
1 · · · ··
2 · · ·· ·
3 · · ·· ··
4 · ·· · ·
5 · ·· · ··
6 · ·· ·· ·
7 · ·· ·· ··
8 ·· · · ·
9 ·· · · ·
0 · · · ·
A ·· · ·· ·
B ·· · ·· ··
C ·· ·· · ·
D ·· ·· · ··
E ·· ·· ·· ·
F ·· ·· ·· ··
The spacing between each symbol defines: "· · · can be composed in 3 points to distinguish the point characteristics of the symbol. The binary expression rule composed of the points is used, wherein the points are calculated and expressed by taking pixel points of the computer image as a reference. A set of dots represents a number, each separated by a space-defining symbol to distinguish.
The invention is realized by the following technical scheme:
a method for preventing illegal mobile use of exclusive credit mark, the steps of which are the same as the steps 111-150 of the invention name 'credit mark random line generating method' of Chinese patent ZL 200710121845.6:
step 111, preparing an electronic document to be signed in a computer system;
step 112, preparing a proprietary credit identification pattern to be signed in the electronic document in the computer system;
step 120, using the content of the electronic document to be signed prepared in step 111 as a data source, and inputting a hash function to calculate a hash value;
step 130, encrypting the hash value by using an asymmetric key;
step 140, obtaining the digital signature value of the content of the electronic document to be signed in step 111;
step 150, calculating the longer digital signature value again by using a hash function to obtain a shorter hash value;
the method is characterized in that:
step 210-A, transforming Morse code representing tapping action into hexadecimal symbol group formed by "dot" symbols using pixel of computer image as basic unit;
step 211, confirming the track distribution of the character strokes with specificity in the exclusive credit identification image;
step 212, confirming a virtual middle line of each character stroke handwriting from the track division of the character strokes with the specificity in the step 211;
step 220, writing the deformed Morse code "dot" symbols representing the specific hexadecimal digital characters into the strokes of the exclusive credit marks along the virtual middle line arrangement confirmed in step 212;
step 230, generating an exclusive credit mark for preventing illegal mobile use;
step 240, signing the electronic document to be signed prepared in step 111 with the new exclusive credit mark prepared in step 220 and step 230, implementing online electronic document exchange and utilization under the management of a computer system, implementing offline exchange and utilization of independent electronic documents of computer information, and directly using printing equipment including a printer to print paper documents.
A method for preventing illegal mobile use of exclusive credit mark, the steps of which are the same as the steps 111-150 of the invention name 'credit mark random line generating method' of Chinese patent ZL 200710121845.6:
step 111, preparing an electronic document to be signed in a computer system;
step 112, preparing a proprietary credit identification pattern to be signed in the electronic document in the computer system;
step 120, using the content of the electronic document to be signed prepared in step 111 as a data source, and inputting a hash function to calculate a hash value;
step 130, encrypting the hash value by using an asymmetric key;
step 140, obtaining the digital signature value of the content of the electronic document to be signed in step 111;
step 150, calculating the longer digital signature value again by using a hash function to obtain a shorter hash value;
the method is characterized in that:
step 210-B, transforming the binary high and low levels of '0' and '1' into a hexadecimal symbol group formed by 'dot' symbols using the pixels of the computer image as the basic unit;
step 211, confirming the track distribution of the character strokes with specificity in the exclusive credit identification image;
step 212, confirming a virtual middle line of each character stroke handwriting from the track division of the character strokes with the specificity in the step 211;
step 220, writing binary "dot" symbols representing a particular hexadecimal numeric character into the strokes of the proprietary credit token along the virtual middle line arrangement identified in step 212;
step 230, generating an exclusive credit mark for preventing illegal mobile use;
step 240, signing the electronic document to be signed prepared in step 111 with the new exclusive credit mark prepared in step 220 and step 230, implementing online electronic document exchange and utilization under the management of a computer system, implementing offline exchange and utilization of independent electronic documents of computer information, and directly using printing equipment including a printer to print paper documents.
A method for preventing illegal moving use of credit mark includes setting deformed Morse code 'dot' symbol at virtual middle line position of character stroke in red and blue seal image, and using color value as M color value of three primary colors for printing.
A method for preventing illegal mobile use of credit mark features that the binary 'dot' symbols are arranged at the position of virtual central line of strokes of characters in red and blue stamp images, and the color value is the M color value of three primary colors for printing.
A method for preventing illegal mobile use of dedicated credit mark features that the deformed Morse code 'dot' symbol is arranged at the virtual central line of the strokes of personal signature handwriting image and is colorless in the color value of optical three primary colors.
A method for preventing illegal mobile use of dedicated credit mark features that the binary 'dot' symbols are arranged on the virtual intermediate line of the strokes of personal signature handwriting image and the color values of optical three primary colors are colorless.
Description of the drawings:
fig. 1 is a flow chart including a patent scheme of chinese invention patent No. ZL200710121845.6 entitled "credit mark random line generation method".
FIG. 2 is a flow chart of a method of the present invention.
The specific implementation mode is as follows:
the method for preventing illegal mobile use of exclusive credit mark includes the following initial steps 111-150 as compared with the step of 'credit mark random line generation method' invented in Chinese patent ZL 200710121845.6:
step 111, preparing an electronic document to be signed in a computer system;
step 112, preparing a proprietary credit identification pattern to be signed in the electronic document in the computer system;
step 120, using the content of the electronic document to be signed prepared in step 111 as a data source, and inputting a hash function to calculate a hash value;
step 130, encrypting the hash value by using an asymmetric key;
step 140, obtaining the digital signature value of the content of the electronic document to be signed in step 111;
step 150, calculating the longer digital signature value again by using a hash function to obtain a shorter hash value;
step 210-A, transforming Morse code representing tapping action into hexadecimal symbol group formed by "dot" symbols using pixel of computer image as basic unit;
step 211, confirming the track distribution of the character strokes with specificity in the exclusive credit identification image;
step 212, confirming a virtual middle line of each character stroke handwriting from the track division of the character strokes with the specificity in the step 211;
step 220, writing the deformed Morse code "dot" symbols representing the specific hexadecimal digital characters into the strokes of the exclusive credit marks along the virtual middle line arrangement confirmed in step 212;
step 230, generating an exclusive credit mark for preventing illegal mobile use;
step 240, signing the electronic document to be signed prepared in step 111 with the new exclusive credit mark prepared in step 220 and step 230, implementing online electronic document exchange and utilization under the management of a computer system, implementing offline exchange and utilization of independent electronic documents of computer information, and directly using printing equipment including a printer to print paper documents.
The method for preventing illegal mobile use of exclusive credit mark includes the following initial steps 111-150 as compared with the step of 'credit mark random line generation method' invented in Chinese patent ZL 200710121845.6:
step 111, preparing an electronic document to be signed in a computer system;
step 112, preparing a proprietary credit identification pattern to be signed in the electronic document in the computer system;
step 120, using the content of the electronic document to be signed prepared in step 111 as a data source, and inputting a hash function to calculate a hash value;
step 130, encrypting the hash value by using an asymmetric key;
step 140, obtaining the digital signature value of the content of the electronic document to be signed in step 111;
step 150, calculating the longer digital signature value again by using a hash function to obtain a shorter hash value;
step 210-B, transforming the binary high and low levels of '0' and '1' into a hexadecimal symbol group formed by 'dot' symbols using the pixels of the computer image as the basic unit;
step 211, confirming the track distribution of the character strokes with specificity in the exclusive credit identification image;
step 212, confirming a virtual middle line of each character stroke handwriting from the track division of the character strokes with the specificity in the step 211;
step 220, writing binary "dot" symbols representing a particular hexadecimal numeric character into the strokes of the proprietary credit token along the virtual middle line arrangement identified in step 212;
step 230, generating an exclusive credit mark for preventing illegal mobile use;
step 240, signing the electronic document to be signed prepared in step 111 with the new exclusive credit mark prepared in step 220 and step 230, implementing online electronic document exchange and utilization under the management of a computer system, implementing offline exchange and utilization of independent electronic documents of computer information, and directly using printing equipment including a printer to print paper documents.
The deformed Morse code 'dot' symbol is placed in the virtual intermediate line position of character stroke in the red and blue seal image, and its colour value is M colour value of printing three primary colours.
The binary 'dot' symbol is placed at the virtual middle line position of character strokes in the red and blue stamp images, and the color value is the M color value of the three primary colors for printing.
The deformed Morse code 'dot' symbol is arranged at the virtual middle line position of the strokes of the personal signature handwriting image, and the color values of the optical three primary colors are colorless.
And the color values of the optical three primary colors are colorless.
The patent scheme of the Chinese invention patent No. ZL200710121845.6 and the invention name 'Credit mark random line generating method' describes the legal basis and the inspection method, and is as follows:
the legal basis of the authenticity verification of the credit identification digital signature random streak is 'electronic signature law' of various countries and a digital certificate used according to the legal basis of 'electronic signature law', and the judicial evidence chain is as follows:
according to the regulations of the electronic signature law of each country, a legal organization using the secure electronic signature technology must have a valid digital certificate issued by a legal CA company.
According to the technical scheme of the patent application, a document needing to be signed with a credit mark must have a hash value of document content, and a digital signature random digital line must be arranged on the credit mark.
Under the technical scheme of the patent application, a counterfeiter forges a credit identification file and also forges a group of digital signature random digital lines in the credit identification.
In secure hash function operations, the file content is not alterable; the digital signature using a valid digital certificate is undeniable, and the sequence of the permutation and combination of the digital codes is unique and unrepeatable.
The digital signature digital code generated by the real file and the random digital code line of the digital signature are coincided; the digital signature character striae in the false document credit identification must be misaligned. "
Based on the Chinese invention patent number ZL200710121845.6 and the patent scheme of the invention name 'Credit mark random line generating method', the invention is specifically explained as follows:
the evidence provided by the technical method of the invention and the legality, authenticity and relevance of the evidence are as follows:
evidence 1, asymmetric key algorithm program of digital authentication technology, and confirming that the operation and control of the black box are not modified;
evidence 2, hash function algorithm program of digital authentication technology, and confirm that it is not modified and the black box operates and controls;
evidence 3, a correspondence table of hexadecimal digits represented using morphed morse code or "dot" notation of morphed binary.
Evidence 4, legal digital certificates held by legal entities or natural persons;
evidence 5, a document bearing a credit identification generated in a computer system, including an electronic document stored off-line in a removable medium (e.g., a usb-disk), a printed paper document.
Evidence 6, the entire plain text content extracted in the document of evidence 4.
Evidence 7, the exclusive credit mark of the document use, including the record or the known seal, the badge, the confirmed personal signature handwriting.
And 8, extracting 'point' symbols hidden in the strokes of the exclusive credit identification characters. And converted into hexadecimal digits according to the corresponding table of the evidence 3.
The technical method of the invention provides the following identification steps:
step 1: proof 9 is generated, and proof 4 is used to compute proof 6 and generate a set of digitally signed values.
Step 2: generating evidence 10, and using evidence 2 to hash function operation evidence 9 to generate a set of hash values.
And step 3: evidence 11 is generated, and evidence 10 is converted to a set of "dot" symbols using a correspondence table of hexadecimal digits represented by the "dot" symbols of evidence 3.
Step 4, generating evidence 12, comparing the hexadecimal numbers of the evidence 8 and the evidence 11, and leading to 2 results of 'coincidence' and 'non-coincidence'.
The technical method of the invention provides the following identification conclusion:
conclusion 1: the suspicious credit identity is signed by the legitimate holder.
Conclusion 2: the suspect credit token is not signed by the legitimate holder.
The above description is only a preferred embodiment of the present invention, but the scope of the present invention is not limited thereto, and any changes or substitutions that can be easily conceived by those skilled in the art within the technical scope of the present invention are included in the scope of the present invention. Therefore, the protection scope of the present invention shall be subject to the protection scope of the claims.

Claims (4)

1. A method for preventing unauthorized mobile use of proprietary credit identifiers, said method comprising the steps of:
step 210-A, transforming Morse code representing tapping action into hexadecimal symbol group formed by "dot" symbols using pixel of computer image as basic unit;
step 211, confirming the track distribution of the character strokes with specificity in the exclusive credit identification image;
step 212, confirming a virtual middle line of each character stroke handwriting from the track division of the character strokes with the specificity in the step 211;
step 220, writing the deformed Morse code "dot" symbols representing the specific hexadecimal digital characters into the strokes of the exclusive credit marks along the virtual middle line arrangement confirmed in step 212;
step 230, generating an exclusive credit mark for preventing illegal mobile use;
step 240, signing the new exclusive credit mark prepared in step 220 and step 230 into the electronic document to be signed prepared in step 111, and implementing online electronic document exchange and utilization under the management of a computer system, or implementing offline exchange and utilization of independent electronic documents of computer information, or directly using printing equipment including a printer to print paper documents;
the deformed Morse code 'dot' symbol is placed in the virtual intermediate line position of character stroke in the red and blue seal image, and its colour value is M colour value of printing three primary colours or colourless.
2. A method for preventing illegal mobile use of proprietary credit token is characterized in that:
step 210-B, transforming the binary high and low levels of '0' and '1' into a hexadecimal symbol group formed by 'dot' symbols using the pixels of the computer image as the basic unit;
step 211, confirming the track distribution of the character strokes with specificity in the exclusive credit identification image;
step 212, confirming a virtual middle line of each character stroke handwriting from the track division of the character strokes with the specificity in the step 211;
step 220, writing binary "dot" symbols representing a particular hexadecimal numeric character into the strokes of the proprietary credit token along the virtual middle line arrangement identified in step 212;
step 230, generating an exclusive credit mark for preventing illegal mobile use;
step 240, signing the electronic document to be signed prepared in step 111 with the new exclusive credit mark prepared in step 220 and step 230, implementing online electronic document exchange and utilization under the management of a computer system, implementing offline exchange and utilization of independent electronic documents of computer information, and directly using printing equipment including a printer to print paper documents.
3. The method according to claim 2, wherein the binary dot symbols are placed at the virtual middle line positions of the strokes of the characters in the red and blue stamp images, and the color values are M color values of the three primary colors of printing.
4. The method for preventing illegal mobile use of proprietary credit marks of claim 2, wherein the color values of the three primary optical colors are colorless for the binary "dot" symbols placed at the virtual middle lines of the strokes of the personal signature script image.
CN201610060751.1A 2016-01-29 2016-01-29 Method for preventing illegal mobile use of credit mark Expired - Fee Related CN107025412B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201610060751.1A CN107025412B (en) 2016-01-29 2016-01-29 Method for preventing illegal mobile use of credit mark
PCT/CN2016/103386 WO2017128784A1 (en) 2016-01-29 2016-10-26 Method for preventing credit identifier from being moved and used illegally

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610060751.1A CN107025412B (en) 2016-01-29 2016-01-29 Method for preventing illegal mobile use of credit mark

Publications (2)

Publication Number Publication Date
CN107025412A CN107025412A (en) 2017-08-08
CN107025412B true CN107025412B (en) 2020-04-17

Family

ID=59397339

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610060751.1A Expired - Fee Related CN107025412B (en) 2016-01-29 2016-01-29 Method for preventing illegal mobile use of credit mark

Country Status (2)

Country Link
CN (1) CN107025412B (en)
WO (1) WO2017128784A1 (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101789067A (en) * 2009-12-31 2010-07-28 北京书生国际信息技术有限公司 Electronic document signature protecting method and system
CN101894238A (en) * 2010-08-09 2010-11-24 中国人民解放军海军工程大学 Double authentication-based word document electronic seal system and method
CN105044069A (en) * 2015-08-12 2015-11-11 合肥源信智能仪器有限公司 Laser fluorescence inspection method for recognizing sequence of crossed writing and seal stamp

Family Cites Families (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1379352A (en) * 2002-05-13 2002-11-13 吴建明 Antiforge method of seal
CN1635533A (en) * 2003-12-30 2005-07-06 刘瑞祯 Digital stamp system
CN2931125Y (en) * 2005-05-31 2007-08-08 李锦� False proof seal
KR100881549B1 (en) * 2007-04-20 2009-02-02 오맹원 The letter input device which uses a morse code and input method
CN101311950B (en) * 2007-05-25 2012-01-18 北京书生国际信息技术有限公司 Electronic stamp realization method and device
CN100518064C (en) * 2007-09-17 2009-07-22 吴建明 Credit sign accidental streakline generating method
CN102096774A (en) * 2009-12-11 2011-06-15 北大方正集团有限公司 Document encryption method, verification method and device thereof
CN103413104B (en) * 2013-08-09 2016-02-03 北京旋极信息技术股份有限公司 A kind of disposal route of transaction sensitive information and treating apparatus
CN103617441A (en) * 2013-11-27 2014-03-05 上海电机学院 Generating system and pattern recognition method of seal based on two-dimension code

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101789067A (en) * 2009-12-31 2010-07-28 北京书生国际信息技术有限公司 Electronic document signature protecting method and system
CN101894238A (en) * 2010-08-09 2010-11-24 中国人民解放军海军工程大学 Double authentication-based word document electronic seal system and method
CN105044069A (en) * 2015-08-12 2015-11-11 合肥源信智能仪器有限公司 Laser fluorescence inspection method for recognizing sequence of crossed writing and seal stamp

Also Published As

Publication number Publication date
CN107025412A (en) 2017-08-08
WO2017128784A1 (en) 2017-08-03

Similar Documents

Publication Publication Date Title
JP7093352B2 (en) Composite 2D barcodes, digital certificate media, generators, readers and methods
CN100518064C (en) Credit sign accidental streakline generating method
CN104820854B (en) A kind of combined anti-fake mark and its generation method and generating means
CN100458845C (en) Production of electronic-physical seal and its synthetic seal
CN102576423A (en) Secure identification of a product
US6636614B1 (en) Method for preventing the falsification of documents comprising a photograph, preferably a facial-view photograph
CN103810457A (en) Offline license anti-counterfeiting method based on reliable digital signature and two-dimensional code
CN109376832B (en) Triple anti-counterfeiting two-dimensional code embedded with anti-counterfeiting mark image and digital fluorescent image
CN115604401B (en) Traceable electronic seal encryption method
CN111160860A (en) File printing and stamping method
WO2015152697A1 (en) Method for generating document and marketable security having counterfeiting/falsification protection function, method for checking counterfeiting/falsification of document and marketable security having counterfeiting/falsification preventing function, method for generating document having counterfeiting preventing means, and a method for checking counterfeiting/falsification
CN109376833B (en) Triple anti-counterfeiting two-dimensional code for pseudo-random information overprinting digital fluorescent image
CN109726788B (en) Light and shade double-code two-dimensional code with hidden metamerism
KR101573857B1 (en) A Printed Document Having Function Of Preventing From Forging/Manipulating, The Method Thereof and The Inspecting Method Of The Printed Document
CN111914283B (en) File electronic signature algorithm based on big data block chain
CN109614805A (en) A kind of generation that document is anti-fake and recognition methods and printing driving and system
CN107025412B (en) Method for preventing illegal mobile use of credit mark
CN109711513B (en) Triple anti-counterfeiting two-dimensional code with double-code of digital fluorescent image overprinting bright and dark
CN109711514B (en) Anti-fake two-dimensional code with hidden pseudo-random information
Tkachenko et al. Fighting against forged documents by using textured image
CN112765569A (en) Method for implementing ideographic electronic seal
CN109740713B (en) Triple anti-counterfeiting two-dimensional code with hidden digital signature and digital fluorescent image
CN101178763A (en) Government documents ciphering and deciphering method
JP5678364B2 (en) Printed material capable of authenticating authenticity, manufacturing apparatus and manufacturing method thereof, authentication apparatus for printed matter capable of authenticating authenticity and authentication method thereof
CN110009081A (en) Multi-code divides the complementary stealthy identification anti-counterfeit method of credentials of fragment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20200417

Termination date: 20220129