CN107194266B - Method for verifying whether paper certificate is tampered - Google Patents
Method for verifying whether paper certificate is tampered Download PDFInfo
- Publication number
- CN107194266B CN107194266B CN201710333560.2A CN201710333560A CN107194266B CN 107194266 B CN107194266 B CN 107194266B CN 201710333560 A CN201710333560 A CN 201710333560A CN 107194266 B CN107194266 B CN 107194266B
- Authority
- CN
- China
- Prior art keywords
- template
- license
- paper
- signature
- electronic
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
- Storage Device Security (AREA)
Abstract
The invention provides a method for verifying whether a paper certificate is tampered, which relates to the digital signature and two-dimensional code technology and comprises the following steps: the method comprises the steps of generating an electronic certificate and verifying the authenticity of a paper certificate. The method for verifying whether the content of the paper electronic certificate is falsified solves the problem of verifying the authenticity and the effectiveness of the content of the document after the electronic document is printed and output as the paper document.
Description
Technical Field
The invention discloses an electronic signature verification method, in particular to a method for verifying whether paper license contents are tampered.
Background
At present, in the using process of the electronic certificate, the electronic certificate needs to be printed and output as a paper certificate, but the authenticity and the validity of the content of the document after the paper certificate is output are verified to be problems, so that a method specially applied to verifying whether the content of the paper certificate is tampered needs to be designed.
Disclosure of Invention
The technical problem to be solved by the invention is as follows: the prior art lacks a method for verifying the falsification of a paper certificate printed and output by an electronic certificate.
In order to solve the technical problem, the invention provides a method for verifying whether paper license content is tampered, which comprises the following steps:
step 1, generating an electronic license, which comprises the following specific steps:
step 1.1, generating a template with a fixed format for each type of electronic certificate, giving a unique template number to each template, forming an abstract for the electronic certificate template, and encrypting the abstract by using a private key to form a template signature;
step 1.2, selecting an electronic license template, and filling all filling items of the electronic license into the template to generate a complete electronic license file;
step 1.3, forming the summary of all the filling items filled in the step 1.2, and then encrypting the summary by using a private key to form a filling item signature;
step 1.4, forming electronic data by the template number, the template signature, all the filling items and the filling item signature in a specified format, forming a two-dimensional code by the electronic data, and placing the two-dimensional code in a blank of the electronic license file generated in the step 1.2 to form an electronic license with the two-dimensional code;
step 1.5, printing and outputting the electronic certificate formed in the step 1.4 as a paper certificate;
step 2, verifying the authenticity of the paper certificate, which comprises the following specific steps:
step 2.1, importing the electronic license template in the step 1.1 to form a license template library;
2.2, scanning the two-dimensional code on the paper license, and acquiring a template number, a template signature, all filling items and a filling item signature from data stored in the two-dimensional code;
step 2.3, processing all the filling items obtained in the step 2.2 to form a summary H;
step 2.4, obtaining a corresponding public key according to the private key identification in the filler signature obtained in the step 2.2, and decrypting the filler signature data obtained in the step 2.2 by using the public key to obtain H1;
step 2.5, comparing H with H1, if the H and H are the same, indicating that all filling items stored in the paper license two-dimensional code are not tampered, and if the H and H are not the same, indicating that all filling items stored in the paper license two-dimensional code are tampered;
step 2.6, acquiring a corresponding electronic license template from a license template library according to the template number acquired in the step 2.2, and processing the content of the electronic license template to form an abstract H2;
step 2.7, according to the public key obtained in the step 2.4, the public key is used for carrying out data decryption on the template signature obtained in the step 2.2, and H3 is obtained;
step 2.8, comparing H2 with H3, if the contents are the same, indicating that the contents of the electronic license template stored in the paper license two-dimensional code are not tampered, and if the contents are different, indicating that the contents of the electronic license template stored in the paper license two-dimensional code are tampered;
step 2.9, if the comparison in the step 2.5 is the same as that in the step 2.8, combining the electronic license template obtained in the step 2.6 with all the filling items obtained in the step 2.2 to generate a new electronic license file;
and 2.10, comparing the new electronic license file generated in the step 2.9 with the content of the paper license document, if the new electronic license file is the same as the content of the paper license document, indicating that the content of the paper document is not tampered, and verifying that the paper document passes, and if the new electronic license file is not the same as the content of the paper license document, indicating that the content of the paper document is tampered, and verifying that the paper document does not pass.
The template with the fixed format is generated for each type of electronic certificate, a unique number is given to each template, the templates are obtained according to the unique number, the data capacity of the generated two-dimensional code is reduced, the storage capacity of the electronic certificate is reduced, and the electronic certificate is convenient to store; and the two-dimensional code is adopted to carry out electronic paper data transmission, so that the paper verification of the paper license content is convenient to realize.
As a further limiting scheme of the present invention, in step 1.1, an abstract is formed on the electronic license template, specifically, all contents on the electronic license template are used as inputs, and hash operation is performed to obtain abstract information.
As a further limiting scheme of the present invention, the step 1.1 of encrypting the digest with the private key to form a template signature specifically refers to encrypting the digest with the private signature key in the digital certificate to obtain a digital signature value.
As a further limitation of the present invention, the digital certificate refers to a digital certificate stored in the intelligent KEY for encryption and digital signature operation.
As a further limiting scheme of the present invention, in step 2.3, all the padding items obtained in step 2.2 are processed to form the digest H, specifically, all the obtained padding items are used as input, and a hash operation is performed to obtain the digest H.
As a further limiting scheme of the present invention, in step 1.3, the digest is encrypted by using a private key to form a filler signature, and in step 2.4, the filler signature data is decrypted by using a public key to obtain H1, specifically, encryption of the private key and decryption of the public key are realized by using an asymmetric key algorithm.
As a further limiting scheme of the present invention, in step 2.4, a corresponding public key, specifically public key information extracted from the digital certificate of the filler signature information, is obtained according to the private key identifier in the filler signature obtained in step 2.2.
As a further limiting scheme of the present invention, in step 2.9, the template obtained in step 2.6 and all the filling items obtained in step 2.2 are combined to generate a new electronic license file, specifically, all the filling item fields are filled in the template by using a document synthesis technology to generate a new file.
The invention has the beneficial effects that: the template with the fixed format is generated for each type of electronic certificate, a unique number is given to each template, the templates are obtained according to the unique number, the data capacity of the generated two-dimensional code is reduced, the storage capacity of the electronic certificate is reduced, and the electronic certificate is convenient to store; and the two-dimensional code is adopted to carry out electronic paper data transmission, so that the paper verification of the paper license content is convenient to realize.
Drawings
FIG. 1 is a flow chart of a method of the present invention;
FIG. 2 is a flow chart of the present invention.
Detailed Description
As shown in fig. 1 and 2, the method for verifying whether the paper license content is tampered includes the following steps:
step 1, generating an electronic license, which comprises the following specific steps:
step 1.1, generating a template with a fixed format for each type of electronic certificate, giving a unique number to each template, forming an abstract by the electronic certificate template, and encrypting the abstract by using a private key to form a signature;
step 1.2, selecting an electronic license template, filling all filling items of the electronic license into the template, such as the name, the enterprise type, the legal representative and other information in the business license of an enterprise legal person, and generating a complete electronic license file;
step 1.3, all the filling items filled in the electronic certificate in the step 1.2 are formed into an abstract, and the abstract is encrypted by a private key to form a signature;
step 1.4, uniquely numbering the electronic license template in the step 1.1, forming electronic data by the signature in the step 1.1, all the filling items in the step 1.2 and the signature in the step 1.3 in a fixed format, forming the electronic data into a two-dimensional code, and placing the two-dimensional code in a blank position of the complete electronic license file generated in the step 1.2 to form an electronic license with the two-dimensional code;
step 1.5, printing the electronic certificate formed in the step 1.4 and outputting the electronic certificate as a paper document;
step 2, verifying the authenticity of the paper certificate, which comprises the following specific steps:
step 2.1, importing the electronic certificate template library in the step 1.1 into authenticity verification software;
2.2, scanning the two-dimensional code on the paper license by using authenticity verification software, and processing the two-dimensional code to obtain the unique number of the electronic license template, template signature data, all filled filling items and filled filling item signature data from the data stored in the image two-dimensional code;
step 2.3, processing all the filling items obtained in the step 2.2 to form a summary H;
step 2.4, acquiring a corresponding public key according to the private key identification in the filler signature acquired in the step 2.2, and decrypting the filler signature data acquired in the step 2.2 by using the public key to obtain H1;
step 2.5, comparing H with H1; if the two-dimensional codes are the same, all filling items stored in the paper license two-dimensional codes are not tampered;
step 2.6, acquiring a corresponding template from the authenticity verification software according to the template unique number acquired in the step 2.2, and processing the template content to form an abstract H2;
step 2.7, according to the public key obtained in the step 2.4, decrypting the template signature data obtained in the step 2.2 by using the public key to obtain H3;
step 2.8, comparing H2 with H3, and if the H2 and the H3 are the same, indicating that the template content stored in the paper license two-dimensional code is not tampered;
step 2.9, after the comparison between the step 2.5 and the step 2.8 is passed, combining the template obtained in the step 2.6 and all the filling items obtained in the step 2.2 to generate a visual new electronic license file;
step 2.10, comparing the new electronic license file generated in the step 2.9 with the content of the paper license document; if the content of the paper document is the same as the content of the paper document, the content of the paper document is not tampered, and the paper document is verified to pass.
The method comprises the steps of 1.1, obtaining a template according to a unique label, and obtaining the two-dimensional code data capacity generated in the step 1.4, wherein the template in a fixed format is generated for each type of electronic license in the step 1.1, the template is given to each template to be a unique number, and the template is obtained according to the unique label in the step 2.6.
In the step 1.1, the summary formation of the electronic license template refers to that all contents on the electronic template are used as input to perform hash operation to obtain summary information. The step 1.1 of encrypting the digest by using the private key to form the signature refers to encrypting the digest information in the claim 3 by using the private signature key in the digital certificate to obtain a digital signature value. The digital certificate is stored in the intelligent KEY and used for encryption and digital signature operation, has the characteristic that the signature private KEY cannot be separated from the KEY, and can effectively protect the security of the signature private KEY.
The step 1.4 of forming electronic data in a fixed format means that the required content information is stored by using a customized unique fixed format. The step 1.4 that the electronic data form the two-dimensional code and the electronic data are placed in the blank of the complete electronic license file generated in the step 1.2 means that the electronic data are converted into the two-dimensional code form for storage by utilizing the characteristic that the two-dimensional code has a data storage function. The two-dimensional code refers to a format-unlimited two-dimensional code with a data storage function.
In step 2.2, scanning the two-dimensional code on the paper license by using the authenticity verification software, and processing the two-dimensional code to obtain the unique number of the electronic license template, the template signature data, all filled filling items and the filled filling item signature data from the data stored in the image two-dimensional code, namely, restoring the content stored in the two-dimensional code by using a two-dimensional code identification technology, thereby separating the unique number of the electronic license template, the template signature data, all filled filling items and the filled filling item signature data.
In the step 2.3, processing all the padding items obtained in the step 2.2 to form the summary H means that all the restored padding items are used as input, and hash operation is performed to obtain the summary.
The step 2.4 of obtaining the corresponding public key according to the private key identifier in the filler signature obtained in the step 2.2 refers to public key information extracted from the digital certificate of the signature information. In step 2.4, the public key is used to decrypt the filler signature data obtained in step 2.2, and obtaining H1 means that the private key is used to encrypt according to an asymmetric key algorithm, and the public key corresponding to the private key can also be used to decrypt.
Step 2.9, combining the template obtained in step 2.6 and all the filling items obtained in step 2.2 to generate a visual new electronic license file refers to filling all the filling item fields into the template by using a document synthesis technology to generate a new file.
The method for verifying whether the paper license content is tampered has the following use effects:
1. the construction and development of the electronic license system are promoted, and the business risk is solved. The method for verifying whether the content of the paper license is falsified utilizes the electronic signature making data issued by a Public Key Infrastructure (PKI) technology and a third-party digital certificate certification center to reliably electronically sign the relevant information such as the content of the document and the like, can be conveniently used as evidence in judicial litigation, provides a reliable technical basis for establishing a dispute resolution and responsibility confirmation mechanism, promotes the construction and development of an electronic license system, and provides effective judicial guarantee for the printing output of the electronic license.
2. The method for verifying whether the content of the paper certificate is falsified promotes cross-region, cross-department, cross-layer information sharing and business cooperation, solves the problem that the masses repeatedly submit paper materials in the current government activities, reduces social cost and resource waste, and lightens the burden of the masses; the phenomenon of abusive false certificates and false photos is avoided, and the problem of difficult work of checking the certificates is solved.
Claims (8)
1. A method for verifying whether paper license content is tampered is characterized by comprising the following steps:
step 1, generating an electronic license, which comprises the following specific steps:
step 1.1, generating a template with a fixed format for each type of electronic certificate, giving a unique template number to each template, forming an abstract for the electronic certificate template, and encrypting the abstract by using a private key to form a template signature;
step 1.2, selecting an electronic license template, and filling all filling items of the electronic license into the template to generate a complete electronic license file;
step 1.3, forming the summary of all the filling items filled in the step 1.2, and then encrypting the summary by using a private key to form a filling item signature;
step 1.4, forming electronic data by the template number, the template signature, all the filling items and the filling item signature in a specified format, forming a two-dimensional code by the electronic data, and placing the two-dimensional code in a blank of the electronic license file generated in the step 1.2 to form an electronic license with the two-dimensional code; converting electronic data into a two-dimensional code form for storage by utilizing the characteristic that the two-dimensional code has a data storage function; the two-dimensional code refers to an unlimited format two-dimensional code with a data storage function;
step 1.5, printing and outputting the electronic certificate formed in the step 1.4 as a paper certificate;
step 2, verifying the authenticity of the paper certificate, which comprises the following specific steps:
step 2.1, importing the electronic license template in the step 1.1 to form a license template library;
2.2, scanning the two-dimensional code on the paper license, and acquiring a template number, a template signature, all filling items and a filling item signature from data stored in the two-dimensional code;
step 2.3, processing all the filling items obtained in the step 2.2 to form a summary H;
step 2.4, obtaining a corresponding public key according to the private key identification in the filler signature obtained in the step 2.2, and decrypting the filler signature data obtained in the step 2.2 by using the public key to obtain H1;
step 2.5, comparing H with H1, if the H and H are the same, indicating that all filling items stored in the paper license two-dimensional code are not tampered, and if the H and H are not the same, indicating that all filling items stored in the paper license two-dimensional code are tampered;
step 2.6, acquiring a corresponding electronic license template from a license template library according to the template number acquired in the step 2.2, and processing the content of the electronic license template to form an abstract H2;
step 2.7, according to the public key obtained in the step 2.4, the public key is used for carrying out data decryption on the template signature obtained in the step 2.2, and H3 is obtained;
step 2.8, comparing H2 with H3, if the contents are the same, indicating that the contents of the electronic license template stored in the paper license two-dimensional code are not tampered, and if the contents are different, indicating that the contents of the electronic license template stored in the paper license two-dimensional code are tampered;
step 2.9, if the comparison in the step 2.5 is the same as that in the step 2.8, combining the electronic license template obtained in the step 2.6 with all the filling items obtained in the step 2.2 to generate a new electronic license file;
and 2.10, comparing the new electronic license file generated in the step 2.9 with the content of the paper license document, if the new electronic license file is the same as the content of the paper license document, indicating that the content of the paper document is not tampered, and verifying that the paper document passes, and if the new electronic license file is not the same as the content of the paper license document, indicating that the content of the paper document is tampered, and verifying that the paper document does not pass.
2. The method for verifying whether the paper license contents are tampered according to claim 1, wherein in step 1.1, the electronic license template is summarized, specifically, all contents on the electronic license template are used as input to perform hash operation to obtain summary information.
3. The method for verifying whether the paper license content is tampered according to claim 1, wherein the digest is encrypted by a private key to form a template signature in step 1.1, specifically a digital signature value obtained by encrypting the digest by using a signature private key in a digital certificate.
4. The method for verifying whether paper license contents are tampered according to claim 3, wherein the digital certificate refers to a digital certificate stored in the intelligent KEY for encryption and digital signature operations.
5. The method for verifying whether the paper license content is tampered according to claim 1, wherein in step 2.3, all the filling items obtained in step 2.2 are processed to form a summary H, and specifically, all the obtained filling items are used as input to perform hash operation to obtain the summary H.
6. The method for verifying whether paper license contents are tampered according to claim 1, wherein in step 1.3, the digest is encrypted by using a private key to form a filler signature, and in step 2.4, the filler signature data is decrypted by using a public key to obtain H1, specifically, encryption of the private key and decryption of the public key are realized through an asymmetric key algorithm.
7. The method for verifying whether the paper license content is tampered according to claim 1, wherein in step 2.4, the corresponding public key is obtained according to the private key identifier in the filler signature obtained in step 2.2, specifically, the public key information extracted from the digital certificate of the filler signature information.
8. The method for verifying whether the paper license content is tampered according to claim 1, wherein in step 2.9, the template obtained in step 2.6 and all the filling items obtained in step 2.2 are combined to generate a new electronic license file, specifically, all the filling item fields are filled in the template to generate a new file by using a document synthesis technology.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710333560.2A CN107194266B (en) | 2017-05-12 | 2017-05-12 | Method for verifying whether paper certificate is tampered |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710333560.2A CN107194266B (en) | 2017-05-12 | 2017-05-12 | Method for verifying whether paper certificate is tampered |
Publications (2)
Publication Number | Publication Date |
---|---|
CN107194266A CN107194266A (en) | 2017-09-22 |
CN107194266B true CN107194266B (en) | 2020-09-04 |
Family
ID=59872541
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710333560.2A Active CN107194266B (en) | 2017-05-12 | 2017-05-12 | Method for verifying whether paper certificate is tampered |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107194266B (en) |
Families Citing this family (17)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107943769A (en) * | 2017-11-13 | 2018-04-20 | 北京书生电子技术有限公司 | The method and apparatus for providing electronics license |
CN107729576A (en) * | 2017-11-28 | 2018-02-23 | 北京筑业志远软件开发有限公司 | The management method and system of archives |
CN107992463A (en) * | 2017-12-01 | 2018-05-04 | 机械工业第六设计研究院有限公司 | The method and system that a kind of E-Government is declared |
CN108170653B (en) * | 2017-12-05 | 2021-07-20 | 北京航天计量测试技术研究所 | Multi-template calibration certificate automatic generation method based on information fusion |
CN108363929B (en) * | 2018-02-09 | 2022-05-13 | 广州旭能信息科技有限公司 | System and method for generating information elimination report of storage device and preventing tampering |
CN108989337B (en) * | 2018-08-19 | 2021-01-05 | 厦门农芯数字科技有限公司 | Electronic license sharing platform design method based on block chain technology |
CN109192259A (en) * | 2018-08-21 | 2019-01-11 | 深圳中兴网信科技有限公司 | Electronic health record processing method, processing unit and computer readable storage medium |
CN109474439A (en) * | 2019-01-02 | 2019-03-15 | 广州市中智软件开发有限公司 | A kind of electronics license based on block chain is credible to be signed and issued, is called and application method |
CN109815660B (en) * | 2019-01-11 | 2023-05-12 | 公安部第三研究所 | Identity electronic license information acquisition and verification system and method |
CN109743330B (en) * | 2019-01-22 | 2020-07-24 | 北京邮电大学 | License authentication method, device, electronic equipment and storage medium |
CN109903478A (en) * | 2019-03-15 | 2019-06-18 | 广东金赋科技股份有限公司 | Papery license self-help print method and system |
CN110135188A (en) * | 2019-04-28 | 2019-08-16 | 佛山科学技术学院 | A kind of electronics license storage method and device based on block chain |
CN112487490B (en) * | 2019-09-11 | 2024-09-13 | 株式会社理光 | Tamper identification method, device and medium |
CN110765137B (en) * | 2019-10-31 | 2022-04-12 | 百度在线网络技术(北京)有限公司 | Electronic certificate processing method, device, equipment, platform and medium |
CN111260528B (en) * | 2020-02-07 | 2021-09-28 | 赵�智 | Real estate information verification method based on asymmetric algorithm |
CN112989434A (en) * | 2021-03-22 | 2021-06-18 | 合肥信息工程监理咨询有限公司 | Electronic document encryption tamper-proof decryption verification method |
CN113239368B (en) * | 2021-04-02 | 2023-02-28 | 暨南大学 | QR code encryption and decryption method based on electronic signature |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101281581A (en) * | 2007-09-27 | 2008-10-08 | 北京数字证书认证中心有限公司 | Method for checking whether contents of paper file is distorted or not |
CN104021482A (en) * | 2013-03-01 | 2014-09-03 | 成都市易恒信科技有限公司 | Certificate false-proof verification method base on identification authentication technology |
CN104361293A (en) * | 2014-10-20 | 2015-02-18 | 北京数字认证股份有限公司 | Methods and devices for generating and distinguishing anti-counterfeiting paper document |
CN105447642A (en) * | 2015-11-27 | 2016-03-30 | 国网重庆市电力公司江津供电分公司 | Engineering digital photograph verification system based on two-dimension code and verification method |
CN105740928A (en) * | 2016-01-27 | 2016-07-06 | 上海尚源信息技术有限公司 | Anti-counterfeiting method for two-dimensional code picture |
CN106598930A (en) * | 2016-12-29 | 2017-04-26 | 南威软件股份有限公司 | Electronic certificate processing method based on layout file |
-
2017
- 2017-05-12 CN CN201710333560.2A patent/CN107194266B/en active Active
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101281581A (en) * | 2007-09-27 | 2008-10-08 | 北京数字证书认证中心有限公司 | Method for checking whether contents of paper file is distorted or not |
CN104021482A (en) * | 2013-03-01 | 2014-09-03 | 成都市易恒信科技有限公司 | Certificate false-proof verification method base on identification authentication technology |
CN104361293A (en) * | 2014-10-20 | 2015-02-18 | 北京数字认证股份有限公司 | Methods and devices for generating and distinguishing anti-counterfeiting paper document |
CN105447642A (en) * | 2015-11-27 | 2016-03-30 | 国网重庆市电力公司江津供电分公司 | Engineering digital photograph verification system based on two-dimension code and verification method |
CN105740928A (en) * | 2016-01-27 | 2016-07-06 | 上海尚源信息技术有限公司 | Anti-counterfeiting method for two-dimensional code picture |
CN106598930A (en) * | 2016-12-29 | 2017-04-26 | 南威软件股份有限公司 | Electronic certificate processing method based on layout file |
Also Published As
Publication number | Publication date |
---|---|
CN107194266A (en) | 2017-09-22 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107194266B (en) | Method for verifying whether paper certificate is tampered | |
US20220327304A1 (en) | Transferring data files using a series of visual codes | |
CN106301782B (en) | Electronic contract signing method and system | |
CN107146120B (en) | Electronic invoice generation method and generation device | |
WO2017016318A1 (en) | Credible label generation and verification method and system based on asymmetric cryptographic algorithm | |
EP0541727B1 (en) | Method for secure time-stamping of digital documents | |
CN103310164B (en) | The verification method of E-seal figure and the verification method containing E-seal file | |
US20120308003A1 (en) | Authentic barcodes using digital signatures | |
CN105610578A (en) | Block chain information archiving and privacy protection method | |
CN109257180A (en) | A kind of method and device for depositing card based on the intellectual property file of block chain | |
CN105635187B (en) | Method and device for generating electronic file with stamp and method and device for authenticating electronic file with stamp | |
JP2006157914A (en) | Document authentication method, detectable document generation method and apparatus and program | |
JPH07191602A (en) | Electronic autographing method and device | |
CN104021482A (en) | Certificate false-proof verification method base on identification authentication technology | |
US9600690B2 (en) | Secure access for sensitive digital information | |
CN102004986A (en) | Product anti-counterfeiting method based on digital signature and public key system and verifying method | |
CN104809490A (en) | Card anti-counterfeiting system based on multidimensional code and authentication method based on card anti-counterfeiting system | |
CN104142803A (en) | Method for copy-protected storage of information on a data carrier | |
CN111177666A (en) | Forensic document anti-counterfeiting and anti-tampering method and system based on fragile watermark | |
CN110162984A (en) | The method of calibration and system of electronic bidding data based on block chain | |
JP2010081039A (en) | Authenticity verification system, information generator, authenticity verification apparatus, information generation program and authenticity verification program | |
EP2697785A1 (en) | Authentic barcodes using digital signatures | |
JP4923388B2 (en) | Content certification system | |
JP2013157777A (en) | Information processing system and information processing method | |
CN106411888B (en) | Signature document encryption device and method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |