CN109558741A - A kind of protection and the verification method of mimeograph documents and bill original part - Google Patents

A kind of protection and the verification method of mimeograph documents and bill original part Download PDF

Info

Publication number
CN109558741A
CN109558741A CN201811324463.8A CN201811324463A CN109558741A CN 109558741 A CN109558741 A CN 109558741A CN 201811324463 A CN201811324463 A CN 201811324463A CN 109558741 A CN109558741 A CN 109558741A
Authority
CN
China
Prior art keywords
trace
file
characteristic vector
protection
digital signature
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201811324463.8A
Other languages
Chinese (zh)
Inventor
吴健康
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Academy Of Digital Health Sciences (nanjing) Co Ltd
Original Assignee
China Academy Of Digital Health Sciences (nanjing) Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Academy Of Digital Health Sciences (nanjing) Co Ltd filed Critical China Academy Of Digital Health Sciences (nanjing) Co Ltd
Priority to CN201811324463.8A priority Critical patent/CN109558741A/en
Publication of CN109558741A publication Critical patent/CN109558741A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/606Protecting data by securing the transmission between two devices or processes
    • G06F21/608Secure printing

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Health & Medical Sciences (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Bioethics (AREA)
  • Editing Of Facsimile Originals (AREA)
  • Record Information Processing For Printing (AREA)
  • Accessory Devices And Overall Control Thereof (AREA)

Abstract

The present invention provides protection and the verification method of a kind of mimeograph documents and bill original part, obtains the trace mark in file or bill original part, extracts trace characteristic vector;It encrypts to form digital signature with secret key pair trace characteristic vector and synopsis;The digital signature of file is sent to authentication center or is printed upon digital signature in original using modes such as bar codes or character;Document image to be verified is obtained when verifying, therefrom extracts trace mark, and extract trace characteristic vector;Digital signature is unlocked with secret key, obtains the trace characteristic vector of original;The synopsis and characteristic vector of the synopsis of file to be verified and trace characteristic vector and original are compared.The present invention extract it is any print, print, affixing one's seal, signing, etc. the extremely strong trace of randomness that all unavoidably generates in the file of generations; for uniquely determining and verifying document text and bill original part; due to the uniqueness of trace, the method for the present invention provides file integrality and the original part protection of highest level.

Description

A kind of protection and the verification method of mimeograph documents and bill original part
Technical field
The invention belongs to file protection and verification technique fields, are related to the protection of a kind of mimeograph documents and bill original part and test Card method.
Background technique
Mimeograph documents play particularly important effect in the fields such as administration, commercial affairs.Bootlegging, production and use are such Mimeograph documents bring very big safety problem to regular traffic.Accomplish the uniqueness for being effectively protected mimeograph documents original part and legal Property, it is necessary to accomplish:
1. anti-counterfeiting.Due to becoming increasingly popular for computer and printing device, criminal can distort mimeograph documents content, Or file content of arbitrarily fabricating.One is effectively protected the printout that method and apparatus allow for identifying forgery, with protection The integrality of file content.
2. anti-copying.Criminal such as obtains original print, can be multiple using duplicating or the production of scanning+printing method File processed.In the occasion for having high request to file primitiveness, such as the high value bill of lading and bill, using duplication come meeting of forging document Cause very big loss.One effective mimeograph documents guard method and device allow for differentiating orginal and duplicate with Thoroughly prevent science attack.
It is the method for a kind of simple anti-counterfeiting and anti-copying using traditional affixing one's seal or sign.But traditional stamped signature easily quilt It forges, and inefficiency, is unfavorable for identifying automatically and inquiring, is also not easy to be embedded in automatic official business system.It is some current below It is intended to substitute traditional stamped signature to protect the method and system of this class file, equal existing defects.
United States Patent (USP), the patent No. number are 5,193,854 (on March 16th, 1993), Patent No. 6,068,895 (2000 years May 30), Patent No. 6,155,604 (on December 5th, 2000), Patent No. 6,089,610 (on July 18th, 2000), Patent No. 6,107,244 (on August 22nd, 2000) is retouched in the patents such as Patent No. 4,820,006 (on April 11st, 1989) It has stated a series of using special paper, the method for specialty inks, special material and special equipment printing security document.This method Safety establish on the basis of the such specialties of strict control, ink, material and equipment, while think such paper, The controls such as the producing and selling of ink, material and equipment are tighter or price is expensive, cause to copy cost much higher than agent-protected file Value.These method security are higher, expensive, only in a small number of occasions, as currency, check printing in terms of use.Separately On the one hand, with the development of technology, the safety of such methods is also challenged.
Using one-dimensional or two-dimensional bar (see Pavlidis, Swartz and Wang respectively in " Fundamentals of Bar code information theory ", Computer volume 23, April nineteen ninety and " Information encoding With two-dimensional bar codes ", Computer volume 24, in June, 1992) be it is another generally use beat Printed text part content integrity guard method.The abstract of the method extraction document content prints after then carrying out specific coding processing Onto same file.Identify file it is whether legal need to use bar code reader read encoded information, then with file content ratio It is right.Such as combine hash (hash) function, asymmetric (asymmetric) cryptographic algorithm and digital signature (digital Signature), bar codes technique can protect mimeograph documents content illegally not forged and distorted fool proofly.However, item Shape code is easy to replicate, and any common duplicator can copy the bar code that can be received completely by reader.Therefore bar code It cannot be guaranteed that the primitiveness of mimeograph documents, that is, be unsatisfactory for anti-copying requirement.
To sum up, there are wretched insufficiencies for the integrality and primitiveness aspect that the prior art protects mimeograph documents at the same time.
Summary of the invention
To solve the above problems, the present invention provides a kind of effective and comprehensive mimeograph documents guard method and device.
In order to achieve the above object, the invention provides the following technical scheme:
A kind of protection and the verification method of mimeograph documents and bill original part, including following extraction step:
Step 1, the trace mark in file or bill original part is obtained, and trace characteristic vector is extracted according to trace;
Step 2, it is encrypted with secret key pair trace characteristic vector, forms digital signature;
Step 3, the digital signature of file is sent to authentication center or beats digital signature using modes such as bar code or characters It is imprinted in original.
It further, further include the previous step of mimeograph documents and trace mark before the step 1.
Further, in the step 2, being encrypted with key and forming the content of digital signature further includes document.
Further, further include the steps that extraction document is made a summary.
Further, further include verification step:
Step 4, document image to be verified is obtained, therefrom extracts trace mark, and extract trace characteristic vector in turn;
Step 5, checking file to be verified, whether there is or not signature bar codes, if nothing, by extracted synopsis and trace Characteristic Vectors Amount is sent to authentication center's verifying, extracts signature bar code if having signature bar code, and solve digital signature;
Step 6, digital signature is unlocked with secret key, to obtain the trace characteristic vector of original;
Step 7, by the synopsis and Characteristic Vectors of the synopsis of file to be verified and trace characteristic vector and original Amount is compared.
Further, the synopsis of original is also obtained when the step 6 unlocks digital signature.
Further, the step of extraction trace characteristic vector includes following sub-step:
(5) the trace mark in selecting files, and determine that it is described profile in turn;
(6) basic point or baseline are selected;
(7) sampling mode and sampling rate are selected;
(8) each sample value is sequentially read, trace characteristic vector is formed.
Further, trace mark include printer, seal-affixing machine, printing machine and it is hand-written during in paper and other Generated character, lines, figure, spot, trace on print media.
Further, the key is obtained from authentication center.
Compared with prior art, the invention has the advantages that and the utility model has the advantages that
The present invention extract it is any print, print, affixing one's seal, signing, etc. all unavoidably generate in the file of generations it is random The extremely strong trace of property, for uniquely determining and verifying document text and bill original part, due to the uniqueness of trace, side of the present invention Method provides file integrality and the original part protection of highest level.
Detailed description of the invention
Fig. 1 is the example for printing trace, due to the chance phenomenon in print procedure, by different printers, same printer Twice, trace caused by duplicating is entirely different.
Fig. 2 is the trace mark of four points, the microscopic feature of trace and the example of feature extraction.
Fig. 3 is extraction step block diagram in the method for the present invention.
Fig. 4 is verification step block diagram in the method for the present invention.
Specific embodiment
Technical solution provided by the invention is described in detail below with reference to specific embodiment, it should be understood that following specific Embodiment is only illustrative of the invention and is not intended to limit the scope of the invention.In addition, step shown in the flowchart of the accompanying drawings Suddenly it can execute in a computer system such as a set of computer executable instructions, although also, showing in flow charts Logical order, but in some cases, it can be with the steps shown or described are performed in an order that is different from the one herein.
The present invention provides the protection of mimeograph documents and bill original part and verification methods.For ease of description, of the invention is each Embodiment is described as or is referred to as " system ".Each component of system is described as module.The function of module can be with hardware or soft Part is realized.In software sense, a module is a program or part of it, is generally completed certain specific function or related function Energy.On hardware sense, a module is a functional hardware unit, is designed to be used together with other components with module. For example, a module can be realized with discrete electronic component or it may make up a complete electronic circuit, it is such as dedicated integrated A part of circuit (ASIC).There are many more other possible combinations, it will be appreciated by those skilled in the art that this system may be used also As hardware and software module combination and be achieved.
One, the trace of mimeograph documents
The present invention provides the protection of mimeograph documents and bill original part and verification method, in the integrity demands file of file Hold accurate, is not distorted illegally.It is original part that the primitiveness of file, which requires file, rather than the copy of original part.It is worth noting , the copy for the file that portion meets integrity demands still has integrality, and a original part illegally distorted still may be used To be referred to as original part.The present invention can protect the integrality and primitiveness of mimeograph documents simultaneously, naturally it is also possible to only be used to protect and beat The integrality or primitiveness of printed text part.
The basic principle of protection and the certification of mimeograph documents and bill original part uniqueness of the present invention is using in print procedure Generally existing chance phenomenon.We are illustrated such chance phenomenon by taking laser printer as an example below.But it is this random Phenomenon also exists in other printers (including but not limited to laser printer, ink-jet printer, electrostatic printer etc.), lid In chapter machine, printing machine or even handwriting.Therefore, present invention is equally suited for file caused by these occasions and bills.
Laser printer types principle can substantially be described below that (certainly, each laser printer is due to model, manufacturer It is different and different): in print procedure, printer controls laser and emits laser beam, is irradiated in photosensitive drums.Photosensitive drums Surface is coated with particular matter, generates electrostatic under laser irradiation.With the rotation of photosensitive drums and the scanning of laser beam, photosensitive drums table Face is formed the type face image drawn out by electrostatic.When photosensitive drums rotate through development wheel, the ink adhered to is taken turns in development Powder is just attracted to the part that electrostatic is had in photosensitive drums.These ink powders are then transferred on printing paper under the action of electrode, Visible character image on printing paper is formed after fuser fuses.Electric discharge and cleaning device carry out the remaining electrostatic of photosensitive drums Electric discharge and cleaning residual ink, make photosensitive drums put into the work in next period.
Above procedure is actually considerably complicated, includes a series of electromechanical and physical processes.Any objective factor in the process, Such as toner particles size, residual ink quantity, electrostatic field distribution situation, printing paper surface appearance, paper and dexter feeder in photosensitive drums Structure friction etc. can all impact final print result.These influence often not reproducible random case, can not make matter Amount tracking removal, and stochastic effects are generated to print result.For high-precision printer, usually naked eyes can not for these stochastic effects Discover, but under the microscope, we can clearly observe these stochastic effects.Here, we claim these because printer, Seal-affixing machine, printing machine and it is hand-written during stochastic effects on paper and other print media generated character, lines, spot The true form of point, trace etc. is " trace ".Due to the enchancement factor of print procedure, for same point, line, stroke, character, figure It is not identical Deng " trace " caused by, different printer, seal-affixing machine, printing machine, people.Moreover, even if the same printer, same One seal-affixing machine, the same printing machine, " trace " be not also identical caused by the same person.That is, " trace " has only One property.
Fig. 1 is the example of the trace of practical laser printer.101 be the enlarged drawing of the lower half portion of English alphabet P, that is, is managed Think the pattern that printer should export under state.102 8100 laser of HP LaserJet the use of resolution ratio to be 600dpi is beaten The actual effect of print machine printing letter P, it can be seen that appear in the irregular contour at alphabetical edge and the ink powder to scatter.103 are The case where printing letter P again using same printer, the difference between 103 and 102 are apparent.104 be to use more high score The effect that the HP LaserJet 4100 of resolution (1200dpi) is printed.105 be using the Minolta for being all 600dpi Di152f duplicator duplicates the result after 102.It has been observed that same printer repeatedly prints same file, different printers are beaten Print same file, between mimeograph documents and its copy and the different copies of same file all it is generally existing it is microcosmic on difference Not.With term of the invention, same content, by different printer or same printer, or generated file after duplicating, Its trace is different from.In this manner it is possible to identify whether file is copy part or duplicate, and then identify the original of file Property.Therefore, the original part of mimeograph documents and uniqueness are determined by " trace " of this document, it is any print, print, affixing one's seal, signing, The file of equal generations is all inevitably generated the very strong trace of randomness, is its ideal " fingerprint ", trace can be uniquely Determine the original part of a file.
It may be noted that not only the output of laser printer is there are this microcosmic chance phenomenon, other type printers, such as It can observe microcosmic chance phenomenon in the output of ink-jet printer, stylus printer and printing equipment.Similar is random existing As that can also observe and obtain in the file of non-print device cover/label such as signature in seal.These chance phenomena can produce " trace ", therefore can also be applied in the present invention.
Two, trace mark, the microscopic feature of trace and expression
As previously mentioned, trace is for a file, like fingerprint is in people.Identification trace can identify the true and false and body of a file Part.For the ease of automatically processing, such as fingerprint automation recognition, we will establish the numerical characteristic mark of trace.In Fig. 2 shown in 202 It is several traces of dot, the edge of trace is in random shape, and has the random appearance of ink dot.Therefore, we can be with such as lower section Method constructs " trace mark " and " trace characteristic vector ":
1. crucial stroke, character, figure in selecting files etc., or the specific figure of design are identified as trace, and in turn Determine that it is described profile.Trace mark can be simply such as the dot in Fig. 2.At this moment, profile should be its outer circle;If trace identifies A selected straight line or curve, such as periphery of a seal, being described profile can be one or both sides;If trace identifies a selected word Symbol, being described profile can be its outside or some or several insides or their cascade.
2. selected basic point or baseline.As shown in 203 in Fig. 2, basic point is the center of circle.It can choose it in processing routine Mass center.If straight line or curve, its middle line may be selected.
3. selecting sampling mode and sampling rate.Point in Fig. 2, we select small fan region for a sampling point, stain institute And maximum radius is the value.If straight line or curve, then may be selected and median perpendicular equal interval sampling.Sample rate is main Consider two factors: first is that can reflect random character using being Qwest's sampling criterion;Second is that view application requirement, and needs to reflect Other number of files matches.If desired the number of files identified is very big, then being formed by trace characteristic vector should also increase accordingly.
4. sequence reads each sample value, trace characteristic vector is formed.Finally as shown in 201 in Fig. 2.
The printing of trace mark is with general character as figure.It is intended merely to the convenience of identification, trace can be identified It is placed on special position, and labels symbol in specific position.For example, putting cross mark in peripheral quadrangle.
The identification of trace mark and the extraction of trace feature obtain text firstly the need of with high-resolution camera or scanner Then part image uses image processing method, identify and position trace mark, realizes trace characteristic vector described above extraction side Method.
Three, the integrality of mimeograph documents and original part protect system
Based on above-mentioned file trace, combining cipher principle and application, the integrality and original part of mimeograph documents protect system System block diagram is shown in Fig. 3.System receives two kinds of files as input, first is that digital document 312, another kind be printed File 311.Here, the integrality of mimeograph documents as shown in Figure 3 and the step of original part guard method, are: (here, it is assumed that The certification of original part and content has been carried out in given digital document and mimeograph documents)
1. extracting content from digital document 312, or from printed file 311 to protect the integrality of file Abstract (digest).There are many method for extracting abstract, and common method is used in encryption technology the main contents of file The method of hash (hash) ask the abstract of content, i.e. document 323.It is the expression of the uniqueness of this document content.It asks The method of abstract (digest) is shown in Afred J.Menezes, Paul C.van Oorschot and Scott A.Vanstone Written by " using encryption technology handbook (Handbook of Applied Cryptography ", gone out by CRC Press within 1996 Version).When seeking abstract, file content should be digital form.For mimeograph documents 311, can be known after scanning using automatic writing system Other technology, acquires digital content.
If unprotect file integrality requires, or after thinking to protect legitimacy or the original part of file, integrality also just exists Wherein, this step can be skipped.
2. printing trace mark, and the characteristic vector for asking trace to identify.To digital document and without the printing of trace mark It is mimeograph documents first for file, and on the trace chosen mark Printed to File by the printing solution chosen, formation is beaten Printed text part and trace mark 321.Then trace feature is extracted according to the method that aforementioned trace mark and trace characteristic vector are extracted Vector 322.It is the expression of the mimeograph documents uniqueness.Whole file can be extracted, it can also be with places several in selecting file It extracts, and records the specific location at extraction, to be compared in verifying.
3. the encryption of document and file trace characteristic vector.In the unique identification for obtaining this document original part, that is, print Mark characteristic vector;And the uniqueness of file content indicates, i.e., after document, it would be desirable to which an authoritative institution is entire to confirm The safety of the legitimacy and protection process of protection.Our this authoritative institution is referred to as authentication center.From authentication center to the present invention In mimeograph documents integrality and original part protection and verifying system core send out secret key, i.e. secret key 313.It can be shared secret key, It is also possible to public close want system.For the convenience of narration, it is assumed that with shared secret key.With this to trace characteristic vector and content Abstract encryption, forms digital signature 332.So far, we obtain the authoritative original parts (legitimacy) and integrality of this document Testimonial material.
4. the preservation of digital signature.The digital signature 332 of file is the legitimacy of the authority of this document and the card of integrality Bright material.The digital signature of file is saved with to be verified extremely important.There are two types of the methods for saving file digital signature.One kind is very Natural method is that the digital signature of file is sent to authentication center.In this way, the verifying of file validation and integrality is with regard to necessary It is completed by authentication center.The advantage of doing so is that unified, authority.The disadvantage is that must all carry out online.Another method be by Digital signature is printed upon on file using modes such as bar code or characters.In this way, if mimeograph documents, trace identify and label with bar code Brief note code is formed last file output 331.Certainly, it if digital signature is sent to authentication center by selection, is not printed upon On file, last output file will only include mimeograph documents and trace mark, not include signature bar code.
Four, the integrality and legitimate verification of mimeograph documents
Fig. 4 show the integrality of mimeograph documents and the process of legitimate verification.File 411 to be verified is given, it is complete Property and legitimate verification process are as follows:
1. determining that whether there is or not integrity protection first, if only doing legitimate verification without integrity protection.
2. extracting synopsis and trace mark from file to be verified, and trace characteristic vector is extracted in turn.Check to Verifying file, whether there is or not signature bar codes, if nothing, extracted synopsis and trace characteristic vector are sent to authentication center's verifying.
3. extracting signature bar code from file 411 to be verified, and solve digital signature 412.
4. using the secret key 413 come from authentication center, Lai Xiekai digital signature 412, so that the content for obtaining original is plucked Want 422 and trace characteristic vector 421.Equally, how using secret key or public keys encryption and decryption is shared, Afred is please referred to J. " encryption technology handbook is applied written by Menezes, Paul C.van Oorschot and Scott A.Vanstone (Handbook of Applied Cryptography ", published by CRC Press for 1996).
5. the synopsis and characteristic vector of the synopsis of file to be verified and trace characteristic vector and original are added With comparison, with the integrality and legitimacy of determination file to be verified.
6. verification process is similar with the above process as digital signature is stored in authentication center.
Five, system other forms
1. the guard method of non-laser mimeograph documents.Non-laser mimeograph documents are equally existed to be generated by print procedure randomness Microscopic feature.Therefore, this method be equally applicable to ink-jet printer, stylus printer, heat transfer printer, typewriter etc. its His file output equipment.Protection to file also includes while protecting file integrality and primitiveness, only protection integrality and only Protect the types such as primitiveness.
2. the guard method of non-print file.Since utilize is generally existing chance phenomenon to the present invention, also fit For closing the protection of integrality to alternative document primitiveness.Alternative document includes: that sealed files (utilize the random micro- of seal stamp mark See feature), signature file (utilizes the random microscopic feature of ink bleed trace), and printed matter (is generated random using ink Pattern), etc..Protection to file also includes while protecting file integrality and primitiveness, only protecting integrality and only protect The types such as primitiveness.
3. the protection of non-paper file.The present disclosure applies equally to protect the protection of non-paper class object, such as the packet of commodity Dress, various certificate cards, etc..Extraction and combining cipher principle of the protected mode equally based on random character, can also make With the method for attached label.
4. utilizing the protection system of non-microscopic feature.The present invention equally includes to be carried out using non-microcosmic random character to object Protection.It is defined as not reproducible generation at random herein, or occurs repeatedly the event of probability very little.For example, it can use wood grain Anti-fake protection is provided for woodwork.
5. artificial and automatic protective system.This system implements the method that can use human-computer interaction, can also be by machine certainly It is dynamic to complete.
Six, the protection of mimeograph documents and bill original part and verifying device
The protection of mimeograph documents and bill original part and a kind of implementation method for verifying device are in existing printing, file scan Realization software of the invention is added on all-in-one machine.
The protection of file:
Mimeograph documents and selected trace mark;
The good file of scanning and printing;
Extract trace mark, and the characteristic vector for asking trace to identify;
The abstract (digest) that content is extracted from digital document or from scanning file, generates document and file print The encryption digital signature of mark characteristic vector, the proof of original part (legitimacy) and integrality as this document;
The digital signature of file is sent to authentication center or is printed upon digital signature using modes such as bar codes or character In original;
File protection is completed, file is issued.
The verifying of file:
Scan file to be verified;
Trace mark is extracted from scanning file, and extracts trace characteristic vector in turn;
Synopsis (digest) is extracted from digital document or from scanning file, in the file for generating file to be verified Hold the encryption digital signature of abstract and file trace characteristic vector;
Signature bar code is extracted from the scanned copy of file to be verified, and solves digital signature, or use is from certification The secret key that the heart comes unlocks digital signature, to obtain the synopsis and trace characteristic vector of original;
By the synopsis and Characteristic Vectors of the synopsis of the file to be verified of generation and trace characteristic vector and original Amount is compared, with the integrality and legitimacy of determination file to be verified.Or two digital signatures are directly compared, come determine to Verify the integrality and legitimacy of file.
The method of the present invention can be applicable in printing and scanning integrated machine.
The technical means disclosed in the embodiments of the present invention is not limited only to technological means disclosed in above embodiment, further includes Technical solution consisting of any combination of the above technical features.It should be pointed out that for those skilled in the art For, various improvements and modifications may be made without departing from the principle of the present invention, these improvements and modifications are also considered as Protection scope of the present invention.

Claims (8)

1. protection and the verification method of a kind of mimeograph documents and bill original part, which is characterized in that including following extraction step:
Step 1, the trace mark in file or bill original part is obtained, and trace characteristic vector is extracted according to trace;
Step 2, it is encrypted with secret key pair trace characteristic vector, forms digital signature;
Step 3, the digital signature of file is sent to authentication center or is printed upon digital signature using modes such as bar codes or character In original.
2. protection and the verification method of mimeograph documents according to claim 1 and bill original part, which is characterized in that the step It further include the previous step of mimeograph documents and trace mark before rapid 1.
3. protection and the verification method of mimeograph documents according to claim 1 and bill original part, which is characterized in that the step In rapid 2, being encrypted with key and forming the content of digital signature further includes document.
4. protection and the verification method of mimeograph documents according to claim 3 and bill original part, which is characterized in that further include The step of extraction document is made a summary.
5. the protection of mimeograph documents described in any one of -4 and bill original part and verification method according to claim 1, special Sign is, further includes verification step:
Step 4, document image to be verified is obtained, therefrom extracts trace mark, and extract trace characteristic vector in turn;
Step 5, checking file to be verified, whether there is or not sign bar code to send extracted synopsis and trace characteristic vector if nothing It is verified toward authentication center, extracts signature bar code if having signature bar code, and solve digital signature;
Step 6, digital signature is unlocked with secret key, to obtain the trace characteristic vector of original;
Step 7, the synopsis and characteristic vector of the synopsis of file to be verified and trace characteristic vector and original are added With comparison.
6. protection and the verification method of mimeograph documents according to claim 5 and bill original part, which is characterized in that the step Rapid 6 also obtain the synopsis of original when unlocking digital signature.
7. the protection of mimeograph documents and bill original part and verification method according to claim 1 or 5, which is characterized in that institute Stating the step of extracting trace characteristic vector includes following sub-step:
(1) the trace mark in selecting files, and determine that it is described profile in turn;
(2) basic point or baseline are selected;
(3) sampling mode and sampling rate are selected;
(4) each sample value is sequentially read, trace characteristic vector is formed.
8. the protection of mimeograph documents and bill original part and verification method according to claim 1 or 5, which is characterized in that institute State trace mark include printer, seal-affixing machine, printing machine and it is hand-written during on paper and other print media caused by Character, lines, figure, spot, trace.
CN201811324463.8A 2018-11-08 2018-11-08 A kind of protection and the verification method of mimeograph documents and bill original part Pending CN109558741A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811324463.8A CN109558741A (en) 2018-11-08 2018-11-08 A kind of protection and the verification method of mimeograph documents and bill original part

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811324463.8A CN109558741A (en) 2018-11-08 2018-11-08 A kind of protection and the verification method of mimeograph documents and bill original part

Publications (1)

Publication Number Publication Date
CN109558741A true CN109558741A (en) 2019-04-02

Family

ID=65865813

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811324463.8A Pending CN109558741A (en) 2018-11-08 2018-11-08 A kind of protection and the verification method of mimeograph documents and bill original part

Country Status (1)

Country Link
CN (1) CN109558741A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110619290A (en) * 2019-08-30 2019-12-27 王晓 Method and system for on-line examining business license
CN111724385A (en) * 2020-07-24 2020-09-29 湖北警官学院 Ink-jet printing added altered file identification system and method based on satellite ink dots
CN113222076A (en) * 2020-01-21 2021-08-06 阿里健康信息技术有限公司 Printing and verifying method, device, system and storage medium

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140378585A1 (en) * 2013-06-20 2014-12-25 Kwai Sang NG Inkjet ink composition for printing irremovable trace marks on substrates for enhancing product authenticity and traceability
CN105488359A (en) * 2014-09-19 2016-04-13 吴健康 Printed file original protection and verification method and apparatus

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140378585A1 (en) * 2013-06-20 2014-12-25 Kwai Sang NG Inkjet ink composition for printing irremovable trace marks on substrates for enhancing product authenticity and traceability
CN105488359A (en) * 2014-09-19 2016-04-13 吴健康 Printed file original protection and verification method and apparatus

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110619290A (en) * 2019-08-30 2019-12-27 王晓 Method and system for on-line examining business license
CN113222076A (en) * 2020-01-21 2021-08-06 阿里健康信息技术有限公司 Printing and verifying method, device, system and storage medium
CN111724385A (en) * 2020-07-24 2020-09-29 湖北警官学院 Ink-jet printing added altered file identification system and method based on satellite ink dots
CN111724385B (en) * 2020-07-24 2024-02-09 湖北警官学院 Satellite ink dot-based ink-jet printing additive variant file identification system and method

Similar Documents

Publication Publication Date Title
US6748533B1 (en) Method and apparatus for protecting the legitimacy of an article
US8943325B2 (en) Use of a digital signature obtained from at least one structural characteristic of a material element to protect the direct reading of sensitive data and method for reading this protected data
CN101097416B (en) Printing system, printing control method
EP2237546B1 (en) Device and process for protecting a digital document, and corresponding process for verifying the authenticity of a printed hardcopy
US20080002882A1 (en) Brand protection and product autentication using portable devices
CN1394313A (en) Method for embedding and extracting text into/from electronic documents
Picard Digital authentication with copy-detection patterns
CN103489109A (en) Three-dimensional entity secret mark anti-counterfeiting system and method
WO2009036619A1 (en) Credit mark random dermal ridge generating method
CN109558741A (en) A kind of protection and the verification method of mimeograph documents and bill original part
WO2007072793A1 (en) Card capable of authentication
CN101359214B (en) Security document printing system and method of controlling the same
US7748748B2 (en) Method and system for generating and authenticating documents having stored electrostatic pattern information
US8578168B2 (en) Method and apparatus for preparing and verifying documents
US20050206158A1 (en) Certificate issuing method and certificate verifying method
RU2647642C1 (en) Method of the document certification with an irreversible digital signature
KR101573857B1 (en) A Printed Document Having Function Of Preventing From Forging/Manipulating, The Method Thereof and The Inspecting Method Of The Printed Document
KR100879961B1 (en) Puzzle Typed KeyCode With Image, and Security System and Method Using It
Dlamini et al. Mitigating the challenge of hardcopy document forgery
CN104751341A (en) Commodity anti-counterfeiting method based on two-dimensional code dynamic passwords
CN1321507C (en) Soft certification anti-false method based on graphic code primary and secondary signet series information association mechanism
RU2684498C2 (en) Method of certification and authentication of protected documents based on measurement result of deviations of relative position in different processes involved in making such security documents
KR101485798B1 (en) Personal identification card, Method for issuing personal identification card, Method for authorizing personal identification card
CN105488359A (en) Printed file original protection and verification method and apparatus
JPH0327489A (en) Method for testing authenticity of document

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20190402

RJ01 Rejection of invention patent application after publication