CN111984957A - Confidential document identification and tracking system based on fingerprint anti-counterfeiting - Google Patents
Confidential document identification and tracking system based on fingerprint anti-counterfeiting Download PDFInfo
- Publication number
- CN111984957A CN111984957A CN202010844722.0A CN202010844722A CN111984957A CN 111984957 A CN111984957 A CN 111984957A CN 202010844722 A CN202010844722 A CN 202010844722A CN 111984957 A CN111984957 A CN 111984957A
- Authority
- CN
- China
- Prior art keywords
- counterfeiting
- information
- document
- file
- identification
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000007639 printing Methods 0.000 claims abstract description 39
- 238000012795 verification Methods 0.000 claims abstract description 11
- BUGBHKTXTAQXES-UHFFFAOYSA-N Selenium Chemical compound [Se] BUGBHKTXTAQXES-UHFFFAOYSA-N 0.000 claims abstract description 9
- 229910052711 selenium Inorganic materials 0.000 claims abstract description 9
- 239000011669 selenium Substances 0.000 claims abstract description 9
- 238000005516 engineering process Methods 0.000 claims description 6
- 238000012545 processing Methods 0.000 claims description 6
- 238000004891 communication Methods 0.000 claims description 3
- 238000000034 method Methods 0.000 claims description 2
- 230000003993 interaction Effects 0.000 abstract description 2
- 230000005540 biological transmission Effects 0.000 description 2
- 238000010586 diagram Methods 0.000 description 2
- 230000002265 prevention Effects 0.000 description 2
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
- 230000007474 system interaction Effects 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/36—User authentication by graphic or iconic representation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/12—Digital output to print unit, e.g. line printer, chain printer
- G06F3/1201—Dedicated interfaces to print systems
- G06F3/1223—Dedicated interfaces to print systems specifically adapted to use a particular technique
- G06F3/1237—Print job management
- G06F3/1239—Restricting the usage of resources, e.g. usage or user levels, credit limit, consumables, special fonts
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2149—Restricted operating environment
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Computer Hardware Design (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Human Computer Interaction (AREA)
- Accessory Devices And Overall Control Thereof (AREA)
Abstract
The invention relates to a confidential document identification and tracking system based on fingerprint anti-counterfeiting, which adopts a computer, a fingerprint identification device, an anti-counterfeiting document two-dimensional code identification device, a server, an anti-counterfeiting selenium drum printer, an anti-counterfeiting printing module, an anti-counterfeiting identification module, document verification authority and tracking management module software to verify fingerprint information of a printer, check printing authority, add an anti-counterfeiting two-dimensional code to a printed document, generate an anti-counterfeiting document, transmit the anti-counterfeiting document to an anti-counterfeiting printer for printing, and simultaneously upload information related to the printer and the document to the server; verifying fingerprint information of the recognizer, realizing file verification on the received anti-counterfeiting file through interaction with a server, and uploading related verification information of the confidential anti-counterfeiting file to the server; and verifying the fingerprint information of the administrator to judge the type of the management user of the administrator, and distributing corresponding authority to manage the corresponding fingerprint information, the related information of the confidential file and the file tracking condition of the confidential file. The confidential document is prevented from copying, scanning and tampering, and the document is automatically tracked.
Description
Technical Field
The invention relates to an anti-counterfeiting tracking technology system, in particular to a confidential document identification and tracking system based on fingerprint anti-counterfeiting.
Background
The paper security document is the most common way for issuing the security document, and the paper security document is convenient for document reading and issuing and brings great convenience to users. But with it many problems arise: 1. the printed file is easy to forge and tamper by lawbreakers due to no special setting, which brings huge loss; 2. the source of the file can not be judged, and lawless persons transmit error information by using fake files; 3. the confidential documents are not expected to be widely spread, and once the confidential documents are divulged, the sources of the confidential documents cannot be searched and the divulging persons cannot be tracked; 4. after the file is printed and issued, the file control capability is lost, and the life cycle and the transmission track of the file cannot be tracked, so that the safety management is out of control; 5. the file is easy to be lost in the transmission process, so that the information is incomplete, and irretrievable loss is caused.
In view of the above problems, the present invention provides a fingerprint-based confidential document identification and tracking system, which utilizes anti-counterfeit encryption technology and strict authority control to prevent documents from being copied, forged and tampered, strictly implement document tracking control, discover document leakage paths in time, and accurately locate the person responsible for document leakage.
Disclosure of Invention
In order to solve the existing problems, the invention relates to a secret document identification and tracking system based on fingerprint anti-counterfeiting, which adopts a specific technical scheme that a secret document identification and tracking system based on fingerprint anti-counterfeiting adopts a plurality of computers, a plurality of fingerprint identification devices, an anti-counterfeiting document two-dimensional code identification device, a server, an anti-counterfeiting selenium drum printer, a software type anti-counterfeiting printing module, an anti-counterfeiting identification module and a document verification authority and tracking management module, and is characterized in that: the anti-counterfeiting printing module, the anti-counterfeiting identification module and the file verification authority and tracking management module are respectively distributed in a plurality of computers, the computers are respectively connected with a plurality of fingerprint identification devices and anti-counterfeiting file two-dimensional code identification devices, and are provided with corresponding drives, the server comprises a data server, an application server and a file server, the computers are connected with the fingerprint identification devices, the anti-counterfeiting selenium drum printer and the anti-counterfeiting file two-dimensional code identification devices by adopting USB (universal serial bus), and the anti-counterfeiting printing module, the anti-counterfeiting identification module and the file verification authority and tracking management module are respectively connected with a designated server by adopting a specific internal network or external network to achieve mutual communication, wherein the specific connection mode is determined according to actual requirements; the implementation steps comprise an anti-counterfeiting printing module step, an anti-counterfeiting identification module step, an authority and tracking management module step, firstly, fingerprint information of a printer, fingerprint information of an anti-counterfeiting file identifier and fingerprint information of a user type manager are stored in a server, and firstly, the anti-counterfeiting printing module step (I) sends an instruction to the server: printing a confidential document, (II) verifying fingerprint information of a printer, if yes, allowing the printer to print the confidential document, otherwise, refusing to return a printing request, and (III) generating an anti-counterfeiting document, (1) encrypting the fingerprint information of the printer and related information of the confidential document to generate an anti-counterfeiting two-dimensional code plaintext, (2) encrypting the contents of the two-dimensional code plaintext by using a public key distributed by a server through a combined encryption algorithm of RSA, DES and MD5 to generate a two-dimensional code ciphertext, (3) processing the contents by using an image processing technology to generate an anti-counterfeiting two-dimensional code image, (4) inserting the anti-counterfeiting two-dimensional code image into a specified position of the confidential document to generate the anti-counterfeiting document, and transmitting the anti-counterfeiting document to a printer with a matched anti-counterfeiting selenium drum for printing, and (5) uploading the related information of the printer and; secondly, an anti-counterfeiting identification module step, (1) verifies fingerprint information of an identifier and passes, identifies a two-dimensional code in an anti-counterfeiting file and sends the two-dimensional code ciphertext information obtained by identification to a server, (2) the server decrypts the two-dimensional code ciphertext by using a decryption private key and a combined decryption algorithm of RSA, DES and MD5 to obtain a two-dimensional code plaintext, (3) decomposes the two-dimensional code plaintext information according to a set rule and compares the decomposed data with information in a database, if not, if, returns the comparison result to the anti-counterfeiting identification module, (4) the anti-counterfeiting identification module analyzes the received identification result, and if the two-dimensional code plaintext information passes, immediately uploads position information, fingerprint information of the identifier and related information of file identification to the server and simultaneously feeds back the identification result received by the identifier; thirdly, the authority and tracking management module judges whether the fingerprint information of the login administrator has login authority or not, if yes, the next step is carried out, 2, the fingerprint identification device is used for verifying the fingerprint information of the anti-counterfeiting user type administrator to determine the type of the management user, the corresponding management authority is distributed, and the corresponding operation authority is distributed according to the type of the management user. The management user types and the corresponding operation authorities thereof are divided into the following types: 1) a print manager: adding, deleting and checking fingerprint information of a printer; viewing the relevant printing information of the confidential document; printing a security document; 2) identifying the administrator: adding, deleting and checking fingerprint information of an identifier; viewing the related tracking information of the confidential document; identifying a secure document; 1) document manager: checking related printing information, tracking information and original documents of the confidential documents; changing the state of the file; destroying the file; 2) a super manager: adding, deleting and checking fingerprint information of a printing manager, an identification manager and a document manager; all rights of a print manager, an identification manager, and a document manager.
The anti-counterfeiting two-dimensional code plaintext is composed of fingerprint information of a printer, printing computer information, printing position information, a file name, printing date and time, the current page number and the total page number.
The confidential file position information, the file identifier information and other file identification information are uploaded at any time, so that the full life cycle motion track of the file is dynamically tracked in real time, and the file is generally accurate and real-time like express logistics information.
The anti-counterfeiting two-dimensional code has the technical effects that the anti-counterfeiting two-dimensional code contains fingerprint information and has an anti-tampering function; the anti-counterfeiting identification module automatically identifies the anti-counterfeiting information of the file, uploads the related information of the file in real time, and a manager can remotely track the file at any time, so that the file can check the motion track of the file at any time like express logistics information; the super administrator can also quickly call the whole confidential document through a certain page in the document; in addition, the anti-counterfeiting two-dimensional code is invisible under natural light, so that the anti-counterfeiting confidential document has the characteristics of copy prevention, scanning prevention and the like.
Drawings
FIG. 1 is a system interaction diagram of the present invention;
FIG. 2 is a flow chart of an anti-counterfeit printing module according to the present invention;
FIG. 3 is a flow chart of two-dimensional code generation according to the present invention;
FIG. 4 is a two-dimensional code recognition interaction diagram of the present invention;
FIG. 5 is a flowchart of the privilege and tracking management login process of the present invention.
Detailed Description
The present invention will be described in detail with reference to the accompanying drawings.
As shown in fig. 1 to 5, a fingerprint-based confidential document identification and tracking system includes an anti-counterfeit printing module, an anti-counterfeit identification module, and an authority and tracking management module, wherein the anti-counterfeit printing module verifies the fingerprint of a printer, and allows the printer to print a confidential document if the fingerprint passes the verification, otherwise rejects the printing request; processing fingerprint information of a printer and related information of a file thereof according to a set rule to generate a two-dimensional code plaintext, encrypting the two-dimensional code plaintext information by using a public key of the module through an RSA, DES and MD5 combined encryption algorithm of the invention, generating a two-dimensional code image from the encrypted plaintext information, forming an anti-counterfeiting two-dimensional code image through an image processing technology, inserting the anti-counterfeiting two-dimensional code image into a specified position of a confidential file, sending the processed confidential file to an anti-counterfeiting printer, wherein the anti-counterfeiting printer is an OEP102D printer produced by Tianjin photoelectric communication Limited, and a specially-made selenium drum is a PT-8008TP selenium drum (anti-counterfeiting color) produced by Tianjin photoelectric Jieshan science and technology Limited company; the anti-counterfeiting printer prints and outputs the received file, and uploads relevant printing information such as file information, printer information and the like to the server.
The anti-counterfeiting identification module firstly verifies whether the anti-counterfeiting identification module has operation authority through fingerprint information of an identifier, if so, the two-dimensional code in the anti-counterfeiting confidential file is identified, the two-dimensional code ciphertext information obtained through identification is sent to a server, the server obtains a two-dimensional code plaintext through a decryption private key and an RSA, DES and MD5 combined decryption algorithm, the plaintext information is decomposed according to established rules, the decomposed information is compared with information stored in a database, a comparison result is returned to the anti-counterfeiting identification module, the anti-counterfeiting identification module analyzes the received identification result, if the result is passed, position information, the fingerprint information of the identifier and related information of file identification are immediately uploaded to the server, and meanwhile, the received identification result is fed back to the identifier.
The authority and tracking management module judges whether the administrator has login authority through the fingerprint information of the administrator, if so, the authority and tracking management module judges the type of the management user to which the administrator belongs according to the fingerprint information, and distributes corresponding operation authority according to the type of the management user. The management user types and the corresponding operation authorities thereof are divided into the following types:
1) a print manager: adding, deleting and checking fingerprint information of a printer; viewing the relevant printing information of the confidential document; printing a security document;
2) identifying the administrator: adding, deleting and checking fingerprint information of an identifier; viewing the related tracking information of the confidential document; identifying a secure document;
3) document manager: checking related printing information, tracking information and original documents of the confidential documents; changing the state of the file; destroying files, etc.;
4) a super manager: adding, deleting and checking fingerprint information of a printing manager, an identification manager and a document manager; all rights of a print manager, an identification manager, and a document manager.
The above-described embodiments are only a part of the present invention, and those skilled in the art will recognize that the equivalent modifications and substitutions can be made without departing from the spirit and characteristics of the present invention, and the scope of the appended claims is to be considered as the protection scope of the present invention.
Claims (3)
1. The utility model provides a secret file discernment and pursuit system based on fingerprint is anti-fake, adopts many computers, many fingerprint identification device, anti-fake file two-dimensional code recognition device, server, anti-fake selenium drum printer and software formula anti-fake print module, anti-fake identification module, file verification authority and pursuit management module, its characterized in that: the anti-counterfeiting printing module, the anti-counterfeiting identification module and the file verification authority and tracking management module are respectively distributed in a plurality of computers, the computers are respectively connected with a plurality of fingerprint identification devices and anti-counterfeiting file two-dimensional code identification devices, and are provided with corresponding drives, the server comprises a data server, an application server and a file server, the computers are connected with the fingerprint identification devices, the anti-counterfeiting selenium drum printer and the anti-counterfeiting file two-dimensional code identification devices by adopting USB (universal serial bus), and the anti-counterfeiting printing module, the anti-counterfeiting identification module and the file verification authority and tracking management module are respectively connected with a designated server by adopting a specific internal network or external network to achieve mutual communication, wherein the specific connection mode is determined according to actual requirements; the realizing steps comprise an anti-counterfeiting printing module step, an anti-counterfeiting identification module step and an authority and tracking management module step, firstly, fingerprint information of a printer, fingerprint information of an anti-counterfeiting file identifier and fingerprint information of a user type manager are stored in a server,
firstly, an anti-counterfeiting printing module is adopted,
the method comprises the following steps of (I) sending an instruction to a server: to print the confidential documents,
(II) fingerprint information verification of the printer, if yes, the printer is allowed to print the security document, otherwise, if no, the printer refuses to return the print request,
(III) generating anti-counterfeiting file
(1) The fingerprint information of the printer and the related information of the confidential document are encrypted to generate an anti-counterfeiting two-dimensional code plaintext,
(2) the public key distributed by the server is used for encrypting the two-dimensional code plaintext content through the RSA, DES and MD5 joint encryption algorithm to generate a two-dimensional code ciphertext,
(3) processing by using an image processing technology to generate an anti-counterfeiting two-dimensional code image from the two-dimensional code ciphertext,
(4) inserting the anti-counterfeiting paper into the specified position of the confidential document to generate an anti-counterfeiting document, sending the anti-counterfeiting document to a printer containing a matched anti-counterfeiting selenium drum for printing,
(5) uploading relevant information of a printer and a file to a server;
secondly, an anti-counterfeiting identification module is adopted,
(1) the fingerprint information of the recognizer is verified, if the fingerprint information passes, the two-dimension code in the anti-counterfeiting file is recognized, the two-dimension code ciphertext information obtained by recognition is sent to a server,
(2) the server decrypts the two-dimension code ciphertext by using the decryption private key and a combined decryption algorithm of RSA, DES and MD5 to obtain a two-dimension code plaintext,
(3) decomposing the plaintext information of the two-dimensional code according to a set rule, comparing the decomposed data with the information in the database, if not, ending, and if yes, returning the comparison result to the anti-counterfeiting identification module,
(4) the anti-counterfeiting identification module analyzes the received identification result, if the identification result passes, the position information, the fingerprint information of the identifier and the related information of the file identification are immediately uploaded to the server, and the position information, the fingerprint information of the identifier and the related information of the file identification are simultaneously fed back to the identification result received by the identifier;
thirdly, the steps of the authority and tracking management module
(1) The authority and tracking management module judges whether the fingerprint information of the login administrator has login authority, yes, and then the next step is carried out,
(2) verifying the fingerprint information of an anti-counterfeiting user type manager by using a fingerprint identification device to determine a management user type, distributing corresponding management authority, and distributing corresponding operation authority according to the management user type;
the management user types and the corresponding operation authorities thereof are divided into the following types:
a print manager: adding, deleting and checking fingerprint information of a printer; viewing the relevant printing information of the confidential document; printing a security document;
identifying the administrator: adding, deleting and checking fingerprint information of an identifier; viewing the related tracking information of the confidential document; identifying a secure document;
document manager: checking related printing information, tracking information and original documents of the confidential documents; changing the state of the file; destroying the file;
a super manager: adding, deleting and checking fingerprint information of a printing manager, an identification manager and a document manager; all rights of a print manager, an identification manager, and a document manager.
2. A fingerprint anti-counterfeiting based secure document identification and tracking system as claimed in claim 1, wherein said anti-counterfeiting two-dimensional code plain text is composed of the fingerprint information of the printer, the printing computer information, the printing position information, the file name, the printing date and time, the current page number, and the total page number content.
3. The fingerprint anti-counterfeiting based confidential document identification and tracking system as claimed in claim 1, wherein confidential document position information, document identifier information and other identification information of the document are uploaded at any time, so that real-time dynamic tracking of the full life cycle motion trajectory of the document is realized, and the motion trajectory is generally accurate and real-time like express logistics information.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010844722.0A CN111984957A (en) | 2020-08-20 | 2020-08-20 | Confidential document identification and tracking system based on fingerprint anti-counterfeiting |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010844722.0A CN111984957A (en) | 2020-08-20 | 2020-08-20 | Confidential document identification and tracking system based on fingerprint anti-counterfeiting |
Publications (1)
Publication Number | Publication Date |
---|---|
CN111984957A true CN111984957A (en) | 2020-11-24 |
Family
ID=73442335
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202010844722.0A Pending CN111984957A (en) | 2020-08-20 | 2020-08-20 | Confidential document identification and tracking system based on fingerprint anti-counterfeiting |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN111984957A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113157223A (en) * | 2021-04-27 | 2021-07-23 | 天津光电久远科技有限公司 | Cross-platform official document anti-counterfeiting printing management system used in local area network |
CN113190814A (en) * | 2021-04-27 | 2021-07-30 | 天津光电久远科技有限公司 | Anti-counterfeiting classified destruction management system based on face recognition and two-dimensional code recognition |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102880833A (en) * | 2012-08-28 | 2013-01-16 | 福州讯华信息技术有限公司 | Two-dimensional code anti-fake verification method for documents |
CN103020684A (en) * | 2012-12-07 | 2013-04-03 | 北京印刷学院 | Anti-counterfeiting device, anti-counterfeiting recognition device and system for commodity packaging |
CN110968275A (en) * | 2019-11-29 | 2020-04-07 | 杭州天谷信息科技有限公司 | The anti-counterfeiting tracing system and method for the printed document |
-
2020
- 2020-08-20 CN CN202010844722.0A patent/CN111984957A/en active Pending
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102880833A (en) * | 2012-08-28 | 2013-01-16 | 福州讯华信息技术有限公司 | Two-dimensional code anti-fake verification method for documents |
CN103020684A (en) * | 2012-12-07 | 2013-04-03 | 北京印刷学院 | Anti-counterfeiting device, anti-counterfeiting recognition device and system for commodity packaging |
CN110968275A (en) * | 2019-11-29 | 2020-04-07 | 杭州天谷信息科技有限公司 | The anti-counterfeiting tracing system and method for the printed document |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113157223A (en) * | 2021-04-27 | 2021-07-23 | 天津光电久远科技有限公司 | Cross-platform official document anti-counterfeiting printing management system used in local area network |
CN113190814A (en) * | 2021-04-27 | 2021-07-30 | 天津光电久远科技有限公司 | Anti-counterfeiting classified destruction management system based on face recognition and two-dimensional code recognition |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8040541B2 (en) | Secure document printing | |
JP3803378B2 (en) | Secure copy of confidential documents | |
EP3907634B1 (en) | Copyright protection based on hidden copright information | |
US8037310B2 (en) | Document authentication combining digital signature verification and visual comparison | |
US7913313B2 (en) | Method and system for invisibly embedding into a text document the license identification of the generating licensed software | |
US20030012374A1 (en) | Electronic signing of documents | |
CN101686294B (en) | Embedded type file information security management system | |
JP2010268466A (en) | Digital authentication using analog document | |
CN110855428A (en) | Movie copyright protection method based on block chain | |
CN116842583B (en) | Electronic signature system and method with PDF signature as core | |
WO1999012144A1 (en) | Digital signature generating server and digital signature generating method | |
CN111984957A (en) | Confidential document identification and tracking system based on fingerprint anti-counterfeiting | |
CN101359214B (en) | Security document printing system and method of controlling the same | |
RU2647642C1 (en) | Method of the document certification with an irreversible digital signature | |
CN113190814A (en) | Anti-counterfeiting classified destruction management system based on face recognition and two-dimensional code recognition | |
EP1280098A1 (en) | Electronic signing of documents | |
CN109614805A (en) | A kind of generation that document is anti-fake and recognition methods and printing driving and system | |
CN114065148A (en) | Block chain-based security management and disclosure tracing method for confidential documents | |
KR102138077B1 (en) | System and method for preventing forgery and alteration of documents | |
CN101170626A (en) | Information processing apparatus, information processing method, program, and storage medium | |
KR20200126313A (en) | Method and System for authenticating documents using inquiry history notice | |
CN113157223A (en) | Cross-platform official document anti-counterfeiting printing management system used in local area network | |
WO2003009217A1 (en) | Electronic signing of documents | |
CN113626776A (en) | Information carrier concept attribute transfer and electronic signature printable method | |
CN1255750C (en) | Design method for digital electronic signet |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |