CN112464273A - Method and server for seal safety management and seal - Google Patents

Method and server for seal safety management and seal Download PDF

Info

Publication number
CN112464273A
CN112464273A CN201910848422.7A CN201910848422A CN112464273A CN 112464273 A CN112464273 A CN 112464273A CN 201910848422 A CN201910848422 A CN 201910848422A CN 112464273 A CN112464273 A CN 112464273A
Authority
CN
China
Prior art keywords
seal
information
server
stamp
code
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910848422.7A
Other languages
Chinese (zh)
Inventor
褚海威
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN201910848422.7A priority Critical patent/CN112464273A/en
Publication of CN112464273A publication Critical patent/CN112464273A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Databases & Information Systems (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention relates to a method for seal safety management, a server and a seal, wherein the method is applied to the server and comprises the following steps: setting the use authority of the seal; receiving a seal ID sent by a seal, sending the use permission of the seal to the seal according to the seal ID, so that the seal can verify the use parameter information to be verified acquired by the seal according to the use permission of the seal, and generating and printing an anti-counterfeiting code based on the verified use parameter information after the verification is passed; and receiving and storing the use parameter information sent by the seal and the seal image containing the code generated based on the use parameter information for the subsequent authenticity identification of the seal or the seal.

Description

Method and server for seal safety management and seal
Technical Field
The invention relates to the technical field of seals, in particular to a method, a server and a seal for seal safety management.
Background
At present, the seal is widely applied in daily commercial activities. For example, the seal is used in the process of business transaction, project declaration and approval of a company. However, with the increase of the usage amount of the stamp, the following problems exist in the prior art:
firstly, the current seal and seal have poor anti-counterfeiting performance, the authenticity of the seal and seal cannot be identified on site, and the seal and seal must be submitted to a judicial authentication department for identification; thus, the authentication period takes at least several tens of days, and costs several thousands of dollars, and the official seal authentication threshold is high.
Secondly, the time of using the seal or generating the seal stamp cannot be determined, so that in practical social applications, because the accurate time of using the seal cannot be determined, documents such as contracts, documents, descriptions, notices, reports and notices can be supplemented later, various kinds of fraud, cheating, justice and disputes are caused, and social instability factors are formed.
Thirdly, once an existing stamp is lost or taken out of the company to which the stamp belongs, the company faces a completely uncontrollable risk. For example, signing a contract, description, statement, notice, debt, etc. with a seal, which is unknown to the company, can result in unpredictable losses to the company.
Fourthly, the seal is hard to distinguish true and false, and criminals use false official seals to cheat, which results in hundreds of millions of losses each year.
Fifthly, the seal and the seal stamp are removed from other documents, and the risk of counterfeiting the seal and the seal stamp exists.
Disclosure of Invention
In order to solve the technical problem, the invention provides a method, a server and a seal for seal safety management.
According to a first aspect of the present invention, there is provided a method for seal security management, which is applied to a server, the method including:
setting the use authority of the seal;
receiving a seal ID sent by a seal, sending the use permission of the seal to the seal according to the seal ID, so that the seal can verify the use parameter information to be verified acquired by the seal according to the use permission of the seal, and generating and printing an anti-counterfeiting code based on the verified use parameter information after the verification is passed; and
and receiving and storing the use parameter information sent by the seal and the seal image containing the code generated based on the use parameter information for the subsequent authenticity identification of the seal or the seal.
Preferably, the usage parameter information includes identity information of a stamp user; or, the use parameter information includes the identity information of the seal user and at least one of the following: identity information of a seal owner, current time, the current position of the seal and the number of times of using the current seal; and
correspondingly, the using authority of the seal comprises user identity information which permits the seal to be used; or the using authority of the seal comprises user identity information for permitting the seal to be used and at least one of the following: the seal management system comprises identity information of a seal owner, a time range for permitting use of the seal, a region range for permitting use of the seal and the number of times for permitting use of the seal.
Preferably, the method further comprises:
when receiving a seal ID sent by a seal, inquiring the state of the seal according to the seal ID; and
judging whether to send the seal use authority to the seal or not based on the inquired state of the seal,
wherein, the state of the seal comprises at least one of the following: normal operation, maintenance in failure, shutdown, and scrapping.
Preferably, the judging whether to send the usage permission of the seal to the seal based on the inquired state of the seal includes:
when the state of the seal is normal work, the use authority of the seal is sent to the seal;
when the state of the seal is fault maintenance, stop using or scrapping, the use authority of the seal is not sent to the seal, and
and when the seal is in a disabled state, sending a self-locking instruction to the seal, so that the seal cannot be used.
Preferably, the method further comprises:
receiving an authorization code sent by a seal while receiving a seal ID sent by the seal, and judging whether the seal is allowed to log in a server according to the authorization code sent by the seal, wherein:
when the authorization code sent by the seal is consistent with the authorization code stored by the server, allowing the seal to log in; otherwise, the seal is not allowed to log in.
Preferably, the method further comprises:
after the seal is logged in by using the authorization code, updating the authorization code; and
and sending the updated authorization code to the seal while sending the use permission of the seal to the seal so as to be used when the seal logs in a server next time.
Preferably, after the stamp is registered with the authorization code, updating the authorization code includes:
and generating a new authorization code based on the seal ID, the current time and the last authorization code so as to update the authorization code.
Preferably, the method further comprises:
changing the state information of the seal according to the received request, and changing the state of the seal; and
and sending a self-locking instruction or a self-destruction instruction to the seal according to the received request seal self-locking information or the request seal self-destruction information so as to enable the seal not to be used or enable the seal to be self-destroyed by adopting a physical or chemical method.
Preferably, the method further comprises:
before sending information or instructions to the seal each time, encryption processing is carried out on the information or instructions to be sent.
According to a second aspect of the present invention, there is provided a method for stamp security management, which is applied to a stamp, the method including:
sending the seal ID to a server so that the server can inquire the use authority of the seal according to the seal ID;
receiving the use permission of the seal sent by the server, verifying the obtained use parameter information to be verified according to the use permission of the seal, and generating and printing an anti-counterfeiting code based on the use parameter information passing verification after the verification is passed; and
and sending the use parameter information and the seal image containing the code generated based on the use parameter information to the server for the subsequent authenticity identification of the seal or the seal.
Preferably, the usage parameter information includes identity information of a stamp user; or, the use parameter information includes the identity information of the seal user and at least one of the following: identity information of a seal owner, current time, the current position of the seal and the number of times of using the current seal; and
correspondingly, the using authority of the seal comprises user identity information which permits the seal to be used; or the using authority of the seal comprises user identity information for permitting the seal to be used and at least one of the following: the seal management system comprises identity information of a seal owner, a time range for permitting use of the seal, a region range for permitting use of the seal and the number of times for permitting use of the seal.
Preferably, the method further comprises:
receiving an authorization code sent by the server;
when the seal is started, the authorization code is verified, and whether the seal stops working is judged based on a verification result, wherein: when the authorization code is verified to be correct, the power-on state is kept; and entering a shutdown state when the authorization code is checked to be wrong.
Preferably, the method further comprises:
before sending information to the server each time, encryption processing is carried out on the information to be sent.
According to a third aspect of the present invention, there is provided a server comprising:
a processor; and
a memory having stored thereon executable code which, when executed by the processor, implements the method for stamp security management provided above according to the first aspect of the invention.
According to a fourth aspect of the present invention, there is provided a stamp comprising:
a processor; and
a memory having stored thereon executable code which, when executed by the processor, implements the method for stamp security management provided above according to the second aspect of the invention.
Compared with the prior art, one or more embodiments in the above scheme can have the following advantages or beneficial effects:
by applying the method, the server and the seal for seal safety management provided by the embodiment of the invention, through setting the use authority of the seal, the condition that people except the use authority cannot use the seal is ensured, and the condition that illegal people use the seal to manufacture files damaging the benefits of seal owners due to seal loss or stealing is effectively avoided, so that the benefits of the seal owners are maintained.
Furthermore, because the generated code contains the service time information of the seal or the unique number can be obtained by decoding the generated code, and the service time information of the seal is inquired through the unique number, documents such as a contract and the like cannot be supplemented later, unfairness brought by the document supplemented later is avoided, and legal risks to seal owners are avoided.
Furthermore, the use time, the use place, the use times and the user identity of the seal are recorded in real time, so that the seal tracing system can trace the use track of the seal completely, is convenient for seal management and prevents risks.
Additional features and advantages of the invention will be set forth in the description which follows, and in part will be obvious from the description, or may be learned by the practice of the invention. The objectives and other advantages of the invention will be realized and attained by the structure particularly pointed out in the written description and claims hereof as well as the appended drawings.
Drawings
The accompanying drawings, which are included to provide a further understanding of the invention and are incorporated in and constitute a part of this specification, illustrate embodiments of the invention and together with the description serve to explain the principles of the invention and not to limit the invention.
Fig. 1 is a flowchart of a method for stamp security management according to an embodiment of the present invention.
Fig. 2 is a flowchart of a method for stamp security management according to a second embodiment of the present invention.
Fig. 3 is a flowchart of a method for stamp security management according to a third embodiment of the present invention.
Detailed Description
The following detailed description of the embodiments of the present invention will be provided with reference to the drawings and examples, so that how to apply the technical means to solve the technical problems and achieve the technical effects can be fully understood and implemented. It should be noted that, as long as there is no conflict, the embodiments and the features of the embodiments of the present invention may be combined with each other, and the technical solutions formed are within the scope of the present invention.
In order to solve the technical problem that once a seal is lost or stolen because a perfect use safety management mechanism is not provided in the use process of the seal in the prior art, an illegal person can use the seal to manufacture some documents which damage the benefits of a seal owner, such as contracts or shortcuts, and the benefits of the seal owner are seriously damaged, the embodiment of the invention provides a method, a server and the seal for seal safety management.
Example one
Fig. 1 is a flowchart of a method for stamp security management according to an embodiment of the present invention. As shown in fig. 1, the method includes:
step S11: setting the use authority of the seal;
step S12; receiving a seal ID sent by a seal, sending the use permission of the seal to the seal according to the seal ID, so that the seal can verify the use parameter information to be verified acquired by the seal according to the use permission of the seal, and generating and printing an anti-counterfeiting code based on the verified use parameter information after the verification is passed; and
step S13: and receiving and storing the use parameter information sent by the seal and the seal image containing the code generated based on the use parameter information for the subsequent authenticity identification of the seal or the seal.
Because the existing seal has no perfect use safety management mechanism in the use process, once the seal is lost or stolen, an illegal person can use the seal to manufacture some documents which damage the benefits of the seal owner, such as contracts or debts, which seriously damage the benefits of the seal owner.
In order to solve the technical problem, in the embodiment of the invention, the use authority of the seal is preferably set through the server, so that people except the use authority cannot use the seal, and the benefits of a seal owner are further maintained. Specifically, in step S11, for any stamp, the server may set the usage authority of the stamp, including: and setting user identity information for permitting the seal to be used. The user identity information for permitting the use of the seal includes, for example: the user's account number and password and/or user's fingerprint and/or other information indicative of the user's identity permitting use of the stamp.
In practice, once the user account and password and/or user fingerprint input by the seal user are not consistent with the user identity information of the permitted seal in the use authority set by the seal, the seal cannot be used, so that the benefit of the seal owner is ensured. Therefore, even if the seal is lost, the seal owner does not need to worry about that illegal personnel forge files which damage own interests by using the seal.
Further, in order to enable the stamp to be used more safely, the embodiment of the present invention sets the time, place, and number of times of use of the stamp permitted in addition to the user identification information permitting use of the stamp. If the time allowed for using the stamp is exceeded, the stamp cannot be used. Likewise, if the place (area or region) where the stamp is allowed to be used or the number of uses is exceeded, the stamp will not be used.
The purpose of setting the time, place and number of times of use that the stamp is allowed to be used is to: on one hand, the technical difficulty of cracking the seal by illegal personnel can be improved by setting the multilayer use permission, so that the risk of the seal being illegally used is reduced; on the other hand, for example, by setting the number of times of allowing the seal to be used, the number of files counterfeited by illegal personnel by using the seal can be limited, the situation that the illegal personnel unlimitedly use the seal to manufacture a large number of files which are harmful to a seal owner is avoided, and the economic loss of the seal owner is reduced; on the other hand, in practice, it is difficult or impossible for other persons than the legitimate user of the stamp to know the information about the time, place and number of times of use of the stamp, which increases the difficulty of using the stamp by an illegitimate person.
Specifically, in the embodiment of the invention, the time range of permitting the use of the seal, the region range of permitting the use of the seal and the number of times of permitting the use of the seal are set. The time range for permitting the use of the seal is set as: 13:00-13:15 or 13:00 to define the specific time or time period during which the stamp may be used. The region range where the seal is permitted to be used is set as: the Hei lake district of Beijing or other application ranges customized by users. The number of permitted uses of the stamp is set as: one, three, or other user-defined number of uses.
In addition to setting the user identification information of the permitted seal, the time range of permitted seal, the area range of permitted seal and the number of permitted seal usage, setting the usage authority of the seal may further include: setting seal owner information, setting opposite side enterprise information and the like. Wherein, setting the seal owner information includes, for example: and setting the enterprise code, the enterprise name and the enterprise legal name of the enterprise. Setting the counterpart enterprise information includes, for example: and setting the enterprise code, the enterprise name and the corporate name of the enterprise of the other side. For example, when the stamp is used, the stamp user is required to input the enterprise code of the enterprise and the enterprise code of the other enterprise, and if the enterprise code of the enterprise and the enterprise code of the other enterprise input by the user are not consistent with the enterprise code of the enterprise and the enterprise code of the other enterprise set in the use authority, the stamp cannot be used.
In the embodiment of the invention, the process of setting the use authority of the seal comprises the following steps: the server preferably has adding operation, modifying operation, deleting operation, resetting operation and saving operation, and is used for setting the use permission of the seal. For example, when a new user needs to be entered, if the user does not have an account, the server first creates a user account, a password and a user fingerprint belonging to the user, and then adds the user account, the password and the fingerprint of the user to the user identity information which permits the use of the seal through an adding operation, and correspondingly, the time range of permitting the use of the seal, the region range of setting permitting the use of the seal, the number of times of setting permitting the use of the seal and other use permission information can be completed through adding operations. When the usage right information needs to be modified, the usage right information can be modified through a modification operation. In addition, the use authority information can be deleted through deletion operation, for example, the user identity information which permits the use of the seal can be deleted; the use authority information can be reset through a reset operation; when each operation is completed, the saving operation is used for saving the currently set use permission information in real time.
In step S12, the server receives the stamp ID sent by the stamp, and sends the usage right of the stamp to the stamp according to the stamp ID, so that the stamp can verify the usage parameter information to be verified acquired by the stamp according to the usage right of the stamp, and after the usage parameter information passes the verification, generates and prints an anti-counterfeiting code based on the usage parameter information that passes the verification.
Specifically, each time the seal is started, the seal sends a startup request message to the server. When the server receives the startup request information sent by the seal, firstly, the server can judge whether the seal is allowed to log in the server according to the seal ID and the authorization code in the startup request information.
Specifically, the server queries the authorization code sent to the stamp last time according to the stamp ID. When the authorization code sent by the seal is consistent with the authorization code inquired by the server, allowing the seal to log in the server; otherwise, the seal is not allowed to log in the server, so that the operation safety of the server is ensured.
Then, after the seal logs in the server, the server inquires the state of the seal corresponding to the seal ID according to the seal ID, and judges whether to send the use permission of the seal to the seal or not based on the inquired state of the seal. Wherein, the state of the seal comprises at least one of the following: normal operation, maintenance in failure, shutdown, and scrapping.
Specifically, based on the inquired state of the seal, whether to send the use permission of the seal to the seal is judged, including:
when the state of the seal is normal work, the use authority of the seal is sent to the seal;
when the state of seal is for the fault maintenance, stop using or scrap, do not send the service authority of this seal to the seal, and when the state of seal was for stopping using, send the auto-lock instruction to the seal for the seal can't use.
Preferably, when the state of the seal is fault maintenance or scrapping, the state information of the seal is sent to the seal so as to inform a seal user of the real-time state of the seal. For example, the status information of the seal such as "the seal is in trouble maintenance", "the seal is discarded", and the like.
After the state of the seal is inquired, if the state of the seal is normal, the server updates the authorization code and stores the updated authorization code. The updating method comprises the following steps: and generating a new authorization code based on the seal ID, the current time and the previous authorization code so as to update the authorization code.
And then, the server sends the use authority of the seal to the seal and sends an updated authorization code to the seal for the seal to use when logging in the server next time.
After the seal receives the use authority of the seal, the use parameter information to be verified acquired by the seal is verified according to the use authority of the seal, and after the use parameter information passes verification, a code for anti-counterfeiting is generated and printed based on the use parameter information passing verification. The using parameter information comprises the identity information of a seal user; or the use parameter information comprises the identity information of the seal user and at least one of the following: identity information of a seal owner, current time, the current position of the seal and the number of times of using the current seal.
For example, the identity information of the stamp user and the identity information of the stamp owner are obtained through input of an input keyboard or a touch screen arranged on the stamp. The current time is obtained by a timing device arranged on the seal. The current position of the seal is obtained by a positioning device arranged on the seal. The number of times of using the current seal is obtained by a counting device arranged on the seal. Of course, other information than the above-described usage parameter information may be included, and the present invention is not limited thereto. The information of the opposite side enterprise can also be obtained by inputting through an input keyboard or a touch screen arranged on the seal.
Specifically, in the embodiment of the present invention, the seal compares the acquired to-be-verified usage parameter information with the usage authority of the seal item by item, and when any one of the to-be-verified usage parameter information (for example, the current time) is not matched with the usage authority of the seal, the seal cannot be used, for example, the seal cannot generate an anti-counterfeiting code. The code for preventing counterfeiting comprises the following components: at least one or more of a two-dimensional code, a bar code, a character, and a predetermined figure. When all the information in the use parameter information to be verified is matched with the use authority of the seal, the seal can be used, for example, the seal generates a code for anti-counterfeiting based on the verified use parameter information.
If the using parameter information to be verified passes the verification, after the code for anti-counterfeiting is generated, when the seal detects the stamping action of a user or the user presses a using seal button, a printing device inside the seal prints the generated code on a file, and the using seal process is completed.
Preferably, in addition to the code, the text portion of the stamp base (e.g. xx company) is also printed on the document with the code. Of course, the text portion of the stamp base may also be printed on the document in a conventional manner, for example, by inkpad printing, without the invention being limited thereto. In addition, the printing position of the code can be flexibly adjusted, such as printing inside the text portion, outside the text portion, or surrounding the text portion, but the invention is not limited thereto.
As a more preferred embodiment, before the seal receives the seal startup authentication information sent by the server, the seal is in a locked state. Specifically, when the server inquires that the state of the seal is normal work: the server sends the seal startup authentication information to the seal while sending the seal use authority and the updated authorization code to the seal. After the seal receives the seal startup authentication information, the locking state is released, the use parameter information to be verified acquired by the seal is verified according to the received use authority of the seal, and after the use parameter information passes the verification, a code for anti-counterfeiting is generated and printed based on the use parameter information passing the verification.
As a better implementation mode, the time in the timing device on the stamp is prevented from being forcibly changed by a user, and the inaccurate timing of the timing device on the stamp is avoided. The server sends the current absolute time to the seal while sending the use authority of the seal to the seal, and time service is carried out so as to correct the time of the timing device on the seal, so that the time of the seal is consistent with that of the server.
As a more preferable implementation mode, when a seal owner confirms that the seal is lost, the seal owner can send a request for seal self-locking information or a request for seal self-destruction information to the server through the user terminal, after the request information is verified, the server can send a self-locking instruction or a self-destruction instruction to the seal corresponding to the seal ID based on the seal ID, and when the seal receives the self-locking instruction sent by the server, the seal exits from a working state and enters into a locking state, so that the seal cannot be used. Preferably, when the seal receives a self-locking instruction, all information in the chip is uploaded to the server to be stored when the seal enters a locking state, and then all information in the chip inside the seal is removed, so that information of a legal seal user is prevented from being leaked.
In addition, when the seal receives a self-destruction instruction sent by the server, the seal is self-destroyed by adopting a physical or chemical method, all information in the chip is uploaded to the server to be stored, and then the information in the chip in the seal is removed. Preferably, the information in the chip in the stamp is removed, and simultaneously, the stamp body and the character part at the bottom of the stamp are destroyed. For example, the seal body is made of low-melting-point rubber and is self-destructed by a heating wire; for another example, the stamp is dissolved chemically. The specific self-destruction mode can be flexibly set according to the actual situation, and the invention is not limited to the specific self-destruction mode.
As a more preferable embodiment, when the seal owner confirms that the seal is lost, for example, the seal owner may send a request to change the state information of the seal to the server through the user terminal, and after the request information is verified, the server may change the state of the seal based on the seal ID, for example, the state of the seal is set to be disabled, so as to ensure the use safety of the seal.
As a more preferable embodiment, the stamp records information (such as an account number and a password) input by a user in real time and records information of time, position and use times acquired by the stamp in real time, and transmits the recorded information to the server in real time for storage by the server. The preferable server sends the information to a user terminal of a seal owner, so that the seal owner can know the using condition of the seal, the using safety of the seal is ensured, and when the seal is lost, the seal can be tracked based on the position information recorded in real time.
As a more preferable embodiment, the seal manager may actively inquire the seal usage record information in the server, for example, by logging in the server through the user terminal, so that the seal manager can supervise each seal usage.
In step S13, the usage parameter information of the generated code sent by the stamp and the picture of the seal stamp containing the code generated based on the usage parameter information are received and stored for the subsequent authentication of the stamp or seal stamp.
Specifically, in order to authenticate a subsequent seal or seal and facilitate subsequent data analysis of the use condition of the seal, in the embodiment of the invention, each time a code is printed on the seal, an image acquisition device on the seal or an external device is used for acquiring a seal picture containing the code, the acquired seal picture and the use parameter information of the generated code are uploaded to a server, and the server stores the received seal picture containing the code and the use parameter information of the generated code. The related seal identification method is explained in detail in other patents, and is not described in detail herein.
In a more preferred embodiment, before any information or instruction is sent to each other, the server and the stamp encrypt the information or instruction to be sent to prevent information leakage. Correspondingly, when the server receives the encrypted information or the encrypted instruction sent by the seal, the server firstly decrypts the encrypted information.
In summary, the embodiment of the present invention provides a method for stamp security management, which ensures that people outside the usage right cannot use a stamp by setting the usage right of the stamp, and effectively prevents illegal people from using the stamp to make some files that damage the benefits of the stamp owner due to the loss or theft of the stamp, thereby maintaining the benefits of the stamp owner.
Furthermore, because the generated code contains the service time information of the seal or the unique number can be obtained by decoding the generated code, and the service time information of the seal is inquired through the unique number, documents such as a contract and the like cannot be supplemented later, unfairness brought by the document supplemented later is avoided, and legal risks to seal owners are avoided.
Furthermore, the use time, the use place, the use times and the user identity of the seal are recorded in real time, so that the seal tracing system can trace the use track of the seal completely, is convenient for seal management and prevents risks.
ExamplesII
The second embodiment of the invention provides a method for stamp security management, which is applied to a stamp, and fig. 2 is a flowchart of the method for stamp security management according to the second embodiment of the invention. As shown in fig. 2, the method includes:
step S21: sending the seal ID to a server so that the server can inquire the use authority of the seal according to the seal ID;
step S22: receiving the use permission of the seal sent by the server, verifying the obtained use parameter information to be verified according to the use permission of the seal, and generating and printing an anti-counterfeiting code based on the use parameter information passing verification after the verification is passed; and
step S23: and sending the use parameter information and the seal image containing the code generated based on the use parameter information to the server for the subsequent authenticity identification of the seal or the seal.
In practice, each seal should be connected to a legal server to ensure the safety of the seal. How to ensure that a server connected with a seal is legal is preferred, in the embodiment of the present invention, it is preferably verified whether the server is a legal server by verifying an authorization code sent by the server.
To this end, before step S21, the method further includes:
when the seal is started each time, the seal firstly verifies whether the last received authorization code is correct. Specifically, as can be seen from the first embodiment, after the authorization code is updated, the server sends the updated authorization code to the stamp, so that the stamp can be used when logging in the server again. Therefore, when the seal is started up each time, the seal can verify whether the authorization code received last time is correct or not so as to ensure that a server connected with the seal is legal.
The authorization code sent by the legal server has a specific format, so that only the correct authorization code can be interpreted by the seal. In the embodiment of the invention, if the seal cannot interpret the authorization code or the read-out of the authorization code is wrong, the seal stops working and exits from the working state. If the seal reads that the authorization code is correct, step S21 is executed.
In step S21, each time the stamp is turned on, the stamp sends a request for turning on information to the server to inquire about the current state of the stamp. Wherein, the request for the boot information includes: a stamp ID and an authorization code. When the server receives the startup request information sent by the seal, firstly, the server can judge whether the seal is allowed to log in the server according to the seal ID and the authorization code in the startup request information.
Specifically, the server queries the authorization code sent to the stamp last time according to the stamp ID. When the authorization code sent by the seal is consistent with the authorization code inquired by the server, allowing the seal to log in the server; otherwise, the seal is not allowed to log in the server, so that the operation safety of the server is ensured.
Then, after the seal logs in the server, the server inquires the state of the seal corresponding to the seal ID according to the seal ID, and judges whether to send the use permission of the seal to the seal or not based on the inquired state of the seal. Wherein, the state of the seal comprises at least one of the following: normal operation, maintenance in failure, shutdown, and scrapping.
Specifically, based on the inquired state of the seal, whether to send the use permission of the seal to the seal is judged, including:
when the state of the seal is normal work, the use authority of the seal is sent to the seal;
when the state of seal is for the fault maintenance, stop using or scrap, do not send the service authority of this seal to the seal, and when the state of seal was for stopping using, send the auto-lock instruction to the seal for the seal can't use.
Preferably, when the state of the seal is in fault maintenance or scrapping, the state information of the seal is sent to the seal so as to inform a seal user of the real-time state of the seal. For example, the status information of the seal such as "the seal is in trouble maintenance", "the seal is discarded", and the like.
After the state of the seal is inquired, if the state of the seal is normal, the server updates the authorization code and stores the updated authorization code. The updating method comprises the following steps: and generating a new authorization code based on the seal ID, the current time and the previous authorization code so as to update the authorization code.
And then, the server sends the use authority of the seal to the seal and sends an updated authorization code to the seal for the seal to use when logging in the server next time.
In step S22, the seal receives the usage right of the seal sent by the server, verifies the acquired usage parameter information to be verified according to the usage right of the seal, and generates and prints an anti-counterfeiting code based on the usage parameter information that passes the verification after the usage parameter information passes the verification.
Specifically, after the seal receives the use authority of the seal, the use parameter information to be verified acquired by the seal is verified according to the use authority of the seal, and after the use parameter information passes verification, a code for anti-counterfeiting is generated and printed based on the verified use parameter information. The using parameter information comprises the identity information of a seal user; or the use parameter information comprises the identity information of the seal user and at least one of the following: identity information of a seal owner, current time, the current position of the seal and the number of times of using the current seal.
For example, the identity information of the stamp user and the identity information of the stamp owner are obtained through input of an input keyboard or a touch screen arranged on the stamp. The current time is obtained by a timing device arranged on the seal. The current position of the seal is obtained by a positioning device arranged on the seal. The number of times of using the current seal is obtained by a counting device arranged on the seal. Of course, other information than the above-described usage parameter information may be included, and the present invention is not limited thereto. The information of the opposite side enterprise can also be obtained by inputting through an input keyboard or a touch screen arranged on the seal.
Specifically, in the embodiment of the present invention, the seal compares the acquired to-be-verified usage parameter information with the usage authority of the seal item by item, and when any one of the to-be-verified usage parameter information (for example, the current time) is not matched with the usage authority of the seal, the seal cannot be used, for example, the seal cannot generate an anti-counterfeiting code. The code for preventing counterfeiting comprises the following components: at least one or more of a two-dimensional code, a bar code, a character, and a predetermined figure. When all the information in the use parameter information to be verified is matched with the use authority of the seal, the seal can be used, for example, the seal generates a code for anti-counterfeiting based on the verified information to be verified.
If the using parameter information to be verified passes the verification, after the code for anti-counterfeiting is generated, when the seal detects the stamping action of a user or the user presses a using seal button, a printing device inside the seal prints the generated code on a file, and the using seal process is completed.
Preferably, in addition to the code, the text portion of the stamp base (e.g. xx company) is also printed on the document with the code. Of course, the text portion of the stamp base may also be printed on the document in a conventional manner, for example, by inkpad printing, without the invention being limited thereto. In addition, the printing position of the code can be flexibly adjusted, such as printing inside the text portion, outside the text portion, or surrounding the text portion, but the invention is not limited thereto.
As a more preferred embodiment, before the seal receives the seal startup authentication information sent by the server, the seal is in a locked state. Specifically, when the server inquires that the state of the seal is normal work: the server sends the seal startup authentication information to the seal while sending the seal use authority and the updated authorization code to the seal. After the seal receives the seal startup authentication information, the locking state is released, the use parameter information to be verified acquired by the seal is verified according to the received use authority of the seal, and after the use parameter information passes the verification, a code for anti-counterfeiting is generated and printed based on the use parameter information passing the verification.
As a better implementation mode, the time in the timing device on the stamp is prevented from being forcibly changed by a user, and the inaccurate timing of the timing device on the stamp is avoided. The seal receives the current absolute time sent by the server to correct the time of the timing device on the seal, so that the time of the seal is consistent with that of the server.
As a better implementation mode, when the seal receives a self-locking instruction sent by a server, the seal exits from the working state and enters into the locking state, so that the seal cannot be used. Preferably, when the seal receives a self-locking instruction, all information in the chip is uploaded to the server to be stored when the seal enters a locking state, and then all information in the chip inside the seal is removed, so that information of a legal seal user is prevented from being leaked. In addition, when the seal receives a self-destruction instruction sent by the server, the seal is self-destroyed by adopting a physical or chemical method, all information in the chip is uploaded to the server to be stored, and then the information in the chip in the seal is removed. Preferably, the information in the chip in the stamp is removed, and simultaneously, the stamp body and the character part at the bottom of the stamp are destroyed. For example, the seal body is made of low-melting-point rubber and is self-destructed by a heating wire; for another example, the stamp is dissolved chemically. The specific self-destruction mode can be flexibly set according to the actual situation, and the invention is not limited to the specific self-destruction mode.
As a more preferable embodiment, in order to ensure the use safety of the stamp, when the stamp detects that no operation is performed for a long time, the stamp enters a self-locking state, so that the stamp cannot be used until the user inputs an account number, a password and/or a fingerprint again to release the self-locking state.
As a more preferable embodiment, the stamp records information (such as an account number and a password) input by a user in real time and records information of time, position and use times acquired by the stamp in real time, and transmits the recorded information to the server in real time for storage by the server. The preferable server sends the information to a user terminal of a seal owner, so that the seal owner can know the using condition of the seal, the using safety of the seal is ensured, and when the seal is lost, the seal can be tracked based on the position information recorded in real time.
As a more preferable embodiment, the seal manager may actively inquire the seal usage record information in the server, for example, by logging in the server through the user terminal, so that the seal manager can supervise each seal usage.
In step S23, the stamp transmits the usage parameter information of the generated code and the stamp image containing the code generated based on the usage parameter information to the server for the subsequent authentication of the stamp or stamp.
Specifically, in order to authenticate a subsequent seal or seal and facilitate subsequent data analysis of the use condition of the seal, in the embodiment of the invention, each time a code is printed on the seal, an image acquisition device on the seal or an external device is used for acquiring a seal picture containing the code, the acquired seal picture and the use parameter information of the generated code are uploaded to a server, and the server stores the received seal picture containing the code and the use parameter information of the generated code. The related seal identification method is explained in detail in other patents, and is not described in detail herein.
In a more preferred embodiment, before any information or instruction is sent to and from the server, the seal encrypts the information or instruction to be sent to prevent information leakage. Correspondingly, when the seal receives the encrypted information or the encrypted instruction sent by the server, the seal firstly carries out decryption processing on the encrypted information.
In summary, the embodiment of the present invention provides a method for stamp security management, which ensures that people outside the usage right cannot use a stamp by setting the usage right of the stamp, and effectively prevents illegal people from using the stamp to make some files that damage the benefits of the stamp owner due to the loss or theft of the stamp, thereby maintaining the benefits of the stamp owner.
Furthermore, because the generated code contains the service time information of the seal or the unique number can be obtained by decoding the generated code, and the service time information of the seal is inquired through the unique number, documents such as a contract and the like cannot be supplemented later, unfairness brought by the document supplemented later is avoided, and legal risks to seal owners are avoided.
Furthermore, the use time, the use place, the use times and the user identity of the seal are recorded in real time, so that the seal tracing system can trace the use track of the seal completely, is convenient for seal management and prevents risks.
EXAMPLE III
A third embodiment of the present invention provides a method for stamp security management, which is applied to a stamp and a server, and fig. 3 is a flowchart of the method for stamp security management according to the third embodiment of the present invention. As shown in fig. 3, the method includes:
step S31: the server sets the use authority of the seal;
step S32: the seal sends the seal ID to a server;
step S33: the server receives a seal ID sent by a seal and sends the use permission of the seal to the seal according to the seal ID;
step S34: the seal receives the using authority of the seal sent by the server, verifies the using parameter information to be verified acquired by the seal according to the using authority of the seal, and generates and prints an anti-counterfeiting code based on the using parameter information passing verification after the verification is passed;
step S35: the seal sends the use parameter information and the seal image containing the code generated based on the use parameter information to the server;
step S36: the server receives and stores the use parameter information which is sent by the seal and used for generating the code and the seal image containing the code generated based on the use parameter information for the subsequent authenticity identification of the seal or the seal.
Because the existing seal has no perfect use safety management mechanism in the use process, once the seal is lost or stolen, an illegal person can use the seal to manufacture some documents which damage the benefits of the seal owner, such as contracts or debts, which seriously damage the benefits of the seal owner.
In order to solve the technical problem, in the embodiment of the invention, the use authority of the seal is preferably set through the server, so that people except the use authority cannot use the seal, and the benefits of a seal owner are further maintained. Specifically, in step S31, for any stamp, the server may set the usage authority of the stamp, including: and setting user identity information for permitting the seal to be used. The user identity information for permitting the use of the seal includes, for example: the user's account number and password and/or user's fingerprint and/or other information indicative of the user's identity permitting use of the stamp.
In practice, once the user account and password and/or user fingerprint input by the seal user are not consistent with the user identity information of the permitted seal in the use authority set by the seal, the seal cannot be used, so that the benefit of the seal owner is ensured. Therefore, even if the seal is lost, the seal owner does not need to worry about that illegal personnel forge files which damage own interests by using the seal.
Further, in order to enable the stamp to be used more safely, the embodiment of the present invention sets the time, place, and number of times of use of the stamp permitted in addition to the user identification information permitting use of the stamp. If the time allowed for using the stamp is exceeded, the stamp cannot be used. Likewise, if the place (area or region) where the stamp is allowed to be used or the number of uses is exceeded, the stamp will not be used.
The purpose of setting the time, place and number of times of use that the stamp is allowed to be used is to: on one hand, the technical difficulty of cracking the seal by illegal personnel can be improved by setting the multilayer use permission, so that the risk of the seal being illegally used is reduced; on the other hand, for example, by setting the number of times of allowing the seal to be used, the number of files counterfeited by illegal personnel by using the seal can be limited, the situation that the illegal personnel unlimitedly use the seal to manufacture a large number of files which are harmful to a seal owner is avoided, and the economic loss of the seal owner is reduced; on the other hand, in practice, it is difficult or impossible for other persons than the legitimate user of the stamp to know the information about the time, place and number of times of use of the stamp, which increases the difficulty of using the stamp by an illegitimate person.
Specifically, in the embodiment of the invention, the time range of permitting the use of the seal, the region range of permitting the use of the seal and the number of times of permitting the use of the seal are set. The time range for permitting the use of the seal is set as: 13:00-13:15 or 13:00 to define the specific time or time period during which the stamp may be used. The region range where the seal is permitted to be used is set as: the Hei lake district of Beijing or other application ranges customized by users. The number of permitted uses of the stamp is set as: one, three, or other user-defined number of uses.
In addition to setting the user identification information of the permitted seal, the time range of permitted seal, the area range of permitted seal and the number of permitted seal usage, setting the usage authority of the seal may further include: setting seal owner information, setting opposite side enterprise information and the like. Wherein, setting the seal owner information includes, for example: and setting the enterprise code, the enterprise name and the enterprise legal name of the enterprise. Setting the counterpart enterprise information includes, for example: and setting the enterprise code, the enterprise name and the corporate name of the enterprise of the other side. For example, when the stamp is used, the stamp user is required to input the enterprise code of the enterprise and the enterprise code of the other enterprise, and if the enterprise code of the enterprise and the enterprise code of the other enterprise input by the user are not consistent with the enterprise code of the enterprise and the enterprise code of the other enterprise set in the use authority, the stamp cannot be used.
In the embodiment of the invention, the process of setting the use authority of the seal comprises the following steps: the server preferably has adding operation, modifying operation, deleting operation, resetting operation and saving operation, and is used for setting the use permission of the seal. For example, when a new user needs to be entered, if the user does not have an account, the server first creates a user account, a password and a user fingerprint belonging to the user, and then adds the user account, the password and the user fingerprint of the user to the user identity information which permits the use of the seal through an adding operation, and correspondingly, the time range of permitting the use of the seal, the region range of permitting the use of the seal, the number of times of permitting the use of the seal and other use permission information can be completed through adding operations. When the usage right information needs to be modified, the usage right information can be modified through a modification operation. In addition, the use authority information can be deleted through deletion operation, for example, the user identity information which permits the use of the seal can be deleted; the use authority information can be reset through a reset operation; when each operation is completed, the saving operation is used for saving the currently set use permission information in real time.
In step S32, each time the stamp is turned on, the stamp sends a request for turning on information to the server to inquire about the current state of the stamp. Wherein, the request for the boot information includes: a stamp ID and an authorization code.
In step S33, when the server receives the startup request information sent by the seal, first, the server will determine whether to allow the seal to log in the server according to the seal ID and the authorization code in the startup request information.
Specifically, the server queries the authorization code sent to the stamp last time according to the stamp ID. When the authorization code sent by the seal is consistent with the authorization code inquired by the server, allowing the seal to log in the server; otherwise, the seal is not allowed to log in the server, so that the operation safety of the server is ensured.
Then, after the seal logs in the server, the server inquires the state of the seal corresponding to the seal ID according to the seal ID, and judges whether to send the use permission of the seal to the seal or not based on the inquired state of the seal. Wherein, the state of the seal comprises at least one of the following: normal operation, maintenance in failure, shutdown, and scrapping.
Specifically, based on the inquired state of the seal, whether to send the use permission of the seal to the seal is judged, including:
when the state of the seal is normal work, the use authority of the seal is sent to the seal;
when the state of seal is for the fault maintenance, stop using or scrap, do not send the service authority of this seal to the seal, and when the state of seal was for stopping using, send the auto-lock instruction to the seal for the seal can't use.
Preferably, when the state of the seal is fault maintenance or scrapping, the state information of the seal is sent to the seal so as to inform a seal user of the real-time state of the seal. For example, the status information of the seal such as "the seal is in trouble maintenance", "the seal is discarded", and the like.
After the state of the seal is inquired, if the state of the seal is normal, the server updates the authorization code and stores the updated authorization code. The updating method comprises the following steps: and generating a new authorization code based on the seal ID, the current time and the previous authorization code so as to update the authorization code.
And then, the server sends the use authority of the seal to the seal and sends an updated authorization code to the seal for the seal to use when logging in the server next time.
In step S34, the seal receives the usage right of the seal sent by the server, verifies the acquired usage parameter information to be verified according to the usage right of the seal, and generates and prints an anti-counterfeiting code based on the usage parameter information that passes the verification after the usage parameter information passes the verification.
Specifically, after the seal receives the use authority of the seal, the use parameter information to be verified acquired by the seal is verified according to the use authority of the seal, and after the use parameter information passes verification, a code for anti-counterfeiting is generated and printed based on the verified use parameter information. The using parameter information comprises the identity information of a seal user; or the use parameter information comprises the identity information of the seal user and at least one of the following: identity information of a seal owner, current time, the current position of the seal and the number of times of using the current seal.
For example, the identity information of the stamp user and the identity information of the stamp owner are obtained through input of an input keyboard or a touch screen arranged on the stamp. The current time is obtained by a timing device arranged on the seal. The current position of the seal is obtained by a positioning device arranged on the seal. The number of times of using the current seal is obtained by a counting device arranged on the seal. Of course, other information than the above-described usage parameter information may be included, and the present invention is not limited thereto. The information of the opposite side enterprise can also be obtained by inputting through an input keyboard or a touch screen arranged on the seal.
Specifically, in the embodiment of the present invention, the seal compares the acquired to-be-verified usage parameter information with the usage authority of the seal item by item, and when any one of the to-be-verified usage parameter information (for example, the current time) is not matched with the usage authority of the seal, the seal cannot be used, for example, the seal cannot generate an anti-counterfeiting code. The code for preventing counterfeiting comprises the following components: at least one or more of a two-dimensional code, a bar code, a character, and a predetermined figure. When all the information in the use parameter information to be verified is matched with the use authority of the seal, the seal can be used, for example, the seal generates a code for anti-counterfeiting based on the verified information to be verified.
If the using parameter information to be verified passes the verification, after the code for anti-counterfeiting is generated, when the seal detects the stamping action of a user or the user presses a using seal button, a printing device inside the seal prints the generated code on a file, and the using seal process is completed.
Preferably, in addition to the code, the text portion of the stamp base (e.g. xx company) is also printed on the document with the code. Of course, the text portion of the stamp base may also be printed on the document in a conventional manner, for example, by inkpad printing, without the invention being limited thereto. In addition, the printing position of the code can be flexibly adjusted, such as printing inside the text portion, outside the text portion, or surrounding the text portion, but the invention is not limited thereto.
As a more preferred embodiment, before the seal receives the seal startup authentication information sent by the server, the seal is in a locked state. Specifically, when the server inquires that the state of the seal is normal work: the server sends the seal startup authentication information to the seal while sending the seal use authority and the updated authorization code to the seal. After the seal receives the seal startup authentication information, the locking state is released, the use parameter information to be verified acquired by the seal is verified according to the received use authority of the seal, and after the use parameter information passes the verification, a code for anti-counterfeiting is generated and printed based on the use parameter information passing the verification.
As a better implementation mode, the time in the timing device on the stamp is prevented from being forcibly changed by a user, and the inaccurate timing of the timing device on the stamp is avoided. The server sends the current absolute time to the seal while sending the use authority of the seal to the seal, and time service is carried out so as to correct the time of the timing device on the seal, so that the time of the seal is consistent with that of the server.
As a more preferred embodiment, when the seal owner confirms that the seal is lost, for example, the seal owner may send a request for seal self-locking information or a request for seal self-destruction information to the server through the user terminal, after the request information is verified, the server may send a self-locking instruction or a self-destruction instruction to the seal corresponding to the seal ID based on the seal ID, and when the seal receives the self-locking instruction sent by the server, the seal exits from the working state and enters into the locking state, thereby ensuring that the seal cannot be used. Preferably, when the seal receives a self-locking instruction, all information in the chip is uploaded to the server to be stored when the seal enters a locking state, and then all information in the chip inside the seal is removed, so that information of a legal seal user is prevented from being leaked.
In addition, when the seal receives a self-destruction instruction sent by the server, the seal is self-destroyed by adopting a physical or chemical method, all information in the chip is uploaded to the server to be stored, and then the information in the chip in the seal is removed. Preferably, the information in the chip in the stamp is removed, and simultaneously, the stamp body and the character part at the bottom of the stamp are destroyed. For example, the seal body is made of low-melting-point rubber and is self-destructed by a heating wire; for another example, the stamp is dissolved chemically. The specific self-destruction mode can be flexibly set according to the actual situation, and the invention is not limited to the specific self-destruction mode.
As a more preferable embodiment, when the seal owner confirms that the seal is lost, for example, the seal owner may send a request to change the state information of the seal to the server through the user terminal, and after the request information is verified, the server may change the state of the seal based on the seal ID, for example, the state of the seal is set to be disabled, so as to ensure the use safety of the seal.
As a more preferable embodiment, the stamp records information (such as an account number and a password) input by a user in real time and records information of time, position and use times acquired by the stamp in real time, and transmits the recorded information to the server in real time for storage by the server. The preferable server sends the information to a user terminal of a seal owner, so that the seal owner can know the using condition of the seal, the using safety of the seal is ensured, and when the seal is lost, the seal can be tracked based on the position information recorded in real time.
As a more preferable embodiment, the seal manager may actively inquire the seal usage record information in the server, for example, by logging in the server through the user terminal, so that the seal manager can supervise each seal usage.
As a more preferable embodiment, in order to ensure the use safety of the stamp, when the stamp detects that no operation is performed for a long time, the stamp enters a self-locking state, so that the stamp cannot be used until the user inputs an account number, a password and/or a fingerprint again to release the self-locking state.
In step S35, the stamp transmits the usage parameter information for generating the code and the seal image including the code generated based on the usage parameter information to the server.
In step S36, the server receives and stores the usage parameter information of the generated code transmitted by the stamp and the picture of the seal stamp containing the code generated based on the usage parameter information for use in the authentication of the subsequent stamp or seal stamp.
Specifically, in order to authenticate a subsequent seal or seal and facilitate subsequent data analysis of the use condition of the seal, in the embodiment of the invention, each time a code is printed on the seal, an image acquisition device on the seal or an external device is used for acquiring a seal picture containing the code, the acquired seal picture and the use parameter information of the generated code are uploaded to a server, and the server stores the received seal picture containing the code and the use parameter information of the generated code. The related seal identification method is explained in detail in other patents, and is not described in detail herein.
In a more preferred embodiment, before any information or instruction is sent to and from the server, the seal encrypts the information or instruction to be sent to prevent information leakage. Correspondingly, when the seal receives the encrypted information or the encrypted instruction sent by the server, the seal firstly carries out decryption processing on the encrypted information.
In a more preferred embodiment, before any information or instruction is sent to each other, the server and the stamp encrypt the information or instruction to be sent to prevent information leakage. Correspondingly, when the server receives the encrypted information or the encrypted instruction sent by the seal, the server firstly decrypts the encrypted information.
In summary, the embodiment of the present invention provides a method for stamp security management, which ensures that people outside the usage right cannot use a stamp by setting the usage right of the stamp, and effectively prevents illegal people from using the stamp to make some files that damage the benefits of the stamp owner due to the loss or theft of the stamp, thereby maintaining the benefits of the stamp owner.
Furthermore, because the generated code contains the service time information of the seal or the unique number can be obtained by decoding the generated code, and the service time information of the seal is inquired through the unique number, documents such as a contract and the like cannot be supplemented later, unfairness brought by the document supplemented later is avoided, and legal risks to seal owners are avoided.
Furthermore, the use time, the use place, the use times and the user identity of the seal are recorded in real time, so that the seal tracing system can trace the use track of the seal completely, is convenient for seal management and prevents risks.
Example four
An embodiment of the present invention provides a server, including:
a processor; and
a memory, on which an executable code is stored, wherein the executable code, when executed by the processor, causes the processor to execute the method for stamp security management provided by the first embodiment.
EXAMPLE five
The embodiment of the invention provides a seal, which comprises:
a processor; and
a memory, on which executable codes are stored, wherein the executable codes, when executed by the processor, cause the processor to execute the method for stamp security management provided by the second embodiment.
In summary, embodiments of the present invention provide a method, a server, and a stamp for stamp security management, which, by setting the usage right of the stamp, ensure that people outside the usage right cannot use the stamp, effectively avoid that illegal people use the stamp to make some files that damage the benefits of the stamp owner because the stamp is lost or stolen, and further maintain the benefits of the stamp owner.
Furthermore, because the generated code contains the service time information of the seal or the unique number can be obtained by decoding the generated code, and the service time information of the seal is inquired through the unique number, documents such as a contract and the like cannot be supplemented later, unfairness brought by the document supplemented later is avoided, and legal risks to seal owners are avoided.
Furthermore, the use time, the use place, the use times and the user identity of the seal are recorded in real time, so that the seal tracing system can trace the use track of the seal completely, is convenient for seal management and prevents risks.
Those skilled in the art will appreciate that the modules or steps of the invention described above can be implemented in a general purpose computing device, centralized on a single computing device or distributed across a network of computing devices, and optionally implemented in program code that is executable by a computing device, such that the modules or steps are stored in a memory device and executed by a computing device, fabricated separately into integrated circuit modules, or fabricated as a single integrated circuit module. Thus, the present invention is not limited to any specific combination of hardware and software.
Although the embodiments of the present invention have been described above, the above description is only for the convenience of understanding the present invention, and is not intended to limit the present invention. It will be understood by those skilled in the art that various changes in form and details may be made therein without departing from the spirit and scope of the invention as defined by the appended claims.

Claims (15)

1. A method for seal safety management is applied to a server, and the method comprises the following steps:
setting the use authority of the seal;
receiving a seal ID sent by a seal, sending the use permission of the seal to the seal according to the seal ID, so that the seal can verify the use parameter information to be verified acquired by the seal according to the use permission of the seal, and generating and printing an anti-counterfeiting code based on the verified use parameter information after the verification is passed; and
and receiving and storing the use parameter information sent by the seal and the seal image containing the code generated based on the use parameter information for the subsequent authenticity identification of the seal or the seal.
2. The method of claim 1,
the using parameter information comprises the identity information of a seal user; or, the use parameter information includes the identity information of the seal user and at least one of the following: identity information of a seal owner, current time, the current position of the seal and the number of times of using the current seal;
correspondingly, the using authority of the seal comprises user identity information which permits the seal to be used; or the using authority of the seal comprises user identity information for permitting the seal to be used and at least one of the following: the seal management system comprises identity information of a seal owner, a time range for permitting use of the seal, a region range for permitting use of the seal and the number of times for permitting use of the seal.
3. The method of claim 1, further comprising:
when receiving a seal ID sent by a seal, inquiring the state of the seal according to the seal ID; and
judging whether to send the seal use authority to the seal or not based on the inquired state of the seal,
wherein, the state of the seal comprises at least one of the following: normal operation, maintenance in failure, shutdown, and scrapping.
4. The method according to claim 3, wherein determining whether to send the stamp usage right to the stamp based on the queried state of the stamp comprises:
when the state of the seal is normal work, the use authority of the seal is sent to the seal;
when the state of the seal is fault maintenance, stop using or scrapping, the use authority of the seal is not sent to the seal, and
and when the seal is in a disabled state, sending a self-locking instruction to the seal, so that the seal cannot be used.
5. The method of claim 1, further comprising:
receiving an authorization code sent by a seal while receiving a seal ID sent by the seal, and judging whether the seal is allowed to log in a server according to the authorization code sent by the seal, wherein:
when the authorization code sent by the seal is consistent with the authorization code stored by the server, allowing the seal to log in; otherwise, the seal is not allowed to log in.
6. The method of claim 5, further comprising:
after the seal is logged in by using the authorization code, updating the authorization code; and
and sending the updated authorization code to the seal while sending the use permission of the seal to the seal so as to be used when the seal logs in a server next time.
7. The method of claim 6, wherein updating the authorization code after the stamp is registered with the authorization code comprises:
and generating a new authorization code based on the seal ID, the current time and the last authorization code so as to update the authorization code.
8. The method of claim 1, further comprising:
changing the state information of the seal according to the received request, and changing the state of the seal; and
and sending a self-locking instruction or a self-destruction instruction to the seal according to the received request seal self-locking information or the request seal self-destruction information so as to enable the seal not to be used or enable the seal to be self-destroyed by adopting a physical or chemical method.
9. The method of claim 8, further comprising:
before sending information or instructions to the seal each time, encryption processing is carried out on the information or instructions to be sent.
10. A method for seal safety management is characterized in that the method is applied to a seal and comprises the following steps:
sending the seal ID to a server so that the server can inquire the use authority of the seal according to the seal ID;
receiving the use permission of the seal sent by the server, verifying the obtained use parameter information to be verified according to the use permission of the seal, and generating and printing an anti-counterfeiting code based on the use parameter information passing verification after the verification is passed; and
and sending the use parameter information and the seal image containing the code generated based on the use parameter information to the server for the subsequent authenticity identification of the seal or the seal.
11. The method of claim 10,
the using parameter information comprises the identity information of a seal user; or, the use parameter information includes the identity information of the seal user and at least one of the following: identity information of a seal owner, current time, the current position of the seal and the number of times of using the current seal;
correspondingly, the using authority of the seal comprises user identity information which permits the seal to be used; or the using authority of the seal comprises user identity information for permitting the seal to be used and at least one of the following: the seal management system comprises identity information of a seal owner, a time range for permitting use of the seal, a region range for permitting use of the seal and the number of times for permitting use of the seal.
12. The method of claim 10, further comprising:
receiving an authorization code sent by the server;
when the seal is started, the authorization code is verified, and whether the seal stops working is judged based on a verification result, wherein: when the authorization code is verified to be correct, the power-on state is kept; and entering a shutdown state when the authorization code is checked to be wrong.
13. The method of claim 10, further comprising:
before sending information to the server each time, encryption processing is carried out on the information to be sent.
14. A server, comprising:
a processor; and
memory having stored thereon executable code which, when executed by the processor, implements a method for stamp security management according to any one of claims 1 to 9.
15. A stamp, comprising:
a processor; and
memory having stored thereon executable code which, when executed by the processor, implements a method for stamp security management according to any one of claims 10 to 13.
CN201910848422.7A 2019-09-09 2019-09-09 Method and server for seal safety management and seal Pending CN112464273A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910848422.7A CN112464273A (en) 2019-09-09 2019-09-09 Method and server for seal safety management and seal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910848422.7A CN112464273A (en) 2019-09-09 2019-09-09 Method and server for seal safety management and seal

Publications (1)

Publication Number Publication Date
CN112464273A true CN112464273A (en) 2021-03-09

Family

ID=74807685

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910848422.7A Pending CN112464273A (en) 2019-09-09 2019-09-09 Method and server for seal safety management and seal

Country Status (1)

Country Link
CN (1) CN112464273A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115964686A (en) * 2023-03-17 2023-04-14 北京惠朗时代科技有限公司 Electronic seal supervision and processing system based on cloud platform

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103465649A (en) * 2013-08-23 2013-12-25 刘文化 Intelligent anti-counterfeiting seal with information tracing, authority controlling and seal impression authenticity verifying functions
CN106846013A (en) * 2017-01-24 2017-06-13 浙江甲骨文超级码科技股份有限公司 A kind of false proof identity management system and method for tracing to the source
CN107395362A (en) * 2017-07-27 2017-11-24 童迎伟 Third-party authentication system and checking management-control method based on cloud intelligence seal

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103465649A (en) * 2013-08-23 2013-12-25 刘文化 Intelligent anti-counterfeiting seal with information tracing, authority controlling and seal impression authenticity verifying functions
CN106846013A (en) * 2017-01-24 2017-06-13 浙江甲骨文超级码科技股份有限公司 A kind of false proof identity management system and method for tracing to the source
CN107395362A (en) * 2017-07-27 2017-11-24 童迎伟 Third-party authentication system and checking management-control method based on cloud intelligence seal

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115964686A (en) * 2023-03-17 2023-04-14 北京惠朗时代科技有限公司 Electronic seal supervision and processing system based on cloud platform

Similar Documents

Publication Publication Date Title
CN111552955B (en) Personal identity authentication method and device based on block chain and IPFS
US7809948B2 (en) Cellular telephone device having authenticating capability
EP1571525B1 (en) A method, a hardware token, and a computer program for authentication
US8356342B2 (en) Method and system for issuing a kill sequence for a token
US20070136202A1 (en) Personal-information managing apparatus, method of providing personal information, computer product, and personal-information-providing system
CN103080946B (en) For managing the method for file, safety equipment, system and computer program safely
US8219806B2 (en) Management system, management apparatus and management method
US20060101047A1 (en) Method and system for fortifying software
US20080310619A1 (en) Process of Encryption and Operational Control of Tagged Data Elements
PL182163B1 (en) System for and method of verifying a document
CN107180195A (en) Electronic document Life cycle safety protecting method based on safety label
CN111431916B (en) Seal verification method based on asymmetric encryption, seal and computer storage medium
CN112257093B (en) Authentication method, terminal and storage medium for data object
CN112508564B (en) Seal use management method based on block chain, electronic equipment and storage medium
CN109285256A (en) Computer room based on block chain authentication enter permission give method
CN115242488A (en) Domestic network security operation and maintenance system and method
JPH11265349A (en) Computer system and secret protection method, transmitting/receiving log management method, mutual checking method, and a disclosed key generation management method to be applied to its system
CN116976890A (en) Multi-sign encryption transaction system of block chain
CN108263105B (en) Intelligent anti-counterfeiting method for seal
US20080152145A1 (en) Asset bring-out management system, asset bring-out management method, brought out asset, brought out asset control program
CN112464273A (en) Method and server for seal safety management and seal
CN110995661B (en) Network card platform
CN110309673A (en) A kind of adaptively customized encryption cloud Database Systems and encryption method
CN105897730A (en) User name and password information encryption and verification method
CN110472423A (en) A kind of nuclear power station file permission management method, device and equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination