CN113486998A - Method for generating and verifying anti-counterfeiting mark of stamped file based on chip stamp - Google Patents

Method for generating and verifying anti-counterfeiting mark of stamped file based on chip stamp Download PDF

Info

Publication number
CN113486998A
CN113486998A CN202110769120.8A CN202110769120A CN113486998A CN 113486998 A CN113486998 A CN 113486998A CN 202110769120 A CN202110769120 A CN 202110769120A CN 113486998 A CN113486998 A CN 113486998A
Authority
CN
China
Prior art keywords
file
seal
counterfeiting mark
key
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110769120.8A
Other languages
Chinese (zh)
Inventor
邹翔
金波
黄胜华
梁皓
陈兵
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Third Research Institute of the Ministry of Public Security
Original Assignee
Third Research Institute of the Ministry of Public Security
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Third Research Institute of the Ministry of Public Security filed Critical Third Research Institute of the Ministry of Public Security
Priority to CN202110769120.8A priority Critical patent/CN113486998A/en
Publication of CN113486998A publication Critical patent/CN113486998A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/06009Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking
    • G06K19/06037Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking multi-dimensional coding
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/06009Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking
    • G06K19/06046Constructional details

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Storage Device Security (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention relates to a system for generating and verifying a seal file anti-counterfeiting mark based on a chip seal, which comprises a security chip card and an interface device key configuration module, wherein the interface device key configuration module is used for reading a unique identifier of the security chip card through a unique identifier interface of the security chip card and generating an asymmetric public and private key pair; the stamping file anti-counterfeiting mark generation module is used for generating anti-counterfeiting marks needing to be added in the stamping file; and the seal file anti-counterfeiting mark verification module is used for acquiring, identifying and verifying the anti-counterfeiting mark and determining the consistency of the seal information and the seal file according to the verification result. The invention also relates to a corresponding method, device, processor and storage medium thereof. By adopting the system, the method, the device, the processor and the storage medium thereof, the condition that the copied two-dimensional code is attached to the forged file can be effectively prevented, the stamped file does not need to be recorded, additional equipment is not needed, the operation is simple and convenient, and the user privacy can be effectively protected.

Description

Method for generating and verifying anti-counterfeiting mark of stamped file based on chip stamp
Technical Field
The invention relates to the technical field of information security, in particular to the technical field of intersection of seal anti-counterfeiting and information security, and specifically relates to a system, a method, a device, a processor and a computer readable storage medium for realizing generation and verification processing of a seal file anti-counterfeiting mark based on a chip seal.
Background
The seal is taken as a legal certificate for confirming identity and willingness of a legal person, and plays an indispensable role in social and economic life of China. Ensuring the correctness and the effectiveness of the seal is a necessary condition for ensuring the legal person to normally carry out activities and realizing social purposes and values. In recent years, the activities of manufacturing false seals and utilizing the false seals to carry out various illegal crimes frequently occur, and the scale of involving hundreds of millions or even billions of cases causes huge economic loss and serious social hazard, so how to effectively realize seal anti-counterfeiting becomes an important problem to be solved urgently at present. The traditional seal anti-counterfeiting technology mainly comprises two categories of seal anti-counterfeiting and inkpad/stamp pad anti-counterfeiting, and the novel seal anti-counterfeiting technology mainly comprises the steps of embedding a chip into a seal, adding a control device, combining seal information record and the like. However, the anti-counterfeiting means such as simple stamp information filing and embedded chip mainly aim at the authenticity identification of the stamp, and the anti-counterfeiting problem of the stamped file is difficult to solve.
Disclosure of Invention
The invention aims to overcome the defects of the prior art and provides a system, a method, a device, a processor and a computer readable storage medium for safely, accurately and quickly generating and verifying a stamping file anti-counterfeiting mark based on a chip stamp.
In order to achieve the above object, the system, method, device, processor and computer readable storage medium for generating and verifying the anti-counterfeit mark of the stamped file based on the chip stamp of the present invention are as follows:
the system for generating and verifying the anti-counterfeiting mark of the stamped file based on the chip stamp is mainly characterized by comprising the following components:
the security chip card and interface equipment key configuration module is used for reading the unique identifier of the security chip card through the unique identifier interface of the security chip card and generating an asymmetric public and private key pair;
the stamping file anti-counterfeiting mark generating module is connected with the stamping file anti-counterfeiting mark format processing module and is used for generating anti-counterfeiting marks to be added in the stamping file; and
and the seal file anti-counterfeiting mark verification module is connected with the seal file anti-counterfeiting mark generation module and is used for acquiring, identifying and verifying the anti-counterfeiting mark and determining the consistency of the seal information and the seal file according to the verification result.
Preferably, the key configuration module for the security chip card and the interface device includes: a key configuration submodule of the security chip card and a key configuration device of the interface device, wherein,
the secure chip card key configuration submodule specifically includes: the system comprises a security chip management client, a chip seal management system and a security chip card;
the chip seal management client is used for calling the unique identification interface of the security chip card, reading the corresponding unique identification code of the security chip card and sending a key filling request and the unique identification code of the security chip card to the chip seal management system;
the chip seal management system distributes one or a group of root keys according to the security chip card to one or a group of corresponding unique identification codes for decentralized processing, obtains an independent symmetric key, and writes the independent symmetric key into the security chip card through the security chip management client side to realize unique binding of the written key and the security chip card;
the interface device key configuration device is as follows: and the interface equipment records the generated public key into the chip seal management system for subsequent processing.
Preferably, the chip stamp management system specifically includes:
a secure chip card key management subsystem, an interface device key management subsystem and a chip seal issuance management subsystem, wherein,
the safety chip card key management subsystem is used for managing the root key and the whole life cycle of the key of the safety chip card;
the interface device key management subsystem is used for managing a public key of the interface device;
the chip seal issuing management subsystem is used for managing and processing the information of the security chip card added into the seal.
Preferably, the security chip card is added into the stamp to form a chip stamp.
Preferably, the interface device is specifically:
a smart phone with a non-contact or contact interface and a special security chip card reader.
Preferably, the module for generating the anti-counterfeit mark of the stamped file comprises the following processing procedures:
(a1) a stamping file anti-counterfeiting mark generating unit in the stamping file anti-counterfeiting mark generating module guides a stamping user to manually input or automatically extracts file key information from a document;
(b1) the seal file anti-counterfeiting mark generating unit calls a secret key of a security chip card in the chip seal to encrypt the key information of the file through the interface equipment and obtains an encryption result of the key information of the file;
(c1) the seal file anti-counterfeiting mark generating unit reads the unique identification code of the security chip card through the interface equipment;
(d1) the generating unit of the anti-counterfeiting mark of the stamped file carries out hash operation and calculates the hash value of the file electronic document in the format of the format document;
(e1) the seal file anti-counterfeiting mark generating unit acquires information including date from a local or remote time source of the system: year, month, day and time information: time, minutes and seconds are used as stamping confirmation time information;
(f1) the generating unit of the anti-counterfeiting mark of the stamping file acquires the coordinate information of the geographic position and the ip address information from the local or interface equipment of the system as position information;
(g1) the stamp-stamped file anti-counterfeiting mark generating unit sends a unique identification code of the security chip card, a file key information encryption result, stamp-stamping confirmation time and position information to the interface device;
(h1) the interface device calls a private key, signature operation is carried out on the unique identification code of the security chip card, the encryption result of the key information of the file, the stamping confirmation time and the position information in a local signature or combined signature mode, the signature information is composed of the signature result, the hash value of the electronic file of the file and the public key ID of the interface device, and the signature information is returned to the stamping file anti-counterfeiting mark generating unit;
(i1) the stamping file anti-counterfeiting mark generation unit forms a stamping file anti-counterfeiting mark record by the unique identification code of the security chip card, the encryption result of the key information of the file, the stamping confirmation time, the position information and the signature information, and makes the stamping file anti-counterfeiting mark record or the signature information in the stamping file anti-counterfeiting mark record into an anti-counterfeiting mark two-dimensional code;
(j1) the stamping file anti-counterfeiting mark generating unit uploads the stamping file anti-counterfeiting mark record, and sets a verification password of the anti-counterfeiting mark two-dimensional code in the record of the chip stamp management system;
(k1) and the stamping file anti-counterfeiting mark generating unit attaches the anti-counterfeiting mark two-dimensional code to the position near the stamping part of the corresponding paper file to complete the generation of the anti-counterfeiting mark.
Preferably, the key information of the file specifically includes:
file title, file author, and file content summary.
Preferably, the anti-counterfeiting mark two-dimensional code is added in the following manner:
directly stamping the seal file together with the electronic version of the seal file after printing or pasting the seal file near the seal part after independently printing.
Preferably, the encryption operation, the hash operation and the signature operation are all processed by using a domestic commercial cryptographic algorithm.
Preferably, the module for verifying the anti-counterfeit mark of the stamped file comprises the following processing procedures:
(a2) the seal verification user terminal acquires a corresponding anti-counterfeiting mark two-dimensional code verification password on a seal file to be verified from a seal signing user through a security channel;
(b2) the seal checking user terminal scans the anti-counterfeiting mark two-dimensional code attached to the seal file to be checked, and obtains the anti-counterfeiting mark record or signature information of the seal file to be checked through decoding;
(c2) the seal checking user terminal attaches a two-dimensional code verification password to the anti-counterfeiting mark record or signature information of the sealed file and uploads the verification password to the chip seal management system;
(d2) the chip seal management system compares the two-dimension code verification password received from the seal verification user terminal with the two-dimension code verification password recorded in the system record; or
The chip seal management system compares the file electronic document hash value in the signature information received from the seal checking user terminal with the hash value in the record;
(e2) the chip seal management system calls the public key of the interface equipment according to the public key ID of the interface equipment in the record, and verifies and signs the signature result in the signature information received from the seal verification user terminal;
(f2) the chip seal management system disperses a security chip card key according to the security chip card unique identification code acquired from the uploaded information, and decrypts the encrypted file key information in the record to acquire the file key information;
(g2) the chip seal management system retrieves the basic information of the chip seal provided with the security chip card according to the unique identification code of the security chip card in the record;
(h2) the chip seal management system returns the decrypted file key information and the basic information of the corresponding chip seal to the seal verification user terminal;
(i2) the seal checking user terminal compares the chip seal information, the file key information, the seal stamping confirmation time and the consistency of the position information and the seal stamping file in a manual or automatic mode, and therefore the seal stamping file anti-counterfeiting mark verification result is obtained.
The method for realizing the generation and verification processing of the anti-counterfeiting mark of the stamped file based on the chip stamp based on the system is mainly characterized by comprising the following steps of:
(1) the security chip management client reads the unique identification code of the security chip card through the unique identification code interface, sends a key filling request to the chip seal management system to obtain an independent symmetric key and sends the independent symmetric key to the security chip card, and the security chip card reads and writes the corresponding independent symmetric key;
(2) generating an asymmetric public and private key pair by the interface equipment, and sending a public key in the asymmetric public and private key pair and the identification information of the interface equipment to the chip seal management system for recording;
(3) the stamping file anti-counterfeiting mark generating unit encrypts the acquired file key information and important anti-counterfeiting information in the file to be stamped to generate an anti-counterfeiting mark two-dimensional code;
(4) and the seal checking user terminal obtains a seal checking result by scanning and identifying the anti-counterfeiting mark two-dimensional code.
Preferably, the step (1) specifically comprises the following steps:
the security chip card management client side obtains the unique identification code of the security chip card needing configuration by reading the unique identification code interface of the security chip card;
(1.2) the security chip card management client side sends a key filling request containing the unique identification code of the security chip card to the chip seal management system;
(1.3) the chip seal management system receives the key filling request of the security chip card management client, performs distributed processing by using one or a group of root keys of the chip seal management system according to the unique identification code of the security chip card to obtain one or a group of independent symmetric keys, and returns the independent symmetric keys to the security chip card management client;
(1.4) the security chip card management client receives the independent symmetric key and writes the independent symmetric key into the security chip card.
Preferably, the step (2) specifically comprises the following steps:
(2.1) the interface device generates an asymmetric public and private key pair by itself or the interface device and the chip seal management system jointly generate an asymmetric public and private key pair;
and (2.2) the interface equipment sends the public key in the asymmetric public and private key pair and the identification information of the interface equipment to the chip seal management system for recording.
More preferably, the step (3) specifically comprises the following steps:
(3.1) the stamping file anti-counterfeiting mark generating unit guides a stamping user to manually input or automatically extract file key information from a document;
(3.2) the seal file anti-counterfeiting mark generating unit calls a security chip card key of the seal through the interface equipment;
(3.3) the seal file anti-counterfeiting mark generating unit encrypts the key information of the file by using a domestic commercial cryptographic algorithm to generate a key information encryption result of the file;
(3.4) the stamp file anti-counterfeiting mark generating unit obtains the unique identification code of the security chip card of the stamp through the interface device;
(3.5) the stamp file anti-counterfeiting mark generating unit performs hash operation on the electronic document of the stamp file including the format document format by using a domestic commercial cryptographic algorithm to obtain a hash value;
(3.6) the generation unit of the anti-counterfeiting mark of the sealed file calls the key of the security chip card to perform encryption operation, and acquires time information and position information from a local or remote time source of the system;
(3.7) the stamp-stamped file anti-counterfeiting mark generating unit sends the unique identification code of the security chip card, the encryption result of the key information of the file, the hash value of the electronic document, the stamp-stamping confirmation time and the position information to the interface device;
(3.8) the interface device calls a private key in the asymmetric public and private key pair, and carries out digital signature on the received unique identification code of the security chip card, the encryption result of the key information of the file, the stamping confirmation time and the position information by using a domestic commercial cryptographic algorithm to obtain a signature result;
(3.9) the interface device returns signature information consisting of a signature result, a hash value and an interface device public key ID to the seal file anti-counterfeiting mark generating unit;
(3.10) the stamp file anti-counterfeiting mark generating unit encodes the signature information to produce an anti-counterfeiting mark two-dimensional code, and guides a stamp user to set a verification password for generating the anti-counterfeiting mark two-dimensional code;
(3.11) the stamp-stamped file anti-counterfeiting mark generating unit uploads a security chip card unique identification code, a file key information encryption result, stamp-stamping confirmation time, position information, a signature result, an electronic document hash value, an interface device public key ID and an anti-counterfeiting mark two-dimensional code verification password to the chip stamp management system;
(3.12) the chip seal management system receives the unique identification code of the security chip card, the encryption result of the key information of the file, the seal confirmation time, the position information, the signature result, the hash value of the electronic document and the public key ID of the interface device, records and records, and configures the two-dimensional code verification password of the anti-counterfeiting mark;
and (3.13) the stamp file anti-counterfeiting mark generating unit attaches the generated anti-counterfeiting mark two-dimensional code picture to the position close to the stamp position of the electronic version of the stamp file to finish the generation of the anti-counterfeiting mark.
More preferably, the step (4) specifically comprises the following steps:
(4.1) the seal checking user terminal scans the anti-counterfeiting mark two-dimensional code on the seal file to be checked and sealed and obtains anti-counterfeiting mark record information or signature information comprising a signature result, an interface equipment identifier and a hash value through decoding processing;
(4.2) the seal verification user terminal uploads the anti-counterfeiting mark record information or signature information obtained by decoding to a chip seal management system located at the cloud end, and submits an anti-counterfeiting mark two-dimensional code verification password obtained from a seal user in advance to the chip seal management system;
(4.3) the chip seal management system compares the received two-dimension code verification password of the anti-counterfeiting mark with a two-dimension code verification password configured during recording and recording;
(4.4) if the verification passwords are compared consistently, extracting record filing information corresponding to the anti-counterfeiting mark two-dimensional code verification password, and entering the step (4.5), otherwise, returning a prompt of 'password error' to the seal verification user terminal, and exiting the current process;
(4.5) the chip seal management system compares the hash value received from the seal checking user terminal with the electronic document hash value in the record;
(4.6) if the comparison result of the hash values is consistent, entering the step (4.7), otherwise, returning a prompt of 'the hash values of the electronic documents are inconsistent' to the seal checking user terminal, and exiting the current process;
(4.7) the chip seal management system calls the public key of the interface equipment used in the signature according to the public key ID of the interface equipment in the record, decrypts the received signature result, and compares the decryption result with the unique identification code of the security chip card, the encryption result of the key information of the file, the seal confirmation time and the position information in the record;
(4.8) if all the information is compared and is consistent, entering the step (4.9), otherwise, returning a prompt of 'signature result is inconsistent' to the seal checking user terminal, and exiting the current process;
(4.9) the chip stamp management system extracts the unique identification code of the security chip card and the key information of the encrypted file in the record, disperses a key of the security chip card according to the unique identification code of the security chip card, and decrypts the key information of the encrypted file, thereby obtaining the key information of the file;
(4.10) the chip stamp management system searches out the basic information of the chip stamp added with the security chip card according to the unique identification code of the security chip card in the record;
(4.11) the chip seal management system returns the key information of the file and the basic information of the chip seal to the seal verification user terminal;
and (4.12) comparing the consistency of the chip seal information, the file key information, the seal verification time and the position information with the seal file in a manual or automatic mode by the seal verification user terminal, and obtaining a final seal verification result.
Preferably, the recording and registering information in the step (4.4) specifically includes:
the system comprises a security chip card unique identification code, a file key information encryption result, a stamping confirmation time, position information, a signature result, an electronic document hash value and an interface device public key ID.
The device for realizing generation and verification processing of the anti-counterfeiting mark of the stamped file based on the chip stamp is mainly characterized by comprising the following components:
a processor configured to execute computer-executable instructions;
and the memory stores one or more computer-executable instructions, and when the computer-executable instructions are executed by the processor, the steps of the method for generating and verifying the anti-counterfeiting mark of the stamped file based on the chip stamp are realized.
The processor for realizing the generation and verification processing of the anti-counterfeiting mark of the stamped file based on the chip stamp is mainly characterized in that the processor is configured to execute computer executable instructions, and the computer executable instructions are executed by the processor to realize the steps of the method for realizing the generation and verification processing of the anti-counterfeiting mark of the stamped file based on the chip stamp.
The computer readable storage medium is mainly characterized in that a computer program is stored on the computer readable storage medium, and the computer program can be executed by a processor to realize the steps of the method for generating and verifying the anti-counterfeiting mark of the stamped file based on the chip stamp.
By adopting the system, the method, the device, the processor and the computer readable storage medium for realizing the generation and verification processing of the anti-counterfeiting mark of the stamped file based on the chip stamp, the authenticity identification of the stamped file can be safely and accurately realized, and the unique binding of the key of the security chip card ensures that the key information encryption result of the file can only be generated by a chip stamp owner or a chip stamp management system; the possession of the interface device to the private key ensures that the signature information can only be generated by the interface device, thereby preventing the extreme situation that the chip seal management system forges the encryption result, and establishing the strong binding relationship between the chip seal and the seal file. On the basis, the condition that the copied two-dimensional code is attached to the forged file can be effectively prevented through comparison of chip seal information, file key information, seal confirmation time, position information and the like contained in the two-dimensional code with the consistency of the sealed file and the set two-dimensional code verification password; the password is verified through the two-dimension code, and an unauthorized user can be prevented from acquiring chip seal information, file key information and the like through the two-dimension code; the stamped files are not required to be recorded, so that the privacy of the user is effectively protected. Meanwhile, the technical scheme does not need additional equipment and is simple and convenient to operate, so that the use cost of a user cannot be increased. The method can safely, accurately and quickly solve the difficult problem of authenticity identification of the stamped file, and effectively reduce the risk of counterfeiting the stamped file.
Drawings
FIG. 1 is a schematic view of the process flow of the security chip card and the key configuration module of the interface device of the present invention.
FIG. 2 is a schematic processing flow diagram of the stamp file anti-counterfeit mark generation module according to the present invention.
FIG. 3 is a schematic processing flow diagram of the verification module for the anti-counterfeit mark of the stamped file according to the present invention.
Detailed Description
In order to more clearly describe the technical contents of the present invention, the following further description is given in conjunction with specific embodiments.
Before describing in detail embodiments that are in accordance with the present invention, it should be noted that the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus.
The system for generating and verifying the anti-counterfeiting mark of the stamped file based on the chip stamp comprises:
the security chip card and interface equipment key configuration module is used for reading the unique identifier of the security chip card through the unique identifier interface of the security chip card and generating an asymmetric public and private key pair;
the stamping file anti-counterfeiting mark generating module is connected with the stamping file anti-counterfeiting mark format processing module and is used for generating anti-counterfeiting marks to be added in the stamping file;
and the seal file anti-counterfeiting mark verification module is connected with the seal file anti-counterfeiting mark generation module and is used for acquiring, identifying and verifying the anti-counterfeiting mark and determining the consistency of the seal information and the seal file according to the verification result.
As a preferred embodiment of the present invention, the security chip card and interface device key configuration module includes: a key configuration submodule of the security chip card and a key configuration device of the interface device, wherein,
the secure chip card key configuration submodule specifically includes: the system comprises a security chip management client, a chip seal management system and a security chip card;
the chip seal management client is used for calling the unique identification interface of the security chip card, reading the corresponding unique identification code of the security chip card and sending a key filling request and the unique identification code of the security chip card to the chip seal management system;
the chip seal management system distributes one or a group of root keys according to the security chip card to one or a group of corresponding unique identification codes for decentralized processing, obtains an independent symmetric key, and writes the independent symmetric key into the security chip card through the security chip management client side to realize unique binding of the written key and the security chip card;
the interface device key configuration device is as follows: and the interface equipment records the generated public key into the chip seal management system for subsequent processing.
As a preferred embodiment of the present invention, the chip stamp management system specifically includes:
a secure chip card key management subsystem, an interface device key management subsystem and a chip seal issuance management subsystem, wherein,
the safety chip card key management subsystem is used for managing the root key and the whole life cycle of the key of the safety chip card;
the interface device key management subsystem is used for managing a public key of the interface device;
the chip seal issuing management subsystem is used for managing and processing the information of the security chip card added into the seal.
In a preferred embodiment of the invention, the security chip card is incorporated into a stamp to form a chip stamp.
As a preferred embodiment of the present invention, the interface device specifically includes:
a smart phone with a non-contact or contact interface and a special security chip card reader.
As a preferred embodiment of the present invention, the module for generating the anti-counterfeit mark of the stamped file comprises the following processing procedures:
(a1) a stamping file anti-counterfeiting mark generating unit in the stamping file anti-counterfeiting mark generating module guides a stamping user to manually input or automatically extracts file key information from a document;
(b1) the seal file anti-counterfeiting mark generating unit calls a secret key of a security chip card in the chip seal to encrypt the key information of the file through the interface equipment and obtains an encryption result of the key information of the file;
(c1) the seal file anti-counterfeiting mark generating unit reads the unique identification code of the security chip card through the interface equipment;
(d1) the generating unit of the anti-counterfeiting mark of the stamped file carries out hash operation and calculates the hash value of the file electronic document in the format of the format document;
(e1) the seal file anti-counterfeiting mark generating unit acquires information including date from a local or remote time source of the system: year, month, day and time information: time, minutes and seconds are used as stamping confirmation time information;
(f1) the generating unit of the anti-counterfeiting mark of the stamping file acquires the coordinate information of the geographic position and the ip address information from the local or interface equipment of the system as position information;
(g1) the stamp-stamped file anti-counterfeiting mark generating unit sends a unique identification code of the security chip card, a file key information encryption result, stamp-stamping confirmation time and position information to the interface device;
(h1) the interface device calls a private key, signature operation is carried out on the unique identification code of the security chip card, the encryption result of the key information of the file, the stamping confirmation time and the position information in a local signature or combined signature mode, the signature information is composed of the signature result, the hash value of the electronic file of the file and the public key ID of the interface device, and the signature information is returned to the stamping file anti-counterfeiting mark generating unit;
(i1) the stamping file anti-counterfeiting mark generation unit forms a stamping file anti-counterfeiting mark record by the unique identification code of the security chip card, the encryption result of the key information of the file, the stamping confirmation time, the position information and the signature information, and makes the stamping file anti-counterfeiting mark record or the signature information in the stamping file anti-counterfeiting mark record into an anti-counterfeiting mark two-dimensional code;
(j1) the stamping file anti-counterfeiting mark generating unit uploads the stamping file anti-counterfeiting mark record, and sets a verification password of the anti-counterfeiting mark two-dimensional code in the record of the chip stamp management system;
(k1) and the stamping file anti-counterfeiting mark generating unit attaches the anti-counterfeiting mark two-dimensional code to the position near the stamping part of the corresponding paper file to complete the generation of the anti-counterfeiting mark.
As a preferred embodiment of the present invention, the file key information specifically includes:
file title, file author, and file content summary.
As a preferred embodiment of the present invention, the anti-counterfeit mark two-dimensional code is attached in the following manner:
directly stamping the seal file together with the electronic version of the seal file after printing or pasting the seal file near the seal part after independently printing.
In a preferred embodiment of the present invention, the encryption operation, the hash operation and the signature operation are all processed by using a domestic commercial cryptographic algorithm.
As a preferred embodiment of the present invention, the module for verifying the anti-counterfeit mark of the stamped file comprises the following processing procedures:
(a2) the seal verification user terminal acquires a corresponding anti-counterfeiting mark two-dimensional code verification password on a seal file to be verified from a seal signing user through a security channel;
(b2) the seal checking user terminal scans the anti-counterfeiting mark two-dimensional code attached to the seal file to be checked, and obtains the anti-counterfeiting mark record or signature information of the seal file to be checked through decoding;
(c2) the seal checking user terminal attaches a two-dimensional code verification password to the anti-counterfeiting mark record or signature information of the sealed file and uploads the verification password to the chip seal management system;
(d2) the chip seal management system compares the two-dimension code verification password received from the seal verification user terminal with the two-dimension code verification password recorded in the system record; or
The chip seal management system compares the file electronic document hash value in the signature information received from the seal checking user terminal with the hash value in the record;
(e2) the chip seal management system calls the public key of the interface equipment according to the public key ID of the interface equipment in the record, and verifies and signs the signature result in the signature information received from the seal verification user terminal;
(f2) the chip seal management system disperses a security chip card key according to the security chip card unique identification code acquired from the uploaded information, and decrypts the encrypted file key information in the record to acquire the file key information;
(g2) the chip seal management system retrieves the basic information of the chip seal provided with the security chip card according to the unique identification code of the security chip card in the record;
(h2) the chip seal management system returns the decrypted file key information and the corresponding seal basic information to the seal verification user terminal;
(i2) the seal checking user terminal compares the chip seal information, the file key information, the seal stamping confirmation time and the consistency of the position information and the seal stamping file in a manual or automatic mode, and therefore the seal stamping file anti-counterfeiting mark verification result is obtained.
Preferably, the basic information of the chip stamp includes:
seal name, seal code, and seal image.
The method for realizing the generation and verification processing of the anti-counterfeiting mark of the stamped file based on the chip stamp based on the system comprises the following steps:
(1) the security chip management client reads the unique identification code of the security chip card through the unique identification code interface, sends a key filling request to the chip seal management system to obtain an independent symmetric key and sends the independent symmetric key to the security chip card, and the security chip card reads and writes the corresponding independent symmetric key;
(2) generating an asymmetric public and private key pair by the interface equipment, and sending a public key in the asymmetric public and private key pair and the identification information of the interface equipment to the chip seal management system for recording;
(3) the stamping file anti-counterfeiting mark generating unit encrypts the acquired file key information and important anti-counterfeiting information in the file to be stamped to generate an anti-counterfeiting mark two-dimensional code;
(4) and the seal checking user terminal obtains a seal checking result by scanning and identifying the anti-counterfeiting mark two-dimensional code.
As a preferred embodiment of the present invention, the step (1) specifically comprises the following steps:
the security chip card management client side obtains the unique identification code of the security chip card needing configuration by reading the unique identification code interface of the security chip card;
(1.2) the security chip card management client side sends a key filling request containing the unique identification code of the security chip card to the chip seal management system;
(1.3) the chip seal management system receives the key filling request of the security chip card management client, performs distributed processing by using one or a group of root keys of the chip seal management system according to the unique identification code of the security chip card to obtain one or a group of independent symmetric keys, and returns the independent symmetric keys to the security chip card management client;
(1.4) the security chip card management client receives the independent symmetric key and writes the independent symmetric key into the security chip card.
As a preferred embodiment of the present invention, the step (2) specifically comprises the following steps:
(2.1) the interface device generates an asymmetric public and private key pair by itself or the interface device and the chip seal management system jointly generate an asymmetric public and private key pair;
and (2.2) the interface equipment sends the public key in the asymmetric public and private key pair and the identification information of the interface equipment to the chip seal management system for recording.
As a preferred embodiment of the present invention, the step (3) specifically comprises the following steps:
(3.1) the stamping file anti-counterfeiting mark generating unit guides a stamping user to manually input or automatically extract file key information from the document: the method comprises the steps of (1) including a file title, a file author and a file content abstract;
(3.2) the seal file anti-counterfeiting mark generating unit calls a security chip card key of the seal through the interface equipment;
(3.3) the seal file anti-counterfeiting mark generating unit encrypts the key information of the file by using a domestic commercial cryptographic algorithm to generate a key information encryption result of the file;
(3.4) the stamp file anti-counterfeiting mark generating unit obtains the unique identification code of the security chip card of the stamp through the interface device;
(3.5) the stamp file anti-counterfeiting mark generating unit performs hash operation on the electronic document of the stamp file including the format document format by using a domestic commercial cryptographic algorithm to obtain a hash value;
(3.6) the generation unit of the anti-counterfeiting mark of the sealed file calls the key of the security chip card to perform encryption operation, and acquires time information and position information from a local or remote time source of the system;
(3.7) the stamp-stamped file anti-counterfeiting mark generating unit sends the unique identification code of the security chip card, the encryption result of the key information of the file, the hash value of the electronic document, the stamp-stamping confirmation time and the position information to the interface device;
(3.8) the interface device calls a private key in the asymmetric public and private key pair, and carries out digital signature on the received unique identification code of the security chip card, the encryption result of the key information of the file, the stamping confirmation time and the position information by using a domestic commercial cryptographic algorithm to obtain a signature result;
(3.9) the interface device returns signature information consisting of a signature result, a hash value and an interface device public key ID to the seal file anti-counterfeiting mark generating unit;
(3.10) the stamp file anti-counterfeiting mark generating unit encodes the signature information to produce an anti-counterfeiting mark two-dimensional code, and guides a stamp user to set a verification password for generating the anti-counterfeiting mark two-dimensional code;
(3.11) the stamp-stamped file anti-counterfeiting mark generating unit uploads a security chip card unique identification code, a file key information encryption result, stamp-stamping confirmation time, position information, a signature result, an electronic document hash value, an interface device public key ID and an anti-counterfeiting mark two-dimensional code verification password to the chip stamp management system;
(3.12) the chip seal management system receives the unique identification code of the security chip card, the encryption result of the key information of the file, the seal confirmation time, the position information, the signature result, the hash value of the electronic document and the public key ID of the interface device, records and records, and configures the two-dimensional code verification password of the anti-counterfeiting mark;
and (3.13) the stamp file anti-counterfeiting mark generating unit attaches the generated anti-counterfeiting mark two-dimensional code picture to the position close to the stamp position of the electronic version of the stamp file to finish the generation of the anti-counterfeiting mark.
As a preferred embodiment of the present invention, the step (4) specifically comprises the following steps:
(4.1) the seal checking user terminal scans the anti-counterfeiting mark two-dimensional code on the seal file to be checked and sealed and obtains anti-counterfeiting mark record information or signature information comprising a signature result, an interface equipment identifier and a hash value through decoding processing;
(4.2) the seal verification user terminal uploads the anti-counterfeiting mark record information or signature information obtained by decoding to a chip seal management system located at the cloud end, and submits an anti-counterfeiting mark two-dimensional code verification password obtained from a seal user in advance to the chip seal management system;
(4.3) the chip seal management system compares the received two-dimension code verification password of the anti-counterfeiting mark with a two-dimension code verification password configured during recording and recording;
(4.4) if the verification passwords are compared consistently, extracting record filing information corresponding to the anti-counterfeiting mark two-dimensional code verification password, and entering the step (4.5), otherwise, returning a prompt of 'password error' to the seal verification user terminal, and exiting the current process;
(4.5) the chip seal management system compares the hash value received from the seal checking user terminal with the electronic document hash value in the record;
(4.6) if the comparison result of the hash values is consistent, entering the step (4.7), otherwise, returning a prompt of 'the hash values of the electronic documents are inconsistent' to the seal checking user terminal, and exiting the current process;
(4.7) the chip seal management system calls the public key of the interface equipment used in the signature according to the public key ID of the interface equipment in the record, decrypts the received signature result, and compares the decryption result with the unique identification code of the security chip card, the encryption result of the key information of the file, the seal confirmation time and the position information in the record;
(4.8) if all the information is compared and is consistent, entering the step (4.9), otherwise, returning a prompt of 'signature result is inconsistent' to the seal checking user terminal, and exiting the current process;
(4.9) the chip stamp management system extracts the unique identification code of the security chip card and the key information of the encrypted file in the record, disperses a key of the security chip card according to the unique identification code of the security chip card, and decrypts the key information of the encrypted file, thereby obtaining the key information of the file;
(4.10) the chip stamp management system searches out the basic information of the chip stamp such as the stamp name, the stamp code, the stamp image and the like added with the security chip card according to the unique identification code of the security chip card in the record;
(4.11) the chip seal management system returns the key information of the file and the basic information of the chip seal to the seal verification user terminal;
and (4.12) comparing the consistency of the chip seal information, the file key information, the seal verification time and the position information with the seal file in a manual or automatic mode by the seal verification user terminal, and obtaining a final seal verification result.
As a preferred embodiment of the present invention, the recording record information in the step (4.4) specifically includes:
the system comprises a security chip card unique identification code, a file key information encryption result, a stamping confirmation time, position information, a signature result, an electronic document hash value and an interface device public key ID.
The device for realizing generation and verification processing of the anti-counterfeiting mark of the stamped file based on the chip stamp comprises:
a processor configured to execute computer-executable instructions;
and the memory stores one or more computer-executable instructions, and when the computer-executable instructions are executed by the processor, the steps of the method for generating and verifying the anti-counterfeiting mark of the stamped file based on the chip stamp are realized.
The processor for generating and verifying the anti-counterfeiting mark of the stamped file based on the chip stamp is configured to execute computer executable instructions, and when the computer executable instructions are executed by the processor, the steps of the method for generating and verifying the anti-counterfeiting mark of the stamped file based on the chip stamp are realized.
As a preferred embodiment of the present invention, the computer readable storage medium has a computer program stored thereon, and the computer program is executable by a processor to implement the steps of the above method for generating and verifying the anti-counterfeit mark of the stamped file based on the chip stamp.
In an embodiment of the present invention, referring to fig. 1, the secure chip card key configuration submodule specifically performs the following processes:
the security chip card management client reads the unique identification code of the security chip card needing to be configured with the secret key;
the security chip card management client sends a key filling request containing the unique identification code of the security chip card to the chip seal management system;
the chip seal management system receives the key filling request of the security chip card management client, and one or one group of root keys of the chip seal management system are dispersed according to the received unique identification code of the security chip card to obtain one or one group of independent symmetric keys;
the chip seal management system returns information such as the independent symmetric key obtained by dispersion to the security chip card management client;
and the security chip card management client receives the return information of the chip seal management system and writes the received independent symmetric key into the corresponding security chip card.
In an embodiment of the present invention, the interface device key configuration apparatus specifically performs the following processing:
the interface device generates an asymmetric public and private key pair by itself or the interface device and a chip seal management system are combined to generate the asymmetric public and private key pair;
and the interface equipment sends information such as a public key in the public and private key pair, an interface equipment identifier and the like to the chip seal management system for recording.
In a preferred embodiment, the chip stamp management system includes a secure chip card key management subsystem, an interface device key management subsystem, and a chip stamp issuance management subsystem, wherein the secure chip card key management subsystem is responsible for the full life cycle management of the root key and the secure chip card key, the interface device key management subsystem is responsible for the management of the interface device public key and related information, and the chip stamp issuance management subsystem is responsible for the information management of the secure chip card attached to the stamp.
In an embodiment of the present invention, referring to fig. 2, the stamp file anti-counterfeit mark generating module performs the following processes:
the generation software of the anti-counterfeiting mark of the stamped file guides a user to manually input or automatically extract file key information such as file titles, file authors, file content summaries and the like from the document;
the anti-counterfeiting mark generation software of the stamped file calls a security chip card key of a stamp to encrypt the key information of the file by using a domestic commercial cryptographic algorithm through interface equipment to generate an encryption result of the key information of the file;
the anti-counterfeiting mark generation software of the stamping file obtains the unique identification code of the security chip card of the stamp through interface equipment;
the anti-counterfeiting mark generation software of the stamping file performs hash operation on the electronic document of the used printing file including the format document format by using a domestic commercial cryptographic algorithm to obtain a hash value;
when the anti-counterfeiting mark generation software of the seal file calls a security chip card key to perform encryption operation, current date information (year, month and day) and time information (hour, minute and second) are acquired from a local or remote time source of the system and serve as seal confirmation time;
when the anti-counterfeiting mark generation software of the seal file calls a security chip card key to perform encryption operation, current geographic position coordinate information and an ip address are acquired from a local system or an interface device and are used as position information;
the stamping file anti-counterfeiting mark generation software sends a unique identification code of the security chip card, a file key information encryption result, an electronic document hash value, stamping confirmation time and position information to the interface device;
the interface device calls a private key in a public and private key pair to carry out digital signature on the received unique identification code of the security chip card, the key information encryption result of the file, the stamping confirmation time and the position information by using a domestic commercial cryptographic algorithm to obtain a signature result, and returns signature information consisting of the signature result, a hash value and an interface device public key ID to the stamping file anti-counterfeiting mark generation software;
the signature information is encoded into a two-dimensional code by the seal file anti-counterfeiting mark generating software;
the anti-counterfeiting mark generation software of the stamped file guides a user to set the verification password for generating the two-dimensional code;
the stamping file anti-counterfeiting mark generation software uploads a security chip card unique identification code, a file key information encryption result, stamping confirmation time, position information, a signature result, an electronic document hash value, an interface device public key ID and a two-dimensional code verification password to the chip stamping management system;
the chip seal management system records and records the received unique identification code of the security chip card, the encryption result of the key information of the file, the seal confirmation time, the position information, the signature result, the hash value of the electronic document and the public key ID of the interface equipment, and configures a two-dimensional code verification password;
the generation software of the anti-counterfeiting mark of the stamped file pastes the two-dimensional code picture near the stamping position of the electronic version of the file.
In an embodiment of the present invention, referring to fig. 3, the stamp document anti-counterfeit mark verification module performs the following processes:
the seal checking user terminal scans the two-dimensional code on the seal file to be checked and decodes the two-dimensional code to obtain signature information comprising a signature result, an interface equipment identifier and a hash value;
the seal checking user terminal uploads the signature information obtained by decoding to a chip seal management system positioned at the cloud end, and submits a two-dimensional code verification password obtained from a seal covering user in advance to the chip seal management system;
the chip seal management system compares the received two-dimension code verification password with a two-dimension code verification password configured during record filing;
if the passwords are consistent, record and record information corresponding to the two-dimensional code verification password is extracted, wherein the record and record information comprises the unique identification code of the security chip card, the encryption result of the key information of the file, the stamping confirmation time, the position information, the signature result, the hash value of the electronic document and the public key ID of the interface equipment, the next process is carried out, and if not, a password error is returned to the user terminal for verifying the stamp and the process is exited;
the chip seal management system compares the hash value received from the seal checking user terminal with the electronic document hash value in the record;
if the hash values are consistent, entering the next process, otherwise, returning 'the electronic document hash values are inconsistent' to the seal checking user terminal and exiting the process;
the chip seal management system calls the public key of the interface equipment during signature according to the public key ID of the interface equipment in the record to decrypt the received signature result, and compares the decrypted result with the unique identification code of the security chip card, the encryption result of the key information of the file, the seal confirmation time and the position information in the record;
if all the information is consistent, entering the next process, otherwise, returning 'the signature result is inconsistent' to the signature verification user terminal and exiting the process;
the chip seal management system extracts the unique identification code of the security chip card and the key information of the encrypted file in the record, disperses a card key of the security chip card according to the unique identification code of the security chip card, and decrypts the key information of the encrypted file to obtain the key information of the file;
the chip seal management system retrieves the basic information of the chip seal provided with the security chip card according to the unique identification code of the security chip card in the record;
the chip seal management system returns the key information of the file and the basic information of the chip seal to the seal checking user terminal;
and comparing the consistency of the chip seal information, the file key information, the seal verification time and the position information with the seal file by the seal verification user terminal in a manual or automatic mode, and obtaining a final seal verification result.
Any process or method descriptions in flow charts or otherwise described herein may be understood as representing modules, segments, or portions of code which include one or more executable instructions for implementing specific logical functions or steps of the process, and alternate implementations are included within the scope of the preferred embodiment of the present invention in which functions may be executed out of order from that shown or discussed, including substantially concurrently or in reverse order, depending on the functionality involved, as would be understood by those reasonably skilled in the art of the present invention.
It should be understood that portions of the present invention may be implemented in hardware, software, firmware, or a combination thereof. In the above embodiments, the various steps or methods may be implemented in software or firmware stored in memory and executed by suitable instruction execution devices.
It will be understood by those skilled in the art that all or part of the steps carried by the method for implementing the above embodiments may be implemented by hardware related to instructions of a program, and the program may be stored in a computer readable storage medium, and when executed, the program includes one or a combination of the steps of the method embodiments.
In addition, functional units in the embodiments of the present invention may be integrated into one processing module, or each unit may exist alone physically, or two or more units are integrated into one module. The integrated module can be realized in a hardware mode, and can also be realized in a software functional module mode. The integrated module, if implemented in the form of a software functional module and sold or used as a separate product, may also be stored in a computer readable storage medium.
The storage medium mentioned above may be a read-only memory, a magnetic or optical disk, etc.
In the description herein, references to the description of the term "an embodiment," "some embodiments," "an example," "a specific example," "an implementation" or "an embodiment," etc., mean that a particular feature, structure, material, or characteristic described in connection with the embodiment or example is included in at least one embodiment or example of the invention. In this specification, the schematic representations of the terms used above do not necessarily refer to the same embodiment or example. Furthermore, the particular features, structures, materials, or characteristics described may be combined in any suitable manner in any one or more embodiments or examples.
Although embodiments of the present invention have been shown and described above, it is understood that the above embodiments are exemplary and should not be construed as limiting the present invention, and that variations, modifications, substitutions and alterations can be made to the above embodiments by those of ordinary skill in the art within the scope of the present invention.
By adopting the system, the method, the device, the processor and the computer readable storage medium for realizing the generation and verification processing of the anti-counterfeiting mark of the stamped file based on the chip stamp, the authenticity identification of the stamped file can be safely and accurately realized, and the unique binding of the key of the security chip card ensures that the key information encryption result of the file can only be generated by a chip stamp owner or a chip stamp management system; the possession of the interface device to the private key ensures that the signature information can only be generated by the interface device, thereby preventing the extreme situation that the chip seal management system forges the encryption result, and establishing the strong binding relationship between the chip seal and the seal file. On the basis, the condition that the copied two-dimensional code is attached to the forged file can be effectively prevented through comparison of chip seal information, file key information, seal confirmation time, position information and the like contained in the two-dimensional code with the consistency of the sealed file and the set two-dimensional code verification password; the password is verified through the two-dimension code, and an unauthorized user can be prevented from acquiring chip seal information, file key information and the like through the two-dimension code; the stamped files are not required to be recorded, so that the privacy of the user is effectively protected. Meanwhile, the technical scheme does not need additional equipment and is simple and convenient to operate, so that the use cost of a user cannot be increased. The method can safely, accurately and quickly solve the difficult problem of authenticity identification of the stamped file, and effectively reduce the risk of counterfeiting the stamped file.
In this specification, the invention has been described with reference to specific embodiments thereof. It will, however, be evident that various modifications and changes may be made thereto without departing from the broader spirit and scope of the invention. The specification and drawings are, accordingly, to be regarded in an illustrative rather than a restrictive sense.

Claims (20)

1. A system for realizing generation and verification processing of a sealed file anti-counterfeiting mark based on a chip seal is characterized by comprising:
the security chip card and interface equipment key configuration module is used for reading the unique identifier of the security chip card through the unique identifier interface of the security chip card and generating an asymmetric public and private key pair;
the stamping file anti-counterfeiting mark generating module is connected with the stamping file anti-counterfeiting mark format processing module and is used for generating anti-counterfeiting marks to be added in the stamping file; and
and the seal file anti-counterfeiting mark verification module is connected with the seal file anti-counterfeiting mark generation module and is used for acquiring, identifying and verifying the anti-counterfeiting mark and determining the consistency of the seal information and the seal file according to the verification result.
2. The system for generating and verifying the anti-counterfeit mark of the stamped file based on the chip stamp as claimed in claim 1, wherein the security chip card and interface device key configuration module comprises: a key configuration submodule of the security chip card and a key configuration device of the interface device, wherein,
the secure chip card key configuration submodule specifically includes: the system comprises a security chip management client, a chip seal management system and a security chip card;
the chip seal management client is used for calling the unique identification interface of the security chip card, reading the corresponding unique identification code of the security chip card and sending a key filling request and the unique identification code of the security chip card to the chip seal management system;
the chip seal management system distributes one or a group of root keys according to the security chip card to one or a group of corresponding unique identification codes for decentralized processing, obtains an independent symmetric key, and writes the independent symmetric key into the security chip card through the security chip management client side to realize unique binding of the written key and the security chip card;
the interface device key configuration device is as follows: and the interface equipment records the generated public key into the chip seal management system for subsequent processing.
3. The system for realizing generation and verification processing of the anti-counterfeiting mark of the stamped file based on the chip stamp according to claim 2, wherein the chip stamp management system specifically comprises:
a secure chip card key management subsystem, an interface device key management subsystem and a chip seal issuance management subsystem, wherein,
the safety chip card key management subsystem is used for managing the root key and the whole life cycle of the key of the safety chip card;
the interface device key management subsystem is used for managing a public key of the interface device;
the chip seal issuing management subsystem is used for managing and processing the information of the security chip card added into the seal.
4. The system for generating and verifying the forgery-proof mark of a stamped document according to claim 3, wherein said security chip card is attached to said stamp to form a chip stamp.
5. The system for realizing generation and verification processing of the anti-counterfeiting mark of the stamped file based on the chip stamp according to claim 4, wherein the interface device is specifically:
a smart phone with a non-contact or contact interface and a special security chip card reader.
6. The system for realizing generation and verification processing of the anti-counterfeiting mark of the stamped file based on the chip stamp according to claim 5, wherein the stamping file anti-counterfeiting mark generation module comprises the following processing procedures:
(a1) a stamping file anti-counterfeiting mark generating unit in the stamping file anti-counterfeiting mark generating module guides a stamping user to manually input or automatically extracts file key information from a document;
(b1) the seal file anti-counterfeiting mark generating unit calls a secret key of a security chip card in the chip seal to encrypt the key information of the file through the interface equipment and obtains an encryption result of the key information of the file;
(c1) the seal file anti-counterfeiting mark generating unit reads the unique identification code of the security chip card through the interface equipment;
(d1) the generating unit of the anti-counterfeiting mark of the stamped file carries out hash operation and calculates the hash value of the file electronic document in the format of the format document;
(e1) the seal file anti-counterfeiting mark generating unit acquires information including date from a local or remote time source of the system: year, month, day and time information: time, minutes and seconds are used as stamping confirmation time information;
(f1) the generating unit of the anti-counterfeiting mark of the stamping file acquires the coordinate information of the geographic position and the ip address information from the local or interface equipment of the system as position information;
(g1) the stamp-stamped file anti-counterfeiting mark generating unit sends a unique identification code of the security chip card, a file key information encryption result, stamp-stamping confirmation time and position information to the interface device;
(h1) the interface device calls a private key, signature operation is carried out on the unique identification code of the security chip card, the encryption result of the key information of the file, the stamping confirmation time and the position information in a local signature or combined signature mode, the signature information is composed of the signature result, the hash value of the electronic file of the file and the public key ID of the interface device, and the signature information is returned to the stamping file anti-counterfeiting mark generating unit;
(i1) the stamping file anti-counterfeiting mark generation unit forms a stamping file anti-counterfeiting mark record by the unique identification code of the security chip card, the encryption result of the key information of the file, the stamping confirmation time, the position information and the signature information, and makes the stamping file anti-counterfeiting mark record or the signature information in the stamping file anti-counterfeiting mark record into an anti-counterfeiting mark two-dimensional code;
(j1) the stamping file anti-counterfeiting mark generating unit uploads the stamping file anti-counterfeiting mark record, and sets a verification password of the anti-counterfeiting mark two-dimensional code in the record of the chip stamp management system;
(k1) and the stamping file anti-counterfeiting mark generating unit attaches the anti-counterfeiting mark two-dimensional code to the position near the stamping part of the corresponding paper file to complete the generation of the anti-counterfeiting mark.
7. The system for generating and verifying the anti-counterfeit mark of the stamped file based on the chip stamp as claimed in claim 6, wherein the key information of the file specifically comprises:
file title, file author, and file content summary.
8. The system for realizing generation and verification processing of the anti-counterfeiting mark of the stamped file based on the chip stamp according to claim 7, wherein the two-dimensional code of the anti-counterfeiting mark is attached in a way that:
directly stamping the seal file together with the electronic version of the seal file after printing or pasting the seal file near the seal part after independently printing.
9. The system for generating and verifying the anti-counterfeit mark of a stamped file based on a chip stamp as claimed in claim 8, wherein the encryption operation, the hash operation and the signature operation are all processed by using a domestic commercial cryptographic algorithm.
10. The system for generating and verifying the anti-counterfeiting mark of the stamped file based on the chip stamp as claimed in claim 9, wherein the stamping file anti-counterfeiting mark verifying module comprises the following processing procedures:
(a2) the seal verification user terminal acquires a corresponding anti-counterfeiting mark two-dimensional code verification password on a seal file to be verified from a seal signing user through a security channel;
(b2) the seal checking user terminal scans the anti-counterfeiting mark two-dimensional code attached to the seal file to be checked, and obtains the anti-counterfeiting mark record or signature information of the seal file to be checked through decoding;
(c2) the seal checking user terminal attaches a two-dimensional code verification password to the anti-counterfeiting mark record or signature information of the sealed file and uploads the verification password to the chip seal management system;
(d2) the chip seal management system compares the two-dimension code verification password received from the seal verification user terminal with the two-dimension code verification password recorded in the system record; or
The chip seal management system compares the file electronic document hash value in the signature information received from the seal checking user terminal with the hash value in the record;
(e2) the chip seal management system calls the public key of the interface equipment according to the public key ID of the interface equipment in the record, and verifies and signs the signature result in the signature information received from the seal verification user terminal;
(f2) the chip seal management system disperses a security chip card key according to the security chip card unique identification code acquired from the uploaded information, and decrypts the encrypted file key information in the record to acquire the file key information;
(g2) the chip seal management system retrieves the basic information of the chip seal provided with the security chip card according to the unique identification code of the security chip card in the record;
(h2) the chip seal management system returns the decrypted file key information and the corresponding basic information of the chip seal to the seal verification user terminal;
(i2) the seal checking user terminal compares the chip seal information, the file key information, the seal stamping confirmation time and the consistency of the position information and the seal stamping file in a manual or automatic mode, and therefore the seal stamping file anti-counterfeiting mark verification result is obtained.
11. The system for generating and verifying the anti-counterfeit mark of the stamped file based on the chip stamp as claimed in claim 10, wherein the basic information of the chip stamp includes:
seal name, seal code, and seal image.
12. A method for realizing generation and verification processing of a sealed file anti-counterfeiting mark based on a chip seal based on the system of claim 11, characterized by comprising the following steps:
(1) the security chip management client reads the unique identification code of the security chip card through the unique identification code interface, sends a key filling request to the chip seal management system to obtain an independent symmetric key and sends the independent symmetric key to the security chip card, and the security chip card reads and writes the corresponding independent symmetric key;
(2) generating an asymmetric public and private key pair by the interface equipment, and sending a public key in the asymmetric public and private key pair and the identification information of the interface equipment to the chip seal management system for recording;
(3) the stamping file anti-counterfeiting mark generating unit encrypts the acquired file key information and important anti-counterfeiting information in the file to be stamped to generate an anti-counterfeiting mark two-dimensional code;
(4) and the seal checking user terminal obtains a seal checking result by scanning and identifying the anti-counterfeiting mark two-dimensional code.
13. The method for realizing generation and verification processing of the anti-counterfeiting mark of the stamped file based on the chip stamp according to claim 12, wherein the step (1) specifically comprises the following steps:
the security chip card management client side obtains the unique identification code of the security chip card needing configuration by reading the unique identification code interface of the security chip card;
(1.2) the security chip card management client side sends a key filling request containing the unique identification code of the security chip card to the chip seal management system;
(1.3) the chip seal management system receives the key filling request of the security chip card management client, performs distributed processing by using one or a group of root keys of the chip seal management system according to the unique identification code of the security chip card to obtain one or a group of independent symmetric keys, and returns the independent symmetric keys to the security chip card management client;
(1.4) the security chip card management client receives the independent symmetric key and writes the independent symmetric key into the security chip card.
14. The method for realizing generation and verification processing of the anti-counterfeiting mark of the stamped file based on the chip stamp according to claim 13, wherein the step (2) specifically comprises the following steps:
(2.1) the interface device generates an asymmetric public and private key pair by itself or the interface device and the chip seal management system jointly generate an asymmetric public and private key pair;
and (2.2) the interface equipment sends the public key in the asymmetric public and private key pair and the identification information of the interface equipment to the chip seal management system for recording.
15. The method for realizing generation and verification processing of the anti-counterfeiting mark of the stamped file based on the chip stamp according to claim 14, wherein the step (3) specifically comprises the following steps:
(3.1) the stamping file anti-counterfeiting mark generating unit guides a stamping user to manually input or automatically extracts the file key information from the document;
(3.2) the seal file anti-counterfeiting mark generating unit calls a security chip card key of the seal through the interface equipment;
(3.3) the seal file anti-counterfeiting mark generating unit encrypts the key information of the file by using a domestic commercial cryptographic algorithm to generate a key information encryption result of the file;
(3.4) the stamp file anti-counterfeiting mark generating unit obtains the unique identification code of the security chip card of the stamp through the interface device;
(3.5) the stamp file anti-counterfeiting mark generating unit performs hash operation on the electronic document of the stamp file including the format document format by using a domestic commercial cryptographic algorithm to obtain a hash value;
(3.6) the generation unit of the anti-counterfeiting mark of the sealed file calls the key of the security chip card to perform encryption operation, and acquires time information and position information from a local or remote time source of the system;
(3.7) the stamp-stamped file anti-counterfeiting mark generating unit sends the unique identification code of the security chip card, the encryption result of the key information of the file, the hash value of the electronic document, the stamp-stamping confirmation time and the position information to the interface device;
(3.8) the interface device calls a private key in the asymmetric public and private key pair, and carries out digital signature on the received unique identification code of the security chip card, the encryption result of the key information of the file, the stamping confirmation time and the position information by using a domestic commercial cryptographic algorithm to obtain a signature result;
(3.9) the interface device returns signature information consisting of a signature result, a hash value and an interface device public key ID to the seal file anti-counterfeiting mark generating unit;
(3.10) the stamp file anti-counterfeiting mark generating unit encodes the signature information to produce an anti-counterfeiting mark two-dimensional code, and guides a stamp user to set a verification password for generating the anti-counterfeiting mark two-dimensional code;
(3.11) the stamp-stamped file anti-counterfeiting mark generating unit uploads a security chip card unique identification code, a file key information encryption result, stamp-stamping confirmation time, position information, a signature result, an electronic document hash value, an interface device public key ID and an anti-counterfeiting mark two-dimensional code verification password to the chip stamp management system;
(3.12) the chip seal management system receives the unique identification code of the security chip card, the encryption result of the key information of the file, the seal confirmation time, the position information, the signature result, the hash value of the electronic document and the public key ID of the interface device, records and records, and configures the two-dimensional code verification password of the anti-counterfeiting mark;
and (3.13) the stamp file anti-counterfeiting mark generating unit attaches the generated anti-counterfeiting mark two-dimensional code picture to the position close to the stamp position of the electronic version of the stamp file to finish the generation of the anti-counterfeiting mark.
16. The method for realizing generation and verification processing of the anti-counterfeiting mark of the stamped file based on the chip stamp according to claim 15, wherein the step (4) specifically comprises the following steps:
(4.1) the seal checking user terminal scans the anti-counterfeiting mark two-dimensional code on the seal file to be checked and sealed and obtains anti-counterfeiting mark record information or signature information comprising a signature result, an interface equipment identifier and a hash value through decoding processing;
(4.2) the seal verification user terminal uploads the anti-counterfeiting mark record information or signature information obtained by decoding to a chip seal management system located at the cloud end, and submits an anti-counterfeiting mark two-dimensional code verification password obtained from a seal user in advance to the chip seal management system;
(4.3) the chip seal management system compares the received two-dimension code verification password of the anti-counterfeiting mark with a two-dimension code verification password configured during recording and recording;
(4.4) if the verification passwords are compared consistently, extracting record filing information corresponding to the anti-counterfeiting mark two-dimensional code verification password, and entering the step (4.5), otherwise, returning a prompt of 'password error' to the seal verification user terminal, and exiting the current process;
(4.5) the chip seal management system compares the hash value received from the seal checking user terminal with the electronic document hash value in the record;
(4.6) if the comparison result of the hash values is consistent, entering the step (4.7), otherwise, returning a prompt of 'the hash values of the electronic documents are inconsistent' to the seal checking user terminal, and exiting the current process;
(4.7) the chip seal management system calls the public key of the interface equipment used in the signature according to the public key ID of the interface equipment in the record, decrypts the received signature result, and compares the decryption result with the unique identification code of the security chip card, the encryption result of the key information of the file, the seal confirmation time and the position information in the record;
(4.8) if all the information is compared and is consistent, entering the step (4.9), otherwise, returning a prompt of 'signature result is inconsistent' to the seal checking user terminal, and exiting the current process;
(4.9) the chip stamp management system extracts the unique identification code of the security chip card and the key information of the encrypted file in the record, disperses a key of the security chip card according to the unique identification code of the security chip card, and decrypts the key information of the encrypted file, thereby obtaining the key information of the file;
(4.10) the chip stamp management system searches out the basic information of the chip stamp added with the security chip card according to the unique identification code of the security chip card in the record;
(4.11) the chip seal management system returns the key information of the file and the basic information of the chip seal to the seal verification user terminal;
and (4.12) comparing the consistency of the chip seal information, the file key information, the seal verification time and the position information with the seal file in a manual or automatic mode by the seal verification user terminal, and obtaining a final seal verification result.
17. The method for realizing generation and verification processing of the anti-counterfeiting mark of the stamped file based on the chip stamp according to claim 16, wherein the recording and filing information in the step (4.4) specifically comprises:
the system comprises a security chip card unique identification code, a file key information encryption result, a stamping confirmation time, position information, a signature result, an electronic document hash value and an interface device public key ID.
18. A device for realizing generation and verification processing of a sealed file anti-counterfeiting mark based on a chip seal is characterized by comprising:
a processor configured to execute computer-executable instructions;
a memory storing one or more computer-executable instructions which, when executed by the processor, implement the steps of the method for implementing generation and verification processing of an anti-counterfeit mark of a stamped document based on a chip stamp according to claims 12 to 17.
19. A processor for generating and verifying a security mark of a stamped file based on a chip stamp, wherein the processor is configured to execute computer-executable instructions, and when the computer-executable instructions are executed by the processor, the processor implements the steps of the method for generating and verifying a security mark of a stamped file based on a chip stamp according to claims 12 to 17.
20. A computer-readable storage medium, having stored thereon a computer program executable by a processor to perform the steps of the method for generating and verifying a security mark of a stamped document based on a chip stamp according to claims 12 to 17.
CN202110769120.8A 2021-07-07 2021-07-07 Method for generating and verifying anti-counterfeiting mark of stamped file based on chip stamp Pending CN113486998A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110769120.8A CN113486998A (en) 2021-07-07 2021-07-07 Method for generating and verifying anti-counterfeiting mark of stamped file based on chip stamp

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110769120.8A CN113486998A (en) 2021-07-07 2021-07-07 Method for generating and verifying anti-counterfeiting mark of stamped file based on chip stamp

Publications (1)

Publication Number Publication Date
CN113486998A true CN113486998A (en) 2021-10-08

Family

ID=77941758

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110769120.8A Pending CN113486998A (en) 2021-07-07 2021-07-07 Method for generating and verifying anti-counterfeiting mark of stamped file based on chip stamp

Country Status (1)

Country Link
CN (1) CN113486998A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114940028A (en) * 2022-05-05 2022-08-26 沈阳利为智能科技中心 Intelligent stamp three-dimensional kaleidoscope lock and anti-counterfeiting method thereof
CN115396105A (en) * 2022-10-28 2022-11-25 苏州浪潮智能科技有限公司 File verification system, method, computer equipment and storage medium
CN114940028B (en) * 2022-05-05 2024-05-31 沈阳利为智能科技中心 Intelligent seal three-dimensional kaleidoscope lock and anti-counterfeiting method thereof

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114940028A (en) * 2022-05-05 2022-08-26 沈阳利为智能科技中心 Intelligent stamp three-dimensional kaleidoscope lock and anti-counterfeiting method thereof
CN114940028B (en) * 2022-05-05 2024-05-31 沈阳利为智能科技中心 Intelligent seal three-dimensional kaleidoscope lock and anti-counterfeiting method thereof
CN115396105A (en) * 2022-10-28 2022-11-25 苏州浪潮智能科技有限公司 File verification system, method, computer equipment and storage medium

Similar Documents

Publication Publication Date Title
CN110798315B (en) Data processing method and device based on block chain and terminal
US9369287B1 (en) System and method for applying a digital signature and authenticating physical documents
KR100910378B1 (en) System and method for issuing electronically accredited certificate using encrypted image
US20140254796A1 (en) Method and apparatus for generating and/or processing 2d barcode
CN106953732B (en) Key management system and method for chip card
CN105391713A (en) Biological-certificate-based identity authentication method
US20110296191A1 (en) Method for securely drawing up a virtual multiparty contract capable of being physically represented
CN104809490A (en) Card anti-counterfeiting system based on multidimensional code and authentication method based on card anti-counterfeiting system
US20200201978A1 (en) Method for electronic signing of a document by a plurality of signatories
CN100374966C (en) Method for storage and transport of an electronic certificate
KR100908100B1 (en) Encrypted image data with matryoshka structure and, system and method for mutual synchronization certificating using the same
WO2011005869A2 (en) Method and system for generating and using biometrically secured embedded tokens in documents
KR101062624B1 (en) IC tag system
CN103955664A (en) High-speed document scanner capable of safely decoding two-dimensional code of vehicle approval certificate and decoding method
JPH10135943A (en) Portable information storage medium, verification method and verification system
CN108400874B (en) Method for authenticating seal by using digital signature function of seal verification terminal
CN113486998A (en) Method for generating and verifying anti-counterfeiting mark of stamped file based on chip stamp
JP2000215280A (en) Identity certification system
KR101638787B1 (en) Mobile ticket security system and method of based location information and terminal unique number
EP3316162B1 (en) Method and system for creating an electronic signature of a document associated to a person by means of the voice print of the person, and corresponding method for verifying the electronic signature
JP4923388B2 (en) Content certification system
CN108322311B (en) Method and device for generating digital certificate
KR102138077B1 (en) System and method for preventing forgery and alteration of documents
CA2898587C (en) Digitised handwritten signature authentication
KR100720738B1 (en) A method for providing secrecy, authentication and integrity of information to RFID tag

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination