CN118350045A - Method, system, equipment and medium for manufacturing and verifying electronic seal document - Google Patents
Method, system, equipment and medium for manufacturing and verifying electronic seal document Download PDFInfo
- Publication number
- CN118350045A CN118350045A CN202410563781.9A CN202410563781A CN118350045A CN 118350045 A CN118350045 A CN 118350045A CN 202410563781 A CN202410563781 A CN 202410563781A CN 118350045 A CN118350045 A CN 118350045A
- Authority
- CN
- China
- Prior art keywords
- data
- stamping
- seal
- fingerprint
- picture
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 50
- 238000004519 manufacturing process Methods 0.000 title claims abstract description 10
- 230000004927 fusion Effects 0.000 claims abstract description 62
- 238000012545 processing Methods 0.000 claims abstract description 42
- 238000007639 printing Methods 0.000 claims description 53
- 238000004422 calculation algorithm Methods 0.000 claims description 42
- 230000015572 biosynthetic process Effects 0.000 claims description 31
- 238000003786 synthesis reaction Methods 0.000 claims description 31
- 230000008569 process Effects 0.000 claims description 17
- 230000006870 function Effects 0.000 claims description 16
- 238000003860 storage Methods 0.000 claims description 16
- 238000000605 extraction Methods 0.000 claims description 12
- 238000004364 calculation method Methods 0.000 claims description 7
- 238000012795 verification Methods 0.000 claims description 6
- 239000002131 composite material Substances 0.000 claims description 4
- 230000002194 synthesizing effect Effects 0.000 claims description 4
- 230000000717 retained effect Effects 0.000 claims description 2
- 238000004590 computer program Methods 0.000 description 11
- 238000004891 communication Methods 0.000 description 9
- 238000010586 diagram Methods 0.000 description 6
- 238000005516 engineering process Methods 0.000 description 6
- 238000007499 fusion processing Methods 0.000 description 6
- 230000008859 change Effects 0.000 description 5
- 230000003287 optical effect Effects 0.000 description 4
- 238000007781 pre-processing Methods 0.000 description 3
- 238000013475 authorization Methods 0.000 description 2
- 230000015556 catabolic process Effects 0.000 description 2
- 238000000354 decomposition reaction Methods 0.000 description 2
- 238000006731 degradation reaction Methods 0.000 description 2
- 238000007689 inspection Methods 0.000 description 2
- 230000003993 interaction Effects 0.000 description 2
- 230000000670 limiting effect Effects 0.000 description 2
- 238000013507 mapping Methods 0.000 description 2
- 239000000463 material Substances 0.000 description 2
- 238000007500 overflow downdraw method Methods 0.000 description 2
- 238000002360 preparation method Methods 0.000 description 2
- 238000003672 processing method Methods 0.000 description 2
- 231100000279 safety data Toxicity 0.000 description 2
- 230000003068 static effect Effects 0.000 description 2
- 238000013473 artificial intelligence Methods 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000010267 cellular communication Effects 0.000 description 1
- 230000001413 cellular effect Effects 0.000 description 1
- 238000012790 confirmation Methods 0.000 description 1
- 238000013075 data extraction Methods 0.000 description 1
- 238000013500 data storage Methods 0.000 description 1
- 230000003247 decreasing effect Effects 0.000 description 1
- 238000001514 detection method Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 239000000284 extract Substances 0.000 description 1
- 239000004973 liquid crystal related substance Substances 0.000 description 1
- 238000010801 machine learning Methods 0.000 description 1
- 238000007726 management method Methods 0.000 description 1
- 210000003205 muscle Anatomy 0.000 description 1
- 239000013307 optical fiber Substances 0.000 description 1
- 230000036961 partial effect Effects 0.000 description 1
- 230000002829 reductive effect Effects 0.000 description 1
- 230000008439 repair process Effects 0.000 description 1
- 150000003839 salts Chemical class 0.000 description 1
- 239000004065 semiconductor Substances 0.000 description 1
- 230000001953 sensory effect Effects 0.000 description 1
- 238000000926 separation method Methods 0.000 description 1
- 201000009032 substance abuse Diseases 0.000 description 1
- 238000001308 synthesis method Methods 0.000 description 1
- 230000000007 visual effect Effects 0.000 description 1
Landscapes
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The application provides a method for manufacturing and verifying an electronic seal document, which relates to the technical field of electronic information and comprises the steps of obtaining seal data, auxiliary data and business data, generating seal data in a ciphertext form, the auxiliary data and business data in a plaintext form, and performing fingerprint feature points of an original seal picture in the seal data to perform fingerprint processing of changing a fingerprint structure by adding or deleting fingerprint points to obtain a fake seal picture; steganography is carried out on the fake stamping picture by adopting the expanded data to generate steganography information, so as to generate stamping appearance; and carrying out data fusion and video fusion on the data such as the seal appearance, the expansion data and the like and the electronic file to obtain the synthesized electronic file. And the key information of the fingerprint picture is hidden by adopting the fake fingerprint picture, and the fake fingerprint picture is subjected to steganographic processing, so that the fingerprint collector is prevented from replacing or stealing the fingerprint data.
Description
Technical Field
The invention relates to the technical field of computer information, in particular to a method for fusing electronic seal and electronic file.
Background
Along with the development of informatization and dataization, the signature printing carrier is gradually changed from traditional paper to electronic equipment such as a handwriting board, an electronic screen and the like, and the signature mode is an electronic signature and electronic printing in an electronic data storage form besides the traditional paper pen writing signature. To ensure the authenticity of the recorded documents, all electronic documents must have digital signatures and be tamper proof, and also to ensure the authenticity of the interrogation record, the signature and fingerprint information of the principal is retained in the electronic record. The electronic signature seal can be used for standardizing electronic writing and electronic legal document production, the electronic writing and electronic legal document credible electronic signature and electronic seal in the remote information-carrying case-handling process are realized, meanwhile, the electronic writing and electronic document automatic digital filing after the electronic signature seal is convenient for detection case handling, the remote case handling closed-loop management is realized, the time and energy consumed by running on the way are effectively reduced, and the case handling efficiency is greatly improved.
The highest people court, the highest people inspection court and the public security department stipulate in the opinion about the problems related to the application of electronic signatures and electronic fingerprint printing in criminal lawsuits, the lawsuit participants have the same legal efficacy as the electronic signatures and the electronic fingerprint printing on paper legal documents, the application of the electronic signatures and the electronic fingerprint printing technology ensures the safety and the norm in a safety certification mode and the like, ensures the technical irreproducibility and the irrefalsification, and the authenticity and the legality of the electronic signatures and the electronic fingerprint printing are taken charge of by the manufacturing units of the electronic legal documents; when the authenticity of the electronic signature and the electronic fingerprint on the electronic legal document is required to be identified, the manufacturing unit or the storage unit of the electronic legal document should be matched, and an original data file and a system log of an information system are provided; the electronic signature, the original data file printed by the electronic fingerprint and the metadata thereof should be packaged to generate a file format which can not be changed, and can be stored and archived separately from the original system.
Application number 201710701420.6, entitled "a mobile terminal, a fingerprint image processing method thereof, and a storage medium", discloses a mobile terminal and a fingerprint image processing method thereof, wherein a fingerprint image obtained by a fingerprint sensor and a prestored adjustment image are subjected to exclusive-or processing one by one according to pixel positions to obtain an adjusted image and stored; and carrying out exclusive OR processing on the adjusted picture and a prestored adjusted picture to obtain a restored fingerprint picture, comparing the fingerprint information acquired by the fingerprint sensor with the actual fingerprint to determine whether the fingerprint acquired by the fingerprint sensor is correct or not, thereby facilitating the repair when the fingerprint function of the mobile terminal is in problem and improving the safety.
Application number 201310100245.7, name: an electronic file synthesis method and a device thereof are disclosed, which are characterized in that a source file and notes in the source file of an electronic file are obtained, and the source file and the notes are combined as two layers. The method can effectively ensure that the noted notes can be correctly displayed in the source file under any display condition, is convenient for displaying the electronic file in various display devices, and improves the readability of the electronic file.
Some of the operations performed on the print (fingerprint) picture in the prior art are sharpening to generate a more realistic fingerprint picture, and some are to hide fingerprint feature information to ensure the security of the print picture. In specific scenes such as electronic printing and electronic file synthesis, the printing pictures of the printing person are required to be displayed externally to prove approval of the printing person to the electronic file, and meanwhile, the printing pictures of the printing person are required to be ensured not to be captured or photographed by other people for other electronic files, so that the method of clearing and completely hiding fingerprint characteristic information cannot be used.
In the existing electronic seal and electronic file synthesis technology, since fingerprint information obtained by a living fingerprint collector is only static biological characteristics, an original electronic seal picture is all fingerprint data of a seal person, unlike the electronic signature and electronic file synthesis technology, dynamic writing characteristics are not displayed in the electronic signature picture, privacy of the seal person can be protected, the original electronic seal picture is directly used as a display appearance of a synthesized electronic file, and the risk of leakage of personal privacy information of the seal person exists.
Disclosure of Invention
In view of this, the present invention is directed to a method for easily revealing fingerprint data of a person in electronic seal, and there is a risk of revealing personal privacy information, and it is not guaranteed that seal pictures in specific scenes are not used on other electronic documents without permission.
Based on a first aspect of the present application, a method for manufacturing an electronic seal document is provided, wherein fingerprint is collected to obtain seal data, auxiliary data and business data, fingerprint feature points of the seal data are processed to obtain a pseudo seal picture, the seal data and the auxiliary data are encrypted and synthesized into expansion data, steganographic information is generated according to an original electronic file to be seal and the expansion data, and steganographic operation is performed on the pseudo seal picture to generate seal appearance; and carrying out data fusion on the electronic file to be printed and the printing appearance and the expansion data to generate a data fusion file so as to obtain the electronic printing document.
Further preferably, the obtaining the pseudo-seal picture includes performing blurring processing on the original seal picture to reduce details and definition of the image to obtain a blurred picture, performing fingerprint feature processing on fingerprint feature points of the original seal picture in fingerprints of the blurred picture, randomly adding or deleting fingerprint points near fingerprint patterns to change fingerprint structural feature data, retaining seal fingerprint shape feature data, obtaining a noise-back picture, sharpening the noise-back picture to increase edges and details of the image, and obtaining the pseudo-seal picture.
Further preferably, calculating a hash value of the fusion file, digitally signing the hash value by using an identification password algorithm, adding a time stamp to obtain a time stamp trusted electronic certificate, merging the time stamp trusted electronic certificate into the fusion file again to obtain a data fusion file, then carrying out video fusion on video data recorded in the whole process of stamping to obtain a final fusion file, and calculating a hash value uploading certificate center of the final fusion file.
Further preferably, a public-private key pair (pk, sk) for identifying a cryptographic algorithm is constructed by using an identity card number of a stamping person as a public key, a key K is constructed, the stamping data NY and auxiliary data FZ are encrypted by using the key K to obtain ciphertext values C NY and C FZ, then the key K is encrypted by using the public key pk to obtain ciphertext C K, the combination of the ciphertext values C NY and C FZ, the ciphertext C K and the service data set YW is recorded as expansion data KZ 1, steganographic information is generated according to an electronic file to be stamped and the expansion data KZ 1, and the pseudo-stamping picture WT is steganographically produced into a stamping appearance WG by the steganographic information.
Further preferably, the merging operation result obtained by merging the original electronic file, the stamping appearance WG and the expansion data KZ 1 is marked as M 1, and the electronic file end to be stamped is marked as M 2: combining M 1 and M 2 as an original text M, calculating a hash value h M of the original text M, digitally signing the hash value of M by using an SM9 identification cryptographic algorithm, adding a timestamp to obtain a signature value S 'M, and placing the signature value S' M between M 1 and M 2 to generate a fusion file
Further preferably, the data is fused and then video fusion is performed, a hash value of the video data in the whole recording and stamping process is calculated and recorded as the expansion data KZ 2, and thenThe merging operation result obtained by merging operation with KZ 2 is marked as M 1 ', the tail of the new file to be printed is marked as M ' 2,M1 ' and M ' 2 to be merged as M ', a hash value h M' of M ' is calculated, the hash value of M ' is digitally signed by using SM9 identification password algorithm, a timestamp is added to obtain a signature value S ' M', and the signature value S ' M' is placed between M 1 ' and M ' 2 to generate a fusion fileCalculation ofIs a hash value of (1)And upload the certificate authority.
Based on the second aspect of the application, a method for manufacturing and verifying an electronic seal document is provided, fingerprint is collected to obtain seal data, auxiliary data and service data, hash values of the seal data and the auxiliary data and plaintext of the service data are generated and put into a certificate storage center; processing fingerprint feature points of the stamping data to obtain a pseudo stamping picture, encrypting the stamping data and auxiliary data, synthesizing the stamping data and the auxiliary data into extension data, generating steganographic information according to the extension data, and performing steganographic operation on the pseudo stamping picture to generate stamping appearance; carrying out data fusion on the electronic file to be printed and the printing appearance and the expansion data, and then carrying out video fusion on the video data of the whole recording printing process to generate a synthetic electronic file; and (3) calculating the hash value of the synthesized electronic file, comparing the hash value with the hash value stored in the evidence storage center, and verifying the authenticity and the integrity of the right-falling printed electronic file.
Further preferably, the acquisition module acquires a stamping data set by data acquisitionAuxiliary data setService data setConstructing a hash function h with reasonable data length based on a password hash algorithm; calculating a corresponding hash value by utilizing a hash function h for each element in the printing data set and the auxiliary data set, and uploading the corresponding hash value to a certificate-storing center; the verification of the authenticity and the integrity of the seal electronic file comprises the steps of extracting the seal document to be authenticated, calculating a hash value of the synthesized electronic file, and storing the hash value and the corresponding fusion file in a certificate storage centerHash valueComparing to verify whether the synthesized electronic file to be authenticated is tampered or complete; decomposing a to-be-identified seal file calculation synthetic electronic file to obtain decrypted seal data, auxiliary data and service data, calculating a hash value according to the decrypted seal data and the auxiliary data, comparing the decrypted seal data with hash values h NY and h FZ stored in a certificate storage center, comparing the service data with a service data plaintext YW stored in the certificate storage center, and verifying whether the synthetic data is tampered or complete; and decrypting according to the stamping appearance to obtain stamping pictures, and carrying out fingerprint identification on the stamping pictures and the sample stamping pictures of the stamping person to verify whether the stamping operation is the stamping operation of the stamping person.
According to a third aspect of the present application, there is provided a system for making an electronic seal document, comprising: the fingerprint processing device comprises an acquisition module, a synthesis module and an extraction module, wherein the acquisition module acquires fingerprint to acquire the stamping data, auxiliary data and service data, generates stamping data, hash values of the auxiliary data and plaintext of the service data, puts the stamping data and the plaintext of the service data into a certificate storage center, processes fingerprint characteristic points of the stamping data to obtain a fake stamping picture, encrypts the stamping data and the auxiliary data and synthesizes the stamping data and the service data into expanded data; the synthesis module generates hidden information according to the expansion data, performs hidden operation on the fake stamping picture to generate stamping appearance, performs data fusion and video fusion on the electronic file to be stamped, the stamping appearance, the expansion data and the stamping whole-course video data to generate a synthetic electronic file, and calculates a hash value uploading and storing center of the synthetic electronic file; the extraction module calculates the hash value of the electronic file of the seal document to be verified and compares the hash value with the hash value stored in the certificate storage center, and verifies the authenticity and the integrity of the electronic seal document.
According to a fourth aspect of the present application, there is provided an electronic device comprising: a processor; and a memory storing a program, wherein the program comprises instructions that when executed by the processor cause the processor to perform a method according to the above.
According to a fifth aspect of the present application, a non-transitory computer readable storage medium storing computer instructions is presented, wherein the computer instructions are for causing the computer to perform the method according to any one of the above.
On the one hand, the fingerprint feature processing and the steganographic operation are carried out on the fingerprint image to generate the fingerprint appearance, if an external attacker copies, captures or turns over the fingerprint appearance to obtain a fake fingerprint image, the fake fingerprint image is used for the second time at other places, and the copying, capturing and turning over are sequentially enhanced from the aspect of the attack degree, namely the steganographic information is most lost after the turning over, even completely lost. However, since the fake printing picture and the original printing picture of the stamping person have certain differences in fingerprint characteristics, fingerprint identification cannot be performed, so that the piracy of the printing picture is prevented, and the safety of privacy information of the stamping person is ensured; on the other hand, the authority of the acquisition module, the synthesis module and the extraction module are separated, the acquisition module carries out safe preprocessing on the data to be synthesized so as to prevent the synthesis module from replacing or stealing the data to be synthesized, meanwhile, the preprocessing process of the acquisition module is incomplete, the synthesis module also needs to carry out steganographic preprocessing on the fake stamping picture, and the steganographic information contains an original electronic file and related information, so that the acquisition module can be prevented from replacing or stealing the data to be synthesized.
The invention can synthesize the stamping information of the stamping person into the electronic file to be stamped, simultaneously ensures the safety of the stamping picture, ensures the relevance, safety and authenticity of the fusion process from the inside and outside aspects of the system, meets the requirements of remote information, lawyer examination, electronic delivery, remote hearing, remote inquiry and other inspection service scenes, is beneficial to forming a reliable and effective electronic evidence chain, and provides a reliable evidence obtaining path for court confirmation of electronic stamping.
Drawings
Further details, features and advantages of the application are disclosed in the following description of exemplary embodiments with reference to the following drawings, in which:
FIG. 1 is a schematic diagram showing an electronic seal and electronic document fusion process in the present exemplary embodiment;
FIG. 2 is a diagram showing a file structure of electronic seal and electronic file data synthesis in the present exemplary embodiment;
Fig. 3 is a block diagram illustrating an exemplary electronic device that can be used to implement embodiments of the present application.
Detailed Description
Embodiments of the present application will be described in more detail below with reference to the accompanying drawings. While the application is susceptible of embodiment in the drawings, it is to be understood that the application may be embodied in various forms and should not be construed as limited to the embodiments set forth herein, but rather are provided to provide a more thorough and complete understanding of the application. It should be understood that the drawings and embodiments of the application are for illustration purposes only and are not intended to limit the scope of the present application.
It should be understood that the various steps recited in the method embodiments of the present application may be performed in a different order and/or performed in parallel. Furthermore, method embodiments may include additional steps and/or omit performing the illustrated steps. The scope of the application is not limited in this respect.
The term "including" and variations thereof as used herein are intended to be open-ended, i.e., including, but not limited to. The term "based on" is based at least in part on. The term "one embodiment" means "at least one embodiment"; the term "another embodiment" means "at least one additional embodiment"; the term "some embodiments" means "at least some embodiments. Related definitions of other terms will be given in the description below. It should be noted that the terms "first," "second," and the like herein are merely used for distinguishing between different devices, modules, or units and not for limiting the order or interdependence of the functions performed by such devices, modules, or units.
It should be noted that references to "one", "a plurality" and "a plurality" in this disclosure are intended to be illustrative rather than limiting, and those skilled in the art will appreciate that "one or more" is intended to be construed as "one or more" unless the context clearly indicates otherwise.
The names of messages or information interacted between the devices in the embodiments of the present application are for illustrative purposes only and are not intended to limit the scope of such messages or information.
In the existing electronic seal and electronic file synthesis technology, since fingerprint information obtained by a living fingerprint collector is only static biological characteristics, an original electronic seal picture is all fingerprint data of a seal person, and is different from an electronic signature and electronic file synthesis technology, dynamic writing characteristics cannot be displayed in the electronic signature picture, and therefore the original electronic seal picture is directly used as a display appearance of a synthesized electronic file, and the risk of leakage of personal privacy information of the seal person exists. According to the application, the original stamping picture is subjected to fingerprint feature processing and steganography operation to obtain the display appearance which is different from the original stamping picture to prevent an attacker from using the stamping picture of a stamping person, the fingerprint feature processing can ensure that the display stamping appearance has fingerprint shape features but does not contain complete fingerprint data, and fingerprint identification of the stamping person cannot be realized through the stamping appearance displayed on an electronic file; meanwhile, the prior synthesis technology has no safety measures in the processes of acquiring, processing, synthesizing and verifying the fingerprint of the stamping, and extracting the fingerprint, and has the risks of leaking the stamping information and possibly maliciously using the stamping picture by others in a plurality of links for verifying the authenticity and legitimacy of the file, so that the safety problem exists. The application collects, synthesizes and extracts the seal information respectively and independently, and carries out authority separation, and the real seal picture containing complete information is not used in each processing link, so as to solve the potential safety hazards that fingerprint data possibly exist in a plurality of links in the synthesis system are leaked and stolen for other purposes.
Fig. 1 is a schematic diagram of an electronic seal and electronic file fusion system in the present exemplary embodiment. The device comprises an acquisition module, a synthesis module and an extraction module.
The acquisition module acquires fingerprint of living body to obtain stamping data, auxiliary data and business data, and processes fingerprint characteristic points of the stamping data to obtain a fake stamping picture;
Generating hash values of the seal data and the auxiliary data and plain text of the service data, and placing the hash values and the plain text into a certificate storage center;
Encrypting the seal data and auxiliary data and synthesizing the service data in a plaintext form into extension data;
the synthesis module performs steganography operation on the fake stamping picture according to the expansion data to generate stamping appearance;
and carrying out data fusion on the to-be-stamped electronic file and the expanded data according to the stamping appearance, so as to obtain the data synthesis electronic file.
Meanwhile, in order to verify and store the identity of the stamping person, the video presentation of the stamping process is increased, the whole-process video recording is further carried out on the stamping process to obtain a recorded video file, the secondary video fusion is carried out on the data synthesis electronic file, the video data are fused into the synthesized electronic file generated after the data fusion, and the final stamping synthesis electronic file fused with the stamping and the video data is obtained.
Wherein, the processing of the fingerprint feature points comprises: one or more processing modes of blurring, liquefying, deforming, adding noise points, sharpening, stylizing, pixelizing and the like are adopted to obtain key data comprising the shape characteristics of the stamping fingerprint, but the fake stamping picture of the fingerprint structure is changed, the fake stamping picture keeps the key data of the stamping picture, but the fake stamping picture does not comprise complete stamping fingerprint information, the fake stamping picture is obviously different from the original fingerprint picture, for example, a fingerprint picture obtained from an electronic file by a person with a heart is difficult to impersonate as a fingerprint seal of the stamping person through a pattern matting or other modes, and the privacy of the stamping person and the abuse risk of the fingerprint are protected.
The steganography operation on the fake stamp image comprises the steps of generating steganographic data information according to the electronic file to be stamped and the expansion data, and adding steganographic data to the fake stamp image.
Wherein generating the hash value and encrypting may include:
Extracting the seal data and the auxiliary data, calculating hash values of the seal data and the auxiliary data, and uploading the two hash values and the service data to a certificate storage center.
The seal data and the auxiliary data are encrypted using a symmetric cryptographic algorithm (e.g., SM4 cryptographic algorithm), and the key of the symmetric cryptographic algorithm is encrypted using a public key that identifies the cryptographic algorithm (e.g., SM9 identification password).
The fake seal picture is obtained by conducting seal feature processing on the original seal picture in the seal data, wherein the seal feature processing comprises the steps of adding or deleting seal points of the seal picture to change the seal structure. If the degradation mapping operation (including one or more of blurring, liquefying, deforming, adding noise points, sharpening, stylizing, pixelizing and the like) is used, fingerprint feature processing is carried out on the right-falling print picture, and the fingerprint structure is changed by randomly adding or deleting fingerprint points on the fingerprint pattern and nearby the fingerprint pattern, so that the right-falling print picture has a certain degree of difference from the original right-falling print picture, and the optimal degree of difference is ensured to be between 30% and 50%.
And the synthesis module performs steganography operation on the fake printing picture. Generating a steganographic content according to the original electronic file to be stamped and the extension data, writing the steganographic content into the fake stamping picture to obtain a steganographic picture, and taking the steganographic picture as the stamping appearance, wherein the steganographic picture can be used for calculating hash values of the original electronic file and the extension data to be used as the steganographic content.
In the data fusion process of the fusion module, the original electronic file, the expanded data and the seal appearance are fused to obtain a fusion file, then, a hash value of the fusion file is digitally signed by using an identification password algorithm (such as SM9 identification password), a time stamp is added to obtain a time stamp trusted electronic certificate, and then, the time stamp trusted electronic certificate is fused into the first fusion file again to obtain the data fusion electronic file.
The first fusing operation is to fuse the stamping data and the related data generated during stamping into the electronic file, and the second fusing operation is to add a trusted timestamp electronic certificate to the electronic file so as to ensure timeliness of the synthesized electronic file. The synthesis operation refers to placing related data in reserved positions of electronic files according to different requirements of different electronic file formats.
And then, carrying out video fusion of a fusion module, wherein a hash value of video data in the whole recording and stamping process is used as new extension data, and the re-fusion operation is carried out on the basis of data fusion.
The extraction module performs data extraction and fingerprint identification operation on the fused electronic file, the synthesized electronic file is sent to the extraction module, the extraction module obtains seal data in ciphertext form, auxiliary data and service data in plaintext form, and the seal picture of the material is obtained through user authorization decryption and is compared with the seal picture of the sample to finish fingerprint identification.
It should be noted that the verification print identified herein is derived from encrypted fused print data, not from the appearance of the fingerprint.
The fingerprint display appearance is a fingerprint picture subjected to fingerprint feature processing and steganography, has a large difference from an original fingerprint picture, cannot pass fingerprint identification, and is also the purpose of fingerprint feature processing, so that fingerprint identification needs to be carried out by using encrypted and fused fingerprint data (the original fingerprint picture).
The cryptographic algorithm involved in the data fusion and the picture fusion is not limited, in order to adapt to domestic environment, the symmetric cryptographic algorithm adopts an SM4 cryptographic algorithm, the public key cryptographic algorithm adopts an SM9 identification cryptographic algorithm, and the hash function adopts an SM3 hash function.
The scheme of electronic stamping and fusing with electronic documents is further described in detail below by way of specific examples. The acquisition module mainly completes data acquisition and evidence storage, fake printing pictures and safety data generation, and the synthesis module completes steganographic appearance and data and video synthesis.
The electronic file signature printing person performs printing through the printing equipment, the data acquisition module obtains printing data NY, auxiliary data FZ and service data YW, calculates hash values of the printing data NY and the auxiliary data FZ and uploads the hash values and the service data YW to the certificate storage center. Wherein the printing data comprises relevant data of the printing fingerprint and personal information data of a printing person, the auxiliary data represents relevant data of printing equipment, and the service data comprises relevant data of printing events.
(1) The stamping person performs stamping on the electronic file by using stamping equipment, and the acquisition module acquires stamping data by performing data acquisitionAuxiliary dataService dataWherein v 1 represents the size of the seal data set, v 2 represents the size of the auxiliary data set, and v 3 represents the size of the service data set. Wherein, in the printing data set,Representing the original fingerprint data (i.e. the original print picture),Indicates the stamping time stamp.Data related to the stamping subject, such as a stamping person identification number; in the set of auxiliary data,Representing the type of signing device and,Indicates the right-falling printing device MAC address.Data related to the stamping device such as an IP address of the signing device,Representing the service number of the service,Representing the name of the service, a.i.,Data related to the object to be pressed, such as the electronic file name, is represented.
(2) A hash function h of reasonable data length is constructed based on a cryptographic hash algorithm, such as the SM3 hash algorithm.
As the hash function h used by the present model, an SM3 hash function is used when the SM3 hash algorithm is used.
(3) For each element in the data set NYCalculating a corresponding hash value using the hash function h:
Wherein, Representing elementsI= {1, …, v 1 }.
(4) For each element in the auxiliary data set FZCalculating a corresponding hash value using the hash function h:
Wherein, Representing elementsJ= {1, …, v 2 }.
Uploading the corresponding hash value to a certificate storage center for verifying the extracted seal data and auxiliary data when the problem of doubtful electronic files occurs afterwards.
(5) The business system uploads h NY、hFZ together with the business data to the certification authority.
And generating fake printing pictures and safety data.
The original print picture in the print data NY is subjected to fingerprint feature processing to newly add or delete fingerprint points and change the fingerprint structure so as to generate a fake print picture. For example, the original print image may be processed by blurring, noise, sharpening, or the like.
A secure encrypted key is constructed.
The service system constructs a secret key K of a cryptographic algorithm (such as SM4 cryptographic algorithm), and constructs a public-private key pair (pk, sk) for identifying the cryptographic algorithm by using the public key, for example, an identification card number of an available right-falling person is used as the public key to construct a public-private key pair (pk, sk) for identifying the cryptographic algorithm by SM 9. Then, the key K is used to encrypt the printing data NY and the auxiliary data FZ, thereby obtaining ciphertext C NY and C FZ. Then, the secret key K is encrypted by using the public key pk to obtain a ciphertext C K so as to ensure the security of the secret key K.
The fingerprint feature processing for the original fingerprint picture in the fingerprint data NY comprises the following steps: the new or deleted fingerprint points change the fingerprint structure to generate a fake fingerprint picture WT:
wherein W deal represents fingerprint feature processing, extracting fingerprint feature data in original fingerprint picture to form fingerprint data set, and processing the original fingerprint picture Fingerprint feature processingThe fingerprint characteristic data can be processed in a fuzzy, noise and sharpening mode or a combined mode so as to change the fingerprint structural characteristics to the greatest extent and keep the shape characteristics of the fingerprint.
The fingerprint feature processing flow is described below with specific examples:
The acquisition module acquires original fingerprint data through fingerprint acquisition, and adds or deletes partial fingerprint characteristic points in the original fingerprint data to obtain a fake stamping picture. In particular to the preparation method of the composite material,
For example, fingerprint feature processing can be performed on the fingerprint picture through degradation mapping operations such as blurring, noise, sharpening and the like, and the fingerprint structure is changed by randomly adding or deleting fingerprint points nearby the fingerprint patterns, so that the fingerprint shape is reserved to the maximum extent. The difference degree of the characteristic data of the fake printing picture and the original printing picture is generally ensured to be 30% -50%, so that the fingerprint information of the printing person can be effectively prevented from being leaked by the printing picture, or the printing picture can be abused and cannot be accurately identified.
Firstly, carrying out fuzzy processing such as Gaussian fuzzy, mean fuzzy and the like on an original right-falling printing picture, and obtaining a blurred picture by reducing the details and definition of the image; noise processing (such as Gaussian noise, spiced salt noise and the like) is carried out on the blurred picture, and the noisy picture is obtained by increasing or reducing random pixel values in the image; and sharpening the picture after noise (such as sharpening a Laplace filter and sharpening a Sobel filter), and sharpening the image by adding the edges and details of the image to obtain a pseudo-printing picture.
And designing a secret key K of the SM4 cryptographic algorithm, and then designing public-private key pairs (pk, sk) of the SM9 cryptographic algorithm by taking the identification card number of the right-falling printer as a public key.
For each element in the printing data set NY and the auxiliary data set FZ by using SM4 encryption algorithmAndThe encryption is performed such that the data is encrypted,
Resulting in ciphertext value sets C NY and C FZ:
Wherein, Is an elementThe calculated ciphertext is encrypted by SM4, i= {1, …, v 1 }.Is an elementThe calculated ciphertext is encrypted by SM4, j= {1, …, v 2 }.
The public key pk of the SM9 identification cryptographic algorithm is used for encrypting and storing the key K to obtain a ciphertext C K:
CK=ESM9(pk,K)。
The obtained ciphertext C K is used for encrypting and storing the symmetric key K, and then is synthesized into an electronic file together with other data.
And the synthesis module performs steganography operation on the fake stamp pictures and completes data synthesis of the electronic file and the stamp pictures.
The synthesis module generates steganographic information to steganographically generate a stamping appearance for the pseudo stamping picture, and in this embodiment, the steganographic information is the sum of the electronic file to be stamped and the KZ 1 of the expansion data 1. Then, data synthesis operation is carried out, the electronic file to be stamped (such as PDF, OFD, HTML format data), the stamping appearance and KZ 1 are marked as M 1 together, the tail 1 is marked as M 2, the original text 1"M is defined as the sum of M 1 and M 2, then, the hash value of M is calculated, the hash value is digitally signed, a timestamp is added after the digital signature, and the hash value of the electronic file is calculated and uploaded to a certificate storage center after data fusion is carried out again. In particular to the preparation method of the composite material,
(1) The sum of the ciphertext value sets C NY and C FZ, the ciphertext C K, and the service data set YW is denoted as "extended data 1" KZ 1,KZ1=CNY||CFZ||CK YW,
The provable electronic document stamp authenticity data is thereby fused into the electronic document.
Generating hidden information according to the electronic file to be printed and the expansion data 1, and carrying out hidden writing on the fake printing picture WT through the hidden information to generate a printing appearance WG, wherein WG=W watermark (WT). Wherein the steganographic information is the sum of the original electronic file and the "extension data 1" KZ1.
(2) The merging operation result obtained by merging the original electronic file, the stamping appearance WG and the expansion data KZ 1 (namely the I operation) is marked as M 1, and the tail 1 is marked as M 2:
M 1 = document to be printed wgkz 1,
M 2 = tail 1 of the file,
M 1 and M 2 are combined as "original M", and the hash value of M is calculated:
M=M1||M2。
hM=h(M)。
(4) Digitally signing the hash value h M of M using SM9 identity cryptography algorithm:
SM=SigSM9(sk,hM)
The digital signature value S M of the hash value h M (digital signature generation S M of h M using the private key sk of SM 9) is time stamped to obtain the signature value S' M, this time stamp being the national time service center time stamp.
(5) The business system puts the signature value S' M between M 1 and M 2 to obtain the final data fusion file
The video fusion process continues the fusion operation based on the data fusion process. The video fusion method is similar to the data fusion method, in the video fusion process, the hash value of the video data in the whole recording and stamping process is calculated and recorded as the expansion data KZ 2, and thenThe merging operation result obtained by merging operation with KZ 2 is marked as M 1 ', the tail of the new file to be printed is marked as M ' 2,M1 ' and M ' 2 to be merged as M ', a hash value h M' of M ' is calculated, the hash value of M ' is digitally signed by using SM9 identification password algorithm, a timestamp is added to obtain a signature value S ' M', and the signature value S ' M' is placed between M 1 ' and M ' 2 to generate a fusion fileCalculation ofIs a hash value of (1)And upload the certificate authority. And carrying out extraction verification operation on the synthesized electronic file in an extraction module, and ensuring the integrity and the safety of the electronic file synthesis flow through mutual verification of the synthesized electronic file and a verification center. When the authenticity of the electronic seal document is required to be verified, firstly, calculating a hash value according to the synthesized electronic file to be authenticated, and fusing the hash value with a corresponding fused file stored in a verification centerHash valueA comparison is made to verify whether the composite electronic document to be authenticated has been tampered with or is complete. Further, the synthesized electronic file is decomposed in the opposite direction according to the synthesis flow to obtain decrypted printing data NY, auxiliary data FZ and service data, the decrypted NY and FZ calculated hash values are compared with h NY and h FZ stored in the evidence storage center, and the service data is subjected to plaintext comparison with YW stored in the evidence storage center to verify whether the original synthesized data are tampered or not. At the same time, fingerprint identification operation can be performed on decrypted stamping data (i.e. stamping picture) NY and sample stamping pictures of stamping persons to verify whether the stamping operation is performed by the person.
Further, the system for fusing electronic seal and electronic file according to the present exemplary embodiment shown in fig. 1 is constructed, and includes an acquisition unit for acquiring seal data, auxiliary data, and service data, generating seal data in ciphertext form, auxiliary data, and service data in plaintext form, and performing fingerprint processing of changing fingerprint structure by adding or deleting fingerprint points in original seal image in seal data to obtain pseudo seal image; the synthesis module adopts extended data to generate hidden information to carry out hidden operation on the fake seal picture, generates seal appearance, and carries out data fusion and video fusion with data such as electronic files to obtain a synthesized electronic file; the extraction module acquires the seal data in the ciphertext form, the auxiliary data and the service data in the plaintext form through the synthesized electronic file, decrypts through user authorization, acquires the seal picture of the material, and compares the seal picture with the sample seal picture to finish fingerprint identification.
The method comprises the steps of performing blurring processing on an original right-falling printing picture to reduce details and definition of the image to obtain a blurred picture, obtaining a noise-processed picture by increasing or decreasing random pixel values in the image on the blurred picture, and sharpening the noise-processed picture to increase edges and details of the image to obtain a pseudo-right-falling printing picture; public-private key pairs (pk, sk) identifying cryptographic algorithms are designed using public keys, each element in the stamp data set NY and auxiliary data set FZ being encrypted using SM4 encryption algorithmAndEncrypting to obtain ciphertext value sets C NY and C FZ, and encrypting a key K of the SM4 encryption algorithm by using a public key pk of the identification encryption algorithm to obtain ciphertext C K; the ciphertext value sets C NY and C FZ, the ciphertext C K and the business data set YW are marked as 'expansion data KZ 1', the original electronic file and 'expansion data KZ 1' are combined to be steganographic information, and the steganographic information is used for steganographically generating the stamping appearance WG of the fake stamping picture WT.
The step of generating the synthetic electronic file by data fusion and video fusion comprises the steps of merging an original electronic file, a stamping appearance WG and expansion data KZ 1 to obtain a merging operation result, merging the merging operation result with the tail of the electronic file to be stamped as an original text M, calculating a hash value h M of the original text M, digitally signing the hash value of M by using an SM9 identification password algorithm, adding a timestamp to obtain a signature value S 'M, and placing the signature value S' M between M 1 and M 2 to generate the data fusion fileAfter data fusion, video fusion is carried out, a hash value of video data in the whole recording and stamping process is calculated and recorded as extension data KZ 2, and then a fusion file is obtainedCombining with KZ 2 to obtain a combination operation result M 1 ', combining M 1 ' with the tail of the right-stamped electronic file into M ', calculating a hash value h M' of M ', digitally signing the hash value of M ' by using SM9 identification password algorithm, adding a timestamp to obtain a signature value S ' M', and placing the signature value S ' M' between M 1 ' and M ' 2 to generate a video fusion fileCalculation ofIs a hash value of (1)And upload the certificate authority.
The exemplary embodiment of the application also provides an electronic device, including: at least one processor; and a memory communicatively coupled to the at least one processor. The memory stores a computer program executable by the at least one processor for causing the electronic device to perform a method according to an embodiment of the application when executed by the at least one processor.
The exemplary embodiments of the present application also provide a non-transitory computer readable storage medium storing a computer program, wherein the computer program, when executed by a processor of a computer, is for causing the computer to perform a method according to an embodiment of the present application.
The exemplary embodiments of the application also provide a computer program product comprising a computer program, wherein the computer program, when being executed by a processor of a computer, is for causing the computer to perform a method according to an embodiment of the application.
Referring to fig. 3, a block diagram of an electronic device 300 that may be a server or a client of the present application will now be described, which is an example of a hardware device that may be applied to aspects of the present application. Electronic devices are intended to represent various forms of digital electronic computer devices, such as laptops, desktops, workstations, personal digital assistants, servers, blade servers, mainframes, and other suitable computers. The electronic device may also represent various forms of mobile devices, such as personal digital processing, cellular telephones, smartphones, wearable devices, and other similar computing devices. The components shown herein, their connections and relationships, and their functions, are meant to be exemplary only, and are not meant to limit implementations of the applications described and/or claimed herein.
As shown in fig. 3, the electronic device 300 includes a computing unit 301 that can perform various suitable actions and processes according to a computer program stored in a Read Only Memory (ROM) 302 or a computer program loaded from a storage unit 308 into a Random Access Memory (RAM) 303. In the RAM 303, various programs and data required for the operation of the device 300 may also be stored. The computing unit 301, the ROM 302, and the RAM 303 are connected to each other by a bus 304. An input/output (I/O) interface 305 is also connected to bus 304.
Various components in the electronic device 300 are connected to the I/O interface 305, including: an input unit 306, an output unit 307, a storage unit 308, and a communication unit 309. The input unit 306 may be any type of device capable of inputting information to the electronic device 300, and the input unit 306 may receive input numeric or character information and generate key signal inputs related to user settings and/or function controls of the electronic device. The output unit 307 may be any type of device capable of presenting information and may include, but is not limited to, a display, speakers, video/audio output terminals, vibrators, and/or printers. Storage unit 308 may include, but is not limited to, magnetic disks, optical disks. The communication unit 309 allows the electronic device 300 to exchange information/data with other devices through a computer network, such as the internet, and/or various telecommunications networks, and may include, but is not limited to, modems, network cards, infrared communication devices, wireless communication transceivers and/or chipsets, such as bluetooth devices, wiFi devices, wiMax devices, cellular communication devices, and/or the like.
The computing unit 301 may be a variety of general and/or special purpose processing components having processing and computing capabilities. Some examples of computing unit 301 include, but are not limited to, a Central Processing Unit (CPU), a Graphics Processing Unit (GPU), various specialized Artificial Intelligence (AI) computing chips, various computing units running machine learning model algorithms, a Digital Signal Processor (DSP), and any suitable processor, controller, microcontroller, etc. The computing unit 301 performs the respective methods and processes described above. For example, in some embodiments, the reconstruction and decomposition of the muscle movement trajectories of the signature strokes as they are re-plotted from their original trajectories, the decomposition of their log velocity profiles, and the like may be implemented as a computer software program tangibly embodied on a machine-readable medium, such as the storage unit 308. In some embodiments, part or all of the computer program may be loaded and/or installed onto the electronic device 300 via the ROM 302 and/or the communication unit 309. In some embodiments, the computing unit 301 may be configured to perform the signature script dynamic acquisition implementation by any other suitable means (e.g., by means of firmware).
Program code for carrying out methods of the present application may be written in any combination of one or more programming languages. These program code may be provided to a processor or controller of a general purpose computer, special purpose computer, or other programmable data processing apparatus such that the program code, when executed by the processor or controller, causes the functions/operations specified in the flowchart and/or block diagram to be implemented. The program code may execute entirely on the machine, partly on the machine, as a stand-alone software package, partly on the machine and partly on a remote machine or entirely on the remote machine or server.
In the context of the present application, a machine-readable medium may be a tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. The machine-readable medium may be a machine-readable signal medium or a machine-readable storage medium. The machine-readable medium may include, but is not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any suitable combination of the foregoing. More specific examples of a machine-readable storage medium would include an electrical connection based on one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing.
As used herein, the terms "machine-readable medium" and "computer-readable medium" refer to any computer program product, apparatus, and/or device (e.g., magnetic discs, optical disks, memory, programmable Logic Devices (PLDs)) used to provide machine instructions and/or data to a programmable processor, including a machine-readable medium that receives machine instructions as a machine-readable signal. The term "machine-readable signal" refers to any signal used to provide machine instructions and/or data to a programmable processor.
To provide for interaction with a user, the systems and techniques described here can be implemented on a computer having: a display device (e.g., a CRT (cathode ray tube) or LCD (liquid crystal display) monitor) for displaying information to a user; and a keyboard and pointing device (e.g., a mouse or trackball) by which a user can provide input to the computer. Other kinds of devices may also be used to provide for interaction with a user; for example, feedback provided to the user may be any form of sensory feedback (e.g., visual feedback, auditory feedback, or tactile feedback); and input from the user may be received in any form, including acoustic input, speech input, or tactile input.
The systems and techniques described here can be implemented in a computing system that includes a background component (e.g., as a data server), or that includes a middleware component (e.g., an application server), or that includes a front-end component (e.g., a user computer having a graphical user interface or a web browser through which a user can interact with an implementation of the systems and techniques described here), or any combination of such background, middleware, or front-end components. The components of the system can be interconnected by any form or medium of digital data communication (e.g., a communication network). Examples of communication networks include: local Area Networks (LANs), wide Area Networks (WANs), and the internet.
The computer system may include a client and a server. The client and server are typically remote from each other and typically interact through a communication network. The relationship of client and server arises by virtue of computer programs running on the respective computers and having a client-server relationship to each other.
Claims (12)
1. The method for manufacturing the electronic seal document is characterized by comprising the steps of collecting fingerprints to obtain seal data, auxiliary data and business data, processing fingerprint characteristic points of the seal data to obtain a fake seal picture, encrypting the seal data and the auxiliary data to form expansion data, generating steganographic information according to an original electronic file to be seal and the expansion data, and performing steganographic operation on the fake seal picture to generate a seal appearance; and carrying out data fusion on the electronic file to be printed and the printing appearance and the expansion data to generate a data fusion file so as to obtain the electronic printing document.
2. The method of claim 1, wherein obtaining the pseudo-print picture comprises blurring the original print picture to reduce details and sharpness of the image to obtain a blurred picture, fingerprint feature processing is performed on fingerprint feature points of the original print picture in a fingerprint of the blurred picture, fingerprint feature data is changed by randomly adding or subtracting fingerprint points near fingerprint patterns and pattern patterns, shape feature data of the print fingerprint is retained, a noisy picture is obtained, sharpening processing is performed on the noisy picture to increase edges and details of the image, and the pseudo-print picture is obtained.
3. The method of claim 1, wherein a hash value of the fused file is calculated, the hash value is digitally signed using an identification cryptographic algorithm, a time stamp is added to obtain a time stamp trusted electronic certificate, the time stamp trusted electronic certificate is fused into the fused file again to obtain a data fused file, and the hash value of the fused file is calculated to upload the certificate authority.
4. A method according to any one of claims 1-3, characterized in that a public-private key pair (pk, sk) identifying a cryptographic algorithm is constructed using the identification card number of the stamping person as a public key, a key K is constructed, the stamping data NY, the auxiliary data FZ are encrypted using the key K to obtain ciphertext values C NY and C FZ, then the key K is encrypted using the public key pk to obtain ciphertext C K, the ciphertext values C NY and C FZ, the combination of ciphertext C K and the set of business data YW is recorded as extension data KZ 1, steganographic information is generated from the electronic file to be stamped and the extension data KZ 1, and the pseudo-stamping picture WT is steganographically generated by the steganographic information to form the stamping appearance WG.
5. The method of claim 4, wherein the merging operation results from merging the original electronic file, the stamping appearance WG and the expansion data KZ 1 are marked as M 1, the M 1 and the tail M 2 of the electronic file to be stamped are merged into an original text M, the hash value h M of the original text M is calculated, the hash value of M is digitally signed by using an SM9 identification cryptographic algorithm, a timestamp is added to obtain a signature value S 'M, and the signature value S' M is placed between M 1 and M 2 to generate the data fusion file
6. The method of any one of claims 1-3, 5, further comprising performing video fusion after data fusion, calculating a hash value of the video data of the full recording stamp process as the extension data KZ 2, and then fusing the data into a fileCombining with KZ 2 to obtain a combination operation result M 1 ', combining M 1' with a right-stamped electronic file tail M '2 to form M', calculating a hash value h M' of M ', digitally signing the hash value of M' by using SM9 identification password algorithm, adding a timestamp to obtain a signature value S 'M', and placing the signature value S' M' between M 1 'and M' 2 to generate a video fusion fileCalculation ofIs a hash value of (1)And upload the certificate authority.
7. The method for manufacturing and verifying the electronic seal document is characterized by collecting fingerprints to obtain seal data, auxiliary data and service data, generating seal data, hash values of the auxiliary data and plaintext of the service data, and placing the seal data, the auxiliary data and the plaintext into a certificate storage center; processing fingerprint feature points of the stamping data to obtain a pseudo stamping picture, encrypting the stamping data and auxiliary data, synthesizing the stamping data and the auxiliary data into extension data, generating steganographic information according to the extension data, and performing steganographic operation on the pseudo stamping picture to generate stamping appearance; carrying out data fusion on the electronic file to be printed and the printing appearance and the expansion data to generate a synthetic electronic file; and (3) calculating the hash value of the synthesized electronic file, comparing the hash value with the hash value stored in the evidence storage center, and verifying the authenticity and the integrity of the right-falling printed electronic file.
8. The method of claim 7, wherein the acquisition module performs data acquisition to obtain a stamping data setAuxiliary data setService data setConstructing a hash function h with reasonable data length based on a password hash algorithm; calculating a corresponding hash value by utilizing a hash function h for each element in the printing data set and the auxiliary data set, and uploading the corresponding hash value to a certificate-storing center; the verification of the authenticity and the integrity of the seal electronic file comprises the steps of extracting the seal document to be authenticated, calculating a hash value of the synthesized electronic file, and storing the hash value and the corresponding fusion file in a certificate storage centerHash valueComparing to verify whether the synthesized electronic file to be authenticated is tampered or complete; decomposing a to-be-identified seal file calculation synthetic electronic file to obtain decrypted seal data, auxiliary data and service data, calculating a hash value according to the decrypted seal data and the auxiliary data, comparing the decrypted seal data with hash values h NY and h FZ stored in a certificate storage center, comparing the service data with a service data plaintext YW stored in the certificate storage center, and verifying whether the synthetic data is tampered or complete; and decrypting according to the stamping appearance to obtain a stamping picture, and carrying out fingerprint identification on the stamping picture and a sample stamping picture of a stamping person to verify whether the stamping person is stamping.
9. A system for making and verifying an electronic seal document, comprising: the fingerprint processing device comprises an acquisition module, a synthesis module and an extraction module, wherein the acquisition module acquires fingerprint to acquire the stamping data, auxiliary data and service data, generates stamping data, hash values of the auxiliary data and plaintext of the service data, puts the stamping data and the plaintext of the service data into a certificate storage center, processes fingerprint characteristic points of the stamping data to obtain a fake stamping picture, encrypts the stamping data and the auxiliary data and synthesizes the stamping data and the service data into expanded data; the synthesis module generates hidden information according to the expansion data, performs hidden operation on the fake stamping picture to generate stamping appearance, performs data fusion and video fusion on the electronic file to be stamped, the stamping appearance, the expansion data and the stamping whole-course video data to generate a synthetic electronic file, and calculates a hash value uploading and storing center of the synthetic electronic file; the extraction module calculates the hash value of the electronic file of the seal document to be verified and compares the hash value with the hash value stored in the certificate storage center, and verifies the authenticity and the integrity of the electronic seal document.
10. The system of claim 9 wherein the generating the composite electronic file by data fusion and video fusion includes combining the original electronic file, the stamping appearance WG and the extension data KZ 1 to obtain a combined result, combining the combined result with the tail of the electronic file to be stamped as an original document M, calculating a hash value h M of the original document M, digitally signing the hash value M using an SM9 identification cryptographic algorithm, adding a timestamp to obtain a signature value S 'M, and placing the signature value S' M between M 1 and M 2 to generate the data fusion fileAfter data fusion, video fusion is carried out, a hash value of video data in the whole recording and stamping process is calculated and recorded as extension data KZ 2, and then a fusion file is obtainedCombining with KZ 2 to obtain a combination operation result M 1 ', combining M 1 ' with the tail of the right-stamped electronic file into M ', calculating a hash value h M' of M ', digitally signing the hash value of M ' by using SM9 identification password algorithm, adding a timestamp to obtain a signature value S ' M', and placing the signature value S ' M' between M 1 ' and M ' 2 to generate a video fusion fileCalculation ofIs a hash value of (1)And upload the certificate authority.
11. An electronic device, comprising: a processor; and a memory storing a program, wherein the program comprises instructions that when executed by the processor cause the processor to perform the method of any of claims 1-8.
12. A non-transitory computer readable storage medium storing computer instructions, wherein the computer instructions are for causing the computer to perform the method of any one of claims 1-8.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202410563781.9A CN118350045A (en) | 2024-05-08 | 2024-05-08 | Method, system, equipment and medium for manufacturing and verifying electronic seal document |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202410563781.9A CN118350045A (en) | 2024-05-08 | 2024-05-08 | Method, system, equipment and medium for manufacturing and verifying electronic seal document |
Publications (1)
Publication Number | Publication Date |
---|---|
CN118350045A true CN118350045A (en) | 2024-07-16 |
Family
ID=91815645
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202410563781.9A Pending CN118350045A (en) | 2024-05-08 | 2024-05-08 | Method, system, equipment and medium for manufacturing and verifying electronic seal document |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN118350045A (en) |
-
2024
- 2024-05-08 CN CN202410563781.9A patent/CN118350045A/en active Pending
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11323272B2 (en) | Electronic identification verification methods and systems with storage of certification records to a side chain | |
US9361509B2 (en) | Electronic signature authentication method and system | |
KR100878579B1 (en) | Watermarking Method, Watermark Validation Method, Watermarking Device and Watermark Validation Device | |
US8959357B2 (en) | Biometric encryption and key generation | |
CN106709963B (en) | The method and apparatus of the authentication image true and false | |
CN107209821A (en) | For the method and authentication method being digitally signed to e-file | |
Pramanik et al. | Signature image hiding in color image using steganography and cryptography based on digital signature concepts | |
WO2021169530A1 (en) | Method, apparatus and device for verifying authenticity of image data | |
CN105635187B (en) | Method and device for generating electronic file with stamp and method and device for authenticating electronic file with stamp | |
Yang et al. | Efficient Secure Data Provenance Scheme in Multimedia Outsourcing and Sharing. | |
CN116015945A (en) | Electronic file secure transmission method, system and medium based on electronic signature | |
CN116383793B (en) | Face data processing method, device, electronic equipment and computer readable medium | |
CN107665314B (en) | The trusted processes method and device signed on the electronic document | |
CN111177748A (en) | Fingerprint storage encryption method, device and system | |
Abrar et al. | Secure Image Authentication Using Watermarking and Blockchain. | |
CN108111311B (en) | Method for realizing bank counter electronic signature based on state cryptographic algorithm | |
CN114422266A (en) | IDaaS system based on dual verification mechanism | |
CN113826096A (en) | User authentication and signature apparatus and method using user biometric identification data | |
JPH11196392A (en) | Method for detecting falsification of electronic image and falsification detection system | |
Senkyire et al. | Validation of forensic crime scene images using watermarking and cryptographic blockchain | |
US10445561B2 (en) | Binding data to a person's identity | |
Ch et al. | ECDSA-based tamper detection in medical data using a watermarking technique | |
CN114338035B (en) | Mobile terminal PDF electronic signature method and system based on key collaborative signature | |
Abboud | Multifactor authentication for software protection | |
CN118350045A (en) | Method, system, equipment and medium for manufacturing and verifying electronic seal document |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |