CN1321507C - Soft certification anti-false method based on graphic code primary and secondary signet series information association mechanism - Google Patents

Soft certification anti-false method based on graphic code primary and secondary signet series information association mechanism Download PDF

Info

Publication number
CN1321507C
CN1321507C CNB200410022374XA CN200410022374A CN1321507C CN 1321507 C CN1321507 C CN 1321507C CN B200410022374X A CNB200410022374X A CN B200410022374XA CN 200410022374 A CN200410022374 A CN 200410022374A CN 1321507 C CN1321507 C CN 1321507C
Authority
CN
China
Prior art keywords
information
certificate
key
digital
checking
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CNB200410022374XA
Other languages
Chinese (zh)
Other versions
CN1570962A (en
Inventor
王晓京
万武南
宋春雨
刘旸
吴玲玲
孙宣东
曹晟
粟伟
张景中
杨路
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
CHENGDU INST OF COMPUTER APPLICATION CHINESE ACADEMY OF SCIENCES
Chengdu Institute of Computer Applications of CAS
Original Assignee
CHENGDU INST OF COMPUTER APPLICATION CHINESE ACADEMY OF SCIENCES
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by CHENGDU INST OF COMPUTER APPLICATION CHINESE ACADEMY OF SCIENCES filed Critical CHENGDU INST OF COMPUTER APPLICATION CHINESE ACADEMY OF SCIENCES
Priority to CNB200410022374XA priority Critical patent/CN1321507C/en
Publication of CN1570962A publication Critical patent/CN1570962A/en
Application granted granted Critical
Publication of CN1321507C publication Critical patent/CN1321507C/en
Anticipated expiration legal-status Critical
Expired - Fee Related legal-status Critical Current

Links

Images

Landscapes

  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The present invention relates to a soft certificate anti-counterfeiting method based on an information associating mechanism of a primary and secondary signet series with graphic codes. Knowledge-type privacy character information of a certificate holder is embedded in a primary and secondary signet series of a certificate, logic constraint relation exists between primary signet information and secondary signet information, and counterfeits and frauds can be stopped. The non-simulation capability of the certificate is decided by the logic result of cipher keys and the knowledge character information of a certificate holder, and does not relate to a technique or a device; thus, a technical regulation can be an open system; simultaneously, a complexity method of a high-cost physical device technology is replaced by a complexity method of a low-cost logic operation through the present invention, other technical modes for identification through human senses are replaced by an electronic information processing method, and verifying processes are not supported by a database, the Internet, etc. Thus, the certificate is accurately and strictly manufactured and verified, and the certificate has the advantages of convenience and low price.

Description

Soft anti-counterfeit method of credentials based on graphic code primary and secondary seal family associating information mechanism
Technical field
The present invention relates to the certificate false proof technology, particularly have the content information protection and the false proof method and the realization technology thereof of holder characteristic information of lawful bearer's soft certificate class, belong to electronic information technical field (computer technology).
Background technology
One, the meaning of soft certificate false proof and characteristics:
Certificate (license) be meant be protected by law and probative effect arranged all carry the print text form of information.Modern society be unable to do without certificate information, and certificate is divided into softly and hard ground two classes.The use of soft certificate class is more extensive at present, for example: soft (papery) authority of passport, driving license, title, the diploma, honor card, certification, operation card, pass, employee's card, student's identity card, degree's diploma, individual reference even file, Commercial goods labels, commercial paper, token, coin or the like acquire full legal force.Hard certificate comprises various IC-cards, magnetic card, portable electronic storage device etc., comprises such as license plate doorplate street board or the like in addition.Hard certificate is usually than soft certificate making cost height, and recognition cost height carries keeping and requires height, but more has superiority in the application of the hard certificate of some industry field.A kind of content information protection and false proof method and the technology of holder characteristic information that the present invention relates generally to soft certificate class realize means, and its method principle also is applicable to hard certificate, but its technology realizes that means are not at hard certificate.
Various soft certificate up to now all is easy to be forged, distorted, stolen, a little less than the authority of soft certificate and credit system were highly brittle, this threat to civil order was increasing.After 911 incidents, the anti-counterfeiting technology of certificate is subjected to the great attention of developed countries such as the U.S., Europe, Japan, U.S. government has alloted the anti-tamper security architectural study that a large amount of special funds are used for exit and entry certificates, and the false proof new technology research and development of many identifications plan is stepping up to implement.At home, the anti-pseudo problem of license certificate has also caused very big concern From government to private, and a kind of suggestion thinks that important soft certificate should adopt IC-card, for example student's identity card IC-card, driving license IC-card or the like.The main limitation of IC-card replacement scheme is: at first, have once the important soft certificate of big class and replace being not easy to using with IC-card or circulation (soft passport that integrates with as the diploma, academic card, title, reference, documentary evidence, bill, with foreign country or the like), also some presses the soft certificate of international practice or commercial criterion use at the current IC-card that adopts owing to the regulation reason is also impossible, and the soft certificate of this class often uses frequently, is false proof main hidden danger.Secondly, all obviously softer certificate height of the cost of manufacture of IC-card and recognizing apparatus cost, factor affected by environment is more, recognizing apparatus also is not easy to use in mobile environment.So the IC-card replacement scheme can only just have superiority in some specific application area and applied environment.Moreover; IC-card itself also has the problem of a logical method kernel; the protection of hard shell only being arranged and do not have inherent outstanding method for anti-counterfeit mechanism is dangerous equally; for example; how to take precautions against with computer and distort or forge the problem that IC-card has become information security, improve the technology kernel of IC-card and the use cost that security mechanism will inevitably improve IC-card again.So in some application development IC-card, the anti-counterfeiting technology that develops soft certificate in other applications is also imperative.Because subject role is still being played the part of in the circulation of soft certificate in the credit system of modern society; soft certificate information protection and use the demand that false proof The application of new technique scope will be boundless, current also very urgent, this for perfect the social credibility security system, the important meaning of the essence of maintaining social stability, safeguard national security.
The characteristics of soft certificate false proof technology: according to the character of certificate, soft certificate can be divided into two big classes: the soft certificate class (for example: file, Commercial goods labels, commercial paper, cost security, coin even diploma or the like) of " irrelevant with holder " and the soft certificate class (for example: passport, driving license, title, certification, employee's card, student's identity card, the pass, individual reference or the like) of " pointing out the lawful bearer ".At first, the soft certificate class of " pointing out the lawful bearer " needs to take precautions against " fastening one person's story upon another person " (lawful document is usurped by other people).Secondly, the anti-counterfeiting technology of the soft certificate class of " pointing out the lawful bearer " mainly is to provide the reliable way of distinguishing the certificate true and false towards certificate issuing organization or certifying organization, and emphasis solves authoritative validation problem; And the false proof of soft certificate class of " irrelevant with holder " generally is that the feasible solution of distinguishing the certificate true and false is provided towards the public, and emphasis will solve public's check problem.Moreover the soft certificate class of " irrelevant with holder " usually needs to take precautions against and illegally copies, and the false proof emphasis of the soft certificate class of " pointing out the lawful bearer " to be anti-usurping with false proof usurp, generally be to allow to the complete copy of lawful document content.This be because, the soft certificate class of pointing out the lawful bearer all contains the affirmation information of legal uses such as lawful bearer's feature description in the certificate content, the result of complete copy comprises these confirmations naturally, is difficult to act as fraudulent substitute for a person (as for the means of cliping and pasting and duplicating the certificate partial content being distorted, then belonging to the category of taking precautions against content tampering).At last, different with hard certificate, making is simple and easy usually, cost is low for soft certificate, and for example the soft certificate of papery is exactly modal a kind of.Therefore the anti-counterfeiting technology of soft certificate needs self corresponding characteristic, and this is cheap easy to use both to have required strictness to hope for success reliably, again.The present invention is primarily aimed at the soft certificate class of " pointing out the lawful bearer ", and its method for anti-counterfeit and technology thereof realize that means also are suitable for the soft certificate class of " irrelevant with holder ", but not necessarily.
Two, the soft certificate false proof state of the art:
Soft certificate false proof means commonly used mainly contain following a few class or the wherein combination of several classes:
1, adds a cover mimeograph official seal or steel seal on the certificate
The physical means that----is traditional
2, paste photo or fingerprint pattern on the certificate
The physiological characteristic means that----is traditional
3, the certificate medium adopts printed matter that shading is arranged or laser anti-false sign etc.
The physical means that----is complicated
4, print additional accession designation number or bar code on the certificate for inquiry
----electronic information technology means (its prerequisite: need set up complete searching database and network system in advance, need continuous maintaining network database afterwards)
In above-mentioned means, to physical means and physiological characteristic means, the adulterator utilizes the imitative photograph that engraves an official seal, exchanges cards containing all personal details and become sworn brothers of modern high technology manufacturing technology, imitated certificate material, reaches the purpose of forging and distorting easily, and the risk of forgery is more and more littler with the ratio of profit; And the verifier more and more is difficult to distinguish effectively the true and false of certificate with naked eyes or optical device, and the leak and the cost of strick precaution are increasing.In addition, the cost of manufacture of physical technologies such as laser mark or end literary composition special material is higher, and discerning the false from the genuine depends on sense organ or depend on degree of approximation nuance relatively, is not easy to the public accurately judge, does not play effect widely at present on certificate false proof as yet; And, if the information that the physical technology material comprises is disclosed (can allow the public differentiate), just can utilize high-tech to copy in principle sooner or later, false proof risk can be increasing, if the information that the physical technology material comprises is hidden, there are how effectively checking and the problem of how to authorize legal identifier again.Above-mentioned physical means and physiological characteristic means, realize the result with regard to its technology, the final sense organ that mostly also will sum up in the point that main dependence people or mentality participate in the true and false and distinguish, and can not mainly lean on the errorless ability of machine to replace subjective attentiveness to verify, this also is noticeable place.Means for number of registration inquiry or networking data library searching, subject matter is: set up and safeguard that cost height, the verification efficiency of huge network database system are low, big to the dependence of infrastructure and territorial environment, big to the ageing dependence of collaborative work in many ways, checking is implemented in (on aircraft) inconvenience in mobile environment, and database technology safety and remote access technology safety itself are exactly a long-term problem to be studied.False proof for bar code, divide bar code and two-dimensional bar code.The information amount of carrying of bar code self is very little, only plays the effect of searching classification symbol, must connect database or on-line on-host retrieval, causes various operation possibilities and safety issue thus naturally; Two-dimensional bar code self can carry bigger amount of information, and certain information screen effect is arranged (because of its information that comprises can not with the naked eye directly be found out, it has been generally acknowledged that it has anti-fake effect), but directly the method for printing two-dimensional bar code can not play strong anti-fake effect naturally on certificate, the way that relies on task equipment at present or adopt non-public technology to print two-dimensional bar code also is worthless, this be because: two-dimensional bar code needs to be generalized to the every profession and trade popularization and application sooner or later, its technical standard also should be disclosed, and the idea that country or mechanism monopolize certain two-dimensional bar code printed apparatus is unpractical, uneconomic.So directly printed bar code and the secret soft certificate false proof mechanism of making bar code all be still far from perfect, very lack of standardization, the effect potentiality of two-dimensional bar are not fully exerted yet.At last, as common problem, above-mentioned various existing method for anti-counterfeit technology are for usurping certificate this outstanding problem high safety measure targetedly not still of " fastening one person's story upon another person ".
The false proof of soft certificate class of pointing out the lawful bearer is the focus that current social is paid close attention to, and whether it also needs effectively to check the holder of certificate legal except will taking precautions against content tampering and forgery false evidence, prevents from illegally to act as fraudulent substitute for a person.
Prevent that the basic skills of acting as fraudulent substitute for a person from being to print lawful bearer's characteristic information on certificate, existing soft certificate is that the social property characteristic information of holder and biological attribute characteristic information are printed on the certificate.The social property characteristic information has: name, educational background and occupation, birthplace, affiliated area under one's jurisdiction or unit, post or the like; The biological attribute characteristic information has: age, height, race, blood group, photo or digital photos information, dna characteristics information, iris feature information, fingerprint graph, palm type information, skin mottling characteristic information, other physiological characteristic and biological information or the like.Social property characteristic information and part biological characteristic information (age, height, race, blood group etc.) in most cases do not have uniqueness, and owing to these features are that disclosed information has imitability already, are easy to forge or distort; The portrait photo need tell truth from falsehood with naked eyes, and the imitation of high-tech cosmetic in recent years means make that this class biological attribute characteristic information is more and more dangerous; Dna characteristics information, iris feature information etc. are unchangeable desirable personal characteristics, but the extractive technique of this biological information and comparison authentication technique depend on the expensive complex device and the maturity of technology thereof, and need the biological information amount of record also very big, be not easy to expression and record on paper document, its false proof cost is considerably beyond the cost of soft certificate self, and it is more valuable that this biological information carries big appointment with hard certificates such as IC-cards.
Concerning soft certificate, no matter be the method for record social property characteristic information and nature (biology) attributive character information, still write down the method for individual further feature information, all have three key issues to need to solve:<1〉be forged owing to distorting easily with the characteristic information of writing record on paper, adopt the problem of which kind of way record lawful bearer's characteristic information during accreditation;<2〉when checking, how to stablize and the problem of gathering the identity verification in driving license characteristic information exactly when participating in the cintest;<3〉when checking, how reliably objective and judge the problem that lawful bearer's feature that identity verification in driving license feature and soft certificate write down is whether identical easily.
In sum, the progress with rapid changepl. never-ending changes and improvements with respect to modern information technologies, the information anti-fake technology of existing soft certificate obviously lags behind, leak is bigger, causes soft certificate to distort forgery and uses the activity of other people soft certificate rampant unusually with illegal, and this is just threatening modern society's credit system and sincere safety.How to guarantee technically the certificate content legitimacy (comprising: guarantee the integrality of its content--anti-tamper; Guarantee the authenticity and the authority-anti-counterfeiting of its content), the technology decidability of the legitimacy used of certificate (anti-usurp, anti-fastening one person's story upon another person) and legitimacy, this remains the three big basic problems that do not have fine solution in the soft certificate false proof technology.
Summary of the invention
The present invention is directed to the soft certificate class of " pointing out the lawful bearer ", and at the protection and the decision technology problem of soft certificate information legitimacy, at following soft certificate making and the verification method that has proposed a kind of based on graphic code primary and secondary seal family associating information mechanism.The purpose of this invention is to provide a kind of implementation cost low, implement convenient, can effectively take precautions against the soft anti-counterfeit method of credentials that (three is anti-) distorted, is forged, acted as fraudulent substitute for a person to soft certificate.
The present invention is achieved in that
The accreditation aspect drives computer by application software and prints the certificate content, is printed with three kinds of information on the certificate: certificate public information, certificate hidden information and authorization information.Also be printed with three kinds of graphic codes representing these three kinds of information respectively (following branch have another name called these three kinds of graphic codes be digital female chapter, digital signet, digital sub-chapter) on the certificate simultaneously.Graphic code is a kind of information symbol expression-form for machine recognition, and its effect is the information that provides on the quick scanning collection certificate of recognizing apparatus.The size of the amount of information of representing according to actual needs on the certificate, graphic code can specifically adopt the machine recognition sign of different performance, particularly adopt two-dimensional bar.(referring to Fig. 1 and Fig. 2)
The checking aspect, the graphic code recognizer of application software is equipped with in utilization, three kinds of information that graphic code primary and secondary seal family on the scanning certificate is contained, and the code value of three kinds of information of gathering deciphered with logical operation check, judge thus whether the certificate content is distorted or forged, utilize the certificate hidden information to judge whether identity verification in driving license is the lawful bearer of certificate in addition.(referring to Fig. 3 and Fig. 4)
The basic fundamental equipment that the present invention will utilize is: common PC computer, common printing device, graphic code recognizer.(the graphic code recognizer is connect by graphic code scanner and graphic code message handler and forms, can provide special product by equipment vendors, wherein the graphic code message handler also can or have the universal products such as mobile phone of data processing function to replace by palm PDA or computer or programmable calculator.)
Method step of the present invention is as follows:
(1) owner that awards a certificate sets encryption key Kp and decruption key Kv and corresponding information encryption mode EF and decrypts information mode DF, and uses encryption key mandate accreditation carrier is secret, and decruption key authority checking actuator is used for checking,
(2) the accreditation carrier consists of certificate intrinsic information AB with certificate content public information A and holder privacy feature information B input computer; Utilize hash function method and computer program HF thereof that information A B is carried out the operation of information extraction summary; Obtain integral credentials characteristic information C; The encryption key Kp that recycling is authorized is encrypted to information C ' to information C according to set cipher mode EF; In addition; Also utilize the encryption key Kp that authorizes according to set cipher mode EF holder privacy feature information B to be encrypted to information B '
(3) with graphic code generator GCP certificate public information A is generated graphic code and----digital female chapter, information B ' is generated graphic code and----digital signet, information C ' is generated the digital sub-chapter of graphic code----, all graphic codes that generate are referred to as primary and secondary seal family, then certificate public information A is printed in the lump or is printed on the certificate together with graphic code primary and secondary seal family, finish accreditation
When (4) verifying, checking actuator is reduced to routine information standard or binary code standard with the digital primary and secondary seal family information on the graphic code recognizer scanning certificate, the graphic code information standard with collection on the graphic code recognizer, obtain digital female chapter information A, digital signet information B ' and digital sub-chapter information C ' respectively, display message A supplies to read then, and contrasts the content of text that is printed on the certificate, if the two is inequality, then judge the certificate content invalid, otherwise, enter next step
(5) on the graphic code recognizer, deciphering obtains information C and code value code1 thereof to information C ' to utilize the digital sub-chapter decruption key Kv of mandate and set manner of decryption DF; Utilize the digital signet decruption key Kv that authorizes digital signet information B ' deciphering to be obtained information B by set manner of decryption DF, information A and information B are merged into information A B, utilize with hash function method identical described in (2) and computer program HF thereof information A B is carried out operation of information extraction summary or information extraction characteristic manipulation, obtain check information R and code value code2 thereof, compare code value code1 and code value code2 or comparison information C and information R, if the two equates, judge that then the certificate content is effective, otherwise judge the certificate content invalid.
Said method also can have following feature:
Checking actuator checks by the following method whether identity verification in driving license is the lawful bearer: according to described in the above-mentioned steps (5) digital signet decryption method being obtained holder privacy feature information B, information B is presented on the graphic code recognizer and identity verification in driving license is maintained secrecy, checking actuator puts question to identity verification in driving license according to the holder privacy feature information that shows, the rate of correcting errors of answering a question according to identity verification in driving license, judge whether it is the lawful bearer, include at digital signet under the situation of holder biological information, checking actuator gathers corresponding biological characteristics such as the fingerprint of identity verification in driving license or handwritten signature when participating in the cintest, and with the graphic code recognizer on the biological information contrast that shows, judge according to similarity degree whether it is the lawful bearer.
The owner that awards a certificate utilizes decruption key to check whether the accreditation carrier observes the existing plan accreditation, method is as follows: randomly draw a collection of certificate that completes, according to above-mentioned steps (4) and (5) it is verified, if it is effective to be verified part, judge that then the accreditation process meets technical specification, otherwise judge defective.The owner that awards a certificate utilizes one by the qualified certificate of encryption key making, come procuratorial work checking actuator whether to abide by standard and carry out checking with the decruption key of authorizing, method is as follows: selected arbitrarily qualified certificate is verified according to above-mentioned steps (4) and (5), if be verified part by checking, then the operating process of decision verification actuator meets set technical specification, otherwise, the violation operation of decision verification actuator, be accused of the cheating.
Encryption and decryption key K p, Kv that the people that awards a certificate described in the above-mentioned steps (1) formulates comprise digital sub-chapter encryption and decryption key K p 1, Kv 1With digital signet encryption and decryption key K p 2, Kv 2Two cover keys.
Key described in the above-mentioned steps (1) is given and accepted and used the following situation of dividing: if adopt the asymmetric private key cryptographic system, the key of then giving and accepting is maintained secrecy without exception to the extraneous of user; If employing public-key cryptosystem, the encryption key Kp and the decruption key Kv that then give and accept are different, encryption key is only authorized and is used for accreditation, to checking actuator and extraneous secret without exception, decruption key is then only authorized and is used for checking, in principle the accreditation people and the external world are also maintained secrecy, but to special certificate class exception can be arranged: digital hereat signet decruption key can be authorized the holder keeping, and, submit to certifying organization to use by identity verification in driving license during checking to maintaining secrecy beyond the holder temporarily, if the key that identity verification in driving license is submitted to can not effectively be deciphered, then determine that it is illegal holder, in addition, can't the trust authentication man-hour when holder, can refuse to submit to key.
The key of licensing except the owner that awards a certificate in the above-mentioned steps (1) relate to maintain secrecy, the method of accreditation and checking and technological system adopt open: i.e. the blanking method that accreditation and checking are related and the technical equipment standard of techniqueflow and employing all can be disclosed, and the concrete cipher mode EF and the manner of decryption DF of employing also can be disclosed.
Above-mentioned steps places such as (2) described holder privacy feature information is that holder is known and some facts or knowledge collection that other most people do not know, in the case of necessary, also the finger print image of holder, iris image, face mutually personal biology characteristics information such as image, palm type feature image, handwritten signature image be included in the holder privacy feature information.
Graphic code described in the above-mentioned steps (3) is meant that machine recognition printable or that be printed on the soft certificate identifies, comprise machine-readable character string, machine-readable character array, bar code, two-dimensional matrix code, two-dimensional bar or the like, difference according to the size of the contained amount of information of concrete certificate classification, employing has the graphic code of the machine recognition sign of appropriate information capacity and recognition speed as indication of the present invention, particularly adopts two-dimensional bar.
Threes such as the digital female chapter in the digital primary and secondary seal family described in the above-mentioned steps (3), digital sub-Zhanghe numeral signet can separately print or be printed on the different blank positions of certificate as required, also can be any both together or the three print together or be printed on the blank position of certificate, promptly digital primary and secondary seal family is at the formal partable of outward appearance.
Principle of the present invention:
Being difficult to mimetism and being easy to the basis that distinctive is a certificate false proof of certificate, the present invention is directed to soft certificate class false proof of " pointing out the lawful bearer ", the method that proposes is to make soft certificate and lawful bearer's thereof feature have the mimetism of being difficult to and be easy to distinctive, and the principle and the anti-fraud system of invention are as follows:
1. the information that is printed on the paper document is easy to be distorted and forge, and but is not easy to differentiate.The basic skills that the present invention addresses this problem is: with the intrinsic information (comprising certificate general information, lawful bearer's characteristic information, the certificate false proof information of appending or certificate hidden information) on the associating information mechanism protection certificate; make the expression making result of certificate intrinsic information have the mimetism of being difficult to and be easy to the property verified, and verify in view of the above whether soft certificate content information is distorted or forged.
At first, extract " the comprehensive characteristics summary " of intrinsic information on the certificate with a kind of functional transformation, promptly when making certificate, the code value conversion (mapping) of all indentations information of input computer is become a kind of shorter and smaller message code value by a kind of functional transformation, be used for checking, be called the integral credentials characteristic information, below be also referred to as authorization information.In other words, the present invention sets up strict logic association by a kind of functional relation between certificate original information code value and authorization information code value, the foundation of logic association relation and checking all can realize by the electronic information compute mode between the message code value.The Mathematical Modeling of this functional relation then adopts hash function and a kind of combination of encryption and decryption function of any maturation in the contemporary cryptographic technique according to the contemporary cryptology principle, this is a kind of secret parameter complicated function of (being called key) that has, utilize secret parameter (key) to be easy to set up and verify this specific relation, do not have secret parameter (key) then to be difficult to decode or set up this set relation.So the present invention makes the expression of results of all intrinsic informations of certificate have the mimetism of being difficult to said method and is easy to the property verified, the method mechanism that this promptly makes about certificate false proof; To any distorting of certificate intrinsic information content, can make all that the internal logical relationship between the intrinsic information code value and authorization information code value produces contradiction and check easily on the certificate, this is promptly about the anti-tamper method mechanism of certificate.
Set up and verify further part and the accompanying drawing of the specific implementation method of logic association relation between the above-mentioned information at this specification
1, accompanying drawing 2 etc. is further specified.
2. according to the method described above, the result that the certificate intrinsic information make to be expressed has the mimetism of being difficult to and is easy to the property verified and thisly is difficult to mimetism and is easy to the property verified fully by cipher controlled, the uniqueness of each certificate or uniqueness are also decided by the logical consequence of key and certificate intrinsic information code value fully, and irrelevant with the concrete technical equipment that realizes certificate making.Therefore, accreditation of the present invention and verification method and technology thereof realize adopting opening system: except key and holder privacy feature information are underground, all technology and equipment standards that relate to are all disclosed, farthest to make things convenient for engineering construction (be convenient to select the equipment supplier, be convenient to application implementation popularization or the like), and the outsider is not owing to there being key, even if utilize disclosed technical step and equipment electricity to be difficult to forge, to distort and abuse other people certificate.
The present invention is the final support of the key of accreditation and checking usefulness as soft certificate false proof reliability, the safety guarantee that the give and accept relation of key is implemented as soft certificate false proof: key is set by owner (certificate issuer or mechanism), wherein the encryption key of accreditation is authorized the secret use of accreditation person (accreditation carrier) by the owner, and the decruption key of checking is used by owner authority checking person (checking executable unit).The give and accept relation of key constitutes actual trust and on commission relation: owner (certificate issuer or unit) is that trustee, accreditation person and verifier are the mandatories.The owner only need set key, propose certificate content and safety requirements requirement, authorize accreditation executable unit and checking executable unit to put into practice by disclosed technical standard it get final product, and the concrete technical know-how scheme that the owner can stay out of certificate false proof enforcement can guarantee fail safe too.In addition, whether the owner only need meet designing technique standard (because lawful document is strict corresponding with the logical relation of authorization key, is had the mimetism of being difficult to, be difficult to coincidence by the graphic code primary and secondary seal family of key and the generation of public technology standard) with the soft certificate that set key just can close inspection goes out to commission by qualified Authentication devices; In like manner, the owner only need just can close inspection go out to entrust the Authentication devices making and use and software thereof whether to meet designing technique standard and proper use the whether with a soft certificate that makes by standard.Like this, even if not understanding or do not participate in concrete technical process monitoring, the owner also is easy to hold reliability and the fail safe that soft certificate false proof is implemented.
3. the characteristic information of printing the lawful bearer on certificate is common false proof way, " social property characteristic information " and " biological attribute characteristic information " that the present invention remedies holder in the common certificate information with " the privacy knowledge characteristic information " of holder is in false proof operational deficiency (referring to the background technology part), make lawful bearer's feature have the mimetism of being difficult to and be easy to distinctive, be convenient to take precautions against " acting as fraudulent substitute for a person ":
The lawful bearer's that the present invention prints on soft certificate characteristic information comprises two parts: holder feature public information and holder feature privacy information.Holder feature public information is used for certificate commonly uses and verifies that holder feature privacy information then is used for strict check certificate and whether " is fastened one person's story upon another person " by other people.Holder feature public information is made of information such as the social property feature of holder and biological attribute features, can directly be printed on the soft certificate, for example can select to print: name, educational background and necessary informations such as occupation, birthplace, age, height, race, blood group, photo or digital photos information, also can select inessential information such as dna characteristics information, fingerprint characteristic, palm type, skin mottling feature, iris feature information, other physiological characteristic and biological characteristic.Information such as the fact that holder feature privacy information is then known with holder and knowledge serve as that the basis constitutes, these true and knowledge be beyond the holder most people uncomprehending, be called holder privacy knowledge characteristic information, it can be selected: certain family member's name, my special hobby, mother tongue and growth dialect system zone, honor or necessary informations such as delinquent account, personal question and answer, password, in addition, also can select fingerprint or this class biological information of digital photo replenishing of holder as holder feature privacy information.The present invention protects (form that makes it to become a kind of cipher symbol string that can not direct reading) with lawful bearer's feature privacy information with encrypted form, usurps certificate to prevent other people.
Some knowledge and the fact that people knows almost can not moved all the life, if these knowledge or true except that me, almost seldom have other people to know or be difficult to and understood by other people, also have the mimetism of being difficult to and be easy to distinctive as the holder characteristic information with these knowledge or the fact so, and it is more much smaller than the amount of information of biological characteristics such as iris, DNA, information is differentiated more certain, be more convenient for soft certificate record and checking.
The specific implementation method of anti-" acting as fraudulent substitute for a person " checking is further specified at the further part of this specification.
So 4, aspect certificate making, the intrinsic content information of soft certificate is defined as three partly:<1〉certificate content public information (comprises: certificate text message, Production Time and serial number information, certificate formal qualification information, holder feature public information, be the social property information and the biological attribute information of holder), for direct reading.Certificate content public information is directly printed or is printed on the soft certificate.<2〉holder privacy feature information, a kind of symbol string form that its code value becomes after encrypting, and print or be printed on the soft certificate with the form of graphic code.Ciphering process has cipher controlled, has only and utilizes the encryption key of authorizing could generate this set certificate hidden information, also has only and utilizes the decruption key of authorizing could understand this certificate hidden information.<3〉authorization information, promptly certificate content public information with holder privacy feature information combines and a kind of short and small symbol string that is converted into through " functional transformation " described in 1., it is an authorization information, and it is printed or be printed on the soft certificate with the form of graphic code.The effect of authorization information is protection and check certificate integrality, authenticity for information about, with anti-tamper, anti-counterfeiting, and plays the effect that reduces checking computing expense.
The detailed implementation process that generates three partial informations is further specified at the further part of this specification and accompanying drawing 1, accompanying drawing 2 etc.
5, during accreditation, make several additional graphic codes on certificate, in order to represent above-mentioned three kinds of certificate informations: the graphic code of expression certificate content public information is called digital female chapter; The graphic code of expression holder privacy feature information is called digital signet; The graphic code of expression integral credentials characteristic information (authorization information) is called digital sub-chapter, is referred to as the graphic code primary and secondary seal family of certificate.In appearance, female chapter, sub-Zhanghe signet can be represented with the graphic code on three diverse locations respectively, also can represent wherein two or three chapters simultaneously, no matter exterior case how, represents that the graphic code of three kinds of information is referred to as graphic code primary and secondary seal family with a bigger graphic code.
Different keys will generate different authorization informations with different certificate text, and digital sub-chapter is also just different, so adopt different keys to make that the logic corresponding relation between the graphic code primary and secondary seal is also different fully.Form a kind of soft certificate logic anti-counterfeit mechanism that retrains mutually by several respects information such as the open print What of certificate, graphic code primary and secondary seal family, holder privacy knowledge features thus.
The detailed process that generates graphic code primary and secondary seal family has into explanation at the further part of this specification and accompanying drawing 1, accompanying drawing 2 etc.
6, aspect checking, the decision criteria of certificate legitimacy is defined as: whether each component units of certificate information satisfies the set restriction relation of certificate mechanism, and whether " the code value grammer " of promptly expressing certificate information meets the logic rules of agreement.The Mathematical Modeling concrete form in the present invention of this logical constraint relation (or treaty rule) is exactly the functional transformation described in 1., the secret parameter of functional transformation (key) determines the key factor of this restriction relation just, the key difference, the restriction relation that produces is just different, key is in case specify, logical constraint relation between each component units of certificate information just has been determined, and the technical finesse process of checking is also determined thereupon.
The present invention is aforementioned certificate public information, holder privacy feature information, authorization information three main component units as certificate information.During checking, verifier (certifying organization) is by the graphic code primary and secondary seal family on the graphic code recognizer scanning certificate, gather the certificate information of these three component units, the decruption key of utilize authorizing, the mode by the electronic information computing, check between the code value of these three kinds of information whether satisfy set restriction relation, " the code value grammer logic rules " of arranging when promptly checking the generation of three kinds of information whether to follow accreditation.If the result of computing coincide consistent, and the female Zhang Suohan information content of graphic code is also consistent with open plain text or the photo content of printing on the certificate, judge that then the certificate content information is true, certificate making is legal, otherwise the decidable certificate is illegal.
The specific implementation process of checking is further specified at the further part of this specification and accompanying drawing 3, accompanying drawing 4 etc.
7, in the proof procedure, " acted as fraudulent substitute for a person " for taking precautions against lawful document, verifier (certifying organization) can utilize the decruption key of mandate, understand the knowledge type privacy feature information of the contained holder of graphic code signet on the certificate by the graphic code recognizer, check the information that identity verification in driving license provides according to these information by modes such as enquirements then, " acting as fraudulent substitute for a person " illegally uses certificate whether to judge identity verification in driving license easily according to correcting errors of answering a question.The lawful bearer knows the privacy feature information of oneself naturally (because these all are the ABC or the fact about oneself, and need not remember specially), and anyly outside award a certificate mechanism and the certifying organization usurp or pick up other people certificate person because the key that not have to authorize can't read lawful bearer's privacy feature information from certificate, thereby be difficult to by high-tech cosmetic shaping etc. usually means reach the purpose of acting as fraudulent substitute for a person.Owing on soft certificate, embedded holder knowledge type privacy feature information, make lawful bearer's feature have the mimetism of being difficult to and be easy to distinctive, even if certificate is lost and stolenly also can not brought potential safety hazard, this is the method mechanism of the present invention about preventing usurping.
8, the anti-counterfeit capability of the present invention's design does not rely on the various network information system, does not rely on external data library inquiry system, does not rely on the high cost (but can replenish these conditions of utilizing) of equipment and material and physical material process conditions, and depends primarily on the logic mechanism of method itself.In principle, make the printing and making that certificate only utilizes common PC computer that application software is housed and printer can finish graphic code primary and secondary seal family and false proof soft certificate; Checking only utilizes the portable graphic code reader that application software is housed to finish.
9, technology path of the present invention is:
Accreditation aspect: remedy the society of holder and the biological information deficiency on false proof with holder privacy knowledge characteristic information, come the complexity and the costliness of substitute material technology or physical technology with the complexity of logical relation between the graphic code primary and secondary seal family message code value, make certificate characteristic information and holder characteristic information thereof all have the mimetism of being difficult to and be easy to distinctive, thereby not only reduce cost but also improve fail safe and application portability.Checking aspect: verify that with the less integral credentials characteristic information of operand replacing the whole prime information of the bigger certificate of operand verifies, the traditional decision procedure that sense organ is judged and image is compared that replaces the people with recognition of graphic code machine and code value compute mode, the accuracy of checking and the reliability processing procedure that depends primarily on electronic information and inhuman sense organ process reaches convenient and strict checking purpose.The system aspect: adopt open technical system, the crypticity of giving and accepting with key (secret parameter) replaces the crypticity of accreditation and Authentication devices software and hardware system, eliminates the drawbacks such as high cost that enclosed type safe practice route at present brings.The present invention obtains to gain and the cost of corresponding sacrifice is the structural complexity of the logical constraint relation between the certificate graphic code primary and secondary seal family and the computational complexity of checking.
The soft anti-counterfeit method of credentials that the present invention proposes allows that on strategy the complete copy of certificate content information (because the certificate of complete copy has comprised various clear and definite information such as lawful bearer's feature, is easy to differentiate, is difficult to illegally be utilized.And any incomplete copy deception information all belongs to and distorts or forge category, by verification method of the present invention, is easy to penetrate).The present invention combines with technology such as digital watermark, laser-markings and also can produce stronger anti-COPY function, but the present invention is not intended to comprise this point.
Beneficial effect of the present invention and application limitation:
The present invention is based on above-mentioned principle and the soft anti-counterfeit method of credentials that the mechanism of enforcement proposes, compare with existing method for anti-counterfeit or technology, its beneficial effect with the application limitation is:
The present invention at first implements the technology determination of soft certificate content information legitimacy on " whether each component units of certificate information satisfies the set logical constraint relation of issuing organization " this basis, and has proposed the related anti-fraud system of a kind of soft certificate information in view of the above.Consequent beneficial effect is: guaranteed being difficult to mimetism and being easy to the property verified of soft certificate information (comprising the holder characteristic information), and this to be difficult to mimetism and to be easy to the property verified be that logical consequence by certificate intrinsic informations such as key and holder privacy knowledge features decides, and it is irrelevant with technical equipment, therefore, accreditation of the present invention and verification technique are open, the soft hardware equipment and the technology implementation standard that adopt are all disclosed, this more helps engineering construction and applies, and needn't worry that the outsider utilizes same equipment and technology illegally to make certificate or verifies deception, (management is difficult for to have eliminated the caused negative effect of technology path of " sealing could safety ", cost height or the like).Therefore, the present invention has very positive meaning for the standardization, fail safe and the easy operating that improve soft certificate false proof system.
The present invention has embedded the certificate hidden information in certificate graphic code primary and secondary seal family, promptly embedded lawful bearer's privacy informations such as knowledge type feature, by it can solve more effectively soft certificate lose, stolen, the security hidden trouble that causes such as act as fraudulent substitute for a person.
Compare with existing certificate class fake certification technology and (to comprise various popular computer network inquiring technologies, the IC-card technology, laser mark, digital watermark, the biological physiology aspect ratio is to technology or the like), the present invention is the technology path that has replaced expensive equipment and material and physical technology complexity with the technology path of logical operation complexity cheaply in itself, so the accreditation checking all has convenient cheap and precisely strict profit concurrently: particularly its proof procedure does not rely on the Computer Database support, do not rely on facility supports such as internet, support off line checking only uses the portable graphic code reader can finish accurate checking to certificate and holder in any environment; Checking is that the processing mode with electronic information has replaced and depends on people's sense organ to participate in other technical approach of differentiating, so checking has not only reduced subjective randomness but also quick and precisely.Therefore, the present invention is particularly suitable for the high-level Application in Anti-counterfeiting of soft certificate class, and realizes that cost is low, widely applicable.
The main cost that beneficial effect of the present invention is paid is the complexity of logical operation in the anti-fraud system.Because the amount of information that need express of soft certificate is generally all little, so this cost possesses feasibility just for the application of soft certificate class.The equipment that realization the present invention relates to mainly is ordinary PC and graphic code recognizer, this all has the off-the-shelf can be for selecting (as the two-dimensional bar code recognition system) for use at home and abroad, only needs to embed application software again on the basis of these simple devices and can realize the present invention utilizing.Current, the development of X-Y scheme code reading equipment performance is very fast, and its application popularization is in the ascendant, and this also is very beneficial for developing with it the high-level anti-counterfeiting technology of soft certificate class.
The present invention is specially adapted to point out lawful bearer's soft certificate class, and for the soft certificate of " irrelevant with holder ", the present invention can only be effective to " anti-tamper " and " anti-counterfeiting ", and can not guarantee to stop " fastening one person's story upon another person " deception.In addition, the soft certificate page area that contains graphic code primary and secondary seal family may cause inaccurate to the graphic code information gathering under stained serious situation, and checking may be lost efficacy.At last, on the large information capacity carrying capacity, soft certificate is rising not as IC-card, and therefore, Application in Anti-counterfeiting scope of the present invention also has limitation.
In sum, the use of various soft certificates still plays the most basic important function in the credit system of advanced information society, the essence of certificate false proof be the legitimacy that ensures the certificate content information (comprising: guarantee the integrality of its content--anti-tamper, the authenticity that guarantees its content and authority--anti-counterfeiting), the engineering reliability and the operability of the legitimacy used of certificate (anti-usurp etc.) and validity decision.For current widely used soft certificate class, this is three outstanding problems that need to be resolved hurrily.This method for anti-counterfeit system that the present invention proposes can effectively protect legitimacy that the legitimacy of soft certificate content information, soft certificate use, and technically (and singly not being legally) solve the preciseness and the convenience problem of this validity decision.
Description of drawings:
Fig. 1: certificate primary and secondary seal family's generating principle and scheme schematic diagram
Fig. 2: certificate making method flow diagram
Fig. 3: checking principle and scheme schematic diagram
Fig. 4: verification method flow chart
Fig. 5: soft certificate false proof is implemented the system schematic diagram
Fig. 6: the man-machine interface figure of accreditation
Fig. 7: a kind of accreditation is figure as a result
The specific embodiment of the present invention
Below count for sake of convenience, method of the present invention and techniqueflow also abbreviate " native system " as.
1. the embodiment of accreditation
(0) at first, work out a kind of certificate editing CMS of integrated software, its function is editor's certificate text and prints the certificate text that it also comprises with the lower support subprogram in addition: encryption function conversion program EF, a corresponding decryption function conversion program DF who supplies CMS to call; Hash function (Hash function) conversion program HF who supplies CMS to call; A pair of information representation method conversion program T2B and the B2T that supplies CMS to call; X-Y scheme font code generator GCP, an X-Y scheme font code decoding recognition program GCR who supplies CMS to call who supplies CMS to call.The functional definition of these subprograms is as follows:
A kind of function program of T2B----representative information representation conversion, its input is printable character, output is corresponding binary numeral; T2B is the general function program, can realize in any way.
A kind of function program of B2T----representative information representation conversion, its input is a binary numeral, its output is corresponding printable number; B2T is the general function program, can realize in any way.
EF----represent a kind of cryptographic calculation function program EF (M, K), its input is binary data M and key K, its output is the binary data C behind the enciphering transformation.According to the general features of smaller all of the total operand of certificate information, the cryptographic calculation function can adopt the standardization program of asymmetric public key cryptographic algorithm or other to realize function, for example rsa encryption program.In this case, in the encipheror of native system, key means " private " key in the asymmetric cryptosystem, only authorizes certificate making mechanism and uses; In the decrypted program of native system, key means " public affairs " key in the asymmetric cryptosystem, and it is authorized certifying organization and uses.
DF----represent a kind of decrypt operation function program FF (C, L), its input is binary data C and key L, its output is the binary data M of deciphering after the conversion.According to the general features of smaller all of the total operand of certificate information, the decrypt operation function adopts the standardization program of asymmetric public key decipherment algorithm or realizes function, for example RSA decrypted program.In this case, in the decrypted program of native system, key refers to " public affairs " key in the asymmetric cryptosystem, and it is authorized certifying organization and uses.
HF----represents a kind of hash function (Hash function) program HF (S), its input is long binary data stream S, its output is the binary data s that S is transformed into short regular length, s has represented the information characteristics of S, so native system claims that the output s of HF is " informative abstract " or " digital finger-print " of input S.Hash function and software program thereof are in mathematics and the existing ripe research of information science field, and this does not give unnecessary details.The size of the size of the total quantity of certain class certificate that native system is made as required and individual certificate content information amount, selection has the suitably Hash function program of " compression ratio " character, makes " informative abstract " (or " digital finger-print ") data length of Different Individual certificate short as far as possible and have nothing in common with each other (reaching the degree that can distinguish mutually) in the similar certificate as far as possible.
GCP----represents a kind of X-Y scheme font code generator GCP (S), its input is common computer code (as the binary numeral string) S of certificate information, through the graphic code cataloged procedure, its output result is special X-Y scheme font code, it can be presented at (on computer screen) on the display, also it can be printed or is printed on the paper.A special case as the X-Y scheme font code: two-dimensional bar, existing mature technology product.Equipment vendors can provide this graphic code to generate support program.
GCR----represents a kind of X-Y scheme font code decoding recognition program (G), its input is the X-Y scheme font code coded data that arrives through X-Y scheme code reader scanning collection, through decode procedure, its output is to become X-Y scheme font code information translation computer or PDA to go up processed conventionally message code.Equipment vendors can provide this graphic code decoding recognition support program.
CMS----represents a kind of certificate editing integrated software, and it has editing and prints the function of certificate content, also has the function of calling above-mentioned T2B, B2T, EF, HF, GCP, CMS or the like correlator program.CMS is the software of general function, can realize in any way.
Obviously, be not difficult to be implemented by the subprogram and the application software of above-mentioned definition.The certificate making person can install " the certificate editing CMS of integrated software " on a common computer, and the key of input mandate.Utilize CMS, and call T2B, B2T, EF, HF, GCP, can realize certificate making (it not is unique scheme that the detail that relates in the technical process is formed, but all according to basic skills of the present invention) by following technical process by CMS:
(1) utilize software CMS to realize following function: when needing to make the certificate of a certain type, on computer (such as PC), to access corresponding certificate format software template and (touch version as student's identity card masterplate, passport masterplate, title ... or the like) and working interface; Input certificate content public information on working interface: comprise the social property information and the biological attribute information (for example selecting to import: name, educational background and occupation, birthplace, age, height, race, blood group, photo or digital photos information, dna characteristics information, fingerprint characteristic, palm type, skin mottling feature, iris feature information, other physiological characteristic and biological characteristic or the like information) of certificate text message, Production Time and serial number information, certificate formal qualification information, holder feature public information----holder, and set type into the page format of certificate requirement.Input lawful bearer privacy feature information on working interface, for example can select input: the access key of family member's name, speciality hobby, mother tongue and growth dialect system zone, personal password, previous conviction, personal question and answer, password, holder feature nonpublic information etc., also can import the information such as finger print image, handwritten signature image, palm type feature of holder.
(2) utilize software CMS that certificate content public information is presented on the software for editing CMS interface, set type.Call X-Y scheme font code generator GCP, certificate content public information is encoded, and generate X-Y scheme symbolic code----and be called digital female chapter, on the CMS interface, set type and show digital female chapter.
(3) call enciphering transformation program EF and hash function program HF and information representation method conversion program B2T and T2B and realize following function: convert lawful bearer's privacy feature information of input to the binary numeral string through T2B, utilize EF to continue to implement enciphering transformation, the binary string str that obtains encrypting again.Utilize GCP that binary string str is encoded again, generate X-Y scheme symbolic code----and be called digital signet, on software CMS interface, set type and show digital signet.
(4) utilize software CMS that certificate content public information and holder privacy feature information are merged into the certificate intrinsic information, call hash function program HF, enciphering transformation program EF, X-Y scheme font code generator GCP, representation conversion program T2B realizes following function: the certificate intrinsic information (is converted to binary data stream through earlier, Hash conversion again, encrypted process then) the binary character string----that is transformed into short regular length is called certificate information fingerprint (or informative abstract), utilize GCP that the certificate information fingerprint is encoded again, generate the X-Y scheme symbolic code, be called digital sub-chapter, and, be presented on the software CMS interface by the sub-chapter of the typesetted numeral of certain format.
(5) utilize the print drive function of software CMS, certificate content public information, digital female chapter, digital signet, digital sub-chapter are printed on respectively by typesetted form on the medium of setting (for example on the paper), promptly finish the making of false proof soft certificate content pages.
The embodiment of accreditation can be further specified by accompanying drawing 1 and accompanying drawing 2.
2. Yan Zheng embodiment
2.1 the soft hardware equipment configuration instruction that utilizes: proof procedure utilization " portable graphic code reading system " is finished, the major function of this system then drives realization by the application software that embeds wherein.The hardware device of system and basic-level support software thereof can be provided by equipment vendor.The equipment of " portable graphic code reading system " is formed following several possibility:
Scheme 1. portable graphic sign indicating number scanners connect palm PDA
Scheme 2. portable graphic sign indicating number scanners connect the PC computer
Scheme 3. portable graphic sign indicating number scanners connect the Web service system
The graphic code recognition system of scheme 4. special uses
In the different applied environments with different appointed condition under, can adopt different allocation plans.The present invention mainly illustrates based on the 1st kind of scheme, the realization principle of other three kinds of schemes is identical therewith, just (wherein second kind of scheme and the third scheme need computer or the support of network facilities condition to the instrument form difference that realizes, under the situation that has possessed this condition, this is the selection of saving, otherwise will be the selection of expense maximum).No matter any scheme all is made of two basic function module: graphic code information scanning acquisition function module and graphic code information processing and Presentation Function module as a result.Below easy for narration, with the graphic code information scanning acquisition function module of graphic code scanner representative system; With the graphic code information processing of PDA representative system and Presentation Function module as a result.
2.2 the embodiment of checking: at first, utilize the embedded software technology to realize a kind of software program, finish functions such as graphic code information gathering and information processing according to method of the present invention in order to drive portable graphic code reading system by method of the present invention.The concrete function of software can make up realization by following subprogram: deciphering varitron program DF, hash function program HF, information representation method conversion program T2B and B2T, X-Y scheme font code decoding recognition program GCR.The concrete definition of these subprograms provides in the embodiment of aforementioned accreditation, and wherein the graphic code of the decipher function of DF, GCR corresponding with EF encryption function decoding recognition function and the graphic code of the GCP systematic function of encoding is corresponding.
In PAD, embed above-mentioned software, the key that input is authorized, and PAD and portable graphic sign indicating number scanner linked constitute portable graphic code reading system, utilize this system can realize checking (it not is unique scheme that the detail that relates in the technical process is formed, but all according to basic skills of the present invention) by following technical process:
(1) digital female chapter information of usefulness portable graphic sign indicating number scanner scans certificate, on PDA, digital female Zhang Suohan certificate content public information A that will gather by subprogram GCR shows, and contrasts with the certificate text, if content is inequality, then show certificate distorted, forged or meet with to be damaged invalid; If content is identical, then continue (2) step card.
(2) the digital signet information of usefulness portable graphic sign indicating number scanner scans certificate, on PDA, by subprogram GCR is the information translation that collects binary code B ', utilize deciphering varitron program DF that binary code B ' deciphering is " holder privacy feature information " B, " holder privacy feature information " B and certificate public information A are merged into information A B, call hash function program HF, enciphering transformation program EF with information A B (through the binary data stream translation, the hash function conversion, encrypted process again) be transformed into the binary character string of short regular length---check code be called.
(3) the digital sub-chapter information of usefulness portable graphic sign indicating number scanner scans certificate, on PDA, by utilizing subprogram GCR, be the information translation that collects binary code, by deciphering varitron program DF this binary code is implemented the deciphering conversion again and obtain " authorization information ".Utilize PAD, calculate relatively " authorization information " and " check code ", if the two difference, then show certificate distorted, forged or damaged invalid; If the two is identical, show that then the certificate content is true and reliable, judge that certificate is legal.If the verifier suspects that certificate is acted as fraudulent substitute for a person, then continue next step; Otherwise checking finishes.
(4) on PAD, the holder privacy feature information B that obtains in the step (2) is shown after with the B2T conversion, and identity verification in driving license is maintained secrecy.Whether the verifier puts question to the licensee according to " holder privacy feature information " that palm PAD shows, acted as fraudulent substitute for a person according to the answer a question decidable certificate that whether conforms to the PAD display message of holder.So far, checking finishes.
The embodiment of checking can be further specified by accompanying drawing 3 and accompanying drawing 4.
3. the explanation of soft certificate false proof enforcement system
Based on above method, the overall enforcement system of soft certificate false proof is described as follows:
False proof enforcement system is made up of several sections such as owner (certificate issuer or certificate mechanism), accreditation person (certificate making carrier), verifier (checking executable unit), certificate holders.Relation between owner and accreditation person, the verifier is to entrust and on commission relation (owner is that trustee, accreditation person and verifier are the mandatories).In this soft certificate false proof enforcement system, key is the final technical backstopping of false proof reliability and fail safe, and the give and accept relation of key constitutes actual trust and on commission relation.
(1) owner (certificate issuer or certificate mechanism): owner's role sets key and ratifies cryptographic system, proposes certificate content and form requirement in addition, and authorizes accreditation person and verifier to implement it.In principle, except key can not disclose, other authorized content (technical specification and the cryptographic system that comprise accreditation and checking) can disclose.
This false proof system relates to the sub-chapter content of numeral encryption and decryption, to two cover keys such as digital signet content encryption and decryption, this two cover key and cryptographic system (as symmetric-key cryptographic system, asymmetric public key cryptographic system and concrete password standard algorithm) thereof are by the person's of issuing licence approval or definite, the present invention is based on the ripeness standard cryptographic algorithm in asymmetric key cryptographic system or the public key system (not adopting other cryptographic system but do not get rid of), the bit length of key is not less than 128bits (for example adopting 1024bits), and encryption and decryption can be adopted different keys respectively.The present invention with the encryption key in the asymmetric key system as the certificate making key K p, the secret preservation; With the decruption key in the asymmetric key system as authentication secret K vSpecifically, first the cover key: the key that digital sub-Zhang Jiami uses (below be designated as K P1), the deciphering usefulness key (below be designated as K V1); The second cover key: digital signet encrypt usefulness key (below be designated as K P2), the deciphering usefulness key (below be designated as K V2).In concrete application implementation, this two covers key also can be combined into a cover.
In this false proof system, the equipment that the technical equipment and the method standard of accreditation and checking all disclose (so that engineering construction and apply), adopt also can openly be purchased (helping reducing cost, improving cost performance) to businessman.The owner is with the secret use of the encryption key mandate accreditation person who sets, so encryption key is also referred to as the accreditation key.Simultaneously, the owner uses the decruption key authority checking person who sets, so decruption key is also referred to as authentication secret.In principle, accreditation person or verifier can not grasp accreditation and two kinds of keys of checking simultaneously, to stop the technological approaches of " defalcating ".Authorize verifier's decruption key two kinds of embodiment:<i are arranged main scheme: the owner is the decruption key K of digital sub-chapter V1, digital signet decruption key K V2All authorize the verifier in the lump.<ii〉possibility: the person of issuing licence is only the decruption key K of digital sub-chapter V1Authorize the verifier, and the decruption key K of digital signet V2Give the lawful bearer.The advantage of main scheme is to be easy to implement; The advantage of possibility is that nonpublic information, the shortcoming of having protected the lawful bearer to greatest extent are troubles of encryption key distribution management.In this false proof system, encryption key K P1, K P2Must follow the validity that the principle of maintaining secrecy to external world could ensure certificate false proof, and decruption key K V1, K V2Even if the open effect that also can't fundamentally influence the anti-tamper and anti-counterfeiting of soft certificate, thereby be convenient to entrust the practical application of checking.But the decruption key K of digital signet V2Be disclosed in and influence the anti-effect of usurping (may reveal lawful bearer's privacy feature information) of certificate to a certain extent.If adopt the asymmetric private key system among the present invention, encrypting and decrypting all is same key, then can not disclose.In addition, the person of issuing licence can authorize different keys at different Production Time section secret of different certificate classes and similar certificate, to guarantee safety.
(2) accreditation person (certificate making carrier): accreditation person's role is with the encryption key enforcement certificate making that the person of issuing licence authorizes, the owner to be responsible for.Accreditation person needs authorized encryption key just can produce and meets the certificate that the donor requires, but unnecessaryly knows decruption key.As the supervision of owner to accreditation person, for the certificate that has completed, judge whether it makes by the technical specification of owner's requirement, the licensor checks it easily with decruption key (with the portable graphic code reading system that has set this key): if certificate is by checking, show that it meets the technical specification that the owner requires, otherwise, judge that certificate making is defective.
(3) verifier (checking executable unit): verifier's role is with the decruption key enforcement checking that the owner authorizes, the owner to be responsible for.The verifier needs authorized decruption key and with decruption key input validation equipment, just can effectively verify, but unnecessaryly knows encryption key.As the supervision of owner to the verifier, whether strict for the Authentication devices that the verifier uses by the technical specification of owner's requirement and the key work of authorizing, the anti-fake certificate that the licensor makes of any one compliant tests out easily: if certificate is by checking, the key that shows verification technique standard and checking usefulness is correct, otherwise the decision verification technical equipment is defective or key uses improper.
(4) licensee: when the application personal document, need to cooperate accreditation person to gather in person for information about (holder social property information, biological attribute information, privacy knowledge characteristic information of agreement holder feature nonpublic information, particularly holder or the like).When being verified, needing to cooperate the verifier to gather for information about and (submit accredited of institute to, answer the problem of relevant holder feature.In the system of the decruption key of holder oneself keeping certificate numeral signet, if holder trust authentication person, holder answers the verifier to require to submit to the decruption key or the password of certificate numeral signet; If holder can not trust authentication person, then can refuse to submit to the decruption key or the password of certificate numeral signet).
The overall enforcement system of soft certificate false proof can be further specified by accompanying drawing 5 of the present invention.
4. application implementation example
Here, provide the false proof embodiment of a concrete soft certificate, the making that example is taken from certain title and checking implementation process (referring to accompanying drawing 7: a kind of accreditation result):
● at first, certificate issuing organization (to call the owner in the following text) is pressed the asymmetric key system of RSA and is set pair of secret keys K pWith K v, key Bit length is 1024 system, wherein K pBe encryption key, as the accreditation key; K vBe decruption key, as authentication secret.The owner is with K pAuthorize the accreditation carrier, use by the accreditation carrier is secret.The owner is with K vAuthority checking actuator is used for checking (uses of can maintaining secrecy also can public use, and below supposition is the use of maintaining secrecy) by checking actuator.The technical scheme and the technical equipment standard thereof of open accreditation of owner and checking are so that operation is carried out and management.
● the accreditation carrier finishes following operation successively on title accreditation information input interface:
Referring to accompanying drawing 6 (people-machine surface chart of accreditation)
Referring to accompanying drawing 7 (a kind of accreditation result)
Step1. import the certificate public information, comprise: accredited legal person's social characteristic information (register of company place, Business Name or the like), accredited legal person's biological information (digital information of photo or finger print image), and other professional conventional public information (xx zone, xx area, property ownership description, the description of property right time limit, other articles of law, certificate are issued time and sequence number or the like) on the certificate.
Step2. import certificate hidden information content M: with accredited legal person consult the legal person privacy knowledge characteristic information (comprising: accredited legal person's father and mother parents' name Zhang San and Li Si, two relative's name king five and Zhao six and with I concern two uncle (mother's brother)s and three one's mother's sisters or the like), then it is imported computer.
Step3. use the accreditation key K pWith rsa encryption function EF (M, K p) accredited legal person's privacy knowledge characteristic information is encrypted, as the hidden information of certificate.
Step4. use hash function (Hash function) HF (M) that the hidden information of certificate is implemented the operation of information extraction summary, and this informative abstract is merged in the certificate public information, form certificate intrinsic information X.
Step5. use hash function (Hash function) HF (X) to certificate intrinsic information information extraction summary S once more, and use the accreditation key K once more pWith rsa encryption function EF (S, K p) the informative abstract S of certificate intrinsic information is encrypted, as the authorization information of certificate.
Step6. generate the sub-chapter of graphic code numeral, generate the female chapter of graphic code numeral, generate graphic code numeral signet from certificate verification information respectively with the GCP function program from the certificate hidden information from the certificate public information.
Step7. Typeset and Print or print above-mentioned certificate related content information is made certificate.
● the certificate that owner's random inspection completes: the certificate of selective examination is verified that the process of checking is with following checking implementation Step1 and Step2 with authentication secret and portable graphic code reading system.If the verification passes, then can be sure of the certificate making compliant, otherwise can conclude that certificate is defective.
● checking executable unit (to call the verifier in the following text) bears the checking to passing certificate and holder thereof, promptly utilizes portable graphic code reading system to finish following operation successively:
Step0. portable graphic sign indicating number scanner is connect mutually with palm PDA, application software is installed among the palm PDA, constitute a portable graphic code reading system, then authentication secret is imported this system.
Step1. the verifier obtains digital female chapter information, digital signet information, digital sub-chapter information respectively with the digital primary and secondary seal family on the graphic code scanner scans certificate.The information A content of digital female chapter of gathering is presented on the display screen of palm PDA, contrasts,, enter next step if consistent with open printed contents on the certificate; If inconsistent, judge that certificate is defective.This is for slightly testing process.
Step2. on palm PDA, the verifier utilizes authentication secret K vThe sub-chapter information of numeral is decrypted, is verified value of information V 1, utilize authentication secret K vDigital signet information is decrypted obtains information B, female chapter information A of numeral and digital signet information B are merged into information A B, and information A B is implemented the operation of information extraction summary, obtain check code value V by hash function HF (M) 2Calculate relatively two code value V with palm PDA 1And V 2If, identical, then judge certificate content information legal (information do not distorted, make conform with agreed specifications), certificate is effective; Otherwise, judge certificate invalid (perhaps content information has illegally and distorts, and perhaps certificate system is illegal forges).This be because, illegally forge or the person that distorts the certificate does not have the accreditation key of authorizing, even if utilize disclosed accreditation technology and equipment, also be difficult between certificate information (digital female chapter information) and certificate verification information (digital sub-chapter information), to set up set complex logic restriction relation just, be difficult to objective checking by the logical constraint relation.This is anti-counterfeiting, anti-tamper strict proof procedure.
Step3. in the case of necessary, the verifier also will be presented at digital signet information content B on the display screen of palm PDA, and holder is hereat maintained secrecy.Does the verifier (for example: father and mother's name 〓 Zhang San, Li Si put question to identity verification in driving license according to the information B that shows? two relative's name 〓 king five, Zhao six? king five, Zhao six 〓 three one's mother's sisters, four uncle (mother's brother)s?), according to the rate of correcting errors that identity verification in driving license is answered a question, whether decidable identity verification in driving license hereat is the lawful bearer.The lawful bearer answers these knowledge type problems of not moving all the life naturally easily, and need not remember specially.Usurp or pick up other people certificate person owing to there not be the authentication secret of mandate then can't answer questions all problems at a guess.This is the strict proof procedure of anti-illegal " fastening one person's story upon another person ".
● Authentication devices and authentication secret that owner's random inspection checking executable unit uses: with a soft certificate of making by technical specification, allow checking executable unit use portable graphic code reading system and authentication secret to verify at random, according to above step if the verification passes, can be sure of to verify the Authentication devices and the authentication secret compliant of executable unit's use, the checking law enforcement is qualified.If checking can't pass, can conclude that then cheating of checking executable unit or equipment etc. have problem.
Application Example can be with reference to accompanying drawing 6 and accompanying drawing 7.

Claims (9)

1. the soft anti-counterfeit method of credentials based on graphic code primary and secondary seal family associating information mechanism comprises the steps:
(1) owner that awards a certificate sets encryption key Kp and decruption key Kv and corresponding information encryption mode EF and decrypts information mode DF, and uses encryption key mandate accreditation carrier is secret, and decruption key authority checking actuator is used for checking,
(2) the accreditation carrier consists of certificate intrinsic information AB with certificate content public information A and holder privacy feature information B input computer; Utilize hash function method and computer program HF thereof that information A B is carried out the operation of information extraction summary; Obtain integral credentials characteristic information C; The encryption key Kp that recycling is authorized is encrypted to information C ' to information C according to set cipher mode EF; In addition; Also utilize the encryption key Kp that authorizes according to set cipher mode EF holder privacy feature information B to be encrypted to information B '
(3) with graphic code generator GCP certificate public information A is generated graphic code and----digital female chapter, information B ' is generated graphic code and----digital signet, information C ' is generated the digital sub-chapter of graphic code----, all graphic codes that generate are referred to as primary and secondary seal family, then certificate public information A is printed in the lump or is printed on the certificate together with graphic code primary and secondary seal family, finish accreditation
When (4) verifying, checking actuator is reduced to routine information standard or binary code standard with the digital primary and secondary seal family information on the graphic code recognizer scanning certificate, the graphic code information standard with collection on the graphic code recognizer, obtain digital female chapter information A, digital signet information B ' and digital sub-chapter information C ' respectively, display message A supplies to read then, and contrasts the content of text that is printed on the certificate, if the two is inequality, then judge the certificate content invalid, otherwise, enter next step
(5) on the graphic code recognizer, deciphering obtains information C and code value code1 thereof to information C ' to utilize the digital sub-chapter decruption key Kv of mandate and set manner of decryption DF; Utilize the digital signet decruption key Kv that authorizes digital signet information B ' deciphering to be obtained information B by set manner of decryption DF, information A and information B are merged into information A B, utilize with hash function method identical described in the step (2) and computer program HF thereof information A B is carried out operation of information extraction summary or information extraction characteristic manipulation, obtain check information R and code value code2 thereof, compare code value code1 and code value code2 or comparison information C and information R, if the two equates, judge that then the certificate content is effective, otherwise judge the certificate content invalid.
2. according to the described method of claim 1, it is characterized in that verifying actuator can check by the following method whether identity verification in driving license is the lawful bearer: obtain holder privacy feature information B according to the method described in the above-mentioned steps (5) to digital signet deciphering, information B is presented on the graphic code recognizer and identity verification in driving license is maintained secrecy, checking actuator puts question to identity verification in driving license according to the holder privacy feature information that shows, the following mistake rate of answering a question according to identity verification in driving license, judge whether it is the lawful bearer, include at digital signet under the situation of holder biological information, checking actuator gathers the fingerprint or the handwritten signature of identity verification in driving license when participating in the cintest, and with the graphic code recognizer on the biological information contrast that shows, judge according to similarity degree whether it is the lawful bearer.
3. according to claim 1 or 2 described methods, the owner that it is characterized in that awaring a certificate can utilize decruption key to check whether the accreditation carrier observes the existing plan accreditation, method is as follows: randomly draw a collection of certificate that completes, according to step (4) and (5) it is verified, if it is effective to be verified part, judge that then the accreditation process meets technical specification, otherwise judge defective, the owner that awards a certificate also can utilize one by the qualified certificate of encryption key making, come procuratorial work checking actuator whether to abide by standard and carry out checking with the decruption key of authorizing, method is as follows: selected arbitrarily qualified certificate is verified according to step (4) and (5), if be verified part by checking, then the operating process of decision verification actuator meets set technical specification, otherwise, the violation operation of decision verification actuator, be accused of cheating.
4. according to the described method of claim 1, it is characterized in that encryption and decryption key K p, Kv that the owner that awards a certificate described in the step (1) formulates comprise digital sub-chapter encryption and decryption key K p 1, Kv 1With digital signet encryption and decryption key K p 2, Kv 2Two cover keys.
5. according to the described method of claim 1, it is characterized in that the key described in the step (1) is given and accepted to use the following situation of dividing: if adopt the asymmetric private key cryptographic system, the key of then giving and accepting is maintained secrecy without exception to the extraneous of user; If employing public-key cryptosystem, the encryption key Kp and the decruption key Kv that then give and accept are different, encryption key is only authorized and is used for accreditation, to checking actuator and extraneous secret without exception, decruption key is then only authorized and is used for checking, and digital signet decruption key can be authorized the holder keeping, and to maintaining secrecy beyond the holder, submit to certifying organization to use by identity verification in driving license during checking temporarily,, then determine that it is illegal holder if the key that identity verification in driving license is submitted to can not effectively be deciphered.
6. according to the described method of claim 1, it is characterized in that the key of licensing except the owner that awards a certificate in the step (1) relate to maintain secrecy, the method of accreditation and checking and technological system adopt open: i.e. the blanking method that accreditation and checking are related and the technical equipment standard of techniqueflow and employing all can be disclosed, and the concrete cipher mode EF and the manner of decryption DF of employing also can be disclosed.
7. according to claim 1 or 2 described methods, it is characterized in that finger print image that described holder privacy feature information is the fact or knowledge collection or holder or iris image or face image or palm type feature image or handwritten signature image mutually.
8. according to the described method of claim 1, it is characterized in that the graphic code described in the step (3) is meant that machine recognition printable or that be printed on the soft certificate identifies, comprise in machine-readable character string, machine-readable character array, bar code, two-dimensional matrix code, the two-dimensional bar any one, according to the difference of the contained amount of information size of concrete certificate classification, adopt machine recognition sign as graphic code, two-dimensional bar with appropriate information capacity and recognition speed.
9. according to the described method of claim 1, it is characterized in that the digital female chapter in the digital primary and secondary seal family described in the step (3), digital sub-Zhanghe numeral signet three can separately print or be printed on the different blank positions of certificate as required, also can be any both together or the three print together or be printed on the blank position of certificate, promptly digital primary and secondary seal family is at the formal partable of outward appearance.
CNB200410022374XA 2004-04-26 2004-04-26 Soft certification anti-false method based on graphic code primary and secondary signet series information association mechanism Expired - Fee Related CN1321507C (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CNB200410022374XA CN1321507C (en) 2004-04-26 2004-04-26 Soft certification anti-false method based on graphic code primary and secondary signet series information association mechanism

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CNB200410022374XA CN1321507C (en) 2004-04-26 2004-04-26 Soft certification anti-false method based on graphic code primary and secondary signet series information association mechanism

Publications (2)

Publication Number Publication Date
CN1570962A CN1570962A (en) 2005-01-26
CN1321507C true CN1321507C (en) 2007-06-13

Family

ID=34480069

Family Applications (1)

Application Number Title Priority Date Filing Date
CNB200410022374XA Expired - Fee Related CN1321507C (en) 2004-04-26 2004-04-26 Soft certification anti-false method based on graphic code primary and secondary signet series information association mechanism

Country Status (1)

Country Link
CN (1) CN1321507C (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11159566B2 (en) 2018-08-21 2021-10-26 International Business Machines Corporation Countering phishing attacks

Families Citing this family (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101596820B (en) * 2008-06-03 2010-08-18 北京中维华盾科技发展有限公司 Method for making fingerprint encryption certificates and cards
CN103310254B (en) * 2013-05-03 2016-03-23 周羽 A kind of safety anti-fake voucher and preparation method thereof
CN103310141B (en) * 2013-05-03 2016-04-20 周羽 Credential information monitoring administration method and system
CN103273760B (en) * 2013-05-03 2014-07-16 广东裕通科技股份有限公司 Safety and anti-fake property ownership certificate and manufacturing method thereof
CN105323072B (en) * 2015-08-04 2018-08-14 中科院成都信息技术股份有限公司 Identity identifying method based on graphic code secret sharing mechanism
CN106997525A (en) * 2017-04-10 2017-08-01 山大地纬软件股份有限公司 Digital license system based on block chain technology
CN108090523A (en) * 2017-12-12 2018-05-29 深圳市创业印章实业有限公司 A kind of BMP image processing methods for laser seal-engraving machine
CN109658582B (en) * 2019-01-25 2021-09-21 中科院成都信息技术股份有限公司 Safe and novel voter qualification certificate and use verification method thereof

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2002101092A (en) * 2000-09-26 2002-04-05 Seiko Epson Corp Individual authentication device and its system and its method, individual authentication information storage medium, individual authentication program storage medium, individual authentication information registering method and individual authentication information authenticating method
JP2002278844A (en) * 2001-01-19 2002-09-27 Xerox Corp Method/system for protecting electronic document, and confidential connect object
CN1379352A (en) * 2002-05-13 2002-11-13 吴建明 Antiforge method of seal
CN1407501A (en) * 2001-08-31 2003-04-02 银川西夏印艺有限公司 Bill and contract verifying system
CN1479216A (en) * 2002-08-02 2004-03-03 ������������ʽ���� Electronic stamp, IC card, checking system and mobile equipment

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2002101092A (en) * 2000-09-26 2002-04-05 Seiko Epson Corp Individual authentication device and its system and its method, individual authentication information storage medium, individual authentication program storage medium, individual authentication information registering method and individual authentication information authenticating method
JP2002278844A (en) * 2001-01-19 2002-09-27 Xerox Corp Method/system for protecting electronic document, and confidential connect object
CN1407501A (en) * 2001-08-31 2003-04-02 银川西夏印艺有限公司 Bill and contract verifying system
CN1379352A (en) * 2002-05-13 2002-11-13 吴建明 Antiforge method of seal
CN1479216A (en) * 2002-08-02 2004-03-03 ������������ʽ���� Electronic stamp, IC card, checking system and mobile equipment

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11159566B2 (en) 2018-08-21 2021-10-26 International Business Machines Corporation Countering phishing attacks

Also Published As

Publication number Publication date
CN1570962A (en) 2005-01-26

Similar Documents

Publication Publication Date Title
JP4323098B2 (en) A signature system that verifies the validity of user signature information
US4993068A (en) Unforgeable personal identification system
CN103198344B (en) Tax control secure two-dimensional code coding, decoding processing method
CN101593324B (en) Method and system for network multi-level approval based on dependable computing application technique
Hoepman et al. Crossing borders: Security and privacy issues of the european e-passport
CN104166871B (en) Anti-counterfeit label and anti-counterfeit method based on combination of two-dimension codes and RFID chips
CN104268742A (en) Official seal fake detection method and device based on network digital certificate and network lookup
US20030012374A1 (en) Electronic signing of documents
JP2009543176A (en) Traceless biometric identification system and method
JPH06176036A (en) Method for forming duplication which can be authenticated
CN101710380A (en) Electronic document safety protection method
CA2374196A1 (en) Legitimacy protection of electronic document and a printed copy thereof
CN102930634A (en) Invoice true check system based on cloud computing and encrypted two-dimensional codes
US20110296191A1 (en) Method for securely drawing up a virtual multiparty contract capable of being physically represented
CN103310141A (en) Method and system for monitoring of certificate information security
CN101359214B (en) Security document printing system and method of controlling the same
CN1321507C (en) Soft certification anti-false method based on graphic code primary and secondary signet series information association mechanism
Gandhi et al. Study on security of online voting system using biometrics and steganography
CN101388076A (en) Method and apparatus for generating two-dimension bar-code
KR20070036491A (en) Id card verifying system and method thereof
EP1280098A1 (en) Electronic signing of documents
Jueneman et al. Biometrics and digital signatures in electronic commerce
Scoville Clear Signatures, Obscure Signs
CN1220932C (en) Electronic autograph on document
JPH11282983A (en) Individual identification method by fingerprint data

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20070613

Termination date: 20160426