Background of the Invention
-
The invention relates to electronic document security systems and in particular to the certification and authentication of document information of various type, like whole documents, certificates, signatures, stamps, etc., especially by verifying its correctness and safety / immunity from fraud.
-
Current systems use stickers, thermal stamps and watermarks to safeguard against and to discover fraud, mostly by using the naked eye as a detector. The naked eye poses the problem that it is relatively unreliable so that many cases of fraud occur.
-
There exists a need to improve certification and authentification of document information by more reliable means.
Detailed Description of Invention
-
The invention uses an electronic system which comprises at least one of several modules:
- 1. Main Module. One of the main modules tasks is it to grant access to the system on the highest level. A further task is it to create crypto-data for use with the system, such as system key pairs generated by asymmetrical crypto-algorithms. It typically runs on an application server / server system which connects to a database server / server system. The server is preferably placed in a trusted environment (e.g. as a trust centre), as for example in the data centre of certification offices. The main module updates its data by connecting to this database and/or to other databases and/or by connecting to other modules. This module is preferably used / activated by an internet browser that runs on a PC but can also accessed by other means like programmable interfaces to other programs. The user / supervisor of this module can for e.g. create a system key pair(s), enter administrator rights and information, and enroll administrator signatures.
- 2. Admin Module. An administrator can use this module to, for example:
- a) Enter certification office information and stamp to be stored in the system;
- b) Enter certification office registrars' information and enroll their signatures;
- c) Activate or deactivate certification office registrars;
- d) Provide certification office registrars with user IDs and passwords;
- e) Print admin reports.
The access to this module is typically granted by entering an administrator ID, password and signature into the module but can also be done in other ways, like by fingerprint sensors, ID cards etc. - 3. Registration Module. A registrar can use this module to typically:
- a) Enter companies' information required for certification like letter header, letter footer and stamp;
- b) Register companies members' information and enroll their signatures on, e.g., a digital pad and an electronic pen connected to a PC;
- c) Activate or deactivate signatories or companies' members;
- d) Provide companies' members with their IDs and passwords;
- e) Print member transaction reports.
The access to this module is typically granted by entering a registrar ID number, password and signature but can also be done in other ways, like by fingerprint sensors, ID cards etc.
- 4. Certification Module: a member can use this module to, by the way of an example:
- a) Enter and save the document information that needs to be certified;
- b) Enroll his signature by the way of, for example, a digital pad and an electronic pen. The system then compares the enrolled signature pattern(s) with the member's signatures pattern(s) stored in the database(s). If the signature is correct, the system displays, e.g. on an internet browser, at least one of: the member signature, his company stamp, certification office stamp, Certification number, Certification date, Certification time and a 2D barcode;
- c) Print the certified letter displayed himself, i.e. a printer connected to his data station / PC;
- d) Authorize the printing by another person.
The access to this module is typically granted by entering a member ID number, password and signature but can also be done in other ways, like by fingerprint sensors, ID cards etc. Preferably, a transaction amount is directly deducted from the member account. The certified document information is preferably saved in the database. - 5. Authorization Module: an authorized person can use this module esp. to print a certified letter on his printer that is connected to his PC. Preferably, all of the authorization information is saved in the database for future retrieval.
- 6. Online Verification Module: a verifier can use this module to esp. do the following:
- a) Retrieving a document to be verified by, e.g., entering the document certification number.
- b) Comparing and/or printing the information displayed to verify its correctness and safety from fraud.
The above described modules are preferably run on the application server / server system and are preferably connected to an data network like the internet and activated by, for example, an internet browser that runs on a PC. Thus, users from different levels can access their modules from anywhere. Preferably, the modules check the corresponding user's ID number, password and / or signature before granting access to the respective module.
Alternatively or in parallel to the Online Verification Module, the system can comprise: - 7. An Offline Verification Module that runs on a stand alone verifier data system, e.g. a PC notebook, palm, mobile phone etc., connected to a scanner. The verifier can use this module to esp. do the following:
- a) Scanning the certified document with the scanner;
- b) Reading the information in the 2D barcode after either:
decrypting the random key with the system decryption key, and decrypting the compressed document information with the random key
or: decrypting the hash code with the system decryption key and comparing it with compressed document information Hash code); - c) Decompressing the document information and displaying it;
- d) Comparing and/or printing the information displayed to verify its correctness and safety from fraud.
At least the Main Module, Admin Module, and Registration Module may be run on the same application server.
-
In order that the invention may be more readily understood and put into practical effect, a preferred embodiment of the invention will now be described with reference to the accompanying drawings, in which :
- FIG.1 schematically shows a handwritten signature captured by a digital pad and an electronic pen;
- FIG.2 schematically shows a company stamp,
- FIG.3 schematically shows a certification office stamp,
- FIG.4 schematically shows a 2D barcode.
-
It is understood that this exemplary description does not limit the scope of the invention.
-
The modules of this invention are linked to each other and preferably share one database, and work as one system.
-
The process to use the system usually starts with an authorized person to enter admin information (name, position, adress, IP adress, admin ID, password etc) and at least one, preferably three or more, electronic admin signatures into the Main Module.
-
The admin is then allowed to log into the Admin Module, e.g. by entering his user ID, password, and electronic signature; this can be done by using an internet or intranet browser and a digital pad and electronic pen, for example. The admin is thus not restricted to use a closed network and can access the admin module from anywhere.
-
The admin in turn can grant access to the Certification Module by entering registrar information (name, employing certification office, address, IP address, registrar ID, password etc) and at least one, preferably three or more, electronic registrar signatures. The registrar is then allowed to log into the Registration Module, e.g. by entering his user ID, password, and electronic signature; this can be done by using an internet or intranet browser and a digital pad and electronic pen, for example. The registrar is thus not restricted to use a closed network and can access the Registration Module from anywhere.
-
The registrar on the other hand, who usually works for a trusted, often governmental, organisation like a certification office, can can grant access to the Certification Module to a member of another organisation (often a commercial company) by entering the member information (name, employing company, address, IP address, member ID number, password etc) and at least one, preferably three or more, electronic member signatures. The member is then allowed to log into the Certification Module, e.g. by entering his user ID, password, and electronic signature; this can be done by using an internet or intranet browser and a digital pad and electronic pen, for example.
-
Members using the Certification Module can enter document information after enrolling their signature(s) into the system, e.g. on a digital pad with an electronic pen connect to a PC. After that, the system compares the enrolled signature patterns with the signatures pattern(s) stored in the database to verify the correctness of the signature. If the signature has been positively verified, the document information is stored in the database, thus completing the certification process.
-
A member can also use the system to print, e.g., one or more of: the member's signature, as shown in FIG. 1, his company stamp as shown in FIG.2, a certification office stamp as shown in FIG.3, a certification number, a certification date, a certification time, and a 2D barcode as shown in FIG.4. Printing can be done by using a printer connected to the member's PC or using a PC on a third person's printer wherein the third person is authorized to print the document. The authentication process is then complete.
-
A typical 2D barcode usually has bars placed on the horizontal and the vertical dimension (as shown schematically in Fig. 4) and is generated using a 2D barcode generation program which transfers information into bars form. To be able to encode longer documents in barcode form, the document information is compressed. In order to prevent forgery and fraud, encrypted information is added. Document information and encrypted information are both put into the 2D barcode. The 2D barcode can be generated by, for example:
- ■ encrypting the compressed document information with a system generated random key, encrypting the random key with a system encryption key and generating the 2D barcode from the encrypted random key and the encrypted compressed document information.
or by: - ■ encrypting the compressed document information Hash code with the system encryption key, generating the 2D barcode from the encrypted Hash code and the compressed document information.
-
The encryption key is preferably one key out of a key pair, as for example from a asymmetric encription algorithm (e.g. PKI).
-
The 2D barcode can, for example, contain the following:
- 1. document information
- 2. member name
- 3. company name
- 4. certification office name
- 5. certification office stamp
- 6. system decryption key name
- 7. random key or hash code.
-
The Offline Verification Module enables verifiers to read the 2D barcode after scanning the document and to display the corresponding information.
-
The decryption can be carried out by, for example:
- ■ decrypting the random key by the system decryption key, decrypt the compressed document information using the random key
or by - ■ decrypting the hash code with the system decryption key and comparing it with the compressed document information hash code,
resp. After that, the compressed document information is decompressed and the module displays it so that the verifier can compare this document information with the printed document information to verify the correctness and safety of the document from fraud.
-
The verifier can verify using the Online Verification Module through the Internet from displaying the certified document information to verify the correctness and safety of the document from fraud.