TW200937929A - Method of using digital signature code for verifying the authenticity of physical object - Google Patents

Method of using digital signature code for verifying the authenticity of physical object Download PDF

Info

Publication number
TW200937929A
TW200937929A TW97105886A TW97105886A TW200937929A TW 200937929 A TW200937929 A TW 200937929A TW 97105886 A TW97105886 A TW 97105886A TW 97105886 A TW97105886 A TW 97105886A TW 200937929 A TW200937929 A TW 200937929A
Authority
TW
Taiwan
Prior art keywords
digital signature
code
digital
authenticity
physical
Prior art date
Application number
TW97105886A
Other languages
Chinese (zh)
Other versions
TWI353765B (en
Inventor
Jie Chen
Original Assignee
Jie Chen
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Jie Chen filed Critical Jie Chen
Priority to TW97105886A priority Critical patent/TWI353765B/zh
Publication of TW200937929A publication Critical patent/TW200937929A/en
Application granted granted Critical
Publication of TWI353765B publication Critical patent/TWI353765B/zh

Links

Abstract

A method of using digital signature code for verifying the authenticity of physical object is disclosed, including the following steps: firstly digitalize the content of a physical object and generate a digital data; then use a secret key to perform a digital signature procedure onto the digital data so as to obtain a digital signature. The digital signature is then converted into a digital signature code. The digital signature code is then inputted into and received by a code processing server host having the digital data, the digital signature, the digital signature code, and the signature sequence number. After that, the code-processing server host uses the signature sequence number to acquire a public key from a signature certification management server host. Finally, the public key, with the digital signature verification procedure, is used to verify the authenticity of the digital signature. By this way, the purpose of simplifying the conventional digital signature verification procedure is achieved.

Description

200937929 九、發明說明: 【發明所屬之技術領域】 本發明是有關於-種驗證實體物真偽之方法 a ==】數位簽章代碼驗證實體物上文字真偽之方法广 β現實生活中,為了要向他人證明自己對文件負責,或 疋證明該文件是由自己所發出 一 叼逋常會在文件上加蓋自200937929 IX. Description of the invention: [Technical field to which the invention pertains] The present invention relates to a method for verifying the authenticity of a physical object a ==] digital signature code to verify the authenticity of the text on the physical object in the wide beta real life, In order to prove to others that you are responsible for the document, or to prove that the document was issued by yourself, it will be stamped on the document.

己的印章或親筆簽名以資證明。例如:傳統的交易行為中 ’一個具有法律效力之商業交易,通常會有書面文件(例 如.契約書)並且會在其上加以簽名或蓋章如此才可以 確定交易雙方彼此相關的權利與義務,以及為了需要向他 人證明文件是由何人所發出的確認用意。 同樣地,在電子商務的環境中,商業交易行為則必須 仰賴電子文件與數位㈣來確立其權利與義務。所謂「電 子文件」是指與交易行為相關的資訊,其資訊型態可以為 文子、聲曰、圖片、影像、符號等之電子形式;而「數位 簽早」疋指依附於電子文件上,用以辨識及確認電子文件 簽署者(Signer)之身分及電子文件真偽的資訊。由此可知 ,數位簽章的功能與印章或親筆簽名的功能相似,只是它 所針對的文件是電子文件,而非實體文件。 目前實作上,數位簽章是以密碼學上的公開金鑰密碼 系統(Public Key Crypt〇SyStem ),又稱「非對稱密碼系統 (ASymmetric Cryptosystem)」為基礎來實作,亦即在該系 統中,每一位使用者必須自行產生自己所擁有的金鑰對( 5 200937929The seal or autograph is used to prove it. For example, in a traditional transaction, a legally binding commercial transaction usually has a written document (for example, a contract) and will be signed or stamped on it to determine the rights and obligations of the parties to the transaction. And in order to prove to others that the document was issued by someone. Similarly, in the context of e-commerce, business transactions must rely on electronic documents and digital (4) to establish their rights and obligations. The so-called "electronic documents" refers to information related to trading behaviors. The information type can be electronic forms such as text, sonar, pictures, images, symbols, etc., and "digital signing" refers to the attachment to electronic documents. To identify and confirm the identity of the electronic signer (Signer) and the authenticity of electronic documents. It can be seen that the function of the digital signature is similar to that of the seal or autograph, except that the file it is targeting is an electronic file, not an entity file. At present, the digital signature is based on the cryptographic public key cryptosystem (Public Key Crypt〇SyStem), also known as the "ASymmetric Cryptosystem", which is also implemented in the system. Each user must generate their own key pair ( 5 200937929

Key Pair ): —把私密金鑰(Secret Key)與一把公開金錄( Public Key )。其中使用者必須秘密地保存自己的私密金錄 ,並且將其公開金鑰公佈於網路中。之後,使用者可以利 用自己的私密金鑰對文件進行簽署;而數位簽章的接收者 可以利用該簽署者的公開金鑰來驗證數位簽章的有效性。 此外,一個安全且有效的數位簽章,除了簽署者必須 要以正確且有效的方法來對電子文件進行簽署外,其所產 生的數位簽章之有效性亦需要一個合適的驗證方法來驗證 〇 。數位簽章機制(Digital Signature Mechanism )便是以密 碼學(Cryptography)為基礎來定義安全的簽章產生與簽章 驗證方法,此機制包括:簽章產生機制(Signature Generation Mechanism )與簽章驗證機制(Signature Verification Mechanism )。「簽章產生機制」是指簽署者產生 數位簽章的方法或程序,而此機制可視為一個數學演算法 。若簽署者要進行簽署時,他可以將欲簽署的電子文件與 自己所擁有的密鑰當作該演算的輸入值,經過該演算法的 〇 計算後便能得到電子文件的數位簽章。另一方面,「簽章驗 證機制」是指驗證者用來驗證數位簽章之有效性的方法或 程序。若是驗證者收到簽署者的電子文件與數位簽章時, 他必須使用電子文件、數位簽章以及簽署者的公鑰,並且 透過此機制來驗證此數位簽章的有效性。 與數位簽章息息相關的密碼技術為「單向雜湊函數」( One-Way Hash Function),此單向雜湊函數是一種可以將任 意長度的輸入值壓縮成固定長度之輸出值的數學函數或演 6 200937929 算法’並且無法從其輸出值去推算其輸入值如現行常見 的MD5 5戈FIP93等單向雜湊函數。在安全性(亦即防止非 法者偽造-個合法的數位簽章,以及防止攻擊者從簽章訊 2破解出簽署的密鑰)與效率性的考量下,安全的數位簽 2機制必須引人單向雜凑函數於該機制中。換言之,在簽 早產生機制甲,簽署者必須先透過單向雜濤函數將電子文 件轉換成固定長度的位元資料,稱之為資料摘要(Data Digest),隨後再使用密鎗簽署該資料摘要以產生數位簽章 :同樣地’驗證者亦需先使用此單向雜湊函數,將電子文 件轉換成固定長度㈣料摘要再進行驗證動作。 因此,前述所提之數位簽章相關說明可由圖i所示之 章架構1概括而述’當愛麗絲(AHee)欲對一數位 文件11簽章時,即使用_ _ 用雜溱函數12將該數位文件u轉 換:-第-訊息摘要13’再利用其所擁 ❹ Γ連一摘要13加密成-數位簽章…並將該數位文件 =同魏位簽章^傳送給飽伯(Bob);當飽伯接到該數 立杜及數位簽早15後,即透過該雜凑函數12對該數 位二飽!Γ換動作’同樣地也得出該第-訊… —機構(圖未不)内取得-與愛麗絲的私 相對應的公開金餘16後’再對該數位簽章15進 :Γ:3’::Γ第二訊息摘要17,最後,將該第-訊息 :要」/=二訊息摘要17進行比對,檢查是否相互吻 ;傳=:則表示所收到之該數位文件Μ實是由愛麗絲 200937929 ❺ ❹ 、年來由於網際網路發達的緣故,以往需透過郵差 或决遞人員協助送交的資料,且須經過一段遞送時間始能 接獲的資料’在現今的E時代中,只須敲擊—按鍵,隨即 透j ‘,,、遠弗屆的網際網路,於彈指之間即送達到收件對方 艮月』然而,也因為訊息傳遞便利性的大幅提昇,同時肇 出利用網際網路之詐編事件,例如,西元2007年4月24 2中國時報之報導指出’有不少受害民眾接到一緊急通知 子郵件Q知「其銀行帳戶因為被不法集團利用而遭到政 :金!會的強财結控管,並請盡速回覆,將有檢察官(實 簽之聯繫並作進一步指示」。雖然,利用目前的數位 早機制即能對此詐編事件進行進—步地驗證,但是,由 :其驗證方式對於-般非熟稔電腦相關領域的人(特別是學 紀的老年人)來說’如何取得驗證用的公開金 何網頁去進行驗證?其程序實為繁複。 業者所欲努力研究的方χ向數位簽章之驗證程序,便成為相關 【發明内容】 因此,本發明之目的’即在提供一種利用 瑪驗證實體物真偽之方法。 法月利用數位簽章代喝驗證實體物真偽之方 /¾•,包含以下步驟: 並產生出一數位資料 (a)數位化一實體物之表面内容, 8 200937929 ,而產生出一數位簽章。 (C)將該數位簽章轉換成一數位簽章代碼。 (d) —儲存有該數位資料、該數位簽章、該數位簽章代 碼及-相對於該私密金錄的簽章序號之代碼處理飼服主機 接收該數位簽章代碼的輸入。 (e) 該代碼處理伺服主機利用該簽章序號自一簽章憑證 管理伺服主機取得一公開金鑰。 (f) 使用該公開金鑰配合數位簽章驗證程序,檢驗該數 > 位簽章是否為真。 本發明之功效在於,藉由對習知數位簽章之使用模式 ’以數位簽章代碼取代,而簡化了現今數位簽章的驗證程 序,並進而衍生出更為廣泛的便利應用方式。 【實施方式】 有關本發明之前述及其他技術内容、特點與功效,在 以下配σ參考圖式之二較佳實施例的詳細說明中將可清 楚的呈現。 m 在本發明被詳細描述之前,要注意的是,在以下的說 明内容中,類似的元件{以相同的編號來表示。 參閲圖2、圖3及圖4,本發明利用數位簽章代碼驗證 實體物真偽之方法2的一第一較佳實施例,包含以下步驟 百先,如步驟21所示,藉由一轉換裝置32數位化_ 實體物31之表面内容,並產生出一數位資料331於一電腦 終端機33内。在本較佳實施例中,該實體物31是一實體 9 200937929 文件311,而該轉換裝置32可視為是一般常見的掃描裝置 ,並透過此掃描裝置對該實體文件3u進行掃描,而將此實 體文件311之内容輸入至該電腦終端機33内,但是,除了 透過掃描裝置對該實體文件311掃描之外,也可以是以人工 方式鍵入該實體文件311之全部(或部分)内容文字並產生出 電子文件檔案,並儲存於該電腦終端機33内;而關於上述 經數位化之實體物31的表面内容,其明文(plain text)檔案 的格式是符合執行一數位簽章35的格式,例如具有副檔名 txt的檔案、具有副檔名d〇c的檔案、具有副檔名(emi)的 電子郵件、手機簡訊(SMS)、網頁文件(HTML d〇cument)或 是可延伸性標示語言格式文檔之其中之一者。此外,在現 實生活中,該實體物31亦可以是其他非實體文件311之形 式,如二維的立體物312,並經過一具有照相或攝影功能的 轉換裝置32,如數位照相裝置或數位攝影裝置等,將該立 體物312之外觀拍下後,以數位資料331格式(靜態圖像或 動態影像)輸入至該電腦終端機33内,此外,具有類似電腦 終端機33功能的網路通訊手機(圖未示)或個人行動電子裝 置(圖未示)均可使用,因此並不應以本較佳實施例中所揭 露者為限。 當然,在該步驟21中,也可於該轉換裝置32數位化 該實體物31之表面内容時,同時加入一非實體物之表面内 容,而產生出該數位資料331於該電腦終端機33内。且該 非實體物之表面内容可以是執行數位簽章者所欲註明或附 加之内容。 10 200937929 再補充說明的是,前述之實體文件311,可以是國民身 分證、健保卡、駕駛執照、車籍資料、車輛出廠資料、電 子機票、畢業證書、名片、判決書、契約書、委託書、授 權書、協議書、醫療診斷報告書、信用狀、傳票、拘票、 搜索票、專業證照、工作證、商品價目表、商品保證書、 交易收據、網頁文字、正本、副本、影本或複製本、履歷 表、生產履歷、各種工作證(包括外勞)、公司證、記者證、 警察證、通行證、停車證、技職專業證照、聘書、服務年 ® 資證明、(藥)物品的說明書、廣告招牌、廣告DM、文宣、 公文、(個人或公司)公告或聲明、標語、照片中之文字、( 病症暨失能)診斷書、巴式量表(Barthel Index)、報紙雜總期 刊中的一段文字、(管理費)繳費帳單、護照簽證中的文字、 一份具法律性質的聲明文字、刮刮樂獎券、各式票(券)、一 幅畫作的圖說、訂單、產地證明、信用狀、租賃書、各種 各式的複委託書(如證券商)、電子郵件中文字及其他對於身 分具有代表識別性或其公信力極為重要而須慎防偽造之文 ❿ 書等。 其次,如步驟22所示,利用一私密金鑰34對該數位 資料331進行一般的數位簽章程序(見圖1)後,而產生出數 位簽章35。在本較佳實施例中,對該數位資料331進行簽 章之私密金鑰34是經由一憑證晶片卡(圖未示),也就是現 行使用之二種晶片卡,接觸式晶卡,例如IS07816或是非 接觸式晶片卡,例如IS014443,再配合一晶片卡讀卡裝置( 圖未示),並透過該電腦終端機33之讀取而取得的,再透過 11 200937929 一簽章工具程式(圖未示)配合該私密金鑰34,將包括檔案名 稱、作者基本資料、建棺時間、有效期間及摘要說明等數 位簽章35必要内容及其格式簽蓋於上述之實體文件311上 ’而完成簽章程序’由於此數位簽章流程並非本發明改良 的重點,僅須依循現今之數位簽章方式即可,故在此不再 贅述。 接著,如步驟23所示,將該數位簽章35轉換成一數 位簽章代碼3 7。 ❹Key Pair ): —Secure the Secret Key and a Public Key. The user must secretly keep his private record and post his public key on the Internet. The user can then sign the file with his or her private key; the recipient of the digital signature can use the signer's public key to verify the validity of the digital signature. In addition, a safe and effective digital signature, in addition to the signatory must sign the electronic document in a correct and effective way, the validity of the digital signature generated by the signatory also requires a suitable verification method to verify 〇 . The Digital Signature Mechanism is based on Cryptography to define secure signature generation and signature verification methods. This mechanism includes: Signature Generation Mechanism and signature verification mechanism. (Signature Verification Mechanism). The "signature generation mechanism" refers to the method or procedure by which the signer generates a digital signature, and this mechanism can be regarded as a mathematical algorithm. If the signatory wants to sign, he can use the electronic file to be signed and the key he owns as the input value of the calculus. After the 的 calculation of the algorithm, the digital signature of the electronic file can be obtained. On the other hand, the “signature verification mechanism” refers to the method or procedure used by the verifier to verify the validity of the digital signature. If the verifier receives the signatory's electronic file and digital signature, he must use the electronic file, the digital signature, and the signer's public key, and use this mechanism to verify the validity of the digital signature. The cryptographic technique closely related to the digital signature is the One-Way Hash Function, a mathematical function that can compress an input value of any length into a fixed-length output value. 200937929 The algorithm 'can't derive its input value from its output value, such as the one-way hash function such as the current common MD5 5G FIP93. Under the consideration of security (that is, preventing illegal falsification - a legitimate digital signature, and preventing the attacker from cracking the signed key from the signature 2) and the efficiency considerations, the secure digital sign 2 mechanism must attract people. One-way hash functions are in this mechanism. In other words, in the early signing mechanism, the signer must first convert the electronic file into a fixed-length bit data through a one-way hash function, called a Data Digest, and then use the secret gun to sign the data summary. To generate a digital signature: Similarly, the 'verifier' must first use this one-way hash function to convert the electronic file into a fixed-length (four) material summary and then perform the verification. Therefore, the above-mentioned description of the digital signature can be summarized by the chapter structure 1 shown in FIG. 1 'When Alice wants to sign a digital file 11, the _ _ using the hodge function 12 will The digital file u conversion: - the first message summary 13' is re-encrypted into a - digital signature by using its summary 13 and the digital file is transmitted to the Bob. When Saburo receives the number of Du Du and the number sign 15, the number is saturated through the hash function 12! The same action also gives the first message - the mechanism (the picture is not ) Get inside - the public money corresponding to Alice's private account is 16 after the 're-signature of the digital sign 15: Γ: 3':: Γ second message summary 17, finally, the first message: want" /= Two message summary 17 for comparison, check whether to kiss each other; pass =: means that the digital file received is actually Alice 200937929 ❺ 、, due to the development of the Internet in the past, the past need to pass the postman Or the person who assisted in the delivery of the information and the information that must be received after a period of delivery' in the current E era Just tapping the button, then you can see through the j',, the far-off Internet, and send it to the recipient's next month. However, because of the greatly improved convenience of message transmission, it also pulls out Using Internet scams, for example, the April 24, 2007 China Times report pointed out that 'a lot of victims received an urgent notification email Q know that their bank account was used by the illegal group. Politics: Kim! The strong financial control of the meeting, and please reply as soon as possible, there will be a prosecutor (the actual link and further instructions). Although, using the current digital early mechanism, this fraudulent incident can be carried out. - Step-by-step verification, however, by: the verification method is for the people who are not familiar with computer-related fields (especially the elderly of the school), how to obtain the publicity page for verification to verify? In order to solve the problem, the verification procedure of the digital signature of the party to be studied by the industry has become relevant [invention] Therefore, the object of the present invention is to provide a method for verifying the authenticity of a physical object by using a horse. Use the digital signature to verify the authenticity of the physical object/3⁄4•, including the following steps: and generate a digital data (a) digitize the surface content of a physical object, 8 200937929, and produce a digital signature (C) Converting the digital signature into a digital signature code. (d) - storing the digital data, the digital signature, the digital signature code, and the code of the signature serial number relative to the private record Processing the feeding host to receive the input of the digital signature code. (e) The code processing server uses the signature serial number to obtain a public key from a signature certificate management server. (f) Using the public key with the digit The signature verification program verifies that the number > bit signature is true. The effect of the present invention is that it simplifies the verification process of today's digital signatures by replacing the use of the traditional digital signature with the digital signature code, and further derives a wider range of convenient applications. [Embodiment] The foregoing and other technical contents, features, and advantages of the present invention will be apparent from the following detailed description of the preferred embodiment of FIG. m Before the present invention is described in detail, it is to be noted that in the following description, similar elements are denoted by the same reference numerals. Referring to FIG. 2, FIG. 3 and FIG. 4, a first preferred embodiment of the method 2 for verifying the authenticity of a physical object by using a digital signature code includes the following steps. As shown in step 21, The converting means 32 digitizes the surface content of the physical object 31 and produces a digital data 331 in a computer terminal unit 33. In the preferred embodiment, the physical object 31 is an entity 9 200937929 file 311, and the converting device 32 can be regarded as a common scanning device, and the physical file 3u is scanned through the scanning device. The content of the physical file 311 is input into the computer terminal 33. However, in addition to scanning the physical file 311 by the scanning device, all (or part) of the content text of the physical file 311 may be manually input and generated. An electronic file file is stored and stored in the computer terminal 33; and regarding the surface content of the digitized physical object 31, the format of the plain text file conforms to the format in which the digital signature 35 is executed, for example File with extension file name txt, file with extension file name d〇c, email with extension file name (emi), mobile phone newsletter (SMS), web page file (HTML d〇cument) or extensible markup language One of the format documents. In addition, in real life, the physical object 31 may also be in the form of other non-physical documents 311, such as a two-dimensional three-dimensional object 312, and passed through a conversion device 32 having a camera or photography function, such as a digital camera or digital photography. The device or the like photographs the appearance of the three-dimensional object 312, and inputs the digital data 331 format (still image or moving image) into the computer terminal 33, and further has a network communication mobile phone similar to the function of the computer terminal 33 (not shown) or personal mobile electronic devices (not shown) may be used and therefore should not be limited to those disclosed in the preferred embodiment. Of course, in the step 21, when the surface of the physical object 31 is digitized by the converting device 32, the surface content of the non-physical object is simultaneously added, and the digital data 331 is generated in the computer terminal 33. . And the surface content of the non-physical object may be what the digital signer wishes to indicate or add. 10 200937929 It is further added that the aforementioned physical document 311 may be a national identity card, a health insurance card, a driver's license, a vehicle registration material, a vehicle shipment information, an electronic ticket, a graduation certificate, a business card, a judgment, a contract, a power of attorney, Power of Attorney, Agreement, Medical Diagnostic Report, Letter of Credit, Summons, Detention, Search Tickets, Professional License, Work Permit, Commodity Price List, Commodity Warranty, Transaction Receipt, Web Page Text, Original, Copy, Photocopy or Replica, Resume , production history, various work permits (including foreign workers), company licenses, press cards, police cards, passes, parking permits, technical professional licenses, letters of appointment, service year certification, (medicine) articles, advertising signs, advertising DM, text, official documents, (individual or company) announcements or statements, slogans, texts in photographs, (disease and disability) diagnostics, Barthel Index, a section of the newspaper's general journal, ( Management fee) payment bill, text in passport visa, a legal statement text, scratch ticket Various types of tickets (vouchers), a picture of a painting, an order, a certificate of origin, a letter of credit, a rental book, various forms of multiple power of attorney (such as a securities firm), e-mail Chinese characters, and other representations of identity or Its credibility is extremely important, and it is necessary to guard against forged books and so on. Next, as shown in step 22, the digital signature 331 is subjected to a general digital signature procedure (see Fig. 1) using a private key 34 to generate a digital signature 35. In the preferred embodiment, the private key 34 for signing the digital data 331 is via a voucher wafer card (not shown), that is, two types of wafer cards currently in use, a contact crystal card, such as IS07816. Or a contactless chip card, such as IS014443, coupled with a chip card reader (not shown), and obtained through the reading of the computer terminal 33, and then through the 11 200937929 a signature tool program (not shown) In conjunction with the private key 34, the necessary content including the file name, the author's basic information, the construction time, the validity period, and the abstract description, 35 and the necessary contents and the format thereof are stamped on the physical file 311 described above. Chapter program 'Because this digital signature process is not the focus of the improvement of the present invention, it is only necessary to follow the current digital signature method, so it will not be repeated here. Next, as shown in step 23, the digital signature 35 is converted into a digital signature code 37. ❹

值得一提的是’在本較佳實施例中,是利用一單向雜 湊函數36(MD5、FIP93或SHA-!等)之運算’將該數位簽章 35轉換成一數位簽章代碼37 ;此種單向雜湊函數%,不僅 具有將任意長度位元資料轉換成固定長度位元資料之特性 外,更具有無法從已經過單向雜凑函數36轉換過之結果資 料逆推回原資料内容的「單向不可逆」特質。此外,對於 同一個單向雜湊函數36而言,不同的輸人資料,會有不同 的輸出資料,加上單向雜湊函數36的計算複雜度相當高, 故欲破解此種單向雜凑函數36而將之輸出資料竄改是非常 ^難的;然而’於實際應用上,該數位簽章代碼37也可以 是以人卫方式職或隨機地直接對該數位簽章35指定-代 號,故不應僅侷限於本較佳實施例所述之方式實施。 田、:在該步驟23中,於產生該數位簽章代碼37後 ,可再透過-條瑪產生裝置(圖未扑對所產生之數位簽章 代碼37轉換成以條蝎的形式呈現。 然後’如步驟24於- > 丄 所不’ 一儲存有該數位資料331、該 12 200937929 數位簽章35、該數位簽章代碼37及一相對於該私密金鑰 34的簽章序號332之代碼處理伺服主機38,接收該數位簽 章代碼37的輸入。在本較佳實施例中,該代碼處理伺服主 機38在接收該數位簽章代碼37之輸入時,先檢查該數位 簽章35是否仍在其有效期間内,若逾期,即停止對該數位 簽章35進行後續驗證作業;且該代碼處理伺服主機38每 隔一預設期間,如每天、每週或每月,即自動檢查該數位 簽章35是否仍在其有效期間内。 φ 此外,除上述檢驗該數位簽章35是否仍在其有效期間 内之外,該代碼處理伺服主機38也可以具有一用來統計該 數位簽章代碼37輸入次數(或驗證次數)之計次裝置(圖未示) ,且在接收該數位簽章代碼37之輸入時,運用該計次裝置 檢查是否超過一預設次數,若超過該預設次數,即停止對 該數位簽章35進行後續驗證作業。且當該數位簽章代碼37 在該步驟23時,如果還有再經一條碼化的過程時,則在該 步驟24中,該代碼處理伺服主機38就是藉由一條碼讀取 © 裝置來接收該數位簽章代碼37之輸入。 補充說明的是,在本較佳實施例中所提及之私密金鑰 34與公開金鑰40,實為現行的「非對稱性加密系統」,且 此「非對稱性加密系統」較常用於數位簽章領域中的有以 下三種機制: RSA數位簽章機制:1978年,Rives、Shamir及 Adleman (RSA78)三位學者利用分解大質數的困難度,提出 RSA 數位簽章機制。目前,VISA、MasterCard、IBM、 13 200937929It is worth mentioning that in the preferred embodiment, the operation of the one-way hash function 36 (MD5, FIP93 or SHA-!, etc.) is used to convert the digital signature 35 into a digital signature code 37; The one-way hash function % not only has the characteristics of converting the bit length data of any length into fixed-length bit data, but also has the inability to reverse the original data content from the result data that has been converted by the one-way hash function 36. "One-way irreversible" traits. In addition, for the same one-way hash function 36, different input data will have different output data, and the computational complexity of the one-way hash function 36 is quite high, so it is necessary to break such a one-way hash function. 36. It is very difficult to tamper with the output data; however, in practical applications, the digital signature code 37 can also be directly assigned to the digital signature 35 by the person-in-person or randomly, and therefore does not It should be implemented only in the manner described in the preferred embodiment. Tian, in this step 23, after the digital signature code 37 is generated, the digital barcode generation device 37 can be re-transmitted to generate the digital signature code 37 to be presented in the form of a bar. 'If step 24 is -> 丄 ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' The processing server host 38 receives the input of the digital signature code 37. In the preferred embodiment, the code processing servo host 38 first checks whether the digital signature 35 is still received when receiving the input of the digital signature code 37. During the valid period, if the deadline is over, the digital signature seal 35 is stopped for subsequent verification operations; and the code processing servo host 38 automatically checks the digit every predetermined period, such as daily, weekly or monthly. Whether the signature 35 is still within its valid period. φ In addition, in addition to the above checking whether the digital signature 35 is still within its valid period, the code processing servo host 38 may also have a code for counting the digital signature. 37 lose a counting device (not shown) of the number of times (or the number of times of verification), and when receiving the input of the digital signature code 37, using the counting device to check whether it exceeds a preset number of times, if the preset number of times is exceeded, That is, the subsequent verification operation is stopped for the digital signature 35. And when the digital signature code 37 is at the step 23, if there is still another process of coding, then in the step 24, the code processing servo The host 38 receives the input of the digital signature code 37 by means of a code reading © device. It is added that the private key 34 and the public key 40 mentioned in the preferred embodiment are The current "Asymmetric Encryption System", and this "Asymmetric Encryption System" is commonly used in the field of digital signatures. There are three mechanisms: RSA Digital Signature Mechanism: 1978, Rives, Shamir and Adleman (RSA78) The three scholars used the difficulty of decomposing large prime numbers to propose the RSA digital signature mechanism. Currently, VISA, MasterCard, IBM, 13 200937929

Microsoft、HP等公司所協力制定的安全電子交易標準( Secure Electronic Transactions,SET)便是採用 RSA 數位 簽章機制。系統設置時,每一位使用者可以先選擇其私密 金錄:即二個大質數(p,q)以及一整數d<(p-l)(q-l),其 中d與(p-l)(q-l)互質;之後再計算出其公開金鑰: 與e=d-l mod (p-l)(q-l),其中mod表示模數運算(亦即 取餘的運算)。The Secure Electronic Transactions (SET) developed by Microsoft, HP, etc. is based on the RSA digital signature mechanism. When the system is set up, each user can first select their private record: two large prime numbers (p, q) and an integer d<(pl)(ql), where d is mutually compatible with (pl)(ql) Then calculate its public key: and e=dl mod (pl)(ql), where mod represents the modulo operation (that is, the remainder operation).

ElGamal 數位簽章機制:T. ElGamal (E1G85)於 1985 Ο 年提出ElGamal數位簽章機制,而此機制的安全性是建立 在解決離散對數問題的困難度上。在使用此機制之前,系 統會先公佈一個大質數ρ和模ρ的原根g。之後,每位 使用者先任選一個小於p-1的整數X作為私密金鑰,並且 計算出他的公開金錄y=gx mod ρ。 DSA 數位簽章機制:此數位簽章機制是由美國國家標 準局(National Institute of Standard and Technology,NIST )於 1991年8月提出(DSS91,DSS92),其安全性與 ® ElGamal數位簽章機制相同,皆建立在解決離散對數問題的 困難度上。在使用此機制之前,系統會先選擇一個512位 元的質數ρ與一個160位元的質數q,其中ρ-I可以被 q整除。另外,系統再任選一個小於ρ-I的整數h並且 計算出g=hp-l/q mod ρ。最後,公佈系統參數{p,q,g}。 因此,使用者一旦得知系統公開參數之後,便可任選一個 小於q-Ι的整數X作為私密金鑰,並且計算出他的公開金 餘 y=gx mod ρ ° 14 200937929 由於數位簽章機制中所使用的「非對稱性加密系統」, 是熟悉該領域之人士可輕易思及且變化應用的,故不應受 本較佳實施例之特定範例為限。 、 再來,如步驟25所示,該代碼處理伺服主機38利用 該簽章序號332自一簽章憑證管理伺服主機39取得一與該 簽章序號332相對應的公開金鑰40。在本較佳實施例中, 該簽章憑證管理伺服主機39可以是架設於内政部自然人憑 證管理中心、經濟部工商憑證管理中心、政府法人憑證或 Φ 其他民營的憑證管理中心内。 而後,如步驟26所示,使用該公開金鑰40配合如圖1 所示的習知數位簽章驗證程序,檢驗該數位簽章35是否為 真。簡而言之,因為每一把私密金鑰34只有一把與其相對 應的公開金鑰40能對由該私密金鑰34所簽發之數位簽章 35進行解密驗證,因此,若能由某一使用者的公開金鑰40 解開其數位簽章35時,就表示該數位簽章35確實是由該 使用者之私密金鑰34所簽蓋的,藉此機制來實現該數位簽 ❹ 章35之鑑別性檢驗;同樣地,由於如何利用公開金鑰40 對數位簽章35進行驗證屬習知技術之範疇,亦非本發明之 改良重點,因此在此諒可不需再加以贅述。 最後,如步驟27所示,判讀已利用該公開金鑰40驗 證的數位簽章35附帶之内容是否與該實體物31之表面内 容相符。在本較佳實施例中,當該數位簽章35已透過該公 開金鑰40解碼驗證後,即可再透過肉眼對該數位資料331 以人工核對方式,檢驗其内容是否有遭竄改。 15 200937929 接下來鑒於蘋果日報2007年2月8日報導,歹徒假 s陳柘仁檢察g印信在假的公文内容上並詐得千萬元之真 實詐編案例’來導引出—套利用前述「利用數位簽章代碼 驗也實體物真偽之方法2」所開發出的「簽章及驗證系統」 來進行上述相_數位㈣35產生及其驗證作業的一第二 較佳實施例: 參閱圖5,為—地方法院傳票所載之假設内容,在本較 佳實施例是使用名為「邱吉強」&自然人憑證晶片卡執行 數位簽章35’暫時替代扮演由政府法人憑證製發單位發給 真實法官的憑證晶片卡之角色。 關於數位簽章代碼37的產生,首先,如圖6所示,一 使用者在其電腦終端機33的螢幕所顯示的簽章及驗證表單 執行介面41中,點選簽章功能選項42;接著,點選檔案 開啟鍵43,以瀏覽並尋找使用者所欲執行數位簽章的檔案 名稱,如圖7之選擇檔案對話框44所示,名為「法院傳票 .txt」之電子檔;然後,所點選之「法院傳票· txt」就被 選入表單執行介面41中,並如圖8所示,於表單執行介面 41之檔案路徑及名稱顯示攔45内呈現出其所屬路徑及名稱 ’而後在數位簽章有效天數選取表單46上,選擇本次數位 簽章代碼3 7的有效天數,如果該使用者是使用晶片卡時, 則須在晶片卡密碼輸入欄47内輸入晶片密碼(見圖9);最 後’於點選簽章產生鍵48後,如圖10之簽章代碼產生欄 49内即出現本次編號為r39c3ee7211」的簽章代碼37。 然而,關於驗證數位簽章代碼驗證實體物真偽的操作 16 200937929 ,首先,如圖11所示,另一使用者在其電腦終端機33(可 為同一部或不同部)上開啟上述之簽章及驗證系統,並點選 其上之驗證功能選項50 ;接著,如圖12所示,在簽章代碼 輸入欄51内輸入於前述數位簽章代碼37產生說明中所產 生的「39c3ee7211」簽章代碼37並點選執行驗證鍵52 ;若 此簽章驗證成功時,即如圖13所示,彈出—驗證成功對話 框53,然後,如圖14所示,於驗證結果顯示框54内呈現ElGamal Digital Signature Mechanism: T. ElGamal (E1G85) proposed the ElGamal digital signature mechanism in 1985, and the security of this mechanism is based on the difficulty of solving the discrete logarithm problem. Before using this mechanism, the system first announces the prime root g of a large prime number ρ and modulo ρ. After that, each user first selects an integer X less than p-1 as the private key, and calculates his public record y=gx mod ρ. DSA Digital Signature Mechanism: This digital signature mechanism was proposed by the National Institute of Standards and Technology (NIST) in August 1991 (DSS91, DSS92) with the same security as the ® ElGamal digital signature mechanism. , are all based on the difficulty of solving the discrete logarithm problem. Before using this mechanism, the system first selects a 512-bit prime number ρ and a 160-bit prime number q, where ρ-I can be divisible by q. In addition, the system optionally selects an integer h smaller than ρ-I and calculates g = hp - l / q mod ρ. Finally, the system parameters {p, q, g} are published. Therefore, once the user knows the system public parameters, he can choose an integer X smaller than q-Ι as the private key, and calculate his public gold balance y=gx mod ρ ° 14 200937929 due to the digital signature mechanism The "asymmetric cryptosystem" used in the art can be easily considered and varied by those skilled in the art and should not be limited to the specific examples of the preferred embodiment. Further, as shown in step 25, the code processing servo host 38 uses the signature number 332 to obtain a public key 40 corresponding to the signature number 332 from a signature certificate management server 39. In the preferred embodiment, the signature voucher management server 39 can be installed in the Ministry of the Interior natural person certificate management center, the Ministry of Economics business certificate management center, the government legal person certificate or the other private certificate management center. Then, as shown in step 26, the public key 40 is used in conjunction with the conventional digital signature verification procedure shown in Fig. 1, to check if the digital signature 35 is true. In short, because each private key 34 has only one corresponding public key 40, the digital signature 35 issued by the private key 34 can be decrypted and verified. When the user's public key 40 unlocks the digital signature 35, it indicates that the digital signature 35 is indeed signed by the user's private key 34, thereby implementing the digital signature. The discriminative test; likewise, the use of the public key 40 for the verification of the digital signature 35 is a matter of the prior art, and is not an improvement of the present invention, so it is not necessary to repeat them here. Finally, as shown in step 27, it is interpreted whether the content attached to the digital signature 35 that has been verified by the public key 40 matches the surface content of the physical object 31. In the preferred embodiment, after the digital signature 35 has been decoded and verified by the public key 40, the digital data 331 can be manually checked by the naked eye to check whether the content has been tampered with. 15 200937929 Next, in view of the Apple Daily’s report on February 8, 2007, the sinister sin Chen’s prosecutor g-printed on the fake official document and swindled the real fraudulent case of 10 million yuan to guide out the use of the aforementioned A second preferred embodiment of the "signature and verification system" developed by the "Method 1 for authenticating the authenticity of the digital signature" to perform the above-mentioned phase-digit (four) 35 generation and verification operation: 5, for the hypothetical content contained in the subpoena of the local court, in the preferred embodiment, the use of the name "Qiu Jiqiang" & the natural person certificate chip card to execute the digital signature 35' temporary replacement played by the government legal person certificate issuing unit The role of the real judge's voucher chip card. Regarding the generation of the digital signature code 37, first, as shown in FIG. 6, a user clicks on the signature function option 42 in the signature and verification form execution interface 41 displayed on the screen of the computer terminal 33; Click the file open button 43 to browse and find the file name of the digital signature that the user wants to execute, as shown in the Select File dialog box 44 of FIG. 7, an electronic file named "Court Voucher.txt"; The selected "court ticket txt" is selected in the form execution interface 41, and as shown in FIG. 8, the path and name of the form is displayed in the file path and name display block 45 of the form execution interface 41. On the digital signature valid days selection form 46, the effective number of days of the signature stamp code 3 7 is selected. If the user is using the wafer card, the wafer password must be entered in the wafer card password input field 47 (see FIG. 9); Finally, after selecting the signature generation key 48, the signature code 37 of the current number r39c3ee7211 appears in the signature code generation field 49 of FIG. However, regarding the operation of verifying the authenticity of the digital signature code to verify the authenticity of the physical object 16 200937929, first, as shown in FIG. 11, another user opens the above-mentioned signature on his computer terminal 33 (which may be the same or a different part). And the verification system, and select the verification function option 50 thereon; then, as shown in FIG. 12, the "39c3ee7211" signature generated in the description of the digital signature code 37 is entered in the signature code input field 51. The code 37 is selected and the verification key 52 is clicked; if the signature verification is successful, as shown in FIG. 13, the pop-up verification success dialog 53 is displayed, and then, as shown in FIG. 14, the verification result display box 54 is presented.

出:一真實簽章人姓名55、一組簽章有效期間56、一組簽 章人憑證有效期間57,及一用來呈現與該數位簽章35相關 之數位資料331内容的檔案内容顯示攔58;最後,再透過 使用者以肉眼辨識方式,對該數位資料331進行更進一步 地内容核對,來檢驗圖5之板橋地方法院傳票内容是否遭 人惡意竄改。 在此須補充說明的是,簽章人若是一位真實法官使用 政府法人憑證晶片卡所簽章時,前述之簽章人姓名託將顯 示為「邱吉強,板橋地方法院法官」(圖未示),而並非如 圖14所示的「邱吉強」三個字;此外,於樓案内容顯示襴 58所顯示的是前述「法院傳票txt」槽案的内容,且該内 容是由法官自行輸入傳票(實體文件)之全部内容或部^重 要内容等方式所產生之電子文件檔案。 上述例子中,如圖10之簽章代碼產生欄49内即出現 本次編號為「39c3ee7211」的簽章代碼37。接著,進—步 邱吉強法官所屬的—個以上的上司或其他㈣法人例如 圖5中的地院也可以再對本次的簽章代碼37,執行圖5至 17 200937929 圖ίο的各步驟,去產生一個複簽章代碼(圖未示)。該個複 簽章代碼(圖未示)皆可印在或寫在圖5中,該地方法院傳 票所載之假設内容上。如圖u所示,另—使用者在其_ 終端機33分別去驗證兩個簽章代碼(圖未示)。 因此藉由本發明之「利用數位簽章代碼驗證實體物 真偽之方法2」可有效避免以下所述之社會詐編事件層出不 窮地發生:Out: a real signature person name 55, a set of signature valid period 56, a set of signature holder voucher valid period 57, and a file content display for presenting the digital content 331 associated with the digital signature 35 58. Finally, through the user's visual identification, the digital data 331 is further checked for content to verify whether the content of the ticket of the Banqiao District Court of Figure 5 has been maliciously altered. It should be added here that if the signatory is signed by a real judge using the government legal person certificate chip card, the name of the above-mentioned signature holder will be displayed as "Qiu Jiqiang, Banqiao District Court Judge" (not shown) It is not the word "Qiu Jiqiang" as shown in Figure 14. In addition, the contents of the building case display 襕58 shows the contents of the aforementioned "court summons txt" slot, and the content is the judge's own input of the voucher ( The electronic file file generated by the whole content or the important content of the entity file. In the above example, the signature code 37 of the current number "39c3ee7211" appears in the signature code generation field 49 of Fig. 10. Then, more than one or more of the superiors or other (four) legal persons that Judge Qiu Jiqiang belongs to, such as the grounds in Figure 5, can also perform the steps of Figure 5 to 17 200937929. Generate a complex signature code (not shown). The complex signature code (not shown) can be printed or written in Figure 5 on the hypothetical content contained in the local court voucher. As shown in Fig. u, another user checks the two signature codes (not shown) at their terminal computers 33. Therefore, the "method 2 for verifying the authenticity of an entity using the digital signature code" of the present invention can effectively prevent the social fraud events described below from occurring indefinitely:

民視新聞網2_/08/11/報導:「…喬裝法務部人員, 以一張偽造的法務部執行處公文,欺騙被害人涉嫌非法洗 錢,所以必須;東結財產,如果被害人不想自己的帳戶被束 結’必須先匯款數十萬纟進行假扣才甲。一張幾可亂真的偽 造公文,再加上民眾對於法律常識的缺乏,讓這個集團在 短短半年内,至少得手一千兩百萬 '^ . .」。倘若此時,被 害人利用手機輸入所接獲公文上的簽章代碼37後傳送至代 碼處理伺服主機38,並自所回傳的訊息中’來比對並判讀 法務部執行處公文是否被偽造。 又,一委託人在銀行的紙製傳票上寫填提領一仟萬並 用私印,接著該委託人再手寫一張匯出該一仟萬的匯款單 後,此委託人使用本發明在該紙製傳票上手寫上一個簽章 代碼37,並在該匯款單上寫另一個數位簽章代碼37,再把 上述傳票相關資料及匯款單傳送至銀行指定的代碼伺服器 主機38進行儲存;因此,當一名被委託人走進銀行並持該 張紙製傳票臨櫃時,銀行櫃員及可使用銀行的電腦終端機 33輸入上述之數位簽章代碼37執行驗證委託人的内容真偽 18 200937929 ♦ 與否;如此一來,大額(現金委託)提領作業之進行即能獲 得加強確認。 最後,再針對如何結合本發明利用數位簽章代碼驗證 實體物真偽之方法2,如何應用於曰常生活上,以提昇其數 位簽章35驗證之便利性及實用性,作更多元化應用之舉例 說明: (一)驗證資訊公信力之程序簡化: 當一乘客欲坐上一遊覽車前,可針對該遊覽車的駕駛 f取其印有—數位簽章代碼37之駕駛資訊相關的名片或 是車上明顯處已貼有—印有數絲章代碼37的駕駛資訊文 件時,該乘客能立即透過一手持式電子裝置(圖未示),如個 人數位助理(PDA)、筆記型電腦或行動電話等,透過各式通 訊方式,如網路,與本較佳實施例中所述的代碼處理伺服 主機38取得連線,並輸入該數位簽章代碼37,執行查證動 作’當該代碼處理舰主機38藉由本發明所述之利用數位 〇 簽章代碼驗證實體物真偽之方法2驗證後,再透過該乘客 之核對,即可辯明該遊覽車駕駛之駕駛紀錄是否優良、該 補遊覽車之車況是否良好或該遊覽車之所有公司之信譽是 否良好等,以防止偽造的駕駛相關資料欺瞒了乘客,而避 免衍生出道路危安之潛在問題。 此外虽一網頁劉覽者在一附有一數位簽章代碼3 7的 網頁中閱讀其所刊載之内容時,可藉由對本較佳實施例中 、的代瑪處理伺服主機38,輸入該數位簽章代碼37,以 尋求該具有公信力之簽章憑證管理伺服主機39的證實,進 19 ❹ Ο 200937929 步地驗證所接收之資訊真偽,以辅助該網頁㉝覽者如何 在真真假假的資訊爆炸洪流巾尋求可#真實的消息,而不 致被假訊息誤導。 因此藉由上述之利用數位簽章代碼驗證實體物真偽 之方法2即可避免發生如中國時報於2刪年1月%日所 載之身分證料造事件:「在料㈣的巧顿造下,上百 名曾經服役於新竹某陸軍單位阿兵哥的軍餘條和軍人身分 證,變成嫌犯向銀行冒名申辦信用卡、車贷和房贷,並作 贷上千萬元的人頭資料。刑事局偵九隊昨曰逮捕主嫌余政 賢等五人’共起出大批偽造軍人身分證、國民身分證、健 保卡和電腦設備。警方調查,主嫌余政賢(廿人歲)從九 十四年十月起’著手偽造軍人身分證、餉條、國民身分證 :健保卡等證件,包裝成具有軍士以分,並且在銀行的 4§用卡申請書内附上軍人身分埽 早入豸刀也及新資證明等假文件,把 人頭主動升級,從上兵變成少校,或者下士自動晉升為少 將。警方分析’上百名人頭戶籍地’均位於新竹縣尖石鄉 ’而填寫駐在部隊更集中於陸軍某旅級單位、部隊.進方 Γ::Γ所附件的申請資料中軍證、薪資及身㈣ 本’偽造變造之文字字體大小與原本— 非檢竅原本外,實難察覺。」 、b精細,除 (二)針對具有時效性之訊息的輔助求證: 當一電子郵件收件者收到一 37的協尋失縱兒童信件時,可藉 ’透過本較佳實施例中之該步驟 封附帶有—數位簽章代褐 由輸入其數位簽章代碼37 24所述的代碼處理伺服主 20 200937929 機38 ’對於該數位簽章35之有效期限進行相關驗證,以判 斷該消息是否因為該失蹤兒童已尋獲,而早已註銷該封電 子信件的有效期限,而避免該封協尋信件因經手多人不斷 地轉發’卻在該名失蹤兒童被尋獲後’還導致不少仍不知 情的民眾繼續花心力協助搜尋,而平白地耗費許多社會資 源。 (三)驗證商品正牌與否之真偽: 备/肖費者欲購貝一樂妝用品時,由於該藥妝用品是 直接地接觸該消費者之身體表面,甚至是口服入體内,加 上目前社會上許多不肖業者為了謀取更多利益,泯滅良心 地製造大量會傷及人體的黑心偽藥,並使之充斥於市面上 ,但疋,即使透過現有衛生局的相關合格標章或藥檢字號 之涊定,仍然不敵不肖業者的偽造欺瞒手法;故鏗於此日 益嚴重之社會問題,即可將一數位簽章代碼37印製於該藥 妝商品包裝内或盒内蓋上,並透過本發明利用數位簽章代 碼驗證實體物真偽之方法2,提供該藥妝商品之成分標示、 來源等相關具公U資訊的驗證,以杜絕假藥對人體所帶 來的危害;另’再配合於該步驟24所提之該安裝於代碼處 理飼服主機38内,用來統計該數位簽章代碼37輸入次數( 或驗證次數)之計絲置輔助,而讓該數位簽章代碼^僅能 提供「一次性」之驗證,進而防杜不肖業者將一合法的數 位簽章代碼37重複地偽造並轉用;況且—但數位簽章代碼 37被使輕,使用人的網路IP位址(或手機來電號碼)會被 前述代碼舰器线38自_存記錄,接著,該代碼伺服 21 200937929 器主機38進步可將該錯存記錄傳送至製作該數位簽章代 碼37之人所屬的電腦終端機33(或手機)。 同理,此具有「一次性」之數位簽章代碼37也可以應 用於/酉類或其他飲品之瓶蓋内或包裝内,因此只有當開封 該酒類或飲品時,才能獲知其數位簽章代碼37,並進一步 地去驗證該酒類或飲品是否為品質可靠的真品,而防止中 國時報於2008年1月31日所報導之不肖事件:「目前正值 春節送禮旺季’但假酒市場充斥全省,台南地檢署计曰指 &gt; #警調兵分十九路,在北中南同步查缉假酒,共查獲以金 門高粱酒為主、洋酒次之的近四千瓶假酒,另有兩千餘公 升的半成品及數十萬枚標籤;這些假酒幾以亂真連原廠 酒商都不易辨認。此外,令警方耗異的是,業者連防偽標 章都仿冒逼真,一位金門酒廠主管陪同查缉,他拿出專業 儀器,才能分辨標章真偽,肉眼無法辨識,一般人就更不 必說了!更加上,目前洋酒的防偽標章已被完全破解,曰 後檢警對於查緝偽造假酒將陷於苦戰中。」 ►.鑒於中國時報於2_i^u29日所報導之詐編撼事 .北縣烏來美人湯溫泉會館,前年委託上恩管理公司協助 營運,沒想到期滿後,竟然發現有不少消費者在各大拍賣 網站購買的住宿及泡湯券等,雖與該會館出售的套券無異 ,但票券編號卻遭偽造。經查是上恩管理公司幹部從中搞 鬼,涉嫌偽造總價約三千多萬元的套券,且此事之東窗事 發乃是美人湯溫泉會館業者自去年九月起,陸續發現有消 費者所持的住宿、泡湯、餐券等,票券編號非會館原先設 22 200937929 計的流水號,紙張與印刷卻一模一樣,懷疑印製過程出現 漏洞。 故利用本發明的簽章代碼37執行驗證之一次性驗證有 效性質,可與任一種有價或無價的「實體入場票(券)」配合 使用例如本案例入場處的一驗票人收取一泡湯券後,立 即使用電腦終端機33(或手機),自線上接收或是離線下載事 先儲存有此泡湯券的㈣代碼37、泡湯券上的流水號(明文)People's News Network 2_/08/11/ reported: "... disguised as a staff member of the Ministry of Justice, with a forged official document of the Ministry of Justice, deceiving the victim suspected of illegal money laundering, so must; East knot property, if the victim does not want his account to be The bundle must first remit hundreds of thousands of dollars to carry out the fake deduction. A few can really falsify the official document, coupled with the lack of public knowledge of the public, so that the group at least won two thousand two hundred in just six months. Wan '^ . . . At this time, the victim uses the mobile phone to input the signature code 37 received on the official document and then transmits it to the code processing server 38, and compares and interprets the document from the returned office to whether the official document of the Ministry of Justice is forged. In addition, a principal writes on the bank's paper voucher to fill the 10,000 and use the private seal, and then the client writes a remittance slip to the ten thousand, the client uses the invention. Hand-written a signature code 37 on the paper voucher, and write another digital signature code 37 on the money order, and then transfer the voucher-related data and the remittance slip to the bank-specified code server host 38 for storage; When a trustee enters the bank and holds the paper-based subpoena, the bank teller and the computer terminal 33 that can use the bank enter the above-mentioned digital signature code 37 to perform verification of the authenticity of the client's content 18 200937929 ♦ Whether or not; as a result, large-value (cash entrustment) withdrawal operations can be enhanced. Finally, how to use the digital signature code to verify the authenticity of the physical object in combination with the present invention, how to apply it to the ordinary life, to improve the convenience and practicability of the digital signature 35 verification, and to make more diversified Examples of application: (1) Simplification of the procedure for verifying information credibility: When a passenger wants to sit on a tour bus, he can obtain the business card related to the driving information printed with the digital signature code 37 for the driving f of the tour bus. Or if the driving information file with the number of silk seal code 37 is attached to the vehicle, the passenger can immediately pass through a handheld electronic device (not shown), such as a personal digital assistant (PDA), a notebook computer or The mobile phone or the like obtains a connection with the code processing servo host 38 described in the preferred embodiment through various communication methods, such as a network, and inputs the digital signature code 37 to perform a verification operation 'When the code is processed The ship master 38 can verify the driving of the tour bus by verifying the method 2 of verifying the authenticity of the physical object by using the digital signature code according to the present invention, and then checking by the passenger. Whether good record, the fill is in good condition or tour of all the tour buses reputation of the company is no good, so as to prevent the forgery of driving-related information to deceive the passengers, while avoiding potential problems derived from the road safety crisis. In addition, although a web page viewer reads the content posted in a web page with a digital signature code 37, the digital sign can be input by the dynaxy processing server 38 in the preferred embodiment. Chapter 37, in order to seek confirmation of the credible signature certificate management server 39, step by step to verify the authenticity of the received information to assist the page 33 in how to be true and false. Explosive torrents seek to be #true news without being misled by false messages. Therefore, by using the above method 2 for verifying the authenticity of the physical object by using the digital signature code, it is possible to avoid the occurrence of the identity card creation event as stated in the China Times on January 1st of the year: "In the material (4) Next, hundreds of military officers and military ID cards that had served in an army unit of Hsinchu, A Bingge, became suspects who impersonated banks for bidding for credit cards, car loans and mortgages, and made head-to-head information for tens of millions of yuan. The Detective Nine Team arrested the suspects Yu Zhengxian and other five people yesterday to jointly produce a large number of forged military identity cards, national identity cards, health insurance cards and computer equipment. The police investigation, the suspect suspect Yu Zhengxian (廿人) from October, 1994 From the beginning of the forgery of military identity cards, shackles, national identity cards: health insurance cards and other documents, packaged into a sergeant with a score, and attached to the bank's 4 § card application book military identity, early into the sickle and new Proof of documents such as capital certification, the initiative to upgrade the head, from the upper soldiers to the major, or the corporal is automatically promoted to the general. The police analysis of 'hundred people head of household registration' are located in Jianshi Township, Hsinchu County, and fill in the troops In a certain brigade-level unit of the Army, the army. In the application: the military license, salary and body (4) of the application materials attached to the attachment of the Γ 四 本 伪 伪 伪 伪 伪 伪 伪 伪 伪 伪 伪 伪 伪 伪 伪 伪 伪 伪 伪 伪 伪 伪 伪 伪 伪 伪 伪 伪 伪 伪</ br>, b fine, except (b) for the aid of the time-sensitive message: When an e-mail recipient receives a 37-item missing child letter, it can be borrowed from the preferred embodiment. The step seal is accompanied by a digital signature, and the code processing servo master 20 200937929 machine 38' enters the validity period of the digital signature 35 to determine the message. Is it because the missing child has been found, and the expiration date of the e-mail has been written off, and the letter of avoidance of the letter has been circulated by many people, but after the missing of the missing child? People who are still unaware of the situation continue to spend their time helping to search, and spend a lot of social resources. (3) Verifying the authenticity of the product or not: When preparing for the purchase of Beiyi Le makeup products, the cosmeceutical supplies are directly in contact with the body surface of the consumer, or even oral administration into the body. In the current society, many unscrupulous people in order to seek more benefits, annihilate conscience to create a large number of black-hearted fake drugs that will hurt the human body, and make it flooded the market, but, even through the relevant health authorities, the relevant qualified mark or drug test The size of the font is still not inferior to the fraudulent tactics of the unscrupulous industry; therefore, in this increasingly serious social problem, a number of signature codes 37 can be printed on the package of the cosmeceutical product or on the inside of the box. The method 2 for verifying the authenticity of a physical object by using the digital signature code of the present invention provides verification of the composition, source, and the like of the cosmeceutical product, so as to eliminate the harm caused by the fake drug to the human body; Further, the method is installed in the code processing feeding host 38, and is used for counting the number of times (or the number of verifications) of the digital signature code 37, and letting the digital signature The code ^ can only provide "one-off" verification, and thus prevent the unscrupulous person from repeatedly forging and transferring a legal digital signature code 37; and - but the digital signature code 37 is made light, the user's network The IP address (or cell phone number) will be recorded by the aforementioned code ship line 38. Then, the code servo 21 200937929 host 38 advances the error record to the person who made the digital signature code 37. The computer terminal 33 (or mobile phone) to which it belongs. Similarly, the “one-time” digital signature code 37 can also be used in the cap or package of a 酉 or other beverage, so the digital signature code can only be known when the alcohol or drink is opened. 37, and further to verify whether the wine or drink is a reliable quality, and prevent the Chinese Times from reporting the unfortunate incident on January 31, 2008: "It is currently in the Spring Festival gift season" but the fake wine market is flooding the province The Tainan District Procuratorate counts the number of vehicles. #警调兵分19路, in the north and south of the same time to check the fake wine, a total of nearly 4,000 bottles of fake wine, followed by Jinmen sorghum, followed by wine, and two More than a thousand liters of semi-finished products and hundreds of thousands of labels; these fake wines are not easy to identify with the original wine merchants. In addition, the police are different, the industry is even counterfeit with the anti-counterfeiting labels, a director of the Golden Gate Winery Accompanied by Jammu, he took out professional equipment to distinguish the authenticity of the stamp, which could not be recognized by the naked eye. The average person would not even have to say it! On the other hand, the anti-counterfeiting seal of the current wine has been completely cracked. The fake wine will be in a difficult battle.” ► In view of the scams reported by the China Times on 2_i^u29. The Wulai Meirentang Hot Spring Resort in Beixian County commissioned the Shangen Management Company to assist in the operation the year before. It has been found that many consumers have purchased accommodation and vouchers on major auction websites. Although they are the same as the coupons sold in the club, the ticket number is forged. The investigation was carried out by the cadres of Shangen Management Company, who were suspected of falsifying a set of vouchers with a total price of about 30 million yuan. The incident of the incident was that the beauty soup hot spring club industry has been found by consumers since September last year. Accommodation, bathing, meal coupons, etc., the ticket number is not the original hall of the 2009 20092929. The paper is exactly the same as the printing, and it is suspected that there is a loophole in the printing process. Therefore, the validity of the one-time verification of the verification using the signature code 37 of the present invention can be combined with any kind of valuable or invaluable "entity admission ticket (voucher), for example, a ticket holder at the entrance of the case receives a soup. Immediately after the voucher, use the computer terminal 33 (or mobile phone), receive it online or download the (4) code 37 in advance of the bubble voucher, the serial number on the bubble voucher (plain text)

及其數位簽章35 ’然後’驗票人即可對此實體泡湯券上的 簽章代碼37進行驗證。 (四)防杜物品檢驗證明之變造:And its digital signature 35 'and then' the ticket inspector can verify the signature code 37 on the physical coupon. (4) The alteration of the inspection certificate for anti-duty items:

由於現今科技技術發達,相對地偽造文件之手法也日 新月異,故於報章雜諸上皆可不時地看到有不肖業者仿冒 政府的各式標章,謂編不知情的社會大眾,例如,偽造 食品衛生# CAS優良冷;東食品標章等,如此—來,不知情 的民眾就得承擔可能吃到不新鮮或來路不明食物的風險, 故當這些食物皆被Μ本發明所述之數位簽章代碼37於其 包裝上時,透過其具有公信力的簽章憑證管理舰主機% 之協助證實,即可將消費者吃到來路不明之食物的風險降 至最低;再者’若此數位簽章代碼37是具有如步驟24所 述之時效性時,即可同時地對該食物之新鮮度上多做一層 把關’即唯有在該數位簽章代碼37之有效期限内(在此可等 同食物的保存期限),始能通過驗證。另,為了提昇暢貨之 快速檢驗流程,亦可將該數位簽章代碼37透過前述的 產生裝置’使之條碼化’而加速了食品驗證之流程。… 23 φDue to the development of today's technology and the relative falsification of documents, the methods of counterfeiting documents are changing with each passing day. Therefore, from time to time, newspapers can see that there are various types of stamps that are unscrupulous to counterfeit the government, that is, the uninformed public, for example, forged food. Health #CAS is excellent cold; East food stamps, etc., so that unsuspecting people have to bear the risk of eating fresh food or unidentified food, so when these foods are labeled as the digital sign described in the present invention When the code 37 is on its packaging, it can confirm the risk of consumers eating unidentified food through the confirmation of the credible signature certificate management host%; in addition, if this digital signature When the code 37 has the timeliness as described in the step 24, the freshness of the food can be simultaneously checked by one level, that is, only within the expiration date of the digital signature code 37 (the food can be equivalent here) The shelf life) can be verified. In addition, in order to improve the rapid inspection process of the goods, the digital signature code 37 can be accelerated by the aforementioned generation device to speed up the food verification process. ... 23 φ

200937929 另,若將現行之車籍資料及車 輪:理所製發的數位簽章代碼37,即可用來確= 伤、出廠曰及相關資料,而確保買二手中古車時不:: 拼裝車或社會上所謂借屍還魂的贓車。 , 此外,當-旅客出示一印有本發明數位簽章代 空機票或是旅行業自己印表機平常用紙印出之電子 =時’此刻’航空櫃台櫃員就可於現場立即地上網輸入 =數代碼37進行查核,以確認此機票之真偽及其相 關订程内容。 值得-提的是,本二實施例中針對該數位簽章代碼π 之應用僅提出幾個日常生活中常見之實用例子,舉凡相關 領域而熟悉該計數之人士所易於思及之例,皆應屬本發明 之實用範&lt;#,故不應侷限於本二較佳實施例之所述。 歸納上述,本發明利用數位簽章代碼驗證實體物真偽 之方法2’具有簡化數位簽章35之驗證程序,提供其驗證 程序之機動性及便利性,並使數位簽章35藉由數位簽章代 碼37之簡化’而推廣其相關應用方式等優勢,故確實達到 本發明之目的。 惟以上所述者,僅為本發明之二較佳實施例而已,當 不能以此限定本發明實施之範圍,即大凡依本發明申請專 利範圍及發明說明内容所作之簡單的等效變化與修飾,皆 仍屬本發明專利涵蓋之範圍内。 【圖式簡單說明】 24 200937929 圖1是一方塊圓, 圖2是一流程圖 實體物真偽之方法的一 說明習知數位簽章架構; ,說明本發明利用數位簽章代碼驗證 第一較佳實施例; 說明該第一較佳實施例中產生-數 圖4是一方塊圖 位簽章代碼的架構; ,說明該第一較佳實施例中驗證該數 Ο 圖5是一示意圖,說明 法院傳票内容; 一附有該數位簽章代碼之地方 之簽章及驗證系統進行簽章的第二較佳實施例, 疋—操作介面圖,說明一實現該第一較佳實 說明透過該系統開啟一明文檔 圖7是一操作介 案的操作晝面; 圖8是-操作介面圖,說明透過該系統 章有效天數; 贫200937929 In addition, if the current vehicle information and the wheel: the number of the signature code 37 issued by the company, can be used to confirm = injury, factory defects and related information, and ensure that when buying a second-hand medieval car:: assembly car or In the society, the so-called car that revived the corpse. In addition, when the passenger presents a digital ticket printed with the invention, or the electronic printing printed by the travel industry's own printer, the 'air station' can immediately enter the Internet at the scene. Code 37 is checked to confirm the authenticity of the ticket and its related subscription content. It is worth mentioning that the application of the digital signature code π in the second embodiment only proposes several practical examples that are common in daily life, and those who are familiar with the counting in the relevant field should be able to think about it. It belongs to the practical range of the present invention and should not be limited to the second preferred embodiment. In summary, the present invention utilizes a digital signature code to verify the authenticity of a physical object. 2' has a verification procedure for simplifying the digital signature 35, providing the flexibility and convenience of the verification procedure, and enabling the digital signature 35 to be digitally signed. The simplification of the code 37 and the promotion of its related application methods and the like, thus indeed achieve the object of the present invention. However, the above is only the preferred embodiment of the present invention, and the scope of the present invention is not limited thereto, that is, the simple equivalent changes and modifications made in accordance with the scope of the present invention and the description of the invention. All remain within the scope of the invention patent. [Simplified illustration] 24 200937929 Figure 1 is a square circle, Figure 2 is a schematic diagram of a method for authenticity of a physical object; a description of the present invention using a digital signature code to verify the first comparison A preferred embodiment of the present invention is illustrated in FIG. The contents of the court voucher; a second preferred embodiment of the signing and verification system of the place where the digital signature code is attached, the operation interface diagram, illustrating the implementation of the first preferred embodiment through the system Open a document. Figure 7 is an operation diagram of an operation scenario; Figure 8 is an operation interface diagram showing the number of days passed through the system chapter;

圖9 作畫面; 疋—操作介面圖,說明透過該系統進行簽章的操 圖10是― 章代碼的晝面; 圖11是― 的操作晝面; 圖12是— 章代碼的晝面; 圖13是— 操作介面圖’說明透過該系統產生一數位簽 操作介面圖,說明透過該系統進行驗證簽章 操作介面圖,說明於該系統上輸人該數位簽 操作介面圖,說明透過該系統驗證簽章成功 25 200937929 之畫面;及 圖14是一操作介面圖,說明該系統於驗證簽章成功後 所顯示之晝面。Figure 9 is a screen; 疋—Operation interface diagram, showing that the signing of the system through the system is shown in Figure 10, which is the operation of the chapter; Figure 11 is the operation of the chapter; 13 is - Operation interface diagram 'Describes a digital interface operation interface diagram generated by the system, indicating the verification signature operation interface diagram through the system, indicating that the digital signature operation interface diagram is input on the system, indicating that the system is verified through the system Signature success 25 200937929 picture; and Figure 14 is an operation interface diagram showing the system displayed after verifying the signature success.

26 20093792926 200937929

【主要元件符號說明】 2 ......... 利用數位簽章代 42....... •簽章功能選項 碼驗證實體物真偽之方 43....... •檔案開啟鍵 法 44....... •檔案選擇對話框 21 〜27··. 步驟 45....... •檔案路徑及名稱 31........ 實體物 顯示欄 311…… 實體文件 46....... -數位簽章有效天 312…… 立體物 數選取表單 32........ 轉換裝置 47....... •日日片卡後碼輸入 33........ 電腦終端機 欄 331…… 數位資料 48....... •簽章產生鍵 332…… 簽章序號 49....... •簽章代碼產生欄 34........ 私密金鑰 50....... •驗證功能選項 35........ 數位簽章 51....... •簽旱代碼輸入爛 36........ 單向雜湊函數 52....... •驗證執行鍵 37........ 數位簽章代碼 53....... •驗證成功對話框 38........ 代碼處理伺服主 54....... •驗證結果顯示框 機 55....... •簽章人姓名 39........ 簽章憑證管理伺 56....... •簽章有效期間 服主機 57....... •簽章人憑證有效 40........ 公開金錄 期間 41........ 簽章及驗證表單 58....... •檔案内容顯示欄 執行介面 27[Main component symbol description] 2 ......... Use digital signature generation 42....... • Signature function option code to verify the authenticity of the entity 43....... • File Open Key Method 44....... • File Selection Dialog 21~27··. Step 45....... • File Path and Name 31........ Physical Display Column 311... Entity file 46....... - Digital signature valid day 312... Three-dimensional object selection form 32........ Conversion device 47....... • Day Chip card rear code input 33........ Computer terminal machine bar 331... Digital data 48....... • Signature generation key 332... Signature serial number 49....... • Signature Code Generation Bar 34........ Private Key 50....... • Verification Function Option 35........ Digital Signature 51....... • Sign the drought code input rotten 36........ One-way hash function 52....... • Verify the execution key 37........ Digital signature code 53..... .. • Verification success dialog 38........ Code processing servo master 54....... • Verification result display box machine 55....... • Signature name 39.. ...... Signature certificate management service 56....... • Signature is valid Intermediary host 57....... • Signature certificate valid 40........ Public record period 41........ Signature and verification form 58..... .. • Archive content display bar execution interface 27

Claims (1)

200937929 十、申請專利範圍: 包含以 1. 一種利用數位簽章代碼驗證實體物真偽之方法 下步驟: ~ / 料 Ο)數位化一實體物之表面内容, 並產生出一數位資 ,㈦利用-私密金鑰對該數位資料進行數位簽章程序 後,而產生出一數位簽章; (c) 將該數位簽章轉換成一數位簽章代碼; (d) -儲存有該數位資料、該數位簽章、該數位簽章 代碼及-相對於該私密金錄的簽章序號之代碼處理伺服 主機接收該數位簽章代碼的輸入; …⑷該代碼處理飼服主機利用該簽章序號自—簽章憑 證管理伺服主機取得一公開金鑰;及 (0使用該公開金鑰配合數位簽章驗證程序,檢驗該 數位簽章是否為真。 2·依據申請專利_第1項所㈣絲位簽章代碼驗證實 體物真偽之方法’其中在該⑷步驟中,是利用一單向雜 湊函數之運算,將該數位簽章轉換成一數位簽章代碼。 3.依據φ請專利範圍第1項所述制數位簽章代碍驗證實 ,物真偽之方法,其中在該⑷步驟中,該數㈣章代碼 是直接對該數位簽章指定一代號。 據申明專利範圍第丨、2或3項所述利用數位簽章代碼 驗i實體物真偽之方法,其中在該⑷步驟中,該數位簽 章代碼疋以一條碼形式呈現,且在該步驟中,該代碼 28 200937929 條碼讀取裝置來接收該數位簽章 處理伺服主機是藉由一 代碼之輸入。 5.依據申請專利範 體物真偽之方法 體文件。 6·依據申請專利範 體物真偽之方法 鍵入該實體文件 檔案。 ❹ 圍第1㈣述利用數位簽章代碼驗證實 ,其中在該(a)步驟中,該實體物是一實 圍第5㈣述利用數位㈣代碼驗證實 ,其中在該(a)步驟中,該數位資料是以 之全部内容文字方式所產生之電子文件 ^據申%專利範圍第5項所述利用數位簽章代碼驗證實 物真偽之方法,其中在該⑷步驟中,該數位資料是由 輸入該實體文件之部分内容文字所產生之電子文件檔案 .依據中請專利範圍第5項所述制數位簽章代瑪驗證實 體物真偽之方法’其中在該⑷步驟中,該數位資料是藉 由一掃描裝置對該實體文件進行掃描所產生的。 9·依射請專利範圍第6、7或8項所述利用數位簽章代碼 驗证實體物真傷之方法,其中在該⑷步驟中,該實體文 件是選自於由國民身分證、健保卡、駕駛執照、車籍資 料、車輛出廠資料、電手機票、#業證書、纟片、判決 書' 契約書、委託書、授權書、協議書、醫療診斷報告 書、信用狀、傳票、拘票、搜索票、專業證照、工作證 商抑價目表、商品保證書、交易收據、缴費帳單、網 頁文字、電子郵件中文字所組成之一群組。 29 200937929 ι〇·依㈣請專利範圍第1項所述利用數位簽章代竭驗證實 體物真偽之方法,其中在該⑷步驟中,該數位資料是藉 由-數位照相裝置對該實體物進行拍照所產生的。 11. 依據中請專利範圍第丨項所述利用數位簽章代嫣驗證實 體物真偽之方法,其巾在該(b)步驟巾,對該數位資料進 行簽章之私密金餘是經由—憑證晶片卡配合—晶片卡讀 卡裝置之讀取而取得的。 Ο 12. 依據巾請專利範圍第1項所述利用數料章代㈣證實 體物真偽之方法,更包含一位於該(f)步驟後的(g)步驟, 判讀已利用該公開金鑰驗證的數位簽章附帶之内容是否 與該實鱧物之表面内容相符。 13. 依據巾請專利範圍第1項所述利用數位簽章代碼驗證實 體物真偽之方法’其中在該(b)步驟中,該數位簽章包括 權案名稱、作者基本資料、建槽時間、有效期間及摘要 說明。 14.依據中請專利範圍第13項所述利用數位簽章代碼驗證實 體物真偽之方法’其中在該⑷步驟中,該代碼處理飼服 主機在接收該數位簽章代碼之輸入時,先檢查該數位簽 ^是否仍在其有效期間内,若逾期,即停止對該數位簽 早進行後續驗證作業。 15·㈣中請專利_第1項所述利用數位簽章代瑪驗證實 體物真偽之方法’其中在該(d)步驟中,該代碼處理饲服 主機具有-用來統計該數位簽章代㉝輸人讀之計次裝 且在接收該數位章代碼之輪人時運用該計次裝 30 200937929 置檢查疋否超過一預設次數,若超過該預設次數’即停 止對該數位簽章進行後續驗證作業。 依據中6|專利範圍第1項所述利用數位簽章代瑪驗證實 體物真偽之方法’其中在該⑷步驟中,該代碼處理伺服 主機每隔一預設期間即自動檢查該數位簽章是否仍在其 有效期間内。 λ 申請專利範圍第i項所述利用數位簽章代碼驗證實200937929 X. Patent application scope: Contains 1. The method of verifying the authenticity of the physical object by using the digital signature code: ~ / Ο) digitizing the surface content of a physical object, and generating a number of resources, (7) utilization - the private key performs a digital signature process on the digital data to generate a digital signature; (c) converts the digital signature into a digital signature code; (d) - stores the digital data, the digit The signature, the digital signature code, and the code of the signature serial number of the private record record processing the input of the digital signature code by the server; (4) the code processing the feeding host uses the signature serial number to sign The voucher management server obtains a public key; and (0 uses the public key with the digital signature verification procedure to verify whether the digital signature is true. 2. According to the patent application _ Item 1 (4) The method for verifying the authenticity of the physical object 'in the step (4) is to use a one-way hash function to convert the digital signature into a digital signature code. The method of verifying the authenticity of the digital signing of the first paragraph is the method of verifying the authenticity of the object. In the step (4), the code of the number (4) is directly assigned a code number to the digital signature. The method for verifying the authenticity of an entity by using the digital signature code, wherein the digital signature code is presented in a code form, and in the step, the code 28 200937929 The bar code reading device receives the digital signature to process the servo host by inputting a code. 5. According to the method for applying for the authenticity of the patent body, the body file is typed according to the method of applying for the patent body object authenticity. Entity file file. 第 第 第 第 第 利用 利用 利用 利用 利用 利用 利用 利用 利用 利用 利用 利用 利用 利用 利用 利用 利用 利用 利用 利用 利用 利用 利用 利用 利用 利用 利用 利用 利用 利用 利用 利用 利用 利用 利用 利用 利用 利用 利用 利用 利用 利用 利用 利用 利用 利用 利用 利用 利用 利用 第 利用 利用 第 第Wherein, the digital data is an electronic file generated by the entire content text method, and the method for verifying the authenticity of the real object by using the digital signature code according to Item 5 of the patent scope of the application, wherein in the step (4), The digital data is an electronic file file generated by inputting part of the text of the entity file. According to the method of claim 5, the digital signature is used to verify the authenticity of the physical object, wherein in the step (4) The digital data is generated by scanning a physical file by a scanning device. 9. The method for verifying the physical damage of the physical object by using the digital signature code as described in item 6, 7 or 8 of the patent scope, In the step (4), the entity file is selected from the national identity card, the health insurance card, the driver's license, the vehicle information, the vehicle factory data, the electric ticket, the #业 certificate, the slap, the judgment, the contract, the commission Book, power of attorney, agreement, medical diagnosis report, letter of credit, subpoena, warrant, search ticket, professional certificate, work permit price list, commodity guarantee, transaction receipt, payment bill, webpage text, email Chinese A group consisting of. 29 200937929 ι〇·依(4) The method of verifying the authenticity of a physical object by using a digital signature as described in item 1 of the patent scope, wherein in the step (4), the digital data is by the digital camera device Produced by taking pictures. 11. According to the method of the third paragraph of the patent application, the method of verifying the authenticity of the physical object by means of the digital signature is used, and in the step (b), the private credit of the digital data is signed via the voucher chip. Card matching - obtained by reading the wafer card reading device. Ο 12. According to the scope of the patent application, the method of verifying the authenticity of the body is described in item 1 of the patent scope, and further includes a step (g) after the step (f), and the public key has been used for interpretation. Whether the content attached to the verified digital signature matches the surface content of the actual object. 13. According to the method of claim 1, the method for verifying the authenticity of a physical object by using a digital signature code, wherein in the step (b), the digital signature includes the name of the power of the case, the basic information of the author, and the time of the construction of the slot. , valid period and summary description. 14. The method for verifying the authenticity of a physical object by using a digital signature code according to item 13 of the patent scope of the patent application, wherein in the step (4), the code processing the feeding host receives the input of the digital signature code first. Check if the digital sign is still within its valid period. If it is overdue, stop the subsequent verification of the digital sign. 15 (4) In the patent _ the first method of using the digital signature to verify the authenticity of the physical object, in the step (d), the code processing the feeding host has - used to count the digital signature On behalf of 33, the person who reads the sub-package and uses the sub-package 30 200937929 to check whether the number exceeds a preset number of times. If the preset number of times is exceeded, the number sign is stopped. The chapter performs subsequent verification jobs. According to the method of claim 1, the digital signature is used to verify the authenticity of the physical object, and in the step (4), the code processing the servo host automatically checks the digital signature every predetermined period. Whether it is still within its effective period. λ Applying the digital signature code verification as described in item i of the patent application scope 真偽之方法,其中在該⑷步驟中,數位化—實體物 之表面内容並加入一非實體物 數位資料。 表面内谷’而產生出— ❹ 31The method of authenticity, wherein in the step (4), the surface content of the physical object is digitized and a non-physical digital data is added. Produced by the valley inside the surface - ❹ 31
TW97105886A 2008-02-20 2008-02-20 TWI353765B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
TW97105886A TWI353765B (en) 2008-02-20 2008-02-20

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
TW97105886A TWI353765B (en) 2008-02-20 2008-02-20

Publications (2)

Publication Number Publication Date
TW200937929A true TW200937929A (en) 2009-09-01
TWI353765B TWI353765B (en) 2011-12-01

Family

ID=44867164

Family Applications (1)

Application Number Title Priority Date Filing Date
TW97105886A TWI353765B (en) 2008-02-20 2008-02-20

Country Status (1)

Country Link
TW (1) TWI353765B (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI405449B (en) * 2009-12-29 2013-08-11 Univ Vanung Group signature method
TWI502398B (en) * 2010-10-05 2015-10-01 Chunghwa Telecom Co Ltd The Production and Verification Method of Electronic Stamp Time Stamp Certificate
TWI595380B (en) * 2015-11-20 2017-08-11 捷碼數位科技股份有限公司 Device for generating or verifying authenticate electronic document with electronic and paper certification and method thereof

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150019871A1 (en) * 2013-07-10 2015-01-15 Transcend Information, Inc. Certification method and electronic device
TWI734729B (en) * 2017-01-19 2021-08-01 香港商阿里巴巴集團服務有限公司 Method and device for realizing electronic signature and signature server

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI405449B (en) * 2009-12-29 2013-08-11 Univ Vanung Group signature method
TWI502398B (en) * 2010-10-05 2015-10-01 Chunghwa Telecom Co Ltd The Production and Verification Method of Electronic Stamp Time Stamp Certificate
TWI595380B (en) * 2015-11-20 2017-08-11 捷碼數位科技股份有限公司 Device for generating or verifying authenticate electronic document with electronic and paper certification and method thereof

Also Published As

Publication number Publication date
TWI353765B (en) 2011-12-01

Similar Documents

Publication Publication Date Title
RU2494455C2 (en) Electronic certification, identification and transmission of information using coded graphic images
US20200134619A1 (en) System and Method for Financial Transaction Validation
US8626656B2 (en) System and method for securing payment instruments
US9594739B2 (en) Document signing systems and methods
CA2594018C (en) Method and process for creating an electronically signed document
US20120308003A1 (en) Authentic barcodes using digital signatures
US20220067736A1 (en) Email based e-commerce with qr code barcode, image recognition alternative payment method and biometrics
US20090228295A1 (en) Method for automatically establishing an identification theft recovery service based on the purchase of an item
TW201447635A (en) Content verification method based on digital signature codes
JP4746338B2 (en) Contract falsification prevention system and contract falsification prevention method
TWI353765B (en)
TW525072B (en) Digital graphic signature system
US20110296191A1 (en) Method for securely drawing up a virtual multiparty contract capable of being physically represented
Chander Cyber Laws and IT Protection
EP2697785A1 (en) Authentic barcodes using digital signatures
Rambarran I Accept, But Do They:... The Need for Electronic Signature Legislation on Mainland China
ЯКОВЕНКО CIVIL LAW SPECIFICS OF TRANSACTIONS IN E-COMMERCE
Alekseyevich CIVIL LAW SPECIFICS OF TRANSACTIONS IN E-COMMERCE
Thoi RESEARCH AND APPLICATION OF DIGITAL SIGNATURES IN E-COMMERCE TODAY
Yakoenko Civil law specifics of transactions in e-commerce
JP2001216395A (en) Authentication system using possessed paper money and application of the system
CN112714920A (en) Advanced method, system and apparatus for registering information in a database
Saulawa et al. The Relevance of Electronic Signatures in Electronic Transactions: An Analysis of Legal Framework
EP2724305A1 (en) Method of dematerialized transaction
Esanwa The effectiveness of the e-commerce legal framework in selected African countries.

Legal Events

Date Code Title Description
MM4A Annulment or lapse of patent due to non-payment of fees