TWI353765B - - Google Patents

Download PDF

Info

Publication number
TWI353765B
TWI353765B TW97105886A TW97105886A TWI353765B TW I353765 B TWI353765 B TW I353765B TW 97105886 A TW97105886 A TW 97105886A TW 97105886 A TW97105886 A TW 97105886A TW I353765 B TWI353765 B TW I353765B
Authority
TW
Taiwan
Prior art keywords
code
digital signature
digital
authenticity
physical object
Prior art date
Application number
TW97105886A
Other languages
Chinese (zh)
Other versions
TW200937929A (en
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed filed Critical
Priority to TW97105886A priority Critical patent/TW200937929A/en
Publication of TW200937929A publication Critical patent/TW200937929A/en
Application granted granted Critical
Publication of TWI353765B publication Critical patent/TWI353765B/zh

Links

Description

1353765 九、發明說明: 【發明所屬之技術領域】 本發明是有關於-種驗證實體物真偽之方法 位簽章代碼驗證實體物上文字真偽之方法。疋 【先刖技術】 現實生活中,為了 ^ > I . 马了要向他人證明自己對文件 牛是由自己所發出的’通常會在文件上加蓋自 己的印早或親筆簽名以資證明。例如:傳統的交易行為中 如1具有法律效力之商業交易,通常會有書面文件⑼ 二契约書)並且會在其上加以簽名或蓋章,如此才可以 確疋交易雙方彼此相關的權利與義務,以及為了需要向他 人證明文件是由何人所發出的確認用意。 ° 仰賴=地,在電子商務的環境中,商業交易行為則必須 二賴電子文件與數位簽章來確立其權利與義務。所謂「電頁 S件磬,與交易行為相關的資訊,其資訊型態可以為 文子、聲音、圖片、影傻、棼旁 簽章之電子形式;而「數位 2d依附於電子文件上,用以辨識及確認電子文件 簽=者(Signe〇之身分及電子文件真偽的m由此可知 :數位簽章的功能與印章或親筆簽名的功能相似只是它 針對的文件是電子文件,而非實體文件。 目前實作上’數位簽章是以密碼學上的公開金錄密碼 2(p_cKeyCryptosystem),又稱「非對稱密碼系統 Cryptosystem)」為基礎來實作,亦即在該系 、先中,母—位使用者必須自行產生自己所擁有的金錄對( 13537651353765 IX. Description of the invention: [Technical field to which the invention pertains] The present invention relates to a method for verifying the authenticity of a physical object.疋[First technique] In real life, in order to ^^ I. I have to prove to others that I have issued a copy of my own signature or autograph on the document. . For example, a traditional transaction, such as a legally binding commercial transaction, usually has a written document (9) and a contract, and will be signed or stamped on it so as to confirm the rights and obligations of the parties to the transaction. And the purpose of confirmation in order to prove to others who the document was issued. ° Depends on the ground, in the context of e-commerce, business transactions must rely on electronic documents and digital signatures to establish their rights and obligations. The so-called "electric page S", the information related to trading behavior, its information type can be electronic form of text, sound, picture, shadow, and signature; and "digital 2d attached to electronic files for Identify and confirm the electronic document sign = (Signe〇's identity and the authenticity of the electronic file m can be seen: the function of the digital signature is similar to the function of the seal or autograph, except that the file it is targeting is an electronic file, not a physical file. At present, the 'digital signature is based on the cryptographically publicized password 2 (p_cKeyCryptosystem), also known as the "asymmetric cryptosystem Cryptosystem"), that is, in the department, the first, the mother - Users must make their own gold record pairs (1353765

Key Pair):—把私密金鄉⑽t ^力與一把公開金输( PUMlC Ke)〇。其中使用者必須秘密地保存自己的私密金鑰 ,並且將其公開金鑰公佈於網路中。之後,使用者可以利 用自己的私密金錄對文件進行簽署;而數位簽章的接收者 可以利用該簽署者的公開金錄來驗證數位簽章的有效性。Key Pair): - Put the private Jinxiang (10) t ^ force and a public gold (PUMlC Ke). The user must secretly save his private key and post his public key on the network. The user can then sign the document using his or her private account, and the recipient of the digital signature can use the signer's public record to verify the validity of the digital signature.

此外自安全且有效的數位簽章,除了簽署者必須 要以正確且有效的方法來對電子文件進行簽署外,其所產 生的數位簽章之有效性亦需要一個合適的驗證方法來驗證 〇數位簽章機制(Digital Sig_e 叫便是以密 碼學(CrmQgraphy)為基❹定義安㈣簽章產生與簽章 驗證方法,此機制包括章產生機制(In addition to the safe and effective digital signature, in addition to the signatory must sign the electronic document in a correct and effective way, the validity of the digital signature generated by the signer also requires a suitable verification method to verify the digits. The signature mechanism (Digital Sig_e is based on CrmQgraphy) to define the (4) signature generation and signature verification method. This mechanism includes the chapter generation mechanism (

Gen__ Mechanism )與簽章驗證機制(^e Venfication Mechanism )。「簽章產生機制」是指簽署者產生 數位簽章的方法或程序’而此機制可視為-個數學演算法 。若簽署者要進行簽署時’他可以將欲簽署的電子文件與 自己所擁有的进錄當作該演算的輸入值’經過該演算法的 計算後便能得到電子文件的數位簽章。另—方面,「簽章驗 證機制」是指驗證者用來驗證數位簽章之有效性的方法或 程序。若是驗證者收到簽署者的電子文件與數位簽章時, 他必須使用電子文件、數位簽章以及簽署者的公鑰,並且 透過此機制來驗證此數位簽章的有效性。 與數位簽章息息相關的密碼技術為「單向雜湊函數」( One-Way Hash Functi〇n),此單向雜凑函數是—種可以將任 意長度的輸入值壓縮成固定長度之輸出值的數學函數或演 1353.765 异法,並且無法從其輸出值去推算其輸入值如現行常見 =5或等單向雜凑函數。在安全性(亦即防止非 偽造-個合法的數位簽章,以及防止攻擊者從簽章訊 二=署㈣錄)與效率性的考量下,安全的數位簽 九 ^弓入早向雜凑函數於該機制中。換言之,在簽 早產生機制中,簽署者必須先透過單向雜凑函數將電子文 ^轉換成@定長度的位^料,稱之為資料摘要(Data gest β|後再使用密㈣署該資料摘要以產生數位簽章 ;同樣地,驗證者亦需先使用此單向雜凑函數,將電子文 件轉換成固^長度的資料摘要再進行驗證動作。 因此,則述所提之數位簽章相關說明可由圖^所示之 習知數位簽章架構j概括而述,當愛麗絲⑷㈣欲對一數位 文件η簽拿時,即使用—雜凑函數12將該數位文件“轉 換為-第-訊息摘I 13 ’再利用其所擁有的私密金鑰"對 該第訊息摘要13加密成一數位簽章15,並將該數位文件 11連同該數位簽章15傳送給鲍伯(B〇b);當飽伯接到該數 位文件η及數位簽章15後,即透過該雜凑函數12對該數 位文们1進行轉換動作,同樣地也得出該第_訊息摘要13 〜接者‘敏伯至-認證機構(圖未示)内取得_與愛麗絲的私 =金輪14相對應的公開金錄16後,再對該數位簽章15進 :解密,而得出一第二訊息摘要17,最後,將該第一訊息 人要二及該第二訊息摘要17進行比對檢查是否相互吻 右疋則表不所收到之該數位文件u確實是由愛麗絲 所傳發出。 1353,765 :年來’由於網際網路發達的緣故,以往需透過郵差 或快遞人員協助送交的資料,且須經過 接獲的資料,在現今的E時代中 二門始- τ 須破擊一按鍵,隨即 透达‘"、运弗屆的網際網路,、, 评知之間即迗達到收件對方 :而纟因為訊息傳遞便利性的大幅提昇,同時肇 生出利用網際網路之炸編事件,例如,西元細 日令國時報之報導指出,有不少受害民眾接 拳月 電子郵件告知「Α 家总通知 其戶因為被不法集團利用而遭到政 府金官會的強制凍結控管, 並。月盡速回覆,將有檢察官(實 為假冒)與之聯繫並作一 、 . ,IB At 步扎不」。雖然,利用目前的數位 =機㈣㈣料料件進行進—步地賴, 於其驗證方式對於—护t :於&非熟輪電腦相關領域的人(特別是學 = 紀的老年人)來說,如何取得驗則的公開金 錄?該連結何網頁去進行驗證?其程序實為繁複。 因此,如何簡化該數位簽章之驗證程序,便成為相關 業者所欲努力研究的方向。 "成為相關 【發明内容】 因此,本發明^^ n & ^ 之目的,即在提供—種利用數位簽章代 碼驗證實體物真偽之方法。 食早代 纟發明利用數位簽章代碼驗證實體物 法,包含以下步驟: 。⑷數位化-實體物之表面内容,並產生出一數位資料 (b)利用私进、金錄對該數位資料進行數位簽章程序後 1353765Gen__ Mechanism) and the signature verification mechanism (^e Venfication Mechanism). The "signature generation mechanism" refers to the method or procedure by which the signatory generates a digital signature, and this mechanism can be regarded as a mathematical algorithm. If the signatory is to sign, he can use the electronic file to be signed and the entry he owns as the input value of the calculation. After the calculation of the algorithm, the digital signature of the electronic document can be obtained. On the other hand, the “signature verification mechanism” refers to the method or procedure used by the verifier to verify the validity of the digital signature. If the verifier receives the signatory's electronic file and digital signature, he must use the electronic file, the digital signature, and the signer's public key, and use this mechanism to verify the validity of the digital signature. The cryptographic technique closely related to the digital signature is the One-Way Hash Functi〇n, a one-way hash function that is a mathematical method that can compress input values of arbitrary length into fixed-length output values. The function or the 1353.765 is different, and its input value cannot be derived from its output value as the current common = 5 or equal one-way hash function. In the security (that is, to prevent non-forgery - a legitimate digital signature, and to prevent the attacker from signing the second message = the fourth (four) record) and efficiency considerations, the security of the digital sign ^ ^ bow into the early hash The function is in this mechanism. In other words, in the early sign-off mechanism, the signer must first convert the electronic text into a fixed-length bit through a one-way hash function, which is called a data summary (Data gest β| The data is summarized to generate a digital signature; similarly, the verifier must first use the one-way hash function to convert the electronic file into a fixed length data summary and then perform the verification action. Therefore, the digital signature is described. The related description can be summarized by the conventional digital signature structure j shown in FIG. 2. When Alice (4) (4) wants to sign a digital file η, the hash function 12 is used to convert the digital file into a -- Message Digest I 13 'Reuse the private key it owns" encrypts the message digest 13 into a digital signature 15 and transmits the digital file 11 along with the digital signature 15 to Bob (B〇b) After receiving the digital file η and the digital signature 15 , the digital file 1 is converted by the hash function 12, and the first _ message digest 13 is also obtained. Bo to the certification body (not shown) obtained _ with Alice After the public gold=14 corresponding to the public record 16, then the digital signature is 15: decryption, and a second message summary 17, and finally, the first message and the second message Abstract 17 is to check whether the kisses are right or not. The digital file u received by the table is indeed sent by Alice. 1353, 765: In the past year, due to the development of the Internet, it was necessary to use the postman or The courier assists in the delivery of the information, and must receive the information, in the current E era, the second door - τ must be hit by a button, then pass through the '", the Internet of the Games,,, evaluation It is known that the recipients arrive at the same time: and because of the substantial increase in the convenience of message transmission, the bombing incidents using the Internet have also been generated. For example, the report of the Times Daily Times pointed out that many victims have received The boxing month email informed that “the family has informed the family that they have been subject to the mandatory freezing control of the government’s gold officials’ meeting because they have been used by the illegal group. And the monthly reply is as soon as possible, and the prosecutor (actually counterfeit) will be contacted. Make one, . , IB At Step by step. Although, using the current digital = machine (four) (four) materials to carry out the step by step, in its verification method for - protection t: in & non-cooked wheel computer related fields (especially learning = discipline The elderly), how to obtain the open record of the test? The link to the website for verification? The procedure is complicated. Therefore, how to simplify the verification process of the digital signature has become an effort of the relevant industry. The direction of the invention is therefore related to the invention. Therefore, the purpose of the invention is to provide a method for verifying the authenticity of a physical object by using a digital signature code. The chapter code verification entity method includes the following steps: (4) Digitalization - the surface content of the physical object, and produce a digital data (b) After the digital signature process using the private data and gold record for the digital data 1353765

,而產生出一數位簽章。 (C)將該數位簽章轉換成一數位簽章代碼。 (d) —儲存有該數位資料、該數位簽章、該數位簽章代 碼及一相對於該私密金鑰的簽章序號之代碼處理伺服主機 接收該數位簽章代碼的輸入。 (e) 該代碼處理伺服主機利用該簽章序號自一簽章憑證 管理伺服主機取得一公開金鑰。And produce a digital signature. (C) Convert the digital signature into a digital signature code. (d) - a code storing the digital data, the digital signature, the digital signature code, and a signature number relative to the private key to process the input of the digital signature code by the server. (e) The code processing server host uses the signature number to obtain a public key from a signature certificate management server.

(0使用該公開金鑰配合數位簽章驗證程序,檢驗該數 位簽章是否為真。 本發明之功效在於,藉由對習知數位簽章之使用模式 ,以數位簽章代碼取代,而簡化了現今數位簽章的驗證程 序,並進而衍生出更為廣泛的便利應用方式。 【實施方式】 有關本發明之前述及其他技術内容、特點與功效,在 X下配&參考圖式之一較佳實施例的詳細說明中,將可清 楚的呈現。(0) Use the public key in conjunction with the digital signature verification procedure to verify whether the digital signature is true. The effect of the present invention is to simplify by replacing the use of the digital signature with the digital signature code. The verification procedure of the current digital signature, and further derived a wider range of convenient application methods. [Embodiment] The foregoing and other technical contents, features and effects of the present invention are combined with one of the reference patterns in X. The detailed description of the preferred embodiments will be apparent.

在本發明被詳細描述之前,要注意的是,在以下的說 明内容中’類㈣元件是以相同的編號來表示。 參閱圖2、圖3及圖4’本發明利用數位簽章代碼驗證 實體物真偽之方法2的—第-較佳實施例,包含以下步驟 首先如^驟21所示,藉由—轉換裝置32 Hi 實體物31之表面内容’並產生出一數位資料331於-電腦 、-、端機33 〇在本較佳實施例中,該實體物^是一實體 9 < S ) 1353765Before the present invention is described in detail, it is to be noted that in the following description, the 'fourth element' is denoted by the same reference numeral. Referring to FIG. 2, FIG. 3 and FIG. 4, a first preferred embodiment of the method 2 for verifying authenticity of a physical object using a digital signature code includes the following steps: first, as shown in FIG. 21, by means of a conversion device 32 Hi The surface content of the physical object 31 and produces a digital data 331 in the computer, -, the end machine 33. In the preferred embodiment, the physical object ^ is an entity 9 < S ) 1353765

牛11而。亥轉換裝置32可視為是一般常見的掃描裝置 ’並透過此掃描裝置對該實體文件311進行掃描而將此實 體文件31】之内容輸入至該電腦終端機^ ~ ,但是,除了 透過掃描裝置對該實體文件311掃描之外,也可以是以二工 方式鍵入該實體文件311之全部(或部分)内容文字並產生出 電子文件檔案,並儲存於該電腦終端機33内;而關於上述 經數位化之實體物31的表面内容,其明文(咖㈣擋宰 的格式是符合執行-數位簽章35的格式,例如具有副樓名 ⑻的檔案、具有副檀4 —的檀案、具有副檀名(叫的 ,子郵件、手機簡訊(SMS)、網頁文件(html板職叫或 疋可延伸性標示語言格式文社其中之—者。此外,在現 實生活中,該實體物31亦可以是其他非實體文件3ιι之形 2如三_立體物312 ’並經過—具有照相或攝影功能的 轉換裝置32,如數位照相裝置或數位攝影裝置等,將該立 =物312之外觀拍下後,以數位資料33ι格式(靜態圖像或 態影像)輸入至該電腦終端機33内,此外,具有類似電腦 4機33功能的網路通訊手機(圖未示)或個人行動電子裝 f (圖未示)均可使用,因此並不應以本較佳實施例中所揭 路者為限。 ^备然,在該步驟21中,也可於該轉換裝置32數位化 二實體物31之表面内容時,同時加人—非實體物之表面内 办’而產生出該數位資料331於該電腦終端機Μ内。且該 非實體物之表面内容可^執行數位簽章者所欲註明或^ 加之内容。 10 < S ) 充說明的是’前述之實體文件311,可以是國民身 分證、健保卡'駕歇執照、車藉資料、車輛出薇資料、電 子機示、畢業證書、名 >;、判決書、契約書、委託書授 權書、協議書、醫療診斷報告書信用狀、傳票、拘票、 ,索不、專業證照、工作證、商品價目表、商品保證書、 夂易收據、網頁文字、正本、副本、影本或複製本、履歷 表生產履歷、各種工作證(包括外勞)、公司證、記者證、 :::、通行證、料證、技職專業證照、聘書、服務年 貝-明、⑷物品的說明書、廣告招牌、廣告dm、文宣、 A文(個人或公司)公告或聲明、標語、照片中之文字 病症暨失能)診斷書、 式里表(Barthel Index)、報紙雜誌期 中的字、(管理費)㈣帳單、護照簽證中的文字、 ==性質的聲明文字、刮刮樂獎券、各 一 中田畫作的圖說、訂單、產 各式的複委託金(如^念、 七用狀租> 書、各種 分…!:)、電子郵件中文字及其他對於身 ;等有代表識別性或其公信力極為重要而須慎防偽造之文 資料=進如步驟22所示,利用-私密金…該數位 章之=金餘^實施例中,對該數位㈣如進行簽 行使用之m M 片卡(®未^),也就是現 接觸式晶= 式晶卡,例如ISQ7816或是非 例如IS014443,再配合一曰片+ 圖未示),並透過該電腦終端機33之讀;^而;i卡/卡裝置( <项取而取得的,再透過Cattle 11 and. The conversion device 32 can be regarded as a common scanning device 'and scans the physical file 311 through the scanning device to input the content of the physical file 31 to the computer terminal device. However, except for the scanning device pair In addition to scanning the physical file 311, all (or part of) the content text of the physical file 311 may be entered in a two-way manner and an electronic file file may be generated and stored in the computer terminal 33; The surface content of the physical object 31, its plain text (the format of the coffee (four) block is in accordance with the format of the execution-digital seal 35, such as the file with the name of the auxiliary building (8), the Tan case with the secondary sandalwood 4, and the secondary sandalwood Name (called, sub-mail, mobile phone newsletter (SMS), web page file (html board called or 疋 extensible markup language format text agency). In addition, in real life, the physical object 31 can also be Other non-physical documents 3 ιι Shape 2 such as three_three-dimensional object 312 'and pass through - having a camera or photography function conversion device 32, such as a digital camera device or a digital camera device, etc. After the appearance of the 312 is taken, it is input into the computer terminal 33 in a digital data format 33 (still image or state image), and in addition, a network communication mobile phone (not shown) or an individual having a function similar to the computer 4 machine 33 The mobile electronic device f (not shown) can be used, and therefore should not be limited to the one disclosed in the preferred embodiment. ^ In addition, in this step 21, the conversion device 32 can also be digitized. When the surface content of the two physical objects 31 is simultaneously added to the surface of the non-physical object, the digital data 331 is generated in the computer terminal, and the surface content of the non-physical object can be executed by the digital signature holder. 10 < S ) Filled with the description of 'the aforementioned physical document 311, which can be a national identity card, a health insurance card' driving license, vehicle loan information, vehicle information, electronic display, Graduation certificate, name>;, judgment, contract, power of attorney, agreement, letter of credit for medical diagnosis report, subpoena, arrest, sorrow, professional certificate, work permit, commodity price list, commodity guarantee, 夂receipt, Page text, original, copy, photocopy or copy, resume production history, various work permits (including foreign workers), company certificate, press card, :::, pass, material certificate, technical professional license, letter of appointment, service year - Ming, (4) Articles of the article, advertising signs, advertising dm, texts, A (personal or company) announcements or statements, slogans, textual illnesses and disability in the photo), Barthel Index, newspapers The words in the magazine period, (management fee) (4) bills, the words in the passport visa, the declaration text of the nature of the ==, the lottery ticket, the picture description of each of the Nakata paintings, the order, and the various types of reinstatement (such as Seven-use rent> books, various points...!:), e-mail Chinese characters and other body-related texts; such as texts that are representative of recognition or their credibility is extremely important and must be guarded against forgery = enter as shown in step 22 Use-private gold...the digital chapter=金余^ In the embodiment, the m-chip card (® not ^) used for the signing of the digit (4), that is, the current contact crystal=type crystal card, such as ISQ7816 Or not for example IS014443 + Together with a said sheet not shown), and the read through the computer terminal 33; and ^; I card / card device (< take items acquired, and then through

11 (S !353765 簽早工具程式(圖未示)配合該私密金鑰34,將包括檔案名 稱、作者基本資料、建檔時間、有效期間及摘要說明等數 位簽章35必要内容及其格式簽蓋於上述之實體文件3ΐι上 ,而完成簽章程序,由於此數位簽章流程並非本發明改良 的重點,僅須依循現今之數位簽章方式即可,故在此不 贅述。 接著,如步驟23所示,將該數位簽章35轉換成—數 位簽章代碼37。 值得一提的是,在本較佳實施例t,是利用一單向雜 凑函數36(则、F„>93或SHA-1等)之運算,將該數位簽章 35轉換成-數位簽章代碼37;此種單向雜凑函數^,不僅 具有將任意長度位元資料轉換成固定長度位元資料之特性 外’更具有無法從已經過單向雜凑函數36轉換過之結果資 科逆推回原資料内容的「單向不可逆」特質。此外,對於 同一個單向雜凑函數36而言,不同的輸入資料,會有不同 =輸出貝料’加上早向雜凑函數%的計算複雜度相當高, 此種單向雜凑函數%而將之輸出資料竄改是非常 _的;然而’於實際應用上,該數位簽章代碼37也可以 :以人工方式刻意或隨機地直接對該數位簽章35指定-代 说’故不應僅贿於本較佳實_所述之方式實施。 在該_23中’於產生該數位料代碼3 ,可再透過一條碼產生裝置( 夂 ^ ^ Μ ^ ^ 置(圖未不),對所產生之數位簽章 代碼37轉換成以條碼的形式呈現。 然後,如步驟24新; γ、’ 一儲存有該數位資料33丨、該 12 1353765 數位簽章35、該數位簽章代碼37及一相對於該私密金鑰 34的簽章序號332之代碼處理伺服主機38,接收該數位簽 章代碼37的輸h在本較佳實施财,該代碼處理词服主 機38在接收該數位簽章代碼37之輸人時先檢查該數位 簽章35是否仍在其有效期間内,若逾期即停止對該數位 簽章35進行後續驗證作業;且該代碼處理舰主機%每 隔-預設期間,如每天 '每週或每月,即自動檢查該數位 簽章35是否仍在其有效期間内。 此外,除上述檢驗職位簽章35是㈣在其有效期間 内之外,該代碼處理舰主機38也可以具有—用來統計該 數位簽章代碼37輸人缝(或驗證次數)之計絲置(圖未示) ,且在接收該數位㈣代碼37之輸人時,運用該計次裝置 檢查是否超過-預設次數’若超過該預設次數即停止對 該數位簽章35進行後續驗證作業。且#該數位簽章代碼η 在該步驟23時’如果還有再經—條碼化的過程時,則在該 步驟24 該代碼處理伺服主機%就是藉由一條碼讀取 裝置來接收該數位簽章代碼37之輸入。 補充說明的是,在本較佳實施例中所提及之私密金輪 34與公開金錄4〇,實為現行的「非對稱性加密系統」,且 此「非對稱性加密系統」較常用於數位簽章領域中的有以 下三種機制: RSA數位簽章機制:1978年,以州、及 Adl_n (RSA78)三位學者利用分解大質數的困難度,提出 RSA 數位簽章機制。目前,VISA、MasterCard、IBM、 13 <S) 135376511 (S!353765 signing early tool (not shown) with this private key 34, will include the file name, author's basic information, filing time, expiration date and summary description, etc. 35 necessary contents and format Covering the above-mentioned physical file 3ΐι, and completing the signature process, since the digital signature process is not the focus of the improvement of the present invention, it is only necessary to follow the current digital signature method, so it will not be described here. As shown in Fig. 23, the digital signature 35 is converted into a digital signature code 37. It is worth mentioning that in the preferred embodiment t, a one-way hash function 36 is utilized (then, F„>93 Or the operation of SHA-1, etc., converting the digital signature 35 into a -digit signature code 37; such a one-way hash function ^ not only has the property of converting arbitrary length bit data into fixed length bit data. Externally, there is a "one-way irreversible" trait that cannot be reversed from the result that has been converted by the one-way hash function 36. In addition, for the same one-way hash function 36, the difference is different. Input data will be different = The computational complexity of the output of the shell material 'plus the early hash function % is quite high, and the unilateral hash function % tampering with the output data is very _; however, in practical applications, the digital signature code 37 can also: manually deliberately or randomly directly designate the digital signature 35 - on behalf of the "should not only be bribed in the manner described in the preferred embodiment." In the _23 in the generation of the digit Material code 3, can be further transmitted through a code generating device (夂^^ Μ ^ ^ (not shown), and the generated digital signature code 37 is converted into a bar code. Then, as step 24 new; γ Receiving the digital host 38, the code processing server host 38 storing the digital data 33, the 12 1353765 digital signature 35, the digital signature code 37, and a signature number 332 relative to the private key 34 The code of the code 37 is implemented in the preferred embodiment, and the code processing vocabulary host 38 first checks whether the digital signature 35 is still within its valid period when receiving the input of the digital signature code 37, if overdue, Stop the subsequent verification of the digital signature 35 And the code handles the ship host% every every preset period, such as every day 'weekly or monthly, that is, it automatically checks whether the digital signature 35 is still within its valid period. In addition, in addition to the above-mentioned inspection position signature 35 is (four) The code processing ship host 38 may also have a meter (not shown) for counting the number of signatures (or the number of verifications) of the digital signature code 37, and receiving the digits, outside of its validity period. (4) When the input of the code 37 is used, the counting device is used to check whether it exceeds the preset number of times. If the preset number of times exceeds the preset number of times, the subsequent verification operation is stopped for the digital signature 35. And the digital signature code η is in the At step 23, if there is still a process of bar coded, then at step 24 the code processing servo host % receives the input of the digital signature code 37 by means of a code reading device. It should be noted that the private gold wheel 34 and the public gold record mentioned in the preferred embodiment are actually the current "asymmetric encryption system", and the "asymmetric encryption system" is more commonly used. There are three mechanisms in the field of digital signature: RSA digital signature mechanism: In 1978, the three states of the State and Adl_n (RSA78) used the difficulty of decomposing large prime numbers to propose the RSA digital signature mechanism. Currently, VISA, MasterCard, IBM, 13 <S) 1353765

Microsoft、HP等公司所協力制定的安全電子交易標準( Secure Electronic Transactions,SET)便是採用 RSA 數位 簽章機制。系統設置時,每一位使用者可以先選擇其私密 金錄:即二個大質數(p,q )以及一整數d<(p-l)(q-l),其 中d與(p-l)(q-l)互質;之後再計算出其公開金鑰:N=p*q 與e=d-l mod (p-l)(q-l),其中mod表示模數運算(亦即 取餘的運算)。The Secure Electronic Transactions (SET) developed by Microsoft, HP, etc. is based on the RSA digital signature mechanism. When the system is set up, each user can first select their private record: two large prime numbers (p, q) and an integer d<(pl)(ql), where d is mutually compatible with (pl)(ql) Then calculate its public key: N=p*q and e=dl mod (pl)(ql), where mod represents the modulo operation (that is, the remainder operation).

ElGamal 數位簽章機制:T. ElGamal (E1G85)於 1985 年提出ElGamal數位簽章機制,而此機制的安全性是建立 在解決離散對數問題的困難度上。在使用此機制之前,系 統會先公佈一個大質數P和模P的原根g。之後,每位 使用者先任選一個小於p-ι的整數X作為私密金鑰,並且 計算出他的公開金鑰y=gx mod p。 DSA 數位簽章機制:此數位簽章機制是由美國國家標 準局(National Institute of Standard and Technology > NIST )於 1991 年 8月提出(DSS91,DSS92),其安全性與 ElGamal數位簽章機制相同,皆建立在解決離散對數問題的 困難度上。在使用此機制之前,系統會先選擇一個5 12位 元的質數p與一個160位元的質數q,其中p-Ι可以被 q整除。另外,系統再任選一個小於p-1的整數h並且 計算出g=hp-l/q mod p。最後,公佈系統參數{p,q, g}。 因此,使用者一旦得知系統公開參數之後,便可任選一個 小於q-Ι的整數X作為私密金鑰,並且計算出他的公開金 錄 y=gx mod p。 14 1353.765 由於數位簽章機制中所使用的「非對稱性加密系統」, 是熟悉該領域之人士可輕易思及且變化應用的,故不應受 本較佳實施例之特定範例為限。 再來,如步驟25所示,該代碼處理伺服主機38利用 該簽早序號332自一簽章憑證管理伺服主機39取得一與該 簽章序號332相對應的公開金鑰4〇。在本較佳實施例中, 該簽章憑證管理伺服主機39可以是架設於内政部自然人憑 證管理中心 '經濟部工商憑證管理中心、政府法人憑證或 其他民營的憑證管理中心内。 而後,如步驟26所示,使用該公開金鑰4〇配合如圖i 所不的習知數位簽章驗證程序,檢驗該數位簽章35是否為 真。簡而言之,因為每一把私密金鑰34只有一把與其相對 應的公開金鑰40能對由該私密金鑰34所簽發之數位簽章 35進行解密驗證’因此,若能由某一使用者的公開金鑰40 解開其數位簽章35時,就表示該數位簽章35確實是由該 使用者之私密金鑰34所簽蓋的,藉此機制來實現該數位簽 章35之鑑別性檢驗;同樣地,由於如何利用公開金鑰仂 對數位簽章35進行驗證屬習知技術之範#,亦非本發明之 改良重點,因此在此諒可不需再加以贅述。 ^最後,如步驟27所示,判讀已利用該公開金鑰4〇驗 ,的數位簽章35附帶之内容是否與該實體物31之表面内 今相符《•在本較佳實施射,當該數位簽章35已透過該公 4金输40解碼驗證後’即可再透過肉眼對該數位資料331 •人工核對方式,檢驗其内容是否有遭竄改。 15 < S :) 冒陳瑞仁檢察年2月8曰報導,歹徒假 實詐編案例,料;ΓΤ文内容上並詐得千萬元之真 來進行上述相關二i 3:的簽章及驗證系統」 較佳實施例··數位簽早35產生及其驗證作業的—第二 少1¾圓 也乃沄呒得示所載之假設内容,在本較 :實施:是使用名為「邱吉強』自然人憑證晶片卡執: 簽早35 %時替代扮演由政府法人憑證製發單位發认 真實法官的憑證晶片卡之角色。 x、。 關於數位簽早代碼37的產生’首先,如圖6所示一 使用者在其電腦終端機33的螢幕所顯示的簽章及驗證表單 執仃"面41中,點選簽章功能選項42 ;接著,點選檔案 開啟鍵43’以劉覽並尋找使用者所欲執行數位簽章的擋案 名稱,如圖7之選擇檔案對話框44所示,名為「法院傳票 」之電子檔;然後,所點選之「法院傳票.加」就被 選入表單執行介面41中,並如圖8所示,於表單執行介面 41之檔案路杻及名稱顯示欄45内呈現出其所屬路徑及名稱 ,而後在數位簽章有效天數選取表單46上,選擇本次數位 簽早代碼,37的有效天數,如果該使用者是使用晶片卡時, 則須在晶片卡密碼輸入欄47内輸入晶片密碼(見圖9);最 後,於點選簽章產生鍵48後,如圖1〇之簽章代碼產生攔 49内即出現本次編號為「39c3ee72! 1」的簽章代碼37。 然而’關於驗證數位簽章代碼驗證實體物真偽的操作 1353765 ’首先,如圖11所示,另一使用者在其電腦終端機33(可 為同一部或不同部)上開啟上述之簽章及驗證系統並點選 其上之驗證功能選項5〇;接著,如圖12所示在簽章代碼 輸入攔51内輸入於前述數位簽章代碼37產生說明中所產 生的「39c3ee7211」簽章代碼37並點選執行驗證鍵52 ;若 此簽章驗證成功時,即如圖13所示,彈出一驗證成功對話 框53,然後,如圖14所示,於驗證結果顯示框54内呈現 出.一真實簽章人姓名55、一組簽章有效期間56、一組簽 章人憑證有效期間57,及一用來呈現與該數位簽章35相關 之數位貧料331内容的檔案内容顯示攔58 ;最後,再透過 使用者以肉眼辨識方式,對該數位資料331進行更進—步 地内容核對,來檢驗圖5之板橋地方法院傳票内容是否遭 人惡意竄改。 在此須補充說明的是,簽章人若是一位真實法官使用 政府法人憑證晶片卡所簽章時,前述之簽章人姓名55將顯 示為「邱吉強,板橋地方法院法官」(圖未示),而並非如 圖14所示的「邱吉強」三個字;此外’於檔案内容顯示攔 58所顯示的是前述「法院傳票· txtj檔案的内容,且該内 容是由法官自行輸入傳票(實體文件)之全部内容或部份重 要内容等方式所產生之電子文件檔案。 上述例子中,如圖1 〇之簽章代碼產生爛4 9内即出現 本次編號為「39c3ee7211」的簽章代碼37。接著,進—步 邱吉強法官所屬的一個以上的上司或其他相關法人,例如 圖5中的地院也可以再對本次的簽章代碼37,執行圖5至 17 < S ) 1353765 二二的各步驟,去產生-個複簽章代碼(圖未示)。該個複 ί::碼(圖未示)皆可印在或寫在圖5中,該地方法院傳 不所載之假設内容上。如圖 線姓Μ的γ 1所不,另一使用者在其電腦 〜端機33为別去驗證兩個簽章代碼(圖未示 因此藉由本發明之「利用數㈣章代碼驗證實體物 :偽之方法2」可有效避免町所述之社會詐卿件層出不 窮地發生:ElGamal Digital Signature Mechanism: T. ElGamal (E1G85) proposed the ElGamal digital signature mechanism in 1985, and the security of this mechanism is based on the difficulty of solving the discrete logarithm problem. Before using this mechanism, the system will first publish a large prime number P and the original root g of the modulo P. After that, each user first selects an integer X smaller than p-ι as the private key, and calculates his public key y=gx mod p. DSA Digital Signature Mechanism: This digital signature mechanism was proposed by the National Institute of Standards and Technology (NIST) in August 1991 (DSS91, DSS92) with the same security as the ElGamal digital signature mechanism. , are all based on the difficulty of solving the discrete logarithm problem. Before using this mechanism, the system first selects a prime number p of 5 12 bits and a prime number q of 160 bits, where p-Ι can be divisible by q. In addition, the system optionally selects an integer h less than p-1 and calculates g = hp - l / q mod p. Finally, the system parameters {p, q, g} are published. Therefore, once the user knows the system public parameters, he can choose an integer X smaller than q-Ι as the private key, and calculate his public record y=gx mod p. 14 1353.765 The "Asymmetric Encryption System" used in the digital signature mechanism is readily applicable and applicable to those skilled in the art and should not be limited to the specific examples of the preferred embodiment. Then, as shown in step 25, the code processing servo host 38 obtains a public key 4 corresponding to the signature number 332 from a signature certificate management server 39 using the signature number 332. In the preferred embodiment, the signature voucher management server 39 can be installed in the Ministry of the Interior Natural Person Certification Management Center 'Ministry of Commerce and Industry Voucher Management Center, government legal person certificate or other private certificate management center. Then, as shown in step 26, the public key 4 is used to match the conventional digital signature verification procedure as shown in Fig. i to verify whether the digital signature 35 is true. In short, because each private key 34 has only one corresponding public key 40, it can decrypt the digital signature 35 issued by the private key 34. Therefore, if it can be When the user's public key 40 unlocks the digital signature 35, it indicates that the digital signature 35 is indeed signed by the user's private key 34, thereby implementing the digital signature 35. The discriminative test; likewise, it is not a modification of the present invention because the use of the public key 进行 to verify the digital signature 35 is not an improvement of the present invention, and therefore no further need to be repeated here. ^ Finally, as shown in step 27, the interpretation of the content of the digital signature 35 that has been verified by the public key 4 is consistent with the surface of the physical object 31. After the digital signature 35 has been verified by the public 4 gold transmission 40, it can be checked by the naked eye for the digital data 331 • the manual check method to check whether the content has been tampered with. 15 < S :) In the case of Chen Ruiren’s prosecution on February 8th, the case of the swindler’s fraudulent scam, it is expected that the content of the essay will be fraudulently obtained for the signing and verification of the above related i i 3: The preferred embodiment············································································ Voucher wafer card: The role of the certificate chip card issued by the government legal person certificate issuing unit is 35% early. x,. About the generation of the digital signing early code 37 'First, as shown in Figure 6 The user clicks on the signature function option 42 in the signature and verification form of the screen displayed on the screen of the computer terminal 33. Then, click the file open button 43' to view the user and find the user. The name of the file to be executed for the digital signature, as shown in the Select File dialog box 44 of Figure 7, is the electronic file named "Court Voucher"; then, the selected "Court Voucher. Plus" is selected into the form. Execute interface 41, and as shown in Figure 8, in the form execution interface 41 file path and name display column 45 presents its own path and name, and then on the digital signature valid days selection form 46, select this number of times sign early code, 37 effective days, if the user is using When the chip card is used, the chip password must be entered in the chip card password input field 47 (see Fig. 9); finally, after the signature generation button 48 is clicked, the signature code generation block 49 as shown in Fig. 1 The signature code 37 with the minor number "39c3ee72! 1". However, 'Operation 1353765 on verifying the authenticity of the digital signature code to verify the authenticity of the entity' firstly, as shown in FIG. 11, another user opens the above signature on his computer terminal 33 (which may be the same or a different part) And verifying the system and clicking the verification function option 5 on it; then, as shown in FIG. 12, the "39c3ee7211" signature code generated in the description is generated by inputting the digital signature code 37 in the signature code input block 51 as shown in FIG. 37 and click the execution verification key 52; if the signature verification is successful, as shown in FIG. 13, a verification success dialog 53 is popped up, and then, as shown in FIG. 14, the verification result display box 54 is presented. A real signature person name 55, a set of signature valid period 56, a set of signature holder voucher valid period 57, and an archive content display block 58 for presenting the content of the digital poor 331 associated with the digital signature 35 Finally, through the user's visual identification, the digital data 331 is further checked for content to verify whether the content of the ticket of the Banqiao District Court of Figure 5 has been maliciously altered. It should be added here that if the signatory is signed by a real judge using the government legal person certificate chip card, the name of the aforementioned signatory 55 will be displayed as "Qiu Jiqiang, Banqiao District Court Judge" (not shown) It is not the word "Qiu Jiqiang" as shown in Figure 14; in addition, the content of the "court summons txtj file" displayed in the file content display block 58 is the subject of the voucher input by the judge. The electronic file file generated by the whole content or part of the important content, etc. In the above example, the signature code 37 of the number "39c3ee7211" appears in the signature code of Figure 1. Then, one or more of the superiors or other related legal persons that Judge Qiu Jiqiang belongs to, such as the grounds in Figure 5, can also perform the signature code 37 of this time, and perform Figures 5 to 17 <S) 1353765 22 Each step, to generate a complex signature code (not shown). The copy:: code (not shown) can be printed or written in Figure 5, which is not contained in the local court. As shown by the γ 1 of the line surname Μ, the other user does not verify the two signature codes in his computer to the end machine 33 (the figure does not show that the physical object is verified by the "number (4) chapter code of the present invention: The pseudo-method 2" can effectively prevent the social frauds described in the town from happening endlessly:

民視新聞網2_/()8/11/報導:「.·.喬裝法務部人員, 以一張偽造的法務部執行處公文,欺编被害人涉嫌非法洗 錢,所以必須;束結財產,如果被害人不想自己的帳戶被凌 結,必須先匯款數十萬來進行假扣押。一張幾可礼直的偽 造公文,再加上民眾對於法律常識的缺乏,讓這個集團在 短短半年内,至少得手—+ 〆付于干兩百萬,...」。倘若此時,被 害人利用手機輸人所接獲公文上的簽章代碼37後傳送至代People's News Network 2_/() 8/11/ reported: "... disguised as a staff member of the Ministry of Justice, with a forged official document of the Ministry of Justice, defrauding the victim suspected of illegal money laundering, so must; tie the property, if the victim If you don't want your account to be smashed, you must first send hundreds of thousands of money to fake the seizure. A few rude documents, plus the public's lack of legal knowledge, let the group at least succeed in just six months. —+ 〆付干干万万,...”. If at this time, the victim receives the signature code 37 on the official document using the mobile phone input and transmits it to the generation.

碼處理㈣主们8,並自所回傳的訊息中,來比對並判讀 法務部執行處公文是否被偽造。 又,一委託人在銀行的紙製傳票上寫填提領一仟萬並 用私印’接著該委託人再手寫一張匯出該一仟萬的匯款單 後,此委託人使用本發明在該紙製傳票上手寫上一個簽章 代碼37,並在該匯款單上寫另一個數位簽章代碼37,再把 上述傳票相Μ資料及匯款單傳送至銀行指$的代碼词服号 主機38進行儲存;因此,當一名被委託人走進銀行並持該 張紙製傳票臨櫃時,銀行櫃員及可使用銀行的電腦終端機 33輸入上述之數位簽章代碼37執行驗證委託人的内容真偽 18 < S ) 大額(現金委託)提領作業之進行即能獲 最後,再針對如何結合本發明利用數位簽章代碼驗證 實體=真傷之方法2,如何應用於日常生活上,以提昇其數 位簽章35驗證之便利性及實用性,作更多元化應用 說明: (一)驗證資訊公信力之程序簡化:Code processing (4) The main 8 and from the returned message, compare and interpret whether the official document of the Ministry of Justice is forged. In addition, a principal writes on the bank's paper voucher to fill the 10,000 and use the private seal. Then the client writes another remittance slip to remit the ten thousand remittance slip, the principal uses the invention. The paper voucher is handwritten with a signature code 37, and another digital signature code 37 is written on the money order, and the voucher data and the remittance slip are transmitted to the bank code number service host 38. Therefore, when a trustee enters the bank and holds the paper-based subpoena, the bank teller and the computer terminal 33 that can use the bank enter the above-mentioned digital signature code 37 to perform verification of the contents of the client. Pseudo 18 < S ) Large amount (cash entrustment) can be obtained in the final operation, and then how to use the digital signature code to verify the entity = true injury method 2, how to apply it to daily life, Improve the convenience and practicability of its digital signature 35 verification, and make a more diversified application description: (1) Simplification of the procedure for verifying information credibility:

與否;如此一來, 得加強確認。 當一乘客欲坐上一遊覽車前,可針對該遊覽車的駕駛 ,取其印有—數位簽章代碼37之駕駛資訊相_名片或 疋車上明顯處已貼有-印有數位簽章代碼37的駕敬資訊文 件時,該乘客能立即透過—手持式電子裝置(圖未示),如個 人數位助理(PDA)、筆記型電腦《行動電話等,透過各式通 方式如網路,與本較佳實施例中所述的代碼處理伺服 主機38取彳于連線,並輸人該數位簽章代碼37,執行查證動 作,當該代碼處理伺服主機38藉由本發明所述之利用數位 簽章代碼驗證實體物真偽之方法2驗證後,再透過該乘客 之核對,即可辯明該遊覽車駕駛之駕駛紀錄是否優良該 輛遊覽車之車況是否良好或該遊覽車之所有公司之信譽是 否良好等,以防止偽造的駕駛相關資料欺瞒了乘客,而避 免衍生出道路危安之潛在問題。 此外,當一網頁瀏覽者在一附有一數位簽章代碼3 7的 網頁中閱讀其所刊載之内容時,可藉由對本較佳實施例中 所述的代碼處理伺服主機38,輸入該數位簽章代碼37,以 尋求遠具有公信力之簽章憑證管理伺服主機39的證實,進 19 1353765 —步地驗證所接收之資訊真偽,以輔助該網頁瀏覽者如何 在真真假假的資訊爆炸洪流中尋求可靠真實的消息而不 致被假訊息誤導。 因此,藉由上述之利用數位簽章代碼驗證實體物真偽 之方法2即可避免發生如中國時報於2〇〇8年i月日所 載之身分證件偽造事件:「在詐騙集團的巧手偽造下,上百 名曾經服役於新竹某陸軍單位阿兵哥的軍餘條和軍人身分 證,變成嫌犯向銀行冒名申辦信用卡 '車貸和房貸,並= 貸上千萬元的人頭資料。刑事局谓九隊昨曰逮捕主嫌余政 賢等五人,共起出大批偽造軍人身分證、國民身分證 保卡和電腦設備。警方調查,主嫌余政賢(廿八歲)從九 十四年十月起,著手偽造軍人身分證、餘條、國民身分證 '健保卡等證件,包裝成具有軍士官身分,並且在銀行的 '用卡申請書内附上軍人身分證及薪資證明等假文件,把 將頭’從上兵變成少校’或者下士自動晉升為少 ,而刀斤’上百名人頭戶籍地,均位於新竹縣尖石鄉 2寫駐在部隊更集中於陸軍某旅級單位、部隊;尊方 再觀察,歹徒所附件的申請資 本,偽造變、止夕、卄τ軍祖、新資及身分證影 非檢L太 子字體大小與原本—致,編排精細,除 非檢嚴原本外,實難察覺。」 降 (-)針對具有時效性之訊息的辅助求證: 當一電子郵件收件者收到一封 37的協尋失蹤| 寸帶有一數位簽章代碼 ,透過本較佳fee + 其數位簽章代碼37 佳心例中之該步驟24所述的代碼處理词服主Whether or not; as a result, it is necessary to strengthen the confirmation. When a passenger wants to sit in front of a tour bus, he can drive the driving information of the tour bus with the digital signage code 37. The business card or the vehicle is marked with a mark - printed with a digital signature. When the code 37 is used to respect the information file, the passenger can immediately pass through the handheld electronic device (not shown), such as a personal digital assistant (PDA), a notebook computer, a mobile phone, etc., through various communication methods such as the Internet. The code processing servo host 38 described in the preferred embodiment is connected to the line and inputs the digital signature code 37 to perform a verification operation when the code processing servo host 38 utilizes the digits described in the present invention. After the verification code 2 verifies the authenticity of the physical object, the verification of the physical object can be used to check whether the driving record of the tour bus is good or not. Whether it is good, etc., to prevent counterfeit driving-related information from deceiving passengers and avoiding potential problems arising from road safety. In addition, when a web page viewer reads the content posted on a web page with a digital signature code 37, the digital host can be input by the code processing server 38 described in the preferred embodiment. Chapter 37, in order to seek the verification of the far-credit signature certificate management server 39, in 19 1353765 to verify the authenticity of the received information, in order to assist the web page viewer in the true and false information explosion torrent Seeking reliable and truthful messages without being misled by false messages. Therefore, by the above method 2 of verifying the authenticity of the physical object by using the digital signature code, it is possible to avoid the occurrence of the identity document forgery incident as stated in the China Times on the 2nd and 8th of the year: "The skill of the fraud group Under the falsification, hundreds of military officers and military identity cards that had served in an army unit of Hsinchu, A Bingge, became suspects and impersonated the bank to apply for credit card 'car loans and mortgages, and = 10 million yuan of head information. Criminal The bureau said that the Nine Teams arrested five suspects, including Yu Zhengxian, and issued a large number of fake military identity cards, national identity card and computer equipment. Police investigation, suspected Yu Zhengxian (廿 eight years old) from October 94 From the beginning, the counterfeit military identity card, the remaining article, the national identity card 'health insurance card and other documents were packaged into a military officer's identity, and a fake document such as a military identity card and a salary certificate was attached to the bank's application card. The head 'from the upper soldier to the major' or the corporal is automatically promoted to less, and the knife-hunting 'hundred people's heads of household registration, are located in Jianshi Township, Hsinchu County, 2, and the troops are more concentrated in a certain brigade-level unit of the Army. Team; Zunfang observes again, the application capital of the attachments of the gangsters, the forgery, the eve, the ancestors, the new capital and the identity card are not checked. It's hard to detect." Drop (-) Auxiliary Verification for Time-sensitive Messages: When an email recipient receives a 37 missing search | inch with a digital signature code, through this better fee + its digital signature code 37 in the good example of the code described in step 24 of the word processing

< S 20 1353765 機38’對於該數位簽章35之有效期限進行相關驗證,以判 斷該消息是否因為該失蹤兒童已尋獲,而早已註銷該封電 子信件的有效期限’而避免該封協尋信件因經 工丁夕人不斷 地轉發’卻在該名失蹤兒童被尋獲後,還導致不少仍不知 情的民眾繼續花心力協助搜尋,而平白地耗費許多社會資 源》 (三)驗證商品正牌與否之真偽:< S 20 1353765 The machine 38' performs relevant verification on the expiration date of the digital signature 35 to determine whether the message has been written off because the missing child has been found, and the expiration date of the e-mail has been cancelled. The search for letters was continually forwarded by the workers, but after the missing children were found, it also led many people who were still unaware of the situation to continue to help to search and spend a lot of social resources. (3) Verification Whether the product is genuine or not:

t-消費者欲購買-藥妝用品時,由於該藥妝用品是 直接地接觸該消費者之身體表面,甚至是口服入體内,加 抵滅良心 上目前社會上許多不肖業者為了謀取更多利益 地製造大量會傷及人體的黑心偽藥’並使之充斥於市面上T- Consumers want to buy - cosmeceuticals, because the cosmeceutical supplies are directly in contact with the body surface of the consumer, or even oral into the body, add to the conscience, many unscrupulous people in the society in order to seek more In the interest of creating a large number of black-hearted fake drugs that will hurt the human body and make it flooded the market

’但是’即錢過現有衛生局的相關合格標章或藥檢字號 之認定,仍然不敵$肖業者的偽造欺瞒手法;故鑑於此日 益嚴重之社會問題’即可將-數位簽章代们7印製於該藥 妝商品包裝内或内蓋上’並透過本發明利用數位簽章代 碼驗證實體物真偽之方法2,提供該藥妝商品之成分標示、 來源等相關具公信力資訊的驗證,以杜絕假藥對人體所帶 來的危害;另’再配合於該步驟24所提之該安裝於代碼處 理词服主機38内’用來統計該數位簽章代碼37輸入次數( 或驗證次數)之計次裝置輔助,而讓該數位^章代碼37僅能 提供「一次性」之驗證,進而防姑尤* %叩I万杜不為業者將一合法的數 位簽章代碼37重複地偽造並轉用·n y ^ 1褥用,况且一但數位簽章代碼 3 7被使用後,使用人的網路ip位 位址(或手機來電號碼)會被 前述代碼伺服器主機38自動儲在#拉 勒埽存5己錄,接著,該代碼伺服 21 1353765 器主機38進-步可將該儲存記錄傳送至製作該數位簽章代 碼37之人所屬的電腦終端機33(或手機)。 同理’此具有「"*次性」之數位簽章代碼37也可以應 用於酒類或其他飲品之瓶蓋内或包褒内,因此只有當開^ 該酒類或飲品時,才能獲知其數位簽章代碼37,並進一步 地去驗證該酒類或飲品是否為品質可靠的真品而防止中 國時報於2008年!月31日所報導之不肖事件:「目前正值 春節送禮旺季,但假酒市場充斥全省,台南地檢署计曰指 揮警調兵分十九路’在北中南同步查缉假酒,共查獲以金 門高粱酒為主、洋酒次之的近四千瓶假酒,另有兩千餘公 升的半成品及數十萬枚標籤;這些假酒幾以亂真,連原廠 酒商都不易辨認。此外,令警方詫異的是,業者連防偽標 章都仿冒逼真,一位金門酒廠主管陪同查緝,他拿出專業 儀益,才能分辨標章真偽,肉眼無法辨識,一般人就更不 必說了!更加上,目前洋酒的防偽標章已被完全破解,曰 後檢警對於查缉偽造假酒將陷於苦戰中。」 鑒於中國時報於2008年!月29日所報導之詐騙憾事 :北縣烏來美人湯溫泉會館,前年委託上恩管理公司協助 營運,沒想到期滿後,竟然發現有不少消費者在各大拍賣 網站購買的住宿及泡湯券等,雖與該會館出售的套券無異 ,但票券編號卻遭偽造。經查是上恩管理公司幹部從中搞 鬼’涉嫌偽造總價約二千多萬元的套券,且此事之東窗事 發乃是美人湯溫泉會館業者自去年九月起,陸續發現有消 費者所持的住宿、泡湯、餐券等,票券編號非會館原先設 22 < £ ) 1353765 計的流水號’紙張與印刷卻 模 漏洞 樣,懷疑印製過程出現 ^利用本發明的簽章代碼37執行驗證之—次性驗證有 效性質,可與任-種有價或無價的「實體入場票(券)」配合 使用,例如本案例入場處的一驗票人收取一泡湯券後,立 二=腦終端機33(或手機),自線上接收或是離線下載事 ==湯券的簽章代碼37、泡湯券上的流水號(明文) 壹Μ章35,然後’驗票人即可對此實體㈣券上的 簽章代碼37進行驗證。 (四)防杜物品檢驗證明之變造: f今科技技術發達,相對地偽造文件之手法也日 =的二於報章雜認上皆可不時地看到有不肖業者仿冒 政府的各式標章,以矇編不知情的社會大眾,例如,偽造 食品衛^的CAS優良冷凌食品標章等,如此一來,不知情 的民眾就得承擔可能f至丨叙 …l到不新鮮或來路不明食物的風險, 田^艮物皆被職予本發明所述之數位簽章代碼3 =上時’透過其具有公信力的簽章憑證管軸服主機、39 :二即可將消費者吃到來路不明之食物的風險降 再者,若此數位簽章代碼37是具有如步驟24所 、效性時,即可同時地對該食物之新鮮 =,即唯有在該數位簽章代碼37之有效期限内(在此可; 物的保存期限)’始能通過驗證。另,為了提昇暢貨之 產==流程,亦可將該數位簽章代碼37透過前述的條碼 " 使之條碼化,而加速了食品驗證之流程。 23 C £ ) 1353765 另右將現仃之車籍資料及車輛 之數位簽章代碼37構相 /U發明 ^在貝一手中古車時,連上網路並 輪入監理所製發的數㈣章代碼37,即可用來料車子年 份、出廠日及相關資料,而確保買二手中古車時不會 拼裝車或社會上所謂借屍還魂的蜮車。 此外,當-旅客出示-印有本發明數位簽章代碼Μ之 實體航空機票歧旅行業自己印表機平常用紙印出之電子'But' that the money passed the identification of the relevant qualified label or drug inspection number of the existing Health Bureau, still lost to the falsified deception of the Xiaoye people; therefore, in view of this increasingly serious social problem, the number of signatures can be Printed in the package of the cosmeceutical product or on the inner cover' and through the method 2 of the invention for verifying the authenticity of the physical object by using the digital signature code, providing verification of the credibility information of the ingredient indication and source of the cosmeceutical product, In order to eliminate the harm caused by the fake medicine to the human body; another 'in conjunction with the installation in the code processing word service host 38 mentioned in the step 24' is used to count the digital signature code 37 input times (or the number of verifications) The counting device assists, and allows the digital code 37 to provide only "one-off" verification, and thus prevent the legal digital signing code 37 from being repeatedly forged and prevented. Transfer to ny ^ 1 ,, and once the digital signature code 3 7 is used, the user's network ip address (or mobile phone number) will be automatically stored in the above code server host 38 Le 埽 5 5 recorded, connected The code servo 21 1353765 main unit 38 advances the stored record to the computer terminal 33 (or mobile phone) to which the person who made the digital signature code 37 belongs. Similarly, the digital signature code 37 with ""*次性" can also be used in the bottle cap or bag of alcohol or other beverages, so the number can only be known when the wine or drink is opened. Signature code 37, and further verify that the wine or drink is a reliable quality and prevent China Times from 2008! The unfortunate incident reported on the 31st of the month: "It is currently in the peak season of the Spring Festival gift season, but the fake wine market is flooding the whole province. The Tainan District Inspection Department has commanded the police to transfer the soldiers to the 19th road. Nearly 4,000 bottles of fake wine, followed by Jinmen sorghum, followed by foreign wine, and more than 2,000 liters of semi-finished products and hundreds of thousands of labels; these fake wines are so confusing that even the original wine merchants are not easily identifiable. What surprised the police was that the company even faked the anti-counterfeiting stamps. A director of the Golden Gate Winery accompanied him. He took out the professional benefits to distinguish the authenticity of the stamps. The naked eye could not recognize them. On the other hand, the anti-counterfeit seal of the current wine has been completely cracked, and the post-war police will be in a difficult battle for the investigation of counterfeit fake wine." Given the China Times in 2008! The fraud reported on the 29th of the month: Wulai Meirentang Hot Spring Resort in Beixian County, commissioned by Shangen Management Company to assist in the operation the previous year. I did not expect that after the expiration of the period, many consumers found accommodation and bathing at major auction websites. Coupons, etc., are the same as the coupons sold in the clubhouse, but the ticket number is forged. The investigation was carried out by the cadres of the Shangen Management Company, who were suspected of falsifying the total price of more than 20 million yuan. The incident of the incident was that the beauty soup hot spring club industry has been found by consumers since September last year. Accommodation, bathing, meal coupons, etc., ticket number is not originally set in the clubhouse 22 < £) 1353765 of the serial number 'paper and printing but the mold is flawed, suspected that the printing process appears ^ use the signature code of the invention 37 to verify The effective nature of the sub-verification can be used in conjunction with any "valuable or non-valuable "entity admission ticket (voucher)". For example, after a ticket inspector at the entrance of this case receives a bubble coupon, Li 2 = brain terminal Machine 33 (or mobile phone), received online or offline downloads == the signature code of the soup coupon 37, the serial number on the bubble coupon (plain text) 壹Μ章35, then 'the ticket examiner can use this entity (4) The signature code 37 on the voucher is verified. (4) The alteration of the inspection certificate of anti-Du goods: f. The technology and technology are developed, and the method of counterfeiting documents is also the same as that of the two newspapers. From time to time, you can see the various types of stamps that are unscrupulous. In order to circumvent the unheard of the public, for example, the forged food Guardian's CAS excellent cold food food stamps, etc., so that unsuspecting people have to bear the possibility of f to 丨 ... ... l to not fresh or come Unknown food risk, Tian ^ 艮 皆 被 被 本 本 本 本 本 本 本 本 本 本 本 本 本 本 本 本 本 本 本 本 数 数 数 数 数 数 数 数 数 数 数 数 数 数 数 数 数 数 数 数 数 数If the risk of the unidentified food is reduced, if the digital signature code 37 has the validity as in step 24, the freshness of the food can be simultaneously =, that is, only in the digital signature code 37 Within the validity period (here; the shelf life of the object) can be verified. In addition, in order to improve the production of the goods == process, the digital signature code 37 can also be bar coded through the aforementioned bar code, thereby accelerating the process of food verification. 23 C £ ) 1353765 On the right, the current vehicle information and the vehicle's digital signature code 37 are constructed/U invented. ^When the old car is in the hands of Beiyi, it is connected to the network and the number of the code issued by the supervisor (four) is coded. 37, you can use the car year, factory date and related information, and ensure that when buying a second-hand medieval car, it will not be assembled or the so-called car in the society. In addition, when the - passengers present - printed with the digital signature code of the invention, the physical airline ticket is different from the travel industry's own printers.

機票時’此刻,航空櫃台櫃員就可於現場立即地上網輸入 该數位㈣代碼37進行查核,以確認此機票之真偽及其相 關行程内容。 值得-提的是’本二實施例中針對該數位簽章代碼37 之應用僅提出幾個日常生活中常見之實用例子,舉凡相關 領域而熟悉該計數之人士所易於思及之例,皆應屬本發明 之實用範疇,故不應侷限於本二較佳實施例之所述。At the moment of the ticket, the airline counter teller can immediately enter the digital (4) code 37 on the Internet to check the authenticity of the ticket and the related itinerary. It is worth mentioning that 'the application of the digital signature code 37 in the second embodiment only presents a few practical examples that are common in daily life, and those who are familiar with the counting in the relevant field should be able to think about it. It is a practical scope of the present invention and should not be limited to the preferred embodiment of the present invention.

歸納上述,本發明利用數位簽章代碼驗證實體物真偽 之方法2,具有簡化數位簽章Μ之驗證程序,提供其驗證 程序之機動性及便利性,並使數位簽章35藉由數位簽章代 碼37之簡化,而推廣其相關應用方式等優勢,故確實達到 本發明之目的。 惟以上所述者,僅為本發明之二較佳實施例而已,當 不能以此限定本發明實施之範圍,即大凡依本發明申請專 利範圍及發明說明内容所作之簡單的等效變化與修飾,皆 仍屬本發明專利涵蓋之範圍内。 【圖式簡單說明】 24 < S > 1353765 圖1是—方塊圖, 圖2是一流程圖 實體物真偽之方法的一 圖3是一方塊圖 位簽章代碼之架構; 說明習知數位簽章架構; ’說明本發明制數位簽章代碼驗證 第一較佳實施例; ,說明該第一較佳實施例中產生一數 說明該第一較佳實施例中驗證該數 圖4是—方塊圖, 位簽章代碼的架構;In summary, the present invention uses the digital signature code to verify the authenticity of the physical object 2, has a simplified digital signature verification procedure, provides the flexibility and convenience of the verification procedure, and enables the digital signature 35 by digital signing The simplification of the code 37, and the promotion of its related application methods and the like, thus indeed achieve the object of the present invention. However, the above is only the preferred embodiment of the present invention, and the scope of the present invention is not limited thereto, that is, the simple equivalent changes and modifications made in accordance with the scope of the present invention and the description of the invention. All remain within the scope of the invention patent. [Simplified illustration] 24 < S > 1353765 Figure 1 is a block diagram, Figure 2 is a flowchart of the method of authenticity of a physical object, Figure 3 is a block diagram of the signature code of the block; Digital Signature Architecture; 'Description of the first preferred embodiment of the digital signature design verification of the present invention; illustrating that the first preferred embodiment produces a number indicating that the first preferred embodiment verifies the number of FIG. - block diagram, the architecture of the bit signature code;

圖5是一 法院傳票内容; 示意圖 說明一附有該數位簽章代碼之地方 保作介面圖,說明一實現該第一較佳實 〜 別m 貝 >九乐一 之簽章及麟系統進行簽章的第二較佳實施例; 圖7疋#作介面圖,說明透過該系統 案的操作畫面; 备Figure 5 is a court voucher content; schematic diagram shows a place with the digital signature code to maintain an interface diagram, indicating that the implementation of the first best real ~ different m shell > nine music one signature and the lin system to sign a second preferred embodiment; FIG. 7 is an interface diagram for explaining an operation screen through the system;

圖8是一操作介面 章有效天數; 圖9是一操作介面 作畫面; 圖’說明透過該系統指定一數位簽 圖’說明透過該系統進行簽章的操 圖10是一操作介面圖 章代碼的畫面; 圖11是一操作介面圖 的操作畫面; 圖12是一操作介面圖 章代碼的畫面; 圖13是一操作介面圖 ’說明透過該系統產生一數位簽 ,說明透過該系統進行驗證簽章 ,說明於該系統上輸入該數位簽 ,說明透過該系統驗證簽章成功 25 1353765 之畫面;及 圖14是一操作介面圖,說明該系統於驗證簽章成功後 所顯示之畫面。Figure 8 is an operation interface chapter effective number of days; Figure 9 is an operation interface for the screen; Figure 'Describes a digital signature through the system' to illustrate the operation of signing through the system Figure 10 is an operation interface stamp code screen Figure 11 is an operation screen of an operation interface diagram; Figure 12 is a screen of an operation interface stamp code; Figure 13 is an operation interface diagram illustrating the generation of a digital sign through the system, indicating that the verification signature is performed through the system, The digital sign is entered on the system to indicate that the signature of the signature is successful 25 1353765 through the system; and FIG. 14 is an operation interface diagram showing the screen displayed by the system after verifying the signature successfully.

26 1353765 【主要元件符號說明】26 1353765 [Description of main component symbols]

2 ......... 利用數位簽章代 42....... •簽章功能選項 碼驗證實體物真偽之方 43....... •檔案開啟鍵 法 44....... •檔案選擇對話框 21〜27… 步驟 45....... •檔案路徑及名稱 31........ 實體物 顯不搁 311 ...... 實體文件 46....... •數位簽章有效天 312…… 立體物 數選取表單 32........ 轉換裝置 47....... •晶片卡密碼輸入 33........ 電腦終端機 欄 331…… 數位資料 48....... •簽章產生鍵 332…… 簽章序號 49....... •簽章代碼產生欄 34........ 私密金錄 50....... •驗證功能選項 35........ 數位簽章 51....... •邊早代碼輸入爛 36........ 單向雜湊函數 52....... •驗證執行鍵 37........ 數位簽章代碼 53....... •驗證成功對話框 38........ 代碼處理伺服主 54....... •驗證結果顯示框 機 55....... •簽章人姓名 39........ 簽章憑證管理伺 56....... •簽章有效期間 服主機 57....... .簽章人憑證有效 40........ 公開金錄 期間 41........ 簽章及驗證表單 58....... •檔案内容顯示欄 執行介面 (S ) 272 ......... Use the digital signature generation 42....... • Signature function option code to verify the authenticity of the physical object 43....... • File open key method 44 ....... • File Selection Dialog 21~27... Step 45....... • Archive Path and Name 31........ The physical object does not stand 311 ..... Entity file 46....... • Digital signature valid day 312... Three-dimensional number selection form 32........ Conversion device 47....... • Wafer card password input 33 ........ Computer terminal board 331... Digital data 48....... • Signature generation key 332... Signature serial number 49....... • Signature code generation field 34........ Private record 50....... • Verification function option 35........ Digital signature 51....... • Early code input is bad 36........ One-way hash function 52....... • Verification execution key 37........ Digital signature code 53....... • Verification successful dialog Box 38........ Code Processing Servo Master 54....... • Verification Result Display Box Machine 55....... • Signature Name 39........ Signature certificate management service 56....... • Signature valid period service host 57....... .Signature The certificate is valid during 40 ........ 41 ........ Public record and signature verification form 58 ....... • contents of the file display field execution interface (S) 27

Claims (1)

1353765 十、申請專利範圍: 1. 一種利用數位簽章代碼驗證實體物真偽之方法,包含以 下步驟: 並產生出一數位資 (a)數位化一實體物之表面内容 料; (b) 利用一私密金鑰對該數位資料進行數位簽章程序 後,而產生出一數位簽章; (c) 將該數位簽章轉換成一數位簽章代碼; ⑷-儲存有該數位資料、該數位簽章、該數位簽章 代碼及-相對於該私密金錄的簽章序號之代碼處理飼服 主機接收該數位簽章代碼的輸入; ⑷該代碼處理舰主機㈣該簽章序號自—簽章憑 證管理伺服主機取得一公開金鑰;及 ⑴使用該么乂開金錄配合數位簽章驗證程彳,檢驗該 數位簽章是否為真。 x 2.依據申請專利範圍笫 1 7 /7丨处列…紙议贫軍代碼驗證實 體物真偽之方法,其中在該⑷步驟中,是利用一單向雜 湊函數之運算,將該數位簽章轉換成一數位簽章代碼。 I依射請專利範圍第1項所述利用數位簽章代碼驗證實 體物真偽之方法,其中在該⑷步驟中,該數位簽章代碼 疋直接對該數位簽章指定一代號。 4 -依據申請專利範圍第丨、?七 2或3項所述利用數位簽章 =證實體物真偽之方法,其中在該⑷步驟中,該數位簽 早代碼是以一條碼形式呈現,且在該⑷步驟中,該代碼 < S 28 135376^ 處理飼服主機是藉由—條碼讀取裝置來接收該數位簽章 代碼之輸入。 • 5·㈣申請專利範圍第】項所述利用數位㈣代碼驗證實 冑物真偽之方法’其中在該(a)步驟中,該實體物是一實 體文件。 .6.依射請專利範圍第5項所述利用數位㈣代碼驗證實 體物真偽之方法,其中在該⑷步驟中,該數位資料是以 鍵人該實體文件之全部内容文字方式所產生之電子文件 響 檔案。 7·依據中請專利制第5項所述利用數位簽章代碼驗證實 體物真偽之方法’其中在該⑷步驟中,該數位資料是由 輪入該實體文件之部分内容文字所產生之電子文件檔案 〇 依據申4專利範圍第5項所述利用數位簽章代碼驗證實 體物真偽之方法’其中在該⑷步驟中,該數位資料是藉 • 由一掃描裝置對該實體文件進行掃描所產生的。 .依據申4專利範圍第6、7或8項所述利用數㈣章代碼 驗,實體物真偽之方法’其中在該⑷步驟中,該實體文 :疋選自於由國民身分證、健保卡駕駛執照、車籍資 ^、車輛出廠資料、電子機票、畢業證書、名片、判決 :、契約書、委託書、授權書、協議書、醫療診斷報告 -、4用狀、傳票、拘票、搜索票、專業證照、工作證 商:價目表、商品保證書、交易收據、缴費帳單、網 頁文字、電子郵件令文字所組成之一群組。 29 1353765 申θ專利範圍第1項所述利用數位簽章代碼驗證實 物真偽之方法,其中在該⑷步驟中,該數位資料是藉 由-數位照相裝置對該實體物進行拍照所產生的。 U.依據申請專利範圍第1項所述利用數位簽章代碼驗證實 體物^偽之方法’其中在該⑻步财,對該數位資料進 仃簽早之私密切是經由―憑證晶片卡配合—晶片卡讀 卡裝置之讀取而取得的。 12:據申請專利範圍第1項所述利用數位簽章代碼驗證實 體物真偽之方法’更包含一位於該⑴步驟後的⑷步驟, 判δ賣已利用該公開金鑰驗證的數位簽章附帶之内容是否 與該實體物之表面内容相符。 13=請專利範圍第1項所述利用數位簽章代碼驗證實 偽之方法,其中在該⑻步驟中,該數位簽章包括 =名稱、作者基本資料、建檔時間、有效期間及摘要 說明。 14::申直1專利範圍第13項所述利用數位簽章代碼驗證實 方法,其中在該⑷步驟中,該代碼處理伺服 =在接收該數㈣章代碼之輸人時1檢查該數位簽 ::否=其有效期間内’若逾期’即停止對該數位簽 早進订後續驗證作業。 15·=:專利範圍第1項所述利用數位簽章代碼驗證實 方法’其中在該⑷步驟中,該代碼處理伺服 用來統計該數位簽章代碼輸入次數之計次裝 置,且在接收該數位㈣代碼之輸人時,運用該計次裝 30 (S ) 1353765 置檢查是否超過一預設次數,若超過該預設次數,即停 止對該數位簽章進行後續驗證作業。 16.依據申凊專利範圍第1項所述利用數位簽章代碼驗證實 體物真偽之方法,其中在該(d)步驟中,該代碼處理伺服 主機每隔一預設期間即自動檢查該數位簽章是否仍在其 有效期間内。 ^ 17.依據申請專利範圍第 體物真偽之方法,其 之表面内容並加入一 數位資料。1353765 X. Patent application scope: 1. A method for verifying the authenticity of a physical object by using a digital signature code, comprising the following steps: and generating a digital resource (a) digitizing a surface material of a physical object; (b) utilizing A private key performs a digital signature process on the digital data to generate a digital signature; (c) converts the digital signature into a digital signature code; (4) - stores the digital data, the digital signature The digital signature code and the code of the signature serial number of the private record are processed to receive the input of the digital signature code; (4) the code processing ship host (4) the signature serial number self-signed certificate management The server obtains a public key; and (1) uses the card to record the digital signature and verify that the digital signature is true. x 2. According to the scope of the patent application 笫1 7 /7丨...the method of verifying the authenticity of the physical object by the poor code, wherein in the step (4), the operation is performed by using a one-way hash function The chapter is converted into a digital signature code. I, in accordance with the first paragraph of the patent scope, uses the digital signature code to verify the authenticity of the physical object, wherein in the step (4), the digital signature code 指定 directly assigns a code to the digital signature. 4 - Based on the scope of the patent application, ? The method of using the digital signature = the authenticity of the physical object in the seventh or third item, wherein in the step (4), the digital early signature code is presented in a code form, and in the step (4), the code < S 28 135376^ The feeding machine host receives the input of the digital signature code by means of a bar code reading device. • 5. (4) The method of verifying the authenticity of the object using the digit (4) code as described in Item 】, wherein in the step (a), the entity is a physical file. .6. According to the method of claim 5, the digital (4) code is used to verify the authenticity of the physical object, wherein in the step (4), the digital data is generated by means of the entire content of the physical file of the key person. The electronic file is a file. 7. According to the method of claim 5, the method for verifying the authenticity of a physical object by using a digital signature code, wherein in the step (4), the digital data is an electron generated by a part of the text of the physical file. The file file is a method for verifying the authenticity of a physical object by using a digital signature code according to item 5 of the scope of claim 4, wherein in the step (4), the digital data is borrowed. • The physical file is scanned by a scanning device. produced. According to the method of claim 4, 7 or 8 of the scope of claim 4, the method of using the number (4) code, the method of authenticity of the physical object', wherein in the step (4), the entity text: 疋 is selected from the national identity card, health insurance Card driver's license, vehicle ownership ^, vehicle factory data, electronic ticket, graduation certificate, business card, judgment:, contract, power of attorney, power of attorney, agreement, medical diagnosis report -, 4 use, subpoena, arrest, search Tickets, professional licenses, work certificates: a list of price lists, commodity guarantees, transaction receipts, payment bills, web page text, and email texts. 29 1353765 The method of verifying the authenticity of a person using a digital signature code according to item 1 of the scope of claim θ, wherein in the step (4), the digital data is generated by photographing the physical object by a digital camera. U. According to the claim 1 of the scope of the patent application, the method of verifying the physical object by using the digital signature code is 'in the (8) step, the digital data is entered into the early signing of the private data through the "certificate wafer card cooperation" - Obtained by reading the wafer card reader. 12: The method for verifying the authenticity of a physical object by using a digital signature code according to item 1 of the patent application scope further comprises a step (4) after the step (1), and arbitrarily selling the digital signature that has been verified by the public key. Whether the attached content matches the surface content of the physical object. 13 = Please refer to the method of verifying the authenticity by using the digital signature code in the first item of the patent scope, wherein in the step (8), the digital signature includes the name, the author's basic data, the filing time, the valid period and the summary description. 14: The method for verifying the digital signature code according to item 13 of the patent scope of the claim 1 wherein, in the step (4), the code processing servo=checking the digital sign when receiving the input of the number (four) chapter code ::No=If it is overdue during its valid period, it will stop signing the subsequent verification of the digital sign. 15·=: The patent method defines the real method by using the digital signature code in the first item, wherein in the step (4), the code processing servo is used to count the number of times the digital signature code is input, and receives the When the digit (4) code is entered, the meter is loaded with 30 (S) 1353765 to check whether it exceeds a preset number of times. If the preset number of times is exceeded, the subsequent verification of the digit signature is stopped. 16. The method for verifying the authenticity of a physical object by using a digital signature code according to claim 1 of the scope of the patent application, wherein in the step (d), the code processing servo host automatically checks the digit every predetermined period of time. Whether the signature is still in its effective period. ^ 17. According to the method of authenticity of the patent application, the surface content and the addition of a digital data. 1項所述利用數位簽章代碼驗證實 中在該⑷步驟中,數位化一實體物 非實體物之表.., 〜衣面内容,而產生出一In the step (4), the digitization of a physical object is not a physical object, and the content of the clothing is produced. 3131
TW97105886A 2008-02-20 2008-02-20 Method of using digital signature code for verifying the authenticity of physical object TW200937929A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
TW97105886A TW200937929A (en) 2008-02-20 2008-02-20 Method of using digital signature code for verifying the authenticity of physical object

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
TW97105886A TW200937929A (en) 2008-02-20 2008-02-20 Method of using digital signature code for verifying the authenticity of physical object

Publications (2)

Publication Number Publication Date
TW200937929A TW200937929A (en) 2009-09-01
TWI353765B true TWI353765B (en) 2011-12-01

Family

ID=44867164

Family Applications (1)

Application Number Title Priority Date Filing Date
TW97105886A TW200937929A (en) 2008-02-20 2008-02-20 Method of using digital signature code for verifying the authenticity of physical object

Country Status (1)

Country Link
TW (1) TW200937929A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI505132B (en) * 2013-07-10 2015-10-21 Transcend Information Inc Certification method and electronic device
TWI734729B (en) * 2017-01-19 2021-08-01 香港商阿里巴巴集團服務有限公司 Method and device for realizing electronic signature and signature server

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI405449B (en) * 2009-12-29 2013-08-11 Univ Vanung Group signature method
TWI502398B (en) * 2010-10-05 2015-10-01 Chunghwa Telecom Co Ltd The Production and Verification Method of Electronic Stamp Time Stamp Certificate
TWI595380B (en) * 2015-11-20 2017-08-11 捷碼數位科技股份有限公司 Device for generating or verifying authenticate electronic document with electronic and paper certification and method thereof

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI505132B (en) * 2013-07-10 2015-10-21 Transcend Information Inc Certification method and electronic device
TWI734729B (en) * 2017-01-19 2021-08-01 香港商阿里巴巴集團服務有限公司 Method and device for realizing electronic signature and signature server

Also Published As

Publication number Publication date
TW200937929A (en) 2009-09-01

Similar Documents

Publication Publication Date Title
US20200134619A1 (en) System and Method for Financial Transaction Validation
US8626656B2 (en) System and method for securing payment instruments
RU2494455C2 (en) Electronic certification, identification and transmission of information using coded graphic images
CN100588156C (en) Method and apparatus for providing electronic message authentication
US20130166455A1 (en) Creating and using digital currency
CN102129589A (en) Asymmetric encryption two-dimension code anti-counterfeiting method
JP4746338B2 (en) Contract falsification prevention system and contract falsification prevention method
TWI353765B (en)
Smedinghoff et al. Moving with change: Electronic signature legislation as a vehicle for advancing e-commerce
US20110296191A1 (en) Method for securely drawing up a virtual multiparty contract capable of being physically represented
TW525072B (en) Digital graphic signature system
CN103179096A (en) Website unique identification achieving method and authentication method based on favicon expansion
CN106559433A (en) The method and system of electronic evidence and user identity are fixed using digital certificate
JPWO2019026873A1 (en) Mutual authentication system, authentication images and recording media
TW200951845A (en) Signature verification system and method capable of improving transaction safety of credit card
Chaum Numbers can be a better form of cash than paper
TW202105296A (en) Anti-counterfeiting method and system for seal and stamp wherein the seal and stamp anti-counterfeiting system includes a client communication device and a bank server system to ensure data integrity
Rambarran I Accept, But Do They:... The Need for Electronic Signature Legislation on Mainland China
Alekseyevich CIVIL LAW SPECIFICS OF TRANSACTIONS IN E-COMMERCE
JP2001216395A (en) Authentication system using possessed paper money and application of the system
Thoi RESEARCH AND APPLICATION OF DIGITAL SIGNATURES IN E-COMMERCE TODAY
ЯКОВЕНКО CIVIL LAW SPECIFICS OF TRANSACTIONS IN E-COMMERCE
US20230196381A1 (en) System, Method And Apparatus For Verified Mailing Documents And Process Preparation
Yakoenko Civil law specifics of transactions in e-commerce
US20160217463A1 (en) Payment-based authentication system

Legal Events

Date Code Title Description
MM4A Annulment or lapse of patent due to non-payment of fees