TWI592825B - Anti-counterfeiting features electronic signature method - Google Patents

Anti-counterfeiting features electronic signature method Download PDF

Info

Publication number
TWI592825B
TWI592825B TW105133201A TW105133201A TWI592825B TW I592825 B TWI592825 B TW I592825B TW 105133201 A TW105133201 A TW 105133201A TW 105133201 A TW105133201 A TW 105133201A TW I592825 B TWI592825 B TW I592825B
Authority
TW
Taiwan
Prior art keywords
signature
electronic
data file
network server
electronic device
Prior art date
Application number
TW105133201A
Other languages
English (en)
Other versions
TW201814580A (zh
Inventor
you-ren Wu
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed filed Critical
Priority to TW105133201A priority Critical patent/TWI592825B/zh
Application granted granted Critical
Publication of TWI592825B publication Critical patent/TWI592825B/zh
Priority to CN201710729429.8A priority patent/CN107959570A/zh
Priority to US15/724,752 priority patent/US10482224B2/en
Publication of TW201814580A publication Critical patent/TW201814580A/zh

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/36User authentication by graphic or iconic representation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0487Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser
    • G06F3/0488Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser using a touch-screen or digitiser, e.g. input of commands through traced gestures
    • G06F3/04883Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser using a touch-screen or digitiser, e.g. input of commands through traced gestures for inputting data by handwriting, e.g. gesture or text
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F40/00Handling natural language data
    • G06F40/10Text processing
    • G06F40/166Editing, e.g. inserting or deleting
    • G06F40/171Editing, e.g. inserting or deleting by use of digital ink
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F40/00Handling natural language data
    • G06F40/10Text processing
    • G06F40/166Editing, e.g. inserting or deleting
    • G06F40/174Form filling; Merging
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/107Network architectures or network communication protocols for network security for controlling access to devices or network resources wherein the security policies are location-dependent, e.g. entities privileges depend on current location or allowing specific operations only from locally connected terminals
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0872Generation of secret information including derivation or calculation of cryptographic keys or passwords using geo-location information, e.g. location data, time, relative position or proximity to other entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3297Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving time stamps, e.g. generation of time stamps
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F40/00Handling natural language data
    • G06F40/10Text processing
    • G06F40/166Editing, e.g. inserting or deleting
    • G06F40/169Annotation, e.g. comment data or footnotes

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Software Systems (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Computational Linguistics (AREA)
  • Audiology, Speech & Language Pathology (AREA)
  • Artificial Intelligence (AREA)
  • Computing Systems (AREA)
  • Bioethics (AREA)
  • Human Computer Interaction (AREA)
  • Collating Specific Patterns (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Description

具有防偽功能的電子簽章方法
本發明是有關於一種電子簽章方法,特別是指一種用於認證身份的具有防偽功能的電子簽章方法。
以中華民國專利號第I493380號「電子簽章方法」發明專利案為例,主要是在簽名者使用一個電子裝置簽名時,同步擷取簽名者手寫之簽名軌跡與簽名者的動態影像。藉此,結合手寫時的動態影像與簽名軌跡,確認前述簽名軌跡確實來自預期的簽名者,進而以簡易的方法,達到認證身份的目的,及提高可信賴度。
前述動態影像雖然能夠彌補簽名軌跡容易被複製的缺失,而確認簽名軌跡為真正,但是,文件內容仍然有被篡改的可能,尤其文件內容中伴隨有選項時,很有可能因為選項位置的變化,造成非出於簽名者本意的結果,例如:簽名者原勾選不同意,被塗改成同意,或簽名者原勾選第1方案,被塗改成第2方案…等等,以致於在真實性方面仍然有可以提升的空間。
因此,本發明的目的,即在提供一種能夠提高可信賴度及真實性之具有防偽功能的電子簽章方法。
於是,本發明具有防偽功能的電子簽章方法,由一個網路伺服器與一個電子裝置進行通訊而實現,該電子裝置包括一個觸控螢幕,及一個影像擷取模組,該電子簽章方法包含下列步驟:
(a):該網路伺服器提供一應用程式安裝在該電子裝置,供該電子裝置載入一份原始數據文件,並顯示在該電子裝置之觸控螢幕。
(b):該網路伺服器接收來自該電子裝置的一個軌跡訊息與一個動態影像訊息,該軌跡訊息是由一個簽名者使用該觸控螢幕所輸入,該動態影像訊息由該影像擷取模組所擷取,且包括該簽名者手寫之簽名軌跡與簽名者的動態影像。
(c):該網路伺服器編譯前述軌跡訊息、動態影像訊息與該原始數據文件為一份簽名數據文件。
(d):該網路伺服器根據前述簽名數據文件中的簽名軌跡的位置、動態影像的位置產生一組加密驗證值,並合併在該簽名數據文件。
(e):該網路伺服器通過該電子裝置之觸控螢幕顯示包括簽名軌跡與動態影像的簽名數據文件。
本發明的功效在於:除了可以確認前述簽名確實來自預期的簽名者外,還能透過前述加密驗證值防止文件被篡改,進一步提高可信賴度及真實性。
參閱圖1、圖2,及圖3,本發明具有防偽功能的電子簽章方法的一較佳實施例由一個網路伺服器1與一個電子裝置2進行通訊而實現。該電子裝置2包括一個觸控螢幕21、朝向簽名者的一個影像擷取模組22,及一個GPS模組23。該GPS模組23用於接收GPS訊號,及計算出一個座標位置L。該電子裝置2可以是電腦、個人數位助理、智慧型手機…等等。
參閱圖4,及圖1~圖3,以下即結合實施例步驟說明如後:
步驟31:該網路伺服器1提供一應用程式安裝在該電子裝置2,供該電子裝置2載入一份原始數據文件P,並顯示在該電子裝置2之觸控螢幕21。該原始數據文件P包括一個簽名區P1、數個選項區P2,及一個預定顯示區P3。
步驟32:該網路伺服器1接收來自該電子裝置2的座標位置L。
步驟33:該網路伺服器1接收來自該電子裝置2的一個軌跡訊息M與一個動態影像訊息V。該軌跡訊息M是由一個簽名者使用該觸控螢幕21所輸入,並包括在該簽名區P1之簽名軌跡41,及在該選項區P2的標記42。該動態影像訊息V由該影像擷取模組22所擷取,並包括該簽名者手寫之簽名軌跡41,及簽名者的動態影像43與語音。
在本實施例中,前述軌跡訊息M是以標記語言(如extensible markup language, 可延伸標記語言)描述簽名軌跡41與標記42。而動態影像訊息V是一種串流媒體(Streaming media),且前述語音為簽名者口述的內容。
步驟34:該網路伺服器1編譯前述軌跡訊息M、動態影像訊息V與該原始數據文件P為一份簽名數據文件P’,使該簽名數據文件P’在該簽名區P1顯示該簽名軌跡41,在該選項區P2顯示該標記42,且在該預定顯示區P3嵌入該動態影像43。
在本實施例,前述手寫軌跡是一種可缩放式向量圖形(Scalabe Vetor Graphics,SVG)。前述動態影像可以是flv、H.263、H.264、f4v、rm、wmv、m4v、mov等格式。
步驟35:該網路伺服器1根據前述簽名數據文件P’中之簽名軌跡41的位置、標記42的位置、動態影像43的位置,及座標位置L產生一組加密驗證值S,並合併在該簽名數據文件P’。
在本較佳實施例中,是由該網路伺服器1以雜湊演算法計算出一個不可逆的雜湊值(Hash Value),藉此,只要簽名軌跡41或標記42或動態影像43的位置有變動,產生的加密驗證值S就會不同。
步驟36:該網路伺服器1將合併有加密驗證值S的簽名數據文件P’向時戳服務中心(TimeStamp Authority,TSA)請求的一個電子時戳(time stamp),並將該電子時戳合併在該簽名數據文件P’。 藉此,證明該簽名數據文件P’在某一時間點就已存在,當日後對該簽名數據文件P’有爭議時,只需將該簽名數據文件P’再回傳給時戳服務中心(TimeStamp Authority,TSA)確認,就能夠驗證該簽名數據文件P’建立時間的準確性與完整性。
步驟37:該網路伺服器1回傳前述包括簽名軌跡41、標記42與動態影像43的簽名數據文件P’給該電子裝置2,並顯示在該電子裝置2的觸控螢幕21。
另外,值得說明的是,在步驟35中,使該簽名數據文件P’合併加密驗證值S的程序,也可以在取得並合併電子時戳的程序後,再產生該加密驗證值S。也就是在步驟34後,先進行步驟36,再進行步驟35。藉此,包括簽名軌跡41、標記42、動態影像43等位置有變動,或電子時戳內容有變動,都可以透過檢驗該加密驗證值S而查核出真偽。由於本領域中具有通常知識者根據以上說明可以推知擴充細節,因此不多加說明。
經由以上的說明,可將前述實施例的優點歸納如下:
本發明除了能以在觀感上類似傳統簽章的簽名軌跡41,被一般大眾接受外,且能夠以結合電子時戳的動態影像43,及座標位置L,彌補簽名軌跡41容易被複製的缺失,證明簽名當時的時間點、位置與真實性,重要的是,本發明還可以利用前述加密驗證值S防止該簽名數據文件P’被篡改,進一步提高可信賴度及真實性。
惟以上所述者,僅為本發明的實施例而已,當不能以此限定本發明實施的範圍,凡是依本發明申請專利範圍及專利說明書內容所作的簡單的等效變化與修飾,皆仍屬本發明專利涵蓋的範圍內。
1‧‧‧網路伺服器
2‧‧‧電子裝置
21‧‧‧觸控螢幕
22‧‧‧影像擷取模組
23‧‧‧GPS模組
31~36‧‧‧步驟流程
41‧‧‧簽名軌跡
42‧‧‧標記
43‧‧‧動態影像
M‧‧‧軌跡訊息
V‧‧‧動態影像訊息
L‧‧‧座標位置
P‧‧‧原始數據文件
P’‧‧‧簽名數據文件
P1‧‧‧簽名區
P2‧‧‧選項區
P3‧‧‧預定顯示區
本發明的其他的特徵及功效,將於參照圖式的實施方式中清楚地呈現,其中: 圖1是一個示意圖,說明本發明具有防偽功能的電子簽章方法的一個實施例; 圖2是該實施例的一個方塊圖; 圖3是一個示意圖,說明該實施例中的一份原始數據文件; 圖4是該實施例的一流程圖;及 圖5是一個示意圖,說明該實施例中的一份簽名數據文件。
2‧‧‧電子裝置
21‧‧‧觸控螢幕
22‧‧‧影像擷取模組
41‧‧‧簽名軌跡
42‧‧‧標記
43‧‧‧動態影像
P’‧‧‧簽名數據文件
P1‧‧‧簽名區
P2‧‧‧選項區
P3‧‧‧預定顯示區

Claims (8)

  1. 一種具有防偽功能的電子簽章方法,由一個網路伺服器與一個電子裝置進行通訊而實現,該電子裝置包括一個觸控螢幕,及一個影像擷取模組,該電子簽章方法包含下列步驟:  (a):該網路伺服器提供一應用程式安裝在該電子裝置,供該電子裝置載入一份原始數據文件,並顯示在該電子裝置之觸控螢幕; (b):該網路伺服器接收來自該電子裝置的一個軌跡訊息與一個動態影像訊息,該軌跡訊息是由一個簽名者使用該觸控螢幕所輸入,該動態影像訊息由該影像擷取模組所擷取,且包括該簽名者手寫之簽名軌跡與簽名者的動態影像; (c):該網路伺服器編譯前述軌跡訊息、動態影像訊息與該原始數據文件為一份簽名數據文件; (d):該網路伺服器根據前述簽名數據文件中的簽名軌跡的位置、動態影像的位置產生一組加密驗證值,並合併在該簽名數據文件;及 (e):該網路伺服器通過該電子裝置之觸控螢幕顯示包括簽名軌跡與動態影像的簽名數據文件。
  2. 如請求項1所述的具有防偽功能的電子簽章方法,其中,在步驟(c)中,該網路伺服器向時戳服務中心(TimeStamp Authority,TSA)請求的一個電子時戳(time stamp),並將該電子時戳合併在該簽名數據文件。
  3. 如請求項1所述的具有防偽功能的電子簽章方法,還包含在步驟(d)後、步驟(e)前的一個步驟(f):該網路伺服器向時戳服務中心(TimeStamp Authority,TSA)請求的一個電子時戳(time stamp),並將該電子時戳合併在該簽名數據文件。
  4. 如請求項1所述的具有防偽功能的電子簽章方法,其中,在步驟(a)中,該原始數據文件包括一個簽名區,及至少一個選項區,在步驟(b)中,該軌跡訊息包括由簽名者使用該觸控螢幕所輸入且在該簽名區之簽名軌跡,及在該選項區的標記。
  5. 如請求項4所述的具有防偽功能的電子簽章方法,其中,在步驟(d)中,該網路伺服器還根據前述標記的位置產生該加密驗證值。
  6. 如請求項4所述的具有防偽功能的電子簽章方法,其中,在步驟(c)中,該網路伺服器編譯該簽名數據文件時,於該簽名數據文件的一個預定顯示區嵌入該動態影像。
  7. 如請求項1所述的具有防偽功能的電子簽章方法,還包含在步驟(a)後、步驟(d)前的一個步驟(g):該網路伺服器接收來自該電子裝置的一個座標位置,且在步驟(d)中,該網路伺服器還根據前述座標位置產生該加密驗證值。
  8. 如請求項7所述的具有防偽功能的電子簽章方法,該電子裝置還包括一個GPS模組,用於接收GPS訊號,及計算出座標位置,其中,步驟(g)的網路伺服器接收前述由GPS訊號所計算出的座標位置。
TW105133201A 2016-10-14 2016-10-14 Anti-counterfeiting features electronic signature method TWI592825B (zh)

Priority Applications (3)

Application Number Priority Date Filing Date Title
TW105133201A TWI592825B (zh) 2016-10-14 2016-10-14 Anti-counterfeiting features electronic signature method
CN201710729429.8A CN107959570A (zh) 2016-10-14 2017-08-23 具有防伪功能的电子签章方法
US15/724,752 US10482224B2 (en) 2016-10-14 2017-10-04 Method for generating a signed electronic document with an anti-tamper function

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
TW105133201A TWI592825B (zh) 2016-10-14 2016-10-14 Anti-counterfeiting features electronic signature method

Publications (2)

Publication Number Publication Date
TWI592825B true TWI592825B (zh) 2017-07-21
TW201814580A TW201814580A (zh) 2018-04-16

Family

ID=60048638

Family Applications (1)

Application Number Title Priority Date Filing Date
TW105133201A TWI592825B (zh) 2016-10-14 2016-10-14 Anti-counterfeiting features electronic signature method

Country Status (3)

Country Link
US (1) US10482224B2 (zh)
CN (1) CN107959570A (zh)
TW (1) TWI592825B (zh)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI671735B (zh) * 2018-03-27 2019-09-11 雲想科技股份有限公司 語音電子簽章方法及其裝置與驗證方法
TWI773877B (zh) * 2019-01-29 2022-08-11 中國信託綜合證券股份有限公司 線上開戶系統與方法以及電腦程式產品

Families Citing this family (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2017197178A1 (en) * 2016-05-11 2017-11-16 OgStar Reading, LLC Interactive multisensory learning process and tutorial device
WO2019191083A1 (en) * 2018-03-26 2019-10-03 Colorado State University Research Foundation Apparatuses, systems and methods for generating and tracking molecular digital signatures to ensure authenticity and integrity of synthetic dna molecules
US10839057B1 (en) * 2018-05-07 2020-11-17 Wells Fargo Bank, N.A. Systems and methods for providing electronic infrastructure on paper documents
TWI688897B (zh) * 2018-05-10 2020-03-21 台灣人壽保險股份有限公司 電子簽名方法及電子裝置
TWI661334B (zh) * 2018-05-11 2019-06-01 雲想科技股份有限公司 具有浮水印之電子簽章方法及其裝置
TWI668594B (zh) * 2018-05-11 2019-08-11 雲想科技股份有限公司 具有數位浮水印的電子簽章產生及驗證方法及電子裝置
EP3706027A1 (en) * 2019-03-08 2020-09-09 ThinkCloud Technology Co., Ltd. Method for generating a signed electronic document with an anti-tamper function
EP3706385A1 (en) * 2019-03-08 2020-09-09 ThinkCloud Technology Co., Ltd. Method for generating an authenticating document
TWI734259B (zh) * 2019-11-14 2021-07-21 雲想科技股份有限公司 電子簽章認證裝置及其方法
US11263503B2 (en) * 2020-05-14 2022-03-01 Hallmark Cards, Incorporated Signature-based unique identifier
US11922730B2 (en) * 2021-09-04 2024-03-05 Simon Levin Methods for signature verification and authentication

Family Cites Families (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6169789B1 (en) * 1996-12-16 2001-01-02 Sanjay K. Rao Intelligent keyboard system
US8909777B2 (en) * 2002-06-26 2014-12-09 Intel Corporation Systems and methods for dynamic access to program features
EP2367128B1 (de) * 2010-03-16 2015-10-14 Stepover GmbH Verfahren und Vorrichtung zur elektronischen Signatur
US20120284602A1 (en) * 2011-05-05 2012-11-08 Vsig.Com, Inc. Systems and methods for electronic document identification and certification
US8788930B2 (en) * 2012-03-07 2014-07-22 Ricoh Co., Ltd. Automatic identification of fields and labels in forms
US20140130177A1 (en) * 2012-06-08 2014-05-08 9195-3984 Quebec Inc. System and method for creating a certified electronic record
US20130332296A1 (en) * 2012-06-11 2013-12-12 Samuel John Murray, JR. System and Method for Creation and Distribution of Author Signed Electronic Books
CN102801525A (zh) * 2012-06-29 2012-11-28 鸿富锦精密工业(深圳)有限公司 电子设备、签名认证系统及其签名认证方法
TW201502851A (zh) * 2013-07-05 2015-01-16 Think Cloud Digital Technology Co Ltd 電子簽章方法
US10032065B2 (en) * 2013-10-25 2018-07-24 Wacom Co., Ltd. Dynamic handwriting verification, handwriting-based user authentication, handwriting data generation, and handwriting data preservation
EP3048773B1 (en) * 2015-01-22 2019-12-11 Tata Consultancy Services Limited System and method for image based location specific password construction and authentication
CN105530258A (zh) * 2015-12-18 2016-04-27 努比亚技术有限公司 电子签名装置及方法

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI671735B (zh) * 2018-03-27 2019-09-11 雲想科技股份有限公司 語音電子簽章方法及其裝置與驗證方法
TWI773877B (zh) * 2019-01-29 2022-08-11 中國信託綜合證券股份有限公司 線上開戶系統與方法以及電腦程式產品

Also Published As

Publication number Publication date
TW201814580A (zh) 2018-04-16
US10482224B2 (en) 2019-11-19
CN107959570A (zh) 2018-04-24
US20180107818A1 (en) 2018-04-19

Similar Documents

Publication Publication Date Title
TWI592825B (zh) Anti-counterfeiting features electronic signature method
US11922532B2 (en) System for mitigating the problem of deepfake media content using watermarking
TW201502851A (zh) 電子簽章方法
US9660988B2 (en) Identifying protected media files
TWI661334B (zh) 具有浮水印之電子簽章方法及其裝置
JP2017204707A (ja) コンテンツ流通システム、コンテンツ流通方法、コンテンツ生成装置及びコンテンツ生成プログラム
US20130236046A1 (en) Method, system, and computer-readable medium for detecting leakage of a video
JP2017204706A (ja) コンテンツ流通システム、コンテンツ流通方法、コンテンツ生成装置及びコンテンツ生成プログラム
TWI650673B (zh) 防偽電子簽章方法
CN110830259A (zh) 为多媒体数据提供原始性和完整性证明的方法及系统
TWM471107U (zh) 電子簽章系統
Igarashi et al. Photrace: A blockchain-based traceability system for photographs on the internet
TWM624495U (zh) 可記錄簽章流程的電子簽章裝置
CN110807640A (zh) 一种记录版权信息的方法及设备
TWI734259B (zh) 電子簽章認證裝置及其方法
US8495749B2 (en) Method, apparatus and computer program product for a content protection system for protecting personal content
KR101589604B1 (ko) 전자문서의 진위 여부와 작성자 신원을 확인하는 방법 및 시스템
TWI612438B (zh) 手持行動通訊裝置的密碼驗證方法
EP3706027A1 (en) Method for generating a signed electronic document with an anti-tamper function
WO2019223310A1 (zh) 一种数字现勘记录可信模型系统
TWI826865B (zh) 可記錄簽章流程的電子簽章裝置及方法
US20230385811A1 (en) Secure and decentralized payment for digital media content via certificates with wallet information
Golovin et al. Content provenance attribution and verification via blockchain certification
KR20240033513A (ko) 이미지 인증을 위한 방법, 컴퓨터 장치, 및 컴퓨터 프로그램
TWM594730U (zh) 可驗證身份的電子簽章裝置