WO2010061257A2 - Systems and processes of protection and automatic verification of paper documents against falsification, adulteration and leakage - Google Patents
Systems and processes of protection and automatic verification of paper documents against falsification, adulteration and leakage Download PDFInfo
- Publication number
- WO2010061257A2 WO2010061257A2 PCT/IB2009/007292 IB2009007292W WO2010061257A2 WO 2010061257 A2 WO2010061257 A2 WO 2010061257A2 IB 2009007292 W IB2009007292 W IB 2009007292W WO 2010061257 A2 WO2010061257 A2 WO 2010061257A2
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- document
- printed
- text
- content
- page
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/606—Protecting data by securing the transmission between two devices or processes
- G06F21/608—Secure printing
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
Definitions
- the present disclosure is directed to document complete integrity, and, more specifically, to protection and verification of paper documents to prevent and indicate falsifications, adulterations, distinguishing original from copy and leakages of a document.
- Static Protection shall be understood as the protection applied to paper prior to printing of a document. As such, there is no direct connection between the security information and information included when the document is printed, such as date, universal time, originator, user, contents, etc. This is in contrast “Dynamic Protection” and, as referred to herein, shall be understood as protection applied at the time of printing of text or other information contained in a page of a document and that changes from page to page or document to document. Dynamic protection carries information that changes dynamically in every printing, such as: date and universal time, originator, user, contents, etc. [0005] With respect to dynamic features, traditionally isolated dynamic features may be applied in regular paper.
- Such dynamic features can be applied dynamically in usual paper.
- security features are traditionally applied on stand alone basis and protect only one aspect of the range of chances of fraud.
- each dynamic security feature may be applied to protect against one kind of fraud, but not protects against a set of fraud possibilities.
- these types of protection are discrete items and there is no integration of these technologies that enable their use simultaneously and at the moment of printing. That is, Each of the technologies developed covers only one aspect of potential fraud.
- processes and systems according to aspects of the current invention allow for the use of telecommunications technology and outside expertise during the printing process of documents, as well as during the verification phase by a document user of a protected document.
- telecommunications such as a network and/or the Internet
- any document user worldwide to perform an instantaneous verification of a document's complete integrity at the time the document is presented to the user for consideration or execution, for example.
- any origin problem and alteration on the document may be detected immediately and before execution, as opposed to some time after the document has been executed and has possibly already been used in a fraudulent manner.
- the present disclosure provides systems and methods for detection, immediately and clearly, of different types of falsification, adulteration, inclusion and omission. Aspects of the disclosure provide identification of fraud, by document page and location.
- the present disclosure provides a network accessible system that is capable of detecting several fraud aspects.
- Such a system includes a "Remote Expertise Center" or a remote service data center accessible from and to any location in which there is a connection to the network, such as through the Internet. Verification may be done immediately with a high degree of precision to provide a conclusive determination of document complete integrity.
- Another aspect of the present disclosure provides multiple types of security protection. Such multiple types of protection provide additional security because, in the event that any of them is surpassed, the document will remain protected by the other types of security protection.
- a service that provides automatic protection and verification of a document. Such protection is performed at the time of printing of a document and printed along with document content. A user may desire to verify the complete integrity of the protected document. Such a user may provide an image of the protected document to the "Remote Expertise Center" which can then verify the document has not been altered since the document was protected printed.
- the protection provided for a document aggregates and integrates several technologies to provide an integrated and differentiated barriers applied to the process of protection of documents. If one type of security feature is broken, other security features will likely persist and enable the detection of frauds.
- Such a service provides efficient processes, in order to facilitate protection, automatic checking, and decentralized control, that is significantly less expensive and less time consuming than traditional document protection schemes. This allows also that organizations can offer new customer services and market through new business processes.
- the storage of an encoded text largely invisible on the user's printed document itself is disclosed.
- the encoded text may be decoded by remote decoding software to allow a comparison of the original text encoded on the page to the actual visible text printed on the hard copy of the user's document. Comparison is remotely performed automatically comparing the decoded text with text visual portion of the page and displayed on a user's computer screen.
- the decoding of the encoded text is performed remotely at a central server equipped with decoding software.
- the user may be located remotely from the central server and may communicate with the central server via a network such as, for example, the Internet.
- the original document may be recovered via scanning of the encoded text, the scan is transmitted to the central server, and the decoding software will decode the scanned encoded text, and the result comparing original and visible content will be transmitted back to the user to be displayed on a computer screen accessible to the user.
- a remote server may receive the scanned encoded text from a printed document via, for example, a network such as the internet.
- the remote server may be used to prevent fraud by allowing a user to compare visual content of a hard copy of the document and the decoded version of the encoded text printed on the same document.
- the encoded text may be stored on the hard copy in the form of a security bar, or other printed pattern that can only be read via scanner and decoded by Remote Expertise Center.
- an immediate comparison can be performed by the Remote Server to determine whether the document is counterfeited or altered.
- the encoded text which is a representation of the document itself, may be decrypted by Remote Server to execute comparisons and sent back to be displayed on a computer screen of the document user.
- Cryptography may also be used in the transmissions between computer user and Remote Server.
- the remote server may be a dedicated server in a Remote Expertise Center. Once the encoded text is received by the remote server, the text may be decoded and compared with visible text portion and result will be transmitted back to the userr. According to various aspects of the current invention, after comparison result between both text versions is transmitted back to the user, the entire verified page is immediately deleted from the remote server.
- various aspects of the current invention provide for document verification and protection, in a decentralized manner, i.e., by allowing a document user to determine the complete integrity of a document in real time by accessing a remote server.
- Most commercial, industrial, financial, fiscal and like activities are generally based on contracts, certificates, powers of attorney, and similar documents that memorialize agreements between various parties and allocate the rights of the various parties.
- a party to a contract may use various aspects of the current invention to determine whether a document is not a forgery before executing the document.
- processes are disclosed that enable an immediate verification of the complete integrity of a document by a remotely located lay document user or party to a contract, and that is effective before ⁇ for example, execution of the document.
- several security features may be incorporated simultaneously on a document in order to improve the complete integrity protection of a document.
- document security is preserved after generation in the Remote Expertise Center and before the user prints the protected document through combination of electronic security features, as user certification, digital signature and software drivers for specific printer model. These electronic security features maintain integrity of document pages for the protected document by preventing access to a page before printing.
- FIG. 1 is a block diagram illustration of a system of an exemplary embodiment of the present disclosure
- Fig. 2 is an image of a verified document, split in original text portion and actual visible text portion, with highlights indicating alterations in each portion for an embodiment of the present disclosure.
- This image illustrates the document's automatic adulteration verification process, having a screen that is split into two parts: the first one corresponding to the original document text stored in the Security Bar at the time of the document printing, that resides in the encrypted area (see Figure 3D).
- the second part reflects the text contained in the visible document text (3B). If there is some discrepancy between the two parts (adulteration), the system detects and indicates each discrepancy with a colored marker (2C).
- This layout in an embodiment, is also printed as a receipt and sent to Customer server for blocked file auditing purposes
- Fig. 3 is an image of a printed document having a plurality of security features of an embodiment of the present disclosure. This image illustrates an original page of the document, with the Special Background (3A), under the document text. On the Security Bar there is an identification area in dark black color, whose characters are visible only through a special lens (3B). Another area contains a feature copy alert
- the rightmost area contains the original document text, coded and encrypted
- Fig. 4 is an image of a copy of a printed document having a plurality of security features of the embodiment of Fig. 3.
- This image illustrates a page copied from the protected original document.
- the Special Background disappeared or became faded out (4A).
- On the identification area (dark black), whose contents can be read only through the use of a special lens on the original protected document, the reading in the copy is no longer possible (4B).
- the copy alert against copy is now showing the word "COPIA" twice (4C).
- the encrypted and coded text area (4D) may be maintained or becomes useless, depending on the capabilities of equipment used for the copy.
- FIG. 5 is an illustration of a configuration of a user computer and a remote service center of an embodiment of the disclosure
- FIG. 6 is an illustration of a configuration of a user computer and a remote service center of another embodiment of the disclosure.
- Fig. 7 is an illustration of a configuration of customer server, a user computer and a remote service center of an embodiment of the disclosure; and [0028] Fig. 8 is an illustration of multiple users interconnected to a server through a network of an embodiment.
- the present disclosure recognizes that currently there is no service, process or set of software in the market that encompasses a sufficiently robust set of functionalities and security technologies to obtain a high level of security and protection against document frauds. Such frauds may be inclusion, alteration or removal of a portion of a document, changing a portion of a document, falsifications, creating copies of a document, etc.
- the present disclosure also recognizes that it would be desirable to provide for the detection, along with an indication in the document identifying, originator, date, universal hour, alterations, inclusions, and elimination of any document content.
- the present disclosure provides new processes for protection, verification and control that are integrated into a platform.
- the platform can apply differing security features, in predetermined sequences, such that any type of fraud in a document may be identified.
- a Remote Expertise Center can be accessed, such as through the Internet, by a certified user that may desire to execute a high security job. This Remote Expertise Center may be accessed by the user, who provides the document content and receives a document that may then be printed which contains a plurality of security features. At a later time, the user, or another user, may access the Remote Expertise Center and determine if the document is original, had been altered, copied, or otherwise changed.
- a secure document that includes a plurality of security features.
- One of the security features is the storage of the text in codified, encrypted form on each document page.
- the encrypted codified text is printed in a computer readable format in, for example, a margin of the printed document page.
- the document page may be scanned and provided to a computer Server in Remote Expertise Center containing program code for decrypting and decoding the text. This decrypted and decoded text may then be compared to the text in the body of the page to identify any differences.
- the decoding software is executed by a Server computer at the Remote Expertise Center that receives a scanned image of the whole page of document encrypted via a network connection, such as through the Internet.
- the decrypting and decoding text in Server computer also includes a second portion of transmitted page, meaning Optical Character Recognition (OCR) that may convert image of visual text in corresponding printed text.
- OCR Optical Character Recognition
- the decrypting and decoding processing in this embodiment generates a first document recovery by decoding and decrypting the information in the security feature.
- a second document recovery is then generated by performing OCR on the visual text image converting it into printed text corresponding on the document page.
- the first and second documents recoveries are then compared to identify any differences that would indicate that the document has been altered.
- a scanned image of the document page is transmitted, such as via the Internet, to the Remote Expertise Center that then performs the processing required for the comparison.
- reliable decoding and decryption of the security feature, as well as reliable OCR require that the document be printed and scanned using equipment capable of minimum printing and scanning quality so as to provide reliable comparisons, enhanced tuning between printer and scanner and between scanner and OCR is a must to achieve 100% conversion, where only and exactly which adulterations will be shown as result of comparisons.
- a complete system is provided to a user, including a printer, scanner, and network interface (such as software executing at a user computer) to interconnect to the Remote Expertise Center.
- software executing at the Remote Expertise Center computer performs the decoding, decryption, OCR, and comparisons. Intelligence of all protection and verification processes are resident solely in Servers of Remote Expertise Centers, avoiding any chance that one user with high expertise can try any alteration to obtain a document similar of another customer.
- documents include a security feature that provides information related to leaking of information on confidential document pages to non-authorized individuals.
- a document protection and verification system 10 comprises a number of process activities.
- protection process 12 include processes for the production of documents printed with the protection of a plurality of security features, such as special backgrounds and a security bar comprising several security features in a margin of a page of a document. Security features that are used in various embodiments are described in more detail below. Protection processes generate the security features and a document printed at printer 14 may include the content of the document, along with the security features that were generated for the document.
- Verification Processes 16 are used in verifying that a document has not been altered, that complete integrity remains. Verification processes 16 are automatic verification processes that will be described in greater detail in a moment. However, it is pointed out that non-automated verification processes may be employed that include visual verification of a document. In many cases, visual verification will precede the automatic verification and may be performed by anyone that visually observes the document. Visual verification may include visual review of visual security features such as background images or watermarks. In some embodiments, a different visual security feature may be applied to a document based on the user logos or marks that generated the document content. Such visual features may also include information related to when a document was created.
- Remote Expertise Centers can be installed in several continents an universal time will be applied to clarify any precedence of rights due to time register.
- the background may be printed so as to be completely visible in the original, but invisible (or faded) in a copy.
- Visual verification may be performed without charge and can be performed by anyone.
- Automatic verification using verification processes 16 are performed with a certified user of the system 10 submits a document to be verified. Such a document may be submitted by scanning the document to a specific scanner 18, with the scanned image transmitted to the verification processes 16 of the system 10.
- scanner 18, and printer 14 may be connected to the system 10 directly, through a local area network such as a LAN, through a wide area network such as the Internet, or through a wireless network, or any combination thereof. Furthermore, information may be transmitted through any of a number of different communications protocols, such as TCP/IP, for example, Additionally, printer 14 and scanner 18 may directly transmit information to the system 10, or may transmit information through one or more intermediary computers, such as a local user computer 20 that can communicate with the system 10.
- a local area network such as a LAN
- wide area network such as the Internet
- wireless network or any combination thereof.
- information may be transmitted through any of a number of different communications protocols, such as TCP/IP, for example.
- printer 14 and scanner 18 may directly transmit information to the system 10, or may transmit information through one or more intermediary computers, such as a local user computer 20 that can communicate with the system 10.
- the scanned image of the document to be verified is transmitted to the verification processes 16 by Remote Expertise Center, which perform the verification process automatically by, for example, reverting the encryption and decoding the document stored in the security bar in embodiments employing such a security feature.
- the verification processes 16 perform a comparison between the original text document as determined, for example, by decryption and decoding of information contained in the security bar, and the actual image of the document converted into text by the OCR. This comparison detects and indicates, automatically, the adulterations, which and where in the page, found in each page of the document, resulting page contents comparison, are sent back to be displayed in the screen of the certified user's computer.
- the system 10 Remote Expertise Center sends a voucher copy to the certified user's printer 14 to attest that the verification of the page of document was executed, and page result indicating each adulteration detected is input into a client record for future audit.
- a display of an automatic verification result is illustrated for an embodiment.
- the screen displays two sections.
- the first section (2A) corresponds to the original document text stored in the security feature at the time the protection processes were performed on the document.
- the second section (2B) reflects the text contained in the visible document text.
- the system detects and indicates exactly each part with a colored marker (2C), being only a comma, alphanumeric character, word or sentence.
- This layout in certain embodiments, is also printed as a receipt and may be saved into a customer record for blocked file auditing purposes.
- the printer 14 is color printer with a minimum of 1200 dpi
- the scanner 16 is a color scanner with a minimum of 1200 dpi
- the OCR tuning achieves unthinkable conversion of 100%.
- image-text conversion may be repeatedly performed with very high reliability. It is well known that producing texts in any kind of printer and reading in any kind of scanner commonly results in image-text conversion that leaves parts to be corrected manually.
- the system 10 also includes Auditing and Control Processes 22. This process is performed both during the protection and verification processes, and for each transaction (page protected or verified) the auditing and control processes 22 generate a transaction log with a record of the document, date, universal hour, and certified user, taking into consideration each page protected or a verified through performing defined new processes.
- This record in an embodiment, is transmitted to the user computer 20 for use in future auditing.
- the system 10 maintains only information required for billing purposes, and the user computer maintains a complete set of information as the results of each page automatically verified, for example.
- This record in an embodiment, is a read only file and cannot be removed or altered even if the user has access to the system through a special password or other control.
- the system 10 includes leak detection processes 24. These processes address situations of vulnerability to leakage through several functionalities that may operate alone or in conjunction with other functionalities. Leakage, as referred to herein, refers to access to confidential information by an individual who does not have required authorization to have the information, or an individual that a user does not desire to have the information.
- One process used to control of the distribution of counterparts of the original document utilizes correlating synonyms ascribed and receivers, and hidden codifications that are kept in case of copies - which, read through the scanner, facilitates the decoding by the system 10, that also identifies the receiver responsible for the leakage.
- the leak detection processes 24 makes correlations between synonyms and key- words, as well as controls the final text sent to each receiver, and the correlations applied.
- Another process that may be used in leak detection processes 24 may be the application of the technology of the identification area, described above, that is applied to the document to be protected against leakage, such that the document can only be read with the use of a special lens. Consequently, the copies of documents are completely prevented, demanding a manual transcription which would consume much more time and may expose the person intending to commit the fraud.
- Another process provides, at the moment of printing of the document, that hidden codes are printed too, and, when copied, will generate the date and time of the copy and the serial number (equipment) that gave this command, adding these data automatically to the copy generated, providing means to discover who was the responsible for the leakage. For example, parts of sentences and different encoded backgrounds will be colored and combined with hidden instructions of Enlarged Reality, intended to produce different effect when reproduced.
- Another leak detection process is assigning each user a different background image that is printed on each user document, that stays in the copy enabling, thus, to identify the source of the leakage. Presently, there is an excess demand regarding the need to ensure that classified documents do not leak to third parties.
- the system is used according to various procedures.
- the procedures of use are: protection process and verification process.
- the client or certified user has three ways of submitting documents for protection using the document protection and verification system.
- the user computer 20 includes a client module that is used to initiate the protection process.
- the system 10 performs remaining processes related to protection of a document.
- a digitally certified user can submit a document to be protected by selecting to print the document with protection trough the selection of a virtual printer shown in an available printer list. In this embodiment, from this point on, the processing is assumed by the system 10.
- the certified user who wishes to "print with protection”, whose computer has generated the document will go through a verification of his/her digital certification (inputted in his/her computer and checked by system) before each page of the document is transmitted to the system 10 for protection.
- the protection will be implemented and the command "protected print” will be given, and document protected it will be transmitted back with digital signature to the certified user's assigned printer using set of instructions of specific model (printer driver), bypassing customer operational system.
- a second method of submitting a document includes accessing system 10 directly (page protection submission in the site), through digital certification (inputted in the certified user's computer), that will be verified by system 10.
- the system 10 accesses the protection processes forwards the document to be protected. In this process the protection will be implemented and the command "protected print” will be given, and it will be transmitted back with digital signature to the certified user's assigned printer.
- the third method, of this embodiment, of submitting a document entails sending an e-mail to the address specifically assigned by the system 10 to "document protection services" in connection with the company of record where the certified user works, with his/her digital certification, with the file to be protected attached to such e- mail. After sending of this e-mail, the procedures for document protection and protected print as above-cited will be in progress.
- the document to be protected is received as merely pages in the system which removes information related to the printed page just after processing. Accordingly, after processing nothing remains stored in the system 10, fully preserving page secrecy. In an embodiment a record is generated only for billing purposes.
- the protected page is directly sent to the assigned printer, without going through the operational system of the user's computer, using the called "driver" of each model of printer (specific set of instructions provided for each model by the vendor).
- Each page is simultaneously protected by digital signature when document is ready to be transmitted back to certified user i? that will prevent the printing should any alteration be made to the page during time frame comprising transmission back to user and moment of effective printing. Access to protected documents is prevented before the printing, with a digital signature applied on the protected document page prior to being sent to the printing line, thereby avoiding a fraud possibility.
- a user may access the system 10 and perform the verification processes 16.
- the client or certified user has three ways of submitting a document for verification. First, the user may select document verification from a client module executing on the user computer. Then, the user initiates a scan of the document using the assigned scanner 18. The system 10, at this point, assumes control and verifies the user's certification and, if OK, accepts the activation of the scanner to capture the complete image of the document. The system receives the image captured by the scanner and performs the verification processes for the document.
- Another option for a user to submit a document for verification comprises accessing the system 10 (page verification submission in the site) using a digital certification inputted in the user computer. Upon confirmation, the system provides access to the verification processes, and the user computer sends the document to be checked.
- a third option for a user to submit a document for verification comprises sending an e-mail, with a digital certification and the document of interest attached, to an e-mail address specifically defined by the system 10 to the corporation or other organization to which the user belongs.
- Figures 3 and 4 illustrate various security features that are used in various embodiments.
- the document protected page of the present disclosure cannot be copied or scanned without loosing one or more of the basic characteristics from the security features integrated on the service platform and fixed on the document page at the time of printing.
- the document continue protected, even if one or more than one of the security features is over passed.
- it is impossible to digitalize this page to put in this disclosure so as to describe all of the features.
- Figs. 3 and 4 are provided for purposes of illustration and discussion, and are not necessarily representative of an actual printed page according to the various aspects of this disclosure.
- One security feature that may be used in various embodiments is a special background, identified as 3 A in Fig. 3.
- each customer entity of the system shall have the possibility to develop a special background for its documents, such as, for example, a drawing composed of the logo of the company, a characteristic visual identification, etc. Regardless of the background chosen, whenever the original document is copied by any digital technology presently available, such background will disappear or become faded and this absence will cause the identification of the copy, as illustrated at 4 A in Figure 4.
- Another security feature is the security bar 50 illustrated in the embodiment of Fig. 3. This feature is an area in the footer of the document page, covering all horizontal size of the page that was designed to give a typical visual image of a protected page document and will receive different areas for each technology or functionality that will integrate the system platform. Displayed within this security bar 50 are several features.
- An Identification Area (3B) includes controls related with the printing of the original document, visible with special lens only.
- the hidden information in this field is related to originality, such as certified user, universal hour, date, number of contract/document, and/or other information that may be important to settle any doubts regarding precedence of validity of rights, or version control.
- AU of the information viewable using the special lens in this area disappear when copied, thus losing the information in this area, as illustrated in Fig. 4 at 4B.
- Copiers, scanners and digital cameras can not reproduce special hidden printed information that only can be read, in this embodiment, with a special lens.
- Such a special lens may employ any one of a number of optical techniques in combination with the printed content to reveal hidden information, such as color filters, and in one embodiment uses polarized light.
- a copy alert 3C is a space where a word, such as "copy” or "void,” (Fig. 4C) is emphasized when the protected document is copied.
- the final item in the security bar 50 of this embodiment is a codification of the text (3D). That is, the storing of the original text, in the original document itself (during the printing), in codified and encrypted form, only visible and identifiable by the system by using decoding and decryption algorithms.
- government organizations may use special encryption, and/or special hash for its documents and have dedicated and double locked Remote Expertise Centers in their installations, but access to their Remote Expertise Centers only can be performed if simultaneously customer and the Remote Expertise Center unlock the physical access.
- the system When the document is scanned in, the system identifies the codified text, decodes the text, performs decryption on the decoded text, and provides the text of the page for comparison to the scanned text that is subjected to OCR.
- the security features in the security bar 50 may be arranged in any order, and that different, fewer, or more, security features may be included in the security bar 50.
- one of the spaces placed for the indication of the word COPY can be replaced by technology that automatically indicates that a copied document is not only a copy or an original, but also indicates the originator of the document.
- the present disclosure also provides digital security features.
- One such security feature may be a Digital Signature. This feature is used to alert alterations made between the moment of document page protection generation, and the time of printing of the document.
- Another such security feature may be a digital certification. This procedure prevents unauthorized users from generating or checking protected documents. The use of an individual and non-transferable digital certification to identify such user, in each page, is mandatory. This digital certification combined with the file that controls the authorized printers, assigns in which printers an user is allowed to receive protected documents.
- Printers Drivers are also used to provide enhanced security for a document.
- the driver is software from the manufacturer of the equipment that works as a vehicle to conduct a document directly to a specific model of printer.
- the printer driver is used by the system to print the protected documents, without passing through the operational system of the user's computer. Since data about each printer and set of instructions specific of each model is known, a command, in this embodiment, is sent to a specific printer that will directly print the job. Because the print job is sent directly to the printer without passing through the operational system of the user's computer, it becomes very difficult to intercept documents already protected while they wait on the printing line of the respective assigned printer.
- Embodiments also provide the capability of sending protected documents to printing by another user.
- embodiments provide the ability to send a request to the system 10, by means of automatic process (via internet), to include the user in a protected server.
- a server will require a specific password at the moment of the access and will verify the digital certification of the user-receiver and the printer assigned to such user.
- the server will send the print job directly, using the driver of this model of printer, so that the document submitted to protection by one certified user can be safely printed with applied protection by another certified user.
- a user computer 60 is connected to a communications network 64, such as the Internet 64 and through the communications network 64 the user computer 60 can communicate with a remote service center 68.
- the user computer 60 is also connected to a printer 72 that may be used to print secure documents.
- the operational steps include, initially, the user interacting with the remote service center to get his "Digital Certification" approval. Next, the user clicks a protection service button on the user computer user interface using client software furnished for this purpose. The document is then sent to the remote service center and page by page encrypted.
- Each page follows a complete transaction and, in this embodiment, no record of its content will be retained at the remote service center.
- the remote service center upon receipt of each page, (a) generates a record for transaction logging, (b) generate a special background on the page (e.g., Fig. 3), (c) generates the Security Bar with all areas composed by integrated technologies, (d) processes each protection technology and prepares the page for printing, (e) establishes a Digital Signature for the page protected prior to sending it to the print queue, (f) selects the printer in accordance with the digital certification record for the user, (g) sends the page to the print queue, and (h) prepares the log for this transaction and sends it to a customer server.
- a user computer 60 is connected to a communications network 64, such as the Internet 64 and through the communications network 64 the user computer 60 can communicate with a remote service center 68.
- the user computer 60 is also connected to a printer 72 that may be used to print secure documents.
- the user computer 60 is also connected to a scanner 76 that may be used to scan images of a document to be verified.
- the operational steps include, initially, the user interacting with the remote service center to get his "Digital Certification' conference approved.
- the user clicks a verification service button on the user computer screen using client software that is used in the system.
- the document will be read by the scanner and sent to the remote service center page by page where each page is decrypted. Each page follows a complete transaction and no record of its content will be retained. Verification operations are then performed at the remote service center.
- the remote service center in this embodiment, generates a record for transaction logging area, which may be used for billing purposes.
- the scanning reading in this embodiment, follows this procedure: (a) the content of reading area "copy alert" is evaluated against the contents read by the scanner, (b) the comparison result will be a "Copy" or "no Copy” report along with information about the user that printed the document, date, time, etc.
- Fig. 7 is a block diagram of a system of an embodiment that provides secure documents as described and a customer server that receives control and audit type provisions.
- a user computer 60 is connected to a communications network 64, such as the Internet 64 and through the communications network 64 the user computer 60 can communicate with a remote service center 68.
- the user computer 60 is also connected to a printer 72 that may be used to print secure documents.
- the user computer 60 is also connected to a customer server 80.
- the operational steps include, after the protection or the verification is done, the server will; (1) Send to Customer Server the Transaction Log that will be recorded for future auditing, (2) the remote service center server has log information required for billing and eventual analysis of a defined transaction. (3) Customer will retain complete records (copy alert and comparison reports) of log transaction for auditing purposes that could be accessed by the remote service center if there is any issue about verification results. (4) These Customer records performed from each remote service center Server transaction sent to Customer Server will generate transaction data Bank that will be read only and cannot be removed or altered. [0063] As can be readily understood from the above discussion, according to various aspects of the current invention, processes and systems provide for verification of a document.
- the third party can scan the printed document and transmit the scanned document to a remote server via a network such as, for example, the Internet.
- a verification of the document may be performed via a number of ways. According to various aspects of the current invention, one aspect of verification of the document is to decode the encrypted text on the security bar via a dedicated decoding. Accordingly, once the security bar is decoded, the remote server may transmit to the third party an image of comparison result between original and visible portions of document.
- remote server compares both the scan of the actual visual printed document and the image of the document decoded from the security bar, and will transmit the result of the comparison of the two portions of same page of document to the third party via a network such as the Internet.
- the comparison may be in the form of a document highlighting differences between the scanned printed document and the decoded document.
- FIG. 8 is a block diagram of various exemplary system components, in accordance with an aspect of the present invention.
- Fig. 8 shows a communication system 1000 usable in accordance with the present invention.
- the communication system 1000 includes one or more accessors 1060, 1062 (also referred to interchangeably herein as one or more "users") and one or more terminals 1042. 1066.
- data for use in accordance with the present invention is, for example, in and/or accessed by accessors 1060, 1064 via terminals 1042, 1066, such as personal computers (PCs), minicomputers, mainframe computers, microcomputers, telephonic devices, or wireless devices, such as personal digital assistants ("PDAs") or a handheld wireless devices coupled to a server 1043, such as a PC, minicomputer, mainframe computer, microcomputer, or other device having a processor and a repository for data and/or connection to a repository for data, via, for example, a network 1044, such as the Internet or an intranet, and couplings 1045, 1046, 1064.
- the couplings 1045, 1046, 1064 include, for example, wired, wireless, or fiberoptic links.
- the process and system of the present invention operate in a standalone environment, such as on a single terminal.
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- General Engineering & Computer Science (AREA)
- General Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- Bioethics (AREA)
- General Physics & Mathematics (AREA)
- Health & Medical Sciences (AREA)
- Editing Of Facsimile Originals (AREA)
- Document Processing Apparatus (AREA)
- Accessory Devices And Overall Control Thereof (AREA)
- Facsimiles In General (AREA)
- Storage Device Security (AREA)
Abstract
Description
Claims
Priority Applications (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2009801536969A CN102271927A (en) | 2008-11-03 | 2009-11-02 | System and processes for protection of paper documents against falsification, adulteration and leakage |
BRPI0921616-2A BRPI0921616B1 (en) | 2008-11-03 | 2009-11-02 | set of processes and method for the dynamic protection of documents printed on paper; set of processes and method for the protection of documents printed on paper; a set of processes and method for verifying the authenticity of a printed document and system for using a computer as a means |
EP09828705.5A EP2355984A4 (en) | 2008-11-03 | 2009-11-02 | System and processes for protection of paper documents against falsification, adulteration and leakage |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US11079508P | 2008-11-03 | 2008-11-03 | |
US61/110,795 | 2008-11-03 |
Publications (2)
Publication Number | Publication Date |
---|---|
WO2010061257A2 true WO2010061257A2 (en) | 2010-06-03 |
WO2010061257A3 WO2010061257A3 (en) | 2010-09-30 |
Family
ID=42131419
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/IB2009/007292 WO2010061257A2 (en) | 2008-11-03 | 2009-11-02 | Systems and processes of protection and automatic verification of paper documents against falsification, adulteration and leakage |
Country Status (5)
Country | Link |
---|---|
US (1) | US8340291B2 (en) |
EP (1) | EP2355984A4 (en) |
CN (1) | CN102271927A (en) |
BR (1) | BRPI0921616B1 (en) |
WO (1) | WO2010061257A2 (en) |
Families Citing this family (24)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103608763A (en) | 2011-06-22 | 2014-02-26 | 惠普发展公司,有限责任合伙企业 | Systems and methods for tracing the source of printed pages |
US20130138765A1 (en) * | 2011-11-29 | 2013-05-30 | Marc Christian Fielding | Methods, Media, and System for Monitoring Access to Computer Environments |
CN102523255B (en) * | 2011-11-30 | 2015-04-29 | 北京京航计算通讯研究所 | Printing security monitoring and auditing system based on virtual printing technique |
US9477884B2 (en) | 2012-06-14 | 2016-10-25 | Digimarc Corporation | Methods and systems for signal processing |
TW201419208A (en) * | 2012-11-09 | 2014-05-16 | Jrsys Internat Corp | Picture delivering system based on visual cryptography and related computer program product |
WO2015116235A1 (en) * | 2014-02-03 | 2015-08-06 | Hewlett-Packard Development Company, L.P. | Replacement text for textual content to be printed |
CN105631348A (en) * | 2014-10-31 | 2016-06-01 | 江苏威盾网络科技有限公司 | Paper printed file secrecy method |
CN105631349A (en) * | 2014-11-01 | 2016-06-01 | 江苏威盾网络科技有限公司 | File security management method based on password sequence |
DE102015102037A1 (en) * | 2015-02-12 | 2016-08-18 | Bundesdruckerei Gmbh | document |
CN104766265B (en) * | 2015-03-09 | 2020-04-07 | 山东科技大学 | Hierarchical access security control equipment and method for paper financial archives |
US10699001B2 (en) | 2015-03-31 | 2020-06-30 | Paradigm, Inc. | Systems and methods for generating and validating certified electronic credentials |
WO2016160052A1 (en) | 2015-03-31 | 2016-10-06 | Paradigm, Inc. | Systems and methods for generating and validating certified electronic credentials |
US11580582B1 (en) | 2016-03-08 | 2023-02-14 | Gerald McLaughlin | Method and system for description database creation, organization, and use |
US10762545B1 (en) * | 2016-11-10 | 2020-09-01 | Gerald McLaughlin | Method and system for distributed manufacturing |
US11010806B2 (en) | 2016-11-10 | 2021-05-18 | Gerald McLaughlin | Method and system for distributed manufacturing |
CN107305556A (en) * | 2016-04-20 | 2017-10-31 | 索尼公司 | Device and method for 3D printing |
CN108513041B (en) | 2017-02-28 | 2021-04-13 | 京瓷办公信息系统株式会社 | Image forming system, terminal, server, image forming apparatus, and image forming method |
RU2707700C1 (en) * | 2019-02-28 | 2019-11-28 | Фудкоин Груп Аг | Method of remote verification of documents |
CN110222515A (en) * | 2019-04-19 | 2019-09-10 | 深圳法大大网络科技有限公司 | Anti-tamper detection method, device and server, computer readable storage medium |
CN112487490B (en) * | 2019-09-11 | 2024-09-13 | 株式会社理光 | Tamper identification method, device and medium |
JP7490409B2 (en) * | 2020-03-25 | 2024-05-27 | 東芝テック株式会社 | Image forming apparatus and method for controlling image forming apparatus |
CN111914304A (en) * | 2020-08-14 | 2020-11-10 | 联想图像(天津)科技有限公司 | Document verification method and device, computer equipment and readable storage medium |
US11750756B1 (en) * | 2022-03-25 | 2023-09-05 | Kyocera Document Solutions Inc. | Contactless document processing system using document management profile |
CN116755649B (en) * | 2023-08-15 | 2023-10-31 | 南京功夫豆信息科技有限公司 | Intelligent printing equipment data management system and method based on Internet of things |
Family Cites Families (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2001357019A (en) * | 2000-06-13 | 2001-12-26 | Dainippon Printing Co Ltd | Synthetic habitant supporting system utilizing ic card and ic card to be used therefor |
US7108184B2 (en) * | 2001-03-30 | 2006-09-19 | Baxter International, Inc. | Coding symbology and a method for printing same |
AU2002313729A1 (en) * | 2001-08-07 | 2003-02-24 | Pacific Holographics, Inc. | System and method for encoding and decoding an image or document and document encoded thereby |
US7793204B2 (en) * | 2003-03-13 | 2010-09-07 | Hewlett-Packard Development Company, L.P. | Copy protecting documents |
GB0310765D0 (en) * | 2003-05-10 | 2003-06-18 | Hewlett Packard Development Co | Improvements relating to the security of and the generation of documents |
CA2567250A1 (en) * | 2004-05-18 | 2005-11-24 | Silverbrook Research Pty Ltd | Authentication of an object using a signature encoded in a number of data portions |
US7669769B2 (en) * | 2005-03-28 | 2010-03-02 | Konica Minolta Systems Laboratory, Inc. | Systems and methods for preserving and maintaining document integrity |
JP2006281667A (en) * | 2005-04-01 | 2006-10-19 | Toshiba Corp | Bankbook printing device |
US20070110235A1 (en) * | 2005-11-17 | 2007-05-17 | Kirk Pruitt | Method and system for authenticating appraisal reports |
-
2009
- 2009-11-02 CN CN2009801536969A patent/CN102271927A/en active Pending
- 2009-11-02 EP EP09828705.5A patent/EP2355984A4/en not_active Withdrawn
- 2009-11-02 BR BRPI0921616-2A patent/BRPI0921616B1/en active IP Right Grant
- 2009-11-02 WO PCT/IB2009/007292 patent/WO2010061257A2/en active Application Filing
- 2009-11-02 US US12/610,998 patent/US8340291B2/en active Active
Non-Patent Citations (1)
Title |
---|
See references of EP2355984A4 * |
Also Published As
Publication number | Publication date |
---|---|
US8340291B2 (en) | 2012-12-25 |
BRPI0921616B1 (en) | 2020-12-29 |
EP2355984A2 (en) | 2011-08-17 |
WO2010061257A3 (en) | 2010-09-30 |
EP2355984A4 (en) | 2015-12-09 |
CN102271927A (en) | 2011-12-07 |
US20100111301A1 (en) | 2010-05-06 |
BRPI0921616A2 (en) | 2016-01-05 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8340291B2 (en) | Systems and processes of automatic verification and protection of paper documents against falsification, adulteration and leakage | |
JP3803378B2 (en) | Secure copy of confidential documents | |
JP4706574B2 (en) | Printing system and program | |
US20190005268A1 (en) | Universal original document validation platform | |
KR101039390B1 (en) | A method and system of examining the genuineness of the issued document using a bar-code | |
EP1998306A1 (en) | Image encryption/decryption system | |
US20130247218A1 (en) | System And Method For Verifying Authenticity Of Documents | |
US8340346B2 (en) | Information processing device, information processing method, and computer readable medium | |
WO2013067092A1 (en) | System and method for dynamic generation of embedded security features in a document | |
MX2013007923A (en) | High value document authentication system & method. | |
JP2010268466A (en) | Digital authentication using analog document | |
KR20090123555A (en) | A online confirming system for issued documents and the method thereof | |
JP2008301480A (en) | Cac (common access card) security and document security enhancement | |
KR102114391B1 (en) | System and method for printing security of computerised documentation | |
JPWO2005031560A1 (en) | Output information management system | |
KR100430469B1 (en) | System for preventing document from forging/alternating | |
TWM520159U (en) | Device for generating and identifying electronic document containing electronic authentication and paper authentication | |
EP1704667B1 (en) | Electronic signing apparatus and methods | |
US20070136787A1 (en) | System and method for restricting and authorizing the use of software printing resources | |
EP1883035A2 (en) | Electronic data disclosure method and system | |
KR102138077B1 (en) | System and method for preventing forgery and alteration of documents | |
KR20080023438A (en) | Online application system for issuing identity card and method thereof | |
TWI595380B (en) | Device for generating or verifying authenticate electronic document with electronic and paper certification and method thereof | |
US20080062456A1 (en) | Print management device, storage medium for print management program, print analysis system, print system, document issuance system, print management method, and computer data signal | |
JP2002099209A (en) | Device, system, method, program, printed matter and recording medium relating to printed matter verification information addition and printed matter verification |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
WWE | Wipo information: entry into national phase |
Ref document number: 200980153696.9 Country of ref document: CN |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 09828705 Country of ref document: EP Kind code of ref document: A2 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2009828705 Country of ref document: EP |
|
ENP | Entry into the national phase |
Ref document number: PI0921616 Country of ref document: BR Kind code of ref document: A2 Effective date: 20110503 |