CN1361960A - Legitimacy protection of electronic document and a printed copy thereof - Google Patents

Legitimacy protection of electronic document and a printed copy thereof Download PDF

Info

Publication number
CN1361960A
CN1361960A CN99816827A CN99816827A CN1361960A CN 1361960 A CN1361960 A CN 1361960A CN 99816827 A CN99816827 A CN 99816827A CN 99816827 A CN99816827 A CN 99816827A CN 1361960 A CN1361960 A CN 1361960A
Authority
CN
China
Prior art keywords
document
seal
synopsis
content
electronic
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN99816827A
Other languages
Chinese (zh)
Other versions
CN1305251C (en
Inventor
J·吴
Q·孙
H·邓
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Trustcopy Ptd Ltd.
Original Assignee
Kent Ridge Digital Labs
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Kent Ridge Digital Labs filed Critical Kent Ridge Digital Labs
Publication of CN1361960A publication Critical patent/CN1361960A/en
Application granted granted Critical
Publication of CN1305251C publication Critical patent/CN1305251C/en
Anticipated expiration legal-status Critical
Expired - Fee Related legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • GPHYSICS
    • G09EDUCATION; CRYPTOGRAPHY; DISPLAY; ADVERTISING; SEALS
    • G09CCIPHERING OR DECIPHERING APPARATUS FOR CRYPTOGRAPHIC OR OTHER PURPOSES INVOLVING THE NEED FOR SECRECY
    • G09C5/00Ciphering apparatus or methods not provided for in the preceding groups, e.g. involving the concealment or deformation of graphic data such as designs, written or printed messages
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/321Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
    • H04L9/3213Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority using tickets or tokens, e.g. Kerberos
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3263Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/60Digital content management, e.g. content distribution
    • H04L2209/608Watermarking

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Image Processing (AREA)
  • Editing Of Facsimile Originals (AREA)
  • Document Processing Apparatus (AREA)

Abstract

An electronic document and a corresponding printed document capable of having their legitimacy protected, and a method, an apparatus, a computer program product and a system for protecting the legitimacy of electronic and printed documents are dislcosed. The electronic document includes: content of an original document in electronic form, a content digest for the content the original document in electronic form, an electronic seal or e-seal for authenticating the original document in electronic form, the e-seal including a visible seal of an authority and the content digest embedded in the visible seal; an optically sensitive or sensible component added to the authenticated document for printing using a trusted printing process. The optically sensitive or sensible component contains information for indicating copying or modification of the printed document in a copy or modified version of the printed document.

Description

The legitimacy protection of electronic document and printed copy thereof
Invention field
The present invention relates to safe electronics and print document, more specifically, relate to a kind of method and device that is used for electronics and prints the comprehensive legal protection of document.
Background technology
In routine matter and personal lifestyle, the electronics of a document and written version are of equal importance, all are important, ubiquitous projects---particularly from the expansion of internet and similar network.However, the conventional method of the legitimacy of a certain form of protection document has been ignored the protection to other form of the document.Some traditional method and systems are below described.
The patent No. is U.S.Patent No.4,981,370 (being presented to Dziewit etc. on January 1st, 1991), 5,031,214 (being presented to Dziewit etc. on July 9th, 1991), 5,163,091 (being presented to Graziano etc. on November 10th, 1992) and 5,191, describe contract (or folk prescription signer document) signature program in the patent of 163 (being presented to Graziano etc. on March 2nd, 1993), discussed the problem of electronic contract signature: fail safe, palpability, reliability, discriminating, durability and validity.Device appliance computer technology described in these patents has produced the document of differentiating through last.This document it is said to have satisfied and differentiates and the authenticity requirement corresponding to the law documentation of printing document traditionally.At transmission and receiving workstation, relatively reach locking by the high speed in a kind of document---can't produce with this feasible change---enables this document evaluator as the part of the program of a verification document identification.This program is promptly waited for the distinguishing signal exchange from two end points subsequently.In case document signatory's identity is through verification, this document identification device is promptly pointed out the party, by its additional electronic signature is differentiated this part document.The discriminating of actual " signature " or electronic document can be used as an additional password step---this step has been utilized people's identity confirmation device one by one---and is achieved.So can use two-stage cryptoguard, make to have one independently " document discriminating pin ".This system is more complicated, and then court can be sure of that more the discriminating of a document is effective.In this way, promptly need not to produce the written version of electronic contract.Traditional part of contract in writing all comes across in the computer system with electronic format.
Also can obtain extra powers and functions, most of document is generated and the evaluator automation because this is a computer system based on knowledge.Particularly portion in many ways the generation of document---as contract---require a large amount of interactions between the each of the contracting parties.This system is effective especially in electronic document exchange (EDI) scope, in this scope between the each side exchange standard form message commodity are ordered and are drawn up a list.
So, these four patents have been handled electronic contract negotiation and signature program.But these document institute published content are failed to electronics and are printed document these two proposes a comprehensive solution and makes a document tangibly and can accepting concerning people simultaneously.
The patent No. is U.S.Patent No.5, and the patent of 742,685 (being presented to Berson etc. on August 21st, 1998) has been described a kind of method, is used for the checking mark card and to the verification of this tag card record in addition.A people's tag card is subjected to scanning to produce a digital signal corresponding to certain literal message, and it is compressed, encrypts, is encoded to 2 dimension bar-codes and is printed on the back side of this tag card.When confirming this card, the message that is encoded is scanned, decodes, deciphers, decompresses and shows.By display image and literal and the image and the literal that are printed on the card are compared, can differentiate.
Similarly, Huttinger, Stephan shows the online label of having described a kind of user of being sent in " online label (Online Ticket) " (publishing in January, 1999 Computer Graphik the 11st volume, 9-10 page or leaf), via the internet to its selection and payment.2 dimension bar-codes are provided on this label, have represented label date and signature.Use the digital signature technology and verified the authenticity of label.
The patent No. is U.S.Patent No.4, and the patent of 853,961 (being presented to Pastor on August 1st, 1989) has been described a kind of system that is used to differentiate document, comprises the equipment with decruption key.When being applied to customer-furnished information, this system not only demonstrates the plain text message in this discriminating source of indication, also provides decruption key, to be used for the information that the mailer is provided.Similarly, the patent No. is U.S.Patent No.5, methodology and device that the patent of 388,158 (being presented to Berson February 7 nineteen ninety-five) has been described a kind of security document and has been used to produce and differentiates this security document.Scanned document to be producing a digital signal, with this Signal Compression, encrypt and be encoded to the similar type of one 2 dimension bar-code or coding.This bar code is comprised in the label that appends to this document.Use a Public Key Cryptographic Systems to encrypt the signal of presentation video, download this key from a center.For ease of differentiating, corresponding decoding key is encrypted and is included in the card with another key.Be to confirm document, encoded signals scanning from the label, deciphering, decompress(ion) are contractd and shown.Compared by the image that will demonstrate and the expression of document subsequently, can stick into row to this and differentiate.
The patent No. is U.S.Patent No.5, and the patent of 157,726 (being presented to Merkle etc. on October 20th, 1992) has been described a kind of system that is used to differentiate the hard copy of original document.At sender's work station, original document and a sign (ID) card are inserted in the special duplicator.To produce a digital signal, it has comprised the ID card from the sender to this machine with the document alphanumeric.This machine produces a hard copy of document, to this part hard copy affix digital signature.The sender keeps original paper but copy is sent to the addressee or claims the recipient.The recipient inserts the machine of his position with the copy that receives, and this machine is also handled document literal and signature digitlization, and shows whether this digital signature is effective.
The patent No. is U.S.Patent No.5, and the patent of 710,886 (being presented to Christensen etc. on January 20th, 1998) has been described a kind of method, is used for distributing, generate and cashing coupon, discount or present document.This method utilization is printed on user ID on the ticket and numbers and follow the tracks of every ticket.Ticket can be distributed by electronic form, for example, and with the form of floppy disk or CD-ROM software.Software on this floppy disk or the CD-ROM can point out the user to remove to dial a 1-800 number to obtain an affirmation numbering or coding.When dialing this phone, telecommunications managerial personnel ask the user demographic and (or) identification information, they can be imported in the centralized data base.In case software is confirmed that the user can be printed the ballot paper certificate.Each ticket only can be printed limited number of times.Each ticket can also user ID numbering---preferably with bar code form---be printed.The present invention is referred to as " use user ID numbering can reduce or prevent the rogue of ticket from duplicating or cash " on ticket.
The patent No. is U.S.Patent No.5; 374; 976 (being presented to Spannenburg on December 20th, 1994), U.S.Patent No.5; 823; 576 (being presented to Lambert on October 20th, 1998) and U.S.Patent No.5; the patent of 018,767 (being presented to Wicker on May 28th, 1991) has been described and has been used to the method protecting paper document, prevent to duplicate.These methods have been used high-resolution printers (for example 600 points/inch), have been printed document with embedded pattern.These patterns are sightless in original document.These patterns promptly become visible after duplicating with the common photocopier with low resolution (for example 300 points/inch).
Above technology has some shortcomings.The first, the technology that is used for the electronic document discriminating is not to user friendly.In other words, these technology do not make electronic document tangibly and understandable concerning the user.Encryption key or 2 dimension bar-codes can not directly be read by the user, and whether the user does not know that document or project have obtained authorizing and being authorized by whom.The second, the two all provides comprehensive solution to electronics and paper document still not have known technology.And this is vital for task for crucial application, still is that daily life is all like this to business no matter.Comprehensive solution has been arranged, just can enjoy via internet or corporate intranet and carry out the facility of transmission at a high speed, and kept the convenience and the palpability of paper document.The 3rd, the protection that these technology provided is not individualized.And this is important to law and service profile equally, and everyone is concerned about protection or is responsible for him the content of this part.
The patent No. is U.S.Patent No.5; 742; 685 (being presented to Berson etc. on April 21st, 1998), U.S.Patent No.4; 853; 961 (being presented to Pastor on August 1st, 1989) and U.S.Patent No.5; the patent of 388,158 (being presented to Berson February 7 nineteen ninety-five) has been announced method or the system that utilizes encryption technology to protect electronics or paper document.But there are some shortcomings in these systems, comprising:
1). these methods or system only provide solution to electronics or paper document individually;
2). these methods or system are based upon on the encryption technology basis, and these technology are for the electronics literary composition
Shelves be safe, but for the user on many practical uses not tangibly and
And it is inconvenient.Paper document is still more desirable and be many people on many practical uses
Institute is liked;
3). protection is not individualized, even be like this concerning the document with a plurality of signatories yet;
4). for differentiating and transmit do not have total solution/product/service.
Therefore, significant need is a kind of had both protected the electronic version of document, also protect the method for the legitimacy of its printing edition, above-mentioned one or more shortcomings that this method has overcome---or having improved at least---.
Summary of the invention
Each side of the present invention seeks to provide a kind of integrated approach of protecting electronic document and corresponding printing edition legitimacy thereof.This is realized by user-friendly e-seal.This protection utilization individual e-seal is individualized.Document with a plurality of signatories can obtain effectively and protection and verification efficiently.
According to a first aspect of the invention, announced a kind of electronic document that is used to duplicate corresponding printing document, print document and can have the legitimacy of this protected electronic documents, this prints document is a printing edition of this electronic document, and this electronic document comprises: the original document content of electronic format; Synopsis (digest) for this electronic format original document content; Be used to differentiate an E-seal of this electronic format original document or claim the e-seal that this e-seal comprises the visible seal of a management organization and embeds the interior synopsis of this visible seal; Add the into document through differentiating, sensitization or the photosensitive composition to utilize a kind of believable print routine to print, this sensitization or photosensitive composition have comprised information, are used for duplicating or revising at the copy of printing document or revision this printing document of indication.
According to a second aspect of the invention, announced a kind of printing document that duplicates from electronic document, this electronic document can have the legitimacy of this protected printing document, and this prints document is a printing edition of this electronic document, and this is printed document and comprises: the reproducting content of original document; Be used for differentiating the E-seal that is replicated in this original document of printing document or claim the e-seal, this e-seal comprise the visible seal of a management organization and embed in this visible seal, for the synopsis of original document content; Utilize a kind of believable print routine to copy to the sensitization or the photosensitive composition of the document after differentiating, this sensitization or photosensitive composition have comprised information, are used for duplicating or revising at the copy of printing document or revision this printing document of indication.
According to a third aspect of the invention we, announced a kind of method of protecting electronic document and corresponding printing document legitimacy, this prints document is the printing edition of this electronic document, and this method may further comprise the steps: the original document for electronic format generates a synopsis; Utilize an E-seal or title e-seal and differentiate original document, this e-seal has comprised the visible seal of a management organization and has been embedded in the interior synopsis of this visible seal; Utilize a kind of believable print routine and with a kind of sensitization or photosensitive composition append to through in the document of discriminating so that print, this sensitization or photosensitive composition have comprised information, are used for duplicating or revising at the copy of printing document or revision this printing document of indication.
According to a forth aspect of the invention, announced a kind of device that is used to protect electronic document and corresponding printing document legitimacy, this prints document is the printing edition of this electronic document, and this device comprises: the device that is used for generating from the original document of electronic format a synopsis; Be used to utilize an E-seal or claim the e-seal and differentiate that the device of this electronic format original document, this e-seal have comprised the visible seal of a management organization and be embedded in synopsis in this visible seal; Utilize a kind of believable print routine and with a kind of sensitization or photosensitive composition append to through in the document of discriminating so that the device of printing, this sensitization or photosensitive composition have comprised information, are used for duplicating or revising at the copy of printing document or revision this printing document of indication.
According to a fifth aspect of the invention, announced a kind of computer-usable medium that the has computer program of---these medium have embedding computer-readable program coding (computer readable programcode means) wherein---, be used to protect the device of electronic document and corresponding printing document legitimacy, this prints document is the printing edition of this electronic document, and this computer program comprises: the computer-readable program coding that is used for generating from the original document of electronic format a synopsis; Be used to utilize an E-seal or claim the e-seal and differentiate that the computer-readable program coding of this electronic format original document, this e-seal have comprised the visible seal of a management organization and be embedded in synopsis in this visible seal; Be used for utilizing a kind of believable print routine and a kind of sensitization or photosensitive composition are appended to through the document differentiated so that the computer-readable program coding of printing, this sensitization or photosensitive composition have comprised information, are used for duplicating or revising at the copy of printing document or revision this printing document of indication.
According to a sixth aspect of the invention, announced a kind of system that utilizes network with protection electronic document and corresponding printing document legitimacy, this prints document is the printing edition of this electronic document, and this system comprises: be used to the original document of electronic format to generate the device of a synopsis; Be used to utilize an E-seal or claim the e-seal and differentiate that the device of this electronic format original document, this e-seal have comprised the visible seal of a management organization and be embedded in synopsis in this visible seal; Be used for utilizing a kind of believable print routine and a kind of sensitization or photosensitive composition are appended to through the document differentiated so that the device of printing, this sensitization or photosensitive composition have comprised information, are used for duplicating or revising at the copy of printing document or revision this printing document of indication.
According to a seventh aspect of the invention, announced a kind of system that is used to protect electronic document and corresponding printing document legitimacy, this prints document is the printing edition of this electronic document, this system comprises: be used to generate the device through the electronic document of differentiating, this comprises the original document content of electronic format through the electronic document of differentiating, be used to differentiate the E-seal of this electronic format original document or claim the e-seal, this e-seal has comprised the visible seal of a management organization and has been embedded in the interior synopsis of this visible seal; Be used to generate the device of a kind of sensitization or photosensitive composition, utilize a kind of believable print routine and with this composition append to through in the document of discriminating so that the device of printing, this sensitization or photosensitive composition have comprised information, are used for duplicating or revising at the copy of printing document or revision this printing document of indication; Be used for the device of verification through the electronic document legitimacy of discriminating; Thereby use depend on calibration equipment credible print routine, provide device to print through the printing document of differentiating through the electronic document differentiated and photographic composition.
According to an eighth aspect of the invention, announced a kind of method that is used to protect electronic document and corresponding printing document legitimacy, this method comprises the steps: to generate the electronic document through differentiating, this comprises the original document content of electronic format through the electronic document of differentiating, be used to differentiate the E-seal of this electronic format original document or claim the e-seal, this e-seal has comprised the visible seal of a management organization and has been embedded in the interior synopsis of this visible seal; Generate a kind of sensitization or photosensitive composition, to utilize a kind of believable print routine this composition is appended in the document that passes through discriminating so that print, this sensitization or photosensitive composition have comprised information, are used for duplicating or revising at the copy of printing document or revision this printing document of indication; The electronic document legitimacy of verification through differentiating; Thereby use depend on checking procedure credible print routine, provide device to print through the printing document of differentiating through the electronic document differentiated and photographic composition.
According to a ninth aspect of the invention, announced a kind of computer-usable medium that has---these medium have embedding computer-readable program coding wherein, be used to protect the computer program of electronic document and corresponding printing document legitimacy, this computer program comprises: be used to generate the computer-readable program coding through the electronic document of differentiating, this comprises the original document content of electronic format through the electronic document of differentiating, be used to differentiate the E-seal of this electronic format original document or claim the e-seal, this e-seal has comprised the visible seal of a management organization and has been embedded in the interior a synopsis of this visible seal; Be used for generating a kind of sensitization or photosensitive composition, this composition appended to the document of process discriminating so that the computer-readable program coding of printing to utilize a kind of believable print routine, this sensitization or photosensitive composition have comprised information, are used for duplicating or revising at the copy of printing document or revision this printing document of indication; Be used for the computer-readable program coding of verification through the electronic document legitimacy of discriminating; Use depends on the credible print routine of this computer-readable program coding and prints through the electronic document of discriminating and the computer-readable program coding of photographic composition, is used for verification so that the printing document through differentiating to be provided.
According to the tenth aspect of the invention, announced a kind of method that credible document transmits of carrying out via network, this method comprises the steps: to create the secure communications link between one or more places; Each square mark of verification; The device that makes each side's signature original document is provided; The legitimacy of document after the signature of protection electronic format, this shielded signature back document comprises the content of electronic format original document, synopsis for electronic format original document content, and be used for the E-seal of this electronic format original document of verification or claim the e-seal, this e-seal has comprised the visible seal of a management organization and has been embedded in the interior synopsis of this visible seal; With shielded, the signature after electronic document send to the recipient who is positioned at certain second remote site on the network from the transmit leg that is positioned at first place; Just the protected electronic documents that is sent is notified the recipient; Second remote site receives the protected electronic documents that is sent on network; And the receipt of transmission protected electronic documents sent to the transmit leg that is positioned at first place.
Description of drawings
In below describing, embodiments of the invention are described with reference to accompanying drawing, in the accompanying drawing:
Figure 1A-1C is a progressive series of greys image, the example of an e-seal is described and in document protection corresponding to the embodiment of the invention, the effect of this each composition of e-seal;
Fig. 2 is a block diagram, illustrates corresponding to first embodiment of the invention, for the content-defined pattern of the document with a plurality of signatories;
The example that Fig. 3 is a progressive series of greys image, is made for a seal image (being jasmine Na image) is carried out watermark processing---this watermark processing is corresponding to embodiment of the invention, used binary coding that documentation summary is embedded a spatial domain---;
Fig. 4 is a block diagram, and a kind of document format is described, the document has E-seal (e-seal) protection corresponding to first embodiment of the invention;
Fig. 5 is a block diagram, and the program of carrying out electronic document authorization corresponding to the e-seal of first embodiment of the invention of using is described;
Fig. 6 is a block diagram, illustrates carry out the program of verification corresponding to a electronic document of first embodiment of the invention;
Fig. 7 is a block diagram, and the print routine that a electronic document is transformed to printing edition corresponding to first embodiment of the invention is described;
Fig. 8 is a block diagram, and the program of paper document being carried out verification corresponding to first embodiment of the invention is described;
Fig. 9 is a block diagram, and the service centre that confirms/notarize corresponding to the embodiment of the invention symbolically has been described.
Embodiment
Electronic document and paper document that its legitimacy is protected have been described, and the method, device, computer program and the system that are used to protect electronics and print the document legitimacy.In the following description, proposed many details, comprised---such as---specific encryption technology, digital watermark, synopsis method and similar details etc.Yet it will be apparent for a person skilled in the art that the present invention can need not these specific detail and implement.In other example, the known characteristics of people are not encyclopaedized, in order to avoid make the present invention smudgy.
For ease of describing, various embodiments of the present invention all are described as or are referred to as " system ".Each assembly of system all is described as module.Module---particularly the function of module---can hardware or software and realizing.On software sense, a module is a program or its part, finishes certain specific function or correlation function usually.On the hardware meaning, a module is a functionality hardware unit, and design is used with other assembly and module.For example, a module can realize that perhaps it can constitute a complete electronic circuit with discrete electronic component---as application-specific integrated circuit (ASIC) (ASIC)---a part.Also have many other possibilities.Skilled person in the art will appreciate that this system also to can be used as the combination of hardware and software module and be achieved.
For convenient and be easy to referring to, describe and comprise as the lower part:
1. system survey
2.e-seal and e-seal assembly
3. protect and the affirmation program
4. product/service 1. system surveys
The embodiment of the invention provides a kind of comprehensive document legitimacy protection system, comprise 4 kinds of product/services that provide believable electronics and paper document to transmit fast via internet and/or corporate intranet, and affirmation/notarization is served.These embodiment provide use E-seal or " e-seal " to carry out electronics or to print the method and the product of the legitimacy protection of document.The visual representation that the individual that this e-seal is a document differentiates, comprise 3 kinds of main components: the Visible stal that 1) this people's visible mark is provided, it can be an image, this image has comprised logo, true seal, this people's signature or their combination (by the e-seal, people just know that immediately who have authorized the document); 2) watermark, with the integrality of protection document, watermark information comprises the document content summary of being protected by cryptographic operation in the embedding seal image.Any change of document content all can produce discontinuous between content and e-seal.For the two all provides integrated protection to electronics and paper document, utilized a kind of summary of novelty to derive algorithm, this algorithm is that the electronics and the written version of document generates a similarly summary; 3) control, a kind of photographic composition added on the end leaf of printing document, with the legitimacy of verification the document before printing by a believable side with a kind of special Method of printing.This photographic composition has been protected the original print document, makes it to avoid possible forgery---and for example subsidize or duplicate as the shearing of being undertaken by duplicating and multiple scanning.This photographic composition has been arranged, can visually finish verification by the simple or common equipment that gets.These 3 kinds of compositions have constituted a kind of comprehensive solution of both having protected electronic document also to protect the printed copy of this electronic document together.
Embodiments of the invention comprise 4 kinds of product/services, comprise that believable document transmits, electronic affirmation/notarization, and a kind of electronic checkout or consulting device, and by the signature of the official documentation that is carried out in many ways.This method, product, device, computer program system can be applicable to different types of documents.
The embodiment of the invention provides 3 rank/types of protection.Visible stal provides rudimentary protection, and alerts people the document is authorized and protection.Watermark provides safeguard protection, avoids the possible unwarranted change of document content.Photographic composition provides the visual inspection with simple and off line, effectively protects for printing document.
Advantageously embodiment is very friendly to the user.People can be similar to the mode of common paper document is handled electronic document.More advantageously, the two all provides comprehensive solution to embodiment to electronic document and corresponding printing edition.This point is important, because the electronic version of a document and written version all have advantage, and two types of document all need on many practical uses.Therefore for the application of task for key, comprehensive solution is a significant advantage.
Further, this controlled, believable Method of printing---legitimacy of its verification document before printing is also added photographic composition on the end leaf of printing document to---are with electronics and print document and link together, and make these documents avoid attack as screen dump or shearing are subsidized effectively.2.e-seal and e-seal assembly
Explanation once more, the visual image of differentiating corresponding to the E-seal of the embodiment of the invention or the individual that claims the e-seal to comprise a sign document.This e-seal provides effectively and efficiently protecting about the document integrality.Figure 1A-1C has illustrated an e-seal example corresponding to the embodiment of the invention.Each e-seal preferably all has 3 kinds of compositions: one visible or claim the image of seal, a watermark that comprises the document content summary, and a kind of sensitization or photosensitive composition.
Figure 1A represents an e-seal 110, and it is affixed to or is comprised into (not shown) in the electronic document.For ease of explanation, e-seal 110 is shown in the rectangle black line frame.E-seal 110 comprises the sign image of 110A (Jiangkang Wu) of people one by one, and it plays the effect of document signer's visual identification symbol.As seen seal 110A remains digital image format.Also can use the visual picture 110A outside individual's signature and not deviate from scope and spirit of the present invention.For example visual picture 110A can be a Document Title, logo, people's face image, graphic symbol and analog.For those skilled in the art, by in this description of carrying out, various possibilities is arranged obviously.Further, visual image 110A is preferably to carry out watermark processing about the possessory information of Visible stal 110A, with the ownership of protection Visible stal 110A.The watermark 110B that e-seal 110 also is included in signature 110A below, seems and be similar to the noise band.Watermark 110B has passed on the summary of document content, with the integrality of protection document.After this this synopsis will be described in more detail.
Figure 1B represents to be replicated in a corresponding e-seal of printing on the document (not shown) 120, is shown in equally in the rectangle black line frame.E-seal 120 comprises a visible seal 120A and a watermark 120B who comprises the document content summary.When duplicating, with grey, sensitization or photosensitive composition 120C append to print watermark band in the document under.This step is with believable reproducer, finish before copying image.Can select a sequence number (promptly 99072002) is added to enter composition 120C zone and print document with sign.Sensitization or photosensitive composition 120C have comprised information, are used for duplicating or revising at the copy of printing document or revision this printing document of indication.Fig. 1 C has represented an e-seal 130 in the original document copy, and this original document comprises the e-seal 120 of Figure 1B.Among Fig. 1 C, the e-seal 120 that is copied has changed outward appearance, thereby becomes visible (being the signature of Jiangkang Wu) in the e-seal 130 that the invisible part of photographic composition 120 is duplicated now.2.1 visible e-seal
In embodiments of the present invention, the visual identification that a visible seal can be regarded as a user-friendly interface and management organization.Huttinger, Stephan shows " online label (OnlineTicket) " (in January, 1999 Computer Graphik the 11st volume, the 9-10 page or leaf) described a kind of 2 dimension (2-D) bar codes that are used for the document mandate in, this bar code is the easy detection coding of enciphered message.Bar code is the binary coding of printing, and it can low-down error rate and detected by bar-code reader, but can not be read by the people.That is when document has a bar code,, not knowing that then the document authorized by whom as no testing equipment, whether effectively the user also can't determine this bar code.
A mandate, no matter be tissue or the individual, " seal " of a uniqueness generally all arranged, this seal can be logo, signature or analog.Above-mentioned image is the visible seal composition of e-seal.Ownership for protection e-seal preferably embeds an invisible watermark in this seal image.This invisible watermark information comprises the date of formation of---but being not limited to---possessory name and seal.Out of Memory also can comprise in the seal image.As watermarking process is irreversible, and other people just can not pretend the owner.The image watermark that is used for copyright protection is done discussion see Cox; Ingemar J. and Miller, Matt L. show " importance of the review of watermark and perception modeling (A Review of Watermarking and the Importance ofPerceptual Modeling) " (being published in the Proc.Of ElectronicImaging ' 97 in February, 1997).
Seal image can be utilized by the owner---such as---encrypt and lock, and be stored in certain home.The owner removes the seal image release to sign a document with this seal image.Can utilize password, smart card or biometric information and carry out the access of seal image and release.2.2 the watermark processing of synopsis
Seal on the paper document and signature can provide the evidence of the document legitimacy because the primitiveness of in writing seal and signature can be by simple visual inspection in addition verification.For a electronic document, document content is avoided without permission or illegal protection of changing realizes by watermark that mainly this watermark is embedded in the e-seal image.Watermark information comprises document content " summary ".The application requirements document legitimacy protection that two kinds of main types are arranged: first type be applied as document by those application that believable management organization issued.Example comprises government notice and bill, and in these examples, management organization or its agent carry out the legitimacy verification.As for information security, then share safe key by management organization/cipher key distribution people and verification people.
Second type be applied as those application that document transmits between in many ways.Example comprises the electronics law documentation, and the official documentation in government or the major company.Perhaps set about this document and need issue key by many people by believable third party.
" key " speech comprises one section or one group of information, by means of this information, message or equipment can by a specific operation and from a kind of state transformation for being another kind of state.For example, to can be used for be a message encryption to a safe key.Also can select to use one group of intrinsic face, this intrinsic face is a face image that is mapped to a bit of characteristic vector.Further, watermark information can be embedded an image with secret address.More than in 3 examples, safe key, intrinsic face and embed the address and all can be described as " key " and all only be used for explanation.One skilled in the art will recognize that and also have various other possible keys.2.2.1 document content
Embodiment of the invention demand is protected document, is exempted from possible altering and/or unwarranted use.Therefore, in defence program the definition document content have outstanding importance---especially concerning those by the document that many people signed.
Basically, document content is included in the information in the document when referring to institute's sealed contract (being about to an e-seal is added on the document), comprise layout and form.To many signers' document is arranged, content-defined is content corresponding to specific signer.First example is the situation of document by two sides signature.At first leg, a common document of two sides signature, the document is one of two parts of copies of a contract.Treaty content is document content.In second leg, each side's signature has been another part document that the opposing party signed.In the case, document content has comprised the opposing party's signature.Fig. 2 represents second example, with three signer's examples, corresponding to specific signer of document and the notion of description definition.Document 200 comprises the initial content 222 of being set about and being signed and send to second people by first people.Second people signs this part document and sends it to the 3rd people.To first people, the content 222 of the document of being seen 200 is included in the full detail in the original document, shown in frame 222.When second people's sign document 200, should comprise the content 222 of original document 200, first people's signature 224 and second people extention 226 (as note) to document corresponding to this person's document 200.For the 3rd people, the content 230 of document 200 comprises original document 222, first people (224) and second people's signature, second people 226 and the 3rd people (236) extention to document.Notice that individual's signature is implemented with the e-seal.Can formally this be written as: C n = Σ i = 1 n ( S i - 1 + δ i ) + C 0 C wherein nBe the content of n people document when signing, S I-1Be previous signer's signature, first signer's serial number is 0, δ iBe the extention of i signer to document.
In the embodiment of the invention, when document was signed by a people, the summary of document content promptly was embedded in its people's the e-seal.
When next individual sign document, unnecessary if the document content summary comprises that still original document is.This unnecessary generation results from the summary of original document content and is present in all e-seals of all signers.
For keeping continuity, when people's sign document, its people promptly contrasts all existing signatures, from first to last one, the legitimacy of verification the document.Another optional method is when people's sign document, and only the summary with last e-seal embeds the extention of document with its people.That is first signer's content is C 0, the content of follow-up signer i is: S I-1+ δ iFor following reason, safe and more simple like this: 1). the synopsis of document when last e-seal has signature, and therefore have the e-seal that all have formed the protection chain.Any part that disconnects this chain all can cause differentiating failure.2). for i signer, synopsis can be written as:
Figure A9981682700331
Wherein the e-seal comprises two parts.A part is the e-seal image, and another part is the synopsis corresponding to this e-seal, and this summary is encoded with the watermark form.This formula can repeat to write down, till first signer, so can learn corresponding to i signer, comprised the documentation summary of when this person signs " signature " of document all the elements.3). owing to the summary corresponding to each e-seal is different, the order according to the document signature does not promptly have and obscures.On the other hand, people tend to the e-seal is placed near its position to the document extention.This is another prompting of signature order.2.2.2 " summary " of document
The embodiment of the invention is to the electronics of document and to print written version all effective." summary " of document content can be easily not only from the electronics of document, but also derive from its written version, and the summary of deriving is identical or quite similar." summary " of document content may be defined as the compression of document and describes, and has enough little size, makes this summary can be embedded in the e-seal image.For the summary systematic function, two kinds of important desirable characteristics are arranged.The first, summary must comprise it perhaps being quite small variation to the content change sensitivity.The second, make a summary preferably to the locus sensitivity, thereby the position of variation also can be detected.
Many methods availalbes are arranged, derive summary in order to document from electronics and written formats.Summary can formally be expressed as " summary=M (content) ", or " summary=M (key, content) ", and wherein M represents map operation and " key " secret value for sharing between publisher and the verifier.Given below is some examples of summary technology, but to those skilled in the art, obviously can use other method and not depart from scope of the present invention and spirit in view of this description.These examples comprise: 1). in cryptographic technique, can use a kind of SHA and generate message digest.For 128 long summaries, before finding two messages with identical summary, must attempt about 2 128Individual message.C.Kaufman, R.Perlman and M.Speciner show the details of having described this SHA among " network security in open society and secure communication (Network Security; Private Communication in a Public World) " (PTR Prentice Hall, Englewood Criffs.New Jersey publishes in 1995).So finding two messages with identical summary does not accomplish.Obviously, cryptographic summary is applicable to the electronic multimedia document, and wherein document Is content is digital, for " identical " and " difference " clearly boundary is arranged.Cryptographic summary also can be applicable to have the document of content of text, and wherein optical character identification (OCR) is transformed to electronic format with paper document well.For generating " address dependent form " summary, text can be divided into some, each piece is generated a small size summary.Final digest is integrated all these small sizes summaries.SHA is a kind of pseudorandom map operation.An independent bit-errors promptly can cause the big difference between each summary in the content.Therefore, document content must be faultless during transmission, storage and format conversion.2). the selection that the brief abstract of document (for example grade affirmation) can---comprise addressee, school's name, class name and date---by some key document projects is derived.Equally, to electronics and written affirmation the two in addition a straightforward procedure of verification be manual these projects of input.3). image content has different-format than text.The expression of text is accurate.1 change promptly can cause the difference of text in the content of text, but also may cause the variation of meaning.On the other hand, the interpretation of picture and inaccuracy.For example, even the content of face-image can not change when 8 of every pixels are kept to 4 of every pixels in view data yet.Therefore, can use " characteristic index " to represent the content of a picture.Characteristic index is extracted from a width of cloth picture to catch most of prominent features of this image.The exemplary that is used for the characteristic index of face-image is the intrinsic face.A.Pentland shows " the intrinsic face that is used to discern (Eigenface for recognition) " (publishing Journal of Cognitive Neuroscience the 3rd volume in 1997, the 59-70 page or leaf) and provides about these thematic particulars.Other example comprises Fourier descriptors, projection and vector quantization (VQ) representation.R.C.Gonzalez and R.E.Woods show among " Digital Image Processing (Digital Image Processing) " (Addison-Wesley Publishing Company, Reading published in 1993) and have described these methods.Because characteristic index has been caught the prominent features of picture, printing and scanning imaging system can not cause the great changes of this index.So the detection of change can be between electronic document and corresponding printing edition, use predetermined threshold value and carry out.Characteristic index both can electronic format, also can written formats and be used for the summary of picture, can also raster format and be used for other non-image data.Intrinsic face and VQ, the map operation that each all can be considered to key in.Intrinsic face and VQ dictionary are the key that is used to shine upon.Intrinsic face and VQ change according to purposes, and many selections are arranged.4). the characteristic index notion can be extended to derive summary, be used for certain non-raster data form (for example be used for the symbolic notation of figure and kind or be used for text and the dictionary basis representation method of form).For example, suppose that certain doctor carries out a medical examination to patient.Because typical case/kind and standard to describe are arranged, these kinds can be encoded, use code clerk to create a summary that is used for the medical examination document subsequently.2.2.3 summary deriving method based on the block mode coding techniques
In the embodiment of the invention, a kind of effective summary deriving method has been proposed, to be used based on image block mode (block-wise) coding techniques.J.K.Wu and R.E.Burge show " adaptive bit that is used for image compression distributes (Adaptive Bit Allocation for ImageCompression) " (being published in the 19th volume in nineteen eighty-two Computer Graphics and ImageProcessing, the 392-400 page or leaf) this method have been done to write up.The advantage of using this method is this method the two is all effective to electronics and paper document, but but and this method both quantity, the also position of change detected of change detected.
Suppose that document is a raster format.That is electronic document is transformed to the raster data form, and paper document is scanned and is the raster data form, and the multipage of document is spliced into a raster image.This method may further comprise the steps: step 1: select piece size roughly.Piece can be arbitrary shape and size in principle.But usually piece is chosen as rectangular shape.This rectangular dimension can be 4 * 4,8 * 8,16 * 16 or 32 * 32 pixels---decides according to file and picture size, the e-seal size that will embed and desired protection accuracy.Step 2: each piece all is classified as a class in some predetermine class.This classification is used original block data or the index that extracts, is carried out with spatial domain or transform domain from piece.For example, as adopting vectorization method, then piece must be corresponding with a predetermined code book.This also can be considered as classification.For the situation of transform domain method, at first each piece is transformed to cosine transform domain.Can derive texture energy, directivity, fine and closely woven degree and disperse index for each territory.Utilize this 4 indexs, can be block sort---for example---class in 16 classes (16 only for the explanation, but practical application kind more or less).For example, as the blocks of data in cosine transform domain be represented as F (u, v) or F (r, θ), then these 4 indexs can be defined as follows: step 3: an array that documentation summary is defined as or constitutes category label.
Figure A9981682700361
F (0,0)=0 wherein
Figure A9981682700362
Figure A9981682700363
Figure A9981682700364
Wherein Step 4: for the document of wanting verification, file and picture is handled equally, kind parameter (or code book) same in use and the step 2 derives summary.The summary of deriving and the summary of embedding contrast.The category label change list of piece is shown in modification has taken place in these pieces.
Class definition (or code book is determined) is an importance of this method, can define single document or one group of document.As piece is defined with spatial domain, class definition just is similar to code book of vector quantization definition.For example, consider that the class definition in the cosine transform domain is as follows: step 1: select suitable piece size.Collect file and picture, these file and pictures can represent will to this group document of application class definition.Step 2:, each piece is transformed to the index that cosine transform domain also extracts the feature of representing these pieces to all file and pictures.Step 3: corresponding to the modification tolerance limit of purposes and determine the quantity of kind n_cls: kind is many more, and then permissible modification is promptly more little.Step 4: use a kind of clustering algorithm (as K-Mean) that all piece clusters are n_cls bunch.Step 5: carry out class definition for given document image data set, this data acquisition system is made up of a bunch center and a bunch label.2.2.4 the discriminating of summary and key management protection
As mentioned above, the summary of document content is embedded in the e-seal with the watermark form.This watermark is used for the authenticity of verification document content.For this purpose, before being embedded into watermark, summary protects the authenticity of summary by cryptographic means.The description of encrypting notion and term is seen Afred J.Menezes, Paul C.van Oorschot and Scott A.Vanstone show " application encipher technical manual (Handbook of Applied Cryptography) ", are published by CRCPress in 1996.
Three kinds of technology A are below proposed), B) and C):
A) can use the authenticity of summary to protect, symmetric key has been used in the authenticity protection of this summary.S is the shared key between publisher and the verifier.Equally, E (s, summary) is illustrated in the key s encryption of summary down, and D (s, cryptogram) is the deciphering of cryptogram under the key s.
Comprise by the operation that the publisher finished:
I) calculate summary: summary=M (content) according to document content;
Ii) under key, encrypt this summary: cryptogram=E (s, summary);
It is watermarked iii) should to make a summary.
The operation of being finished by verifier comprises:
I) from watermark, extract cryptogram and the cryptogram that this is extracted is expressed as password
Text ';
Ii) sharing this cryptogram of extracting of deciphering under the password: summary '=D (s, password literary composition
This ');
Iii) " calculate summary, summary ": summary according to document content, content "=M (in
Hold ");
Iv) will make a summary ' with summary " compared, if summary ' with make a summary " between " distance
From " in predetermined threshold, with the document as being accepted really; Otherwise refuse
Exhausted the document.
B) can use message authentication check (MAC) to provide protects the authenticity of a document content summary.Make that s is a cipher key shared between publisher and the verifier.The MAC of a document content summary promptly is defined as MAC=H (s, summary), and H () is an one-way hash function here.
Comprise by the operation that the publisher finished:
I) summary of calculating document content: summary=M (content);
Ii) calculate the MAC:MAC=H (s, summary) of summary;
Iii) that MAC is watermarked.
The operation of being finished by verifier comprises:
I) from watermark, extract MAC and it is expressed as MAC ';
Ii) calculate summary according to document content: summary "=M (content ");
" (s's=H makes a summary ") iii) to calculate MAC;
Iv) with MAC ' and MAC " compared, if the two equate, with the document as
Accepted really; Otherwise refusal the document.
C) can use digital signature to provide the authenticity of summary is protected, s and p are that publisher's private cipher key and public-key cryptography is right, are used for certain given digital signature pattern.On a documentation summary, publisher's digital signature can be expressed as SIG=S (s, summary).Two types digital signature pattern is arranged---have the digital signature pattern of appendix and have the digital signature pattern that message recovers.Under the situation of versatility, supposed back one type digital signature pattern in below describing.The example of this quasi-mode is RSA, Rabin and Nyberg-Rueppel.To those skilled in the art, the conclusion of last type of digital signature pattern is simple and easy to bright, supposes that verifier obtains publisher's public-key cryptography in a kind of reliable mode.
Comprise by the operation that the publisher finished:
I) calculate summary: summary=M (content) according to document content;
Ii) calculate the digital signature of summary: SIG=S (s, summary);
Iii) that SIG is watermarked.
The operation of being finished by verifier comprises:
I) from watermark, extract digital signature and it is expressed as SIG ';
Ii) use the publisher public-key cryptography, according to SIG ' recover the summary: the summary '=R
(p, SIG '), R () is the message recovery function of digital signature pattern here;
Iii) calculate summary according to document content: summary "=M (content ");
Iv) will make a summary ' with summary " compared, if summary ' with make a summary " between " distance
From " be within the predetermined threshold, with the document as being accepted really; Otherwise
Refusal the document.
Attention method A) and B) be applicable to the situation that publisher and verifier are trusted each other, and method C) can be used for publisher and the mistrustful each other situation of verifier.
In the file of employed key by document that management organization is formed and stored in watermark embedding (for example address and parameter) and the summary derivation (intrinsic face ...).2.2.5 watermark embeds
Different with the situation that relates to copyright protection, people do not attempt to eliminate watermark usually from the e-seal, because people need provide the evidence of establishing document primitiveness with this.So invisibility and durability are not subject matter just.Therefore, the spatial domain embedding grammar is compared with the spectrum domain technology, and is promptly more desirable.The spatial domain method is simple and big capacity arranged.
The document content summary that has the possible digital watermark of many kinds to can be applicable to the corresponding embodiment of the invention embeds.M.D.Swanson, M.Kobayashi and A.H.Tewfik show " multi-medium data embeds and digital watermark (Multimedia Data Embedding and WatermarkingTechnologies) " (being published in Proc.Of the IEEE the 86th volume No.6 1064-1087 page or leaf in June, 1998) review to digital watermark are provided.
For the required characteristics of watermark embedded technology that are used for the document discriminating are:
1) in order to the big capacity of stores documents summary, the size of this capacity according to practical application and
Different;
2) can stand printing-multiple scanning and handle, this processing be the penman text verification must
Need step.
Embodiments of the invention can use a kind of simple technique that is shown in Fig. 3---but be not limited thereto.Summary 300B is embedded in the zone of e-seal 300A.The segment boundary of watermark region 300B is the border of original image content 300.The border of 300B is recorded in the document files, extracts with the watermark in the convenient checking routine.This border is " relevant with content ", and watermark 300B is closely combined with seal image 300A.Watermark region 300B can have arbitrary shape and be in the optional position according to the practical application needs in principle---as long as this watermark region does not influence the identification of main picture material 300A.
In the method, 300B encodes as the binary modulated of S composition in the HSV color space among Fig. 3 with summary.To other composition or other the possible modulation in other color space also is effective.For the rate of reducing errors can be used error correcting code, serve as the summary coding perhaps with more pixels, as long as the resolution of scanner is enough high, recovering information is a no problem.2.3 photosensitive composition
As seen the e-seal provides direct warning about the document legitimacy protection to people.Engage with visible seal, photosensitive composition provides safeguard protection and easy verification for printing document, and this verification is by as special lenses or comprise that the normalized optical equipment the common existing equipment of photocopier carries out.
Can use the photosensitive composition of arbitrarily big quantity in the embodiments of the invention.Preferably can use a kind of in two kinds of methods, be used for photosensitive composition is embedded document:
1) directly some composition of determining is embedded in the content of document.By in frequency domain detection some " hole ", these compositions can be embedded in these holes and in detected this particular category that this optical lens comes corresponding document through special design thereafter by a kind of optical lens.
2) the visible composition of document can be modulated, make document for along predetermined direction, responsive by increasing resolution or changing certain particular light scanning that the document color carries out.In the case, detector can be logical existing photocopier of a Daepori or scanner.2.4 file structure
Fig. 4 has described the layout of a single page document 400, comprises a content area 420 and two e-seal parts: the logo 410 and 430 (and being preferably a sequence number) of signing.Content area 420 can further be further divided into several regions, and wherein each zone comprises different medium, for example text, figure, form and/or image.2.4.1 with landmark or the framework of doing simple and easy location
But additional frame (frame) 410,420,430 is with the landmark (landmark) as the simple and easy location in content 420 and e-seal zone 410,430.Can use the landmark of other form to replace framework and do not depart from scope of the present invention and spirit.2.4.2 a plurality of parts of e-seal
An e-seal can have many parts.An exemplary is a official documentation 430, and it comprises two parts: the signature of an official documentation header 410 and a tissue and/or seal 430.Document header 410 can comprise the title and the logo of this tissue.The classification of document and sequence number also print in the place near header usually, but this is preferably the part of content 420.Visual information is embedded in the logo image 410 as watermark, is used for protection.In general, the paper document that become effective document must both comprise header, also comprises one or more signatures.Obviously it would be desirable that all images in the e-seal all passes through watermark processing and protects ownership, but and nonessential so.2.4.3 multipage
For a multipage document, the e-seal can be injected each page or leaf.The preferred part that page number (number into current number---total number) is included in the document and regards document content as.2.4.4 the file of authorisation document
A file that comprises essential information is created and stored to every part of authorisation document, be used for further quoting.Comprise the key that hereof information comprises the authenticity protection that is used to make a summary and/or embeds, the size of e-seal is used for the parameter of photosensitive composition, signer's name, or the like.This document is stored by certain management organization or believable third party.The addressable this document of checking routine.3. protection and checking routine 3.1 electronic documents are signed program
Fig. 5 has illustrated and has been the defence program that a electronic document carried out corresponding to first embodiment of the invention.After the someone had started document signature program, this person just need access to your password or biometric information (fingerprint, face etc.) comes to be its e-seal 534 releases.For a given electronic document with single signer, this part electronic document or title E-document 512 are not used for the verification module 510 that previous e-seal is checked, the summary of document content is generated by summary generation module 520---and key can be had, also key can be do not had.If necessary, obtaining a key comes this summary is encrypted.Address and parameter are selected as key 532, offer watermark merge module 530, thereby will make a summary (and watermark embeds the time) embeds e-seal image 534 and supply the usefulness of e-document files 542 discriminatings as a watermark.Can add the landmark that is used for e-seal and the simple and easy location of content.The final module 540 of this program comprises or adds the information that the e-seal is included in also additional landmark in the electronic document 512, is used for verification and printing, so that E-document 542 and the E-document files 544 through differentiating to be provided.
In many signers' occasion, when taking turns to n signer, carry out verification, with the e-seal of confirming that all are previous with verification module 510.This people's additional information is affixed in the document, derives the summary corresponding to this person, and encrypts and embed this summary.Information (additional this person's e-seal) about signature is affixed in the file of this electronic document.
In many application, document content has comprised main contents, classification numbering, and sequence number, other comprises hereof information page number and all.
For the application that requires high safety, it is essential that signer's individual differentiates.This available password, the biometric information as fingerprint or face or smart card are finished.After the individual of success differentiated, system finished following steps: make the release of e-seal image, and sign document, and expense counted this person account.3.2 be used for the checking routine of electronic document
Fig. 6 has illustrated checking routine, with through the electronic document 542 of differentiating, comprise the e-seal and respective electronic file 544 as importing.At first, by module 610 location and these e-seals of verification.With the watermark of extracting and deciphering each e-seal, thereby obtain original digest from the information of this document.To extract out from electronic document and compare with summary that module 620 is extracted corresponding to the synopsis of each e-seal, being within the predetermined threshold then as indifference or difference, verification promptly be successful.In some cases can confirmation request e-seal image with the true ownership of check (e-seal), this is confirmed to be and produces by the copyright protection watermark of extracting that check results 644 finishes in module 630.If check results 644 is "Yes" or " very ", show that promptly electronic document is original after this part discriminating.If check results 644 is "No" or " puppet ", show that promptly this document is not original or counterfeit, and this forgery is positioned at (x, y) position probably.3.3 the printing of electronic document
Control the printing of electronic document 542 by Method of printing shown in Figure 7, to obtain printed copy 734 through differentiating.The legitimacy of electronic document is by inspection module 710 verifications in addition.If verification succeeds is then added a kind of photosensitive composition (preferably having the number of duplicating) by add-on module 720, print the document by module 730 subsequently.The sequence number of printed copy can be appended on the document file and the printed copy.Photosensitive composition is affixed in last signatory's the e-seal, and this e-seal provides the Global Macros of the document that comprises previous signatory e-seal.
Can be only Method of printing by Fig. 7 generate effective printing document.This has just guaranteed that people can not edit and print subsequently this electronic document with any printf.By the use of control printf, promptly available this photosensitive composition and to a great extent protection print the legitimacy of document.
There are some kinds of methods to control printf.Among this embodiment of Fig. 7, because must be through verification before printing, printf is controlled by the each side that has verification power, and this verification is very convenient.It below is the method for two kinds of control printfs.
1) online control: a user prints certain particular electronic document by a secure network registration and request.After having carried out successful user's verification by management organization or believable third party, management organization or believable third party's verification the document and with printf with the website that must data sends to this user.This printf is printed this part document on user's printer.When document was printed, the data division that has printed can carrying out and destroy with print routine.This can finish by progressively removing the memory that contains this data division.
2) verification and print agent: the agency through mandate can have a kind of special printing device.This printing device or be connected to management organization and online, or off line.Under offline condition, data and function are pre-loaded in this equipment.After the user was authorized, equipment promptly printed document.Equipment operation is when off-line state, and process and first method are similar.According to the safe class that equipment had, can be by this equipment storage compartment data and function.3.4 be used to print the check problem of document
Print document three grades of verifications are arranged.As shown in Figure 8, this verification starts from carrying out the printing document 734 of verification and is included in the customizing messages about the document in the document files 544.Difference between the verification of electronic document 644 and paper document 734 is can be by visual examination verification in addition to paper document 734, and paper document can by with electronic document the same manner in addition before the verification, thereby this paper document 734 can be scanned and is converted into number format.The first order is verified as the e-seal visual examination that module 810 is carried out, and the second level is verified as the photosensitive composition verification that module 820 is carried out.Calibration equipment can also be certain simple optical instrument, for example as certain special lenses or the logical photocopier of a Daepori.After the duplicating, some pattern tackle in this photosensitive composition become as seen/sightless.This pattern in to the overview of original print copy 734 distance be invisible/visible.If check results is " OK " and the verification rank can accept, then checking routine can stop at module 810 or 820.
Third level verification is to scan paper document with scan module 830, to convert it back to number format.But belong to its raster data form by scanning obtained digital document, it is different from original electronic document, and in original electronic document, text, figure and form are all encoded in its common mode.Noise and other distortion can append in e-seal image and the image content, even they originally were raster format.Therefore, watermark extractor block 840 and summary extractor block 850 are answered tolerable distortion and form difference.If application program selects to use the selected project as the synopsis, then manually import these selected projects and can and print document 544,734 to electronics the two all obtains very good effect.
Extract after 840 having carried out watermark with key, compare by the original digest of module 850 recorded contents and with the content of extracting from paper document.Do not exceed then verification succeeds of threshold value as indifference or difference, sure check results 854 is provided.
(whether target program 854 should be " check results " by label in PLSCONFM) 4. product/service
Can produce many possible products and service from the embodiment of the invention.Below enumerate two examples.Basic conception can be applicable to other a large amount of similar application.4.1 the transmission of credible copy
At present formal mail and many other reliable documents are sent practically via mail service or the express delivery as federal express delivery.The electronics of the credible copy of the embodiment of the invention is then convenient document is delivered.That is the addressee can receive the credible document of electronics and/or written formats.Two types setting is below described.
First kind of setting relates to sender's mechanism, and this mechanism has authorized identity and set up a computer system, and its functional descriptions is as follows:
1) sender is by editing a electronic document or preparing a electronic document in the enterprising line scanning of a paper document.This sender obtains mandate with the computer system that post-registration enters this mechanism, release this person's e-seal, and sign document, and the document sent to the addressee, illustrate simultaneously whether service provider wishes that the addressee receives the document with electronics and/or written formats;
2) during addressee notified (mechanism to mechanism or mechanism to the individual) or the addressee ask a document (label, ticket, communique, receipt ...) time, this addressee promptly registers the system that enters the sender, obtains this electronic document, and/or prints paper document.When document is printed, call the printf from the sender system, additional sender's e-seal and photosensitive composition are printed a believable copy.
Second kind of setting relates to the document that sends by a service centre:
1) sender is by editing a electronic document or preparing a electronic document in the enterprising line scanning of a paper document.This sender enters a service centre with post-registration, discerned, and release this person's e-seal, sign document, and the document sent to the addressee, illustrate simultaneously whether service provider wishes that the addressee receives the document with electronics and/or written formats;
2) during addressee notified (mechanism to mechanism or mechanism to the individual) or addressee when asking a document (label, ticket, communique, receipt ...), this addressee promptly registers and enters this service centre, obtains this electronic document, and/or prints paper document.When document is printed, call the printf from this service centre, additional sender's e-seal and photosensitive composition are printed a believable copy.In addition, service centre also can increase notarization seal and a photosensitive composition proves this credible copy.4.2 confirm and notarization
At present to official documentation and file---as diploma, marriage certificate and official document---affirmation and the notarization all carry out in writing.For example application enters Asia university student that an American university pursues a postgaduate program and just has to obtain all are issued by its university management mechanism oneself certificate and official document, and drops by public postal delivery system.Distinct issues are exactly that many universities are arranged in the world.Allow an official who is responsible for approval judge that the legitimacy of these documents also is difficult in addition.Also have, this student does not also know whether the own document of being dropped is acceptable.
Affirmation here and notarization are applicable to all types of documents, comprise---but being not limited to---birth certificate, marriage certificate, diploma and official's mail.In below describing with diploma as an example.The embodiment of the invention is devoted to be used to confirm/notarize the structure and the technology of service centre's operation.
910 pairs of document publisher 930 of service centre shown in Figure 9 (for example student take one's degree university), the document owner 920 (graduate) and document addressee 940 (university that higher degree is majored in this student's application) provide online service.For various requests, process is as follows:
The first, one owner 920 by service centre 910 to shown in publisher's 930 a electronics diplomas of request and finish the following step:
1) owner 920 is registered on the webpage of this service centre 910, does not then finish registration as finishing as yet, and fills in the request form;
2) if service centre 910 should ask to communicate by letter with publisher 930 and arrange between service centre 910 and the publisher 930 service chaining---this links not ready as yet;
3) publisher 930 links to each other with service centre 910, and that owner 920 is issued a electronics diploma, and by service centre 910 this certificate is sent to this owner 920;
4) service centre 910 preserves the record of this certificate, and this record is collected in the process of issuing and is enough to be used in the verification service;
5) owner 920 can select to preserve this part e-certificate, or the storage box of renting a safety in service centre 910 is preserved certificate.
The second, a kind of optional mode is taken a paper document (diploma) service centre 910 to and is asked the digital certificates service for the owner 920, and this comprises the following steps:
1) legitimacy of service centre 910 and original publisher 930 this paper document of verification on its capacity is converted to electronic format with this paper document, signs this electronic version and the document is specified confidence levels.For example, as with original publisher carry out verification then this confidence levels be height;
2) service centre 910 preserves the record of this certificate;
3) owner 920 can select to preserve this part e-certificate, or the storage box of renting a safety in service centre 910 is preserved certificate.
The three, one owner 920 (student) request sends to an addressee 940 (university that higher degree is majored in this student's application) with a electronic document (diploma), may further comprise the steps:
1) this owner 920 is registered on the webpage of service centre 910 and fills in the request form;
2) this service centre's this electronic document of 910 verifications and with e-seal and the safety instruction (confidence levels) of the document with service centre sends to addressee 940;
This owner 920 of condition notification when 3) service centre 910 receives this electronic document with addressee 940.
The 4th, a certainly can ask document legitimacy verification service, may further comprise the steps:
1) this this service of side's registration;
2) this side after the registration is registered on the webpage of service centre 910, and submits this electronic document;
3) service centre 910 checks the record of the document and carries out verification.As no record, then service centre 910 and publisher 930 get in touch carrying out verification, and subsequently with the e-seal of this service centre and safety instruction together, are added in the document;
4) service centre 910 preserves the record of the document and this electronic document loopback is given this side of registration.
The 5th, request is received from certain owner 910 or the opposing party by service centre 910, prints the hard copy of a electronic document.
1) this user will be to these service centre's 910 registrations;
2) this user is registered on the webpage of service centre 910, and submits this electronic document;
3) service centre 910 finishes the verification to this electronic document, and the document is specified confidence levels, and prints a have the e-seal at this center and a kind of copy of dedicated optical sensitive ingredient.
The 6th, service centre 910 receives about the request of a printed copy legitimacy verification, may further comprise the steps:
1) service centre 910 comes the validity of each e-seal of verification by visual examination;
2) validity of service centre's 910 verification photosensitive compositions;
3) service centre 910 is scanned on this paper document, and comes verification the document legitimacy by the ownership (words if necessary) of check document content summary and e-seal.
In the 6th process, service centre 910 only saves as the required document record of verification service.When signing the document, generate this record and collect data when the service that provides by service centre 910 is provided.That is service centre 910 does not preserve the copy of entire document.By arrangement like this, publisher 920 management organization has promptly obtained respecting fully and having protected this possessory privacy.When certain user was chosen in service centre 910 and rents a storage box, this storage box was protected by this user.Service centre 910 there is no the content that any power removes to visit this storage box.
The owner 920 of certificate can select this e-certificate is directly sent to anyone.
Service centre 910 is easily, and this has some reasons:
1) many document publisher is arranged in the world, then seldom or fully do not have available information about publisher and those documents that is published.As a result, almost there is not effective means to carry out the legitimacy verification;
2) allow the owners deliver paper document and provide not only time-consuming but also expensive about the official of these document legitimacies proof;
3) allow each publisher that verification service about certificate and other document legitimacy is provided, this practice efficient is not high.4.3 electronic checkout
Many people use and preference is paid its bill with check or negotiable bill.Relate to each side and be requestee, payee, requestee's bank, payee's bank and service centre.The eCheck service is as follows:
At first the requestee draws a cheque, and may further comprise the steps:
A) this payment people is for obtaining service to service centre's 910 registrations;
B) this requestee is registered to service centre by the webpage at this center;
C) this requestee uses the mode identical with bank (person identfication number, fingerprint, face or other) to fill in form of payment.This form comprises the information about requestee bank and bank account, identification card number, payee's name, the amount of money and the date of payment;
D) service centre 910 is linked to requestee bank to carry out verification;
E) service centre 910 is both with this requestee, also sign this check and this check is sent to the payee with the e-seal of service centre;
F) after this payee collects this check, the 910 advice and pay people of service centre;
G) requestee can select to print this check with the printf that service centre 910 is provided, and gives the payee with this check in person.This check that prints has the security performance of requestee bank, and requestee's signature from the seal and the photosensitive composition of service centre 910, and is believable.
Secondly, the payee cashes this check, may further comprise the steps: this payee is to service centre's 910 registrations;
A) this payee is registered on the webpage of this service centre;
B) this payee signs in on the webpage of this service centre;
C) this payee submits this eCheck to service centre 910;
D) in addition, this payee also can send to this check payee's bank, and this bank reads any information needed and this information is sent to service centre 910 from this check scanning;
E) service centre 910 comes this check of verification with the original form that the requestee was filled in;
F) service centre 910 sends to this check and check results payee's bank;
G) payee's bank accept this check and on check the indicated date of payment handle transfer;
H) under the situation of this check of requestee's bank dishonor, this requestee bank signs this check and refuses to pay.Service centre 910 is together with the advice and pay people that refuses a cheque of this signature, payee, and payee's bank;
I) under any circumstance, if the requestee, requestee bank, payee and payee bank require printed copy, and service centre promptly comes this check of verification with original form, adds to be the photosensitive composition of this check appointment, and prints written copy.4.4 be used to have the service centre of many signers' security document
A plurality of signers for document, suppose that all signatures registered to the system operator of service centre 910 or mechanism per capita, service centre 910 has obtained public key certificate (public key certificate) for this business, and user (signer, the addressee ...) obtained themselves public key certificate.
The situation of the contract between some sides, this just relates to following steps:
A) each side's contact is to obtain the last manuscript that all each side are all agreed.Service centre 910 adds a seal freezing the document, and the document is sent to one of them signer to begin signature;
B) all each side register to service centre 910, prepare signature;
C) wherein a side signs this part document and the document is sent to next side, so proceeds, till all each side have all signed the document.The validity of signature Automatic Program verification service centre seal is to guarantee that this version of getting the permission is not changed.Generate the record of the document during the signature process in service centre 910;
D) in addition, also can make all each side sign this part document simultaneously.That is after signature for the first time, each signer sends it back service centre 910 with document, and service centre 910 is distributed to each side with the document so that signature is for the second time so proceeded.In the case, the copy number of institute's sign document equates with signer's number.Each copy has different signature orders, but has identical validity;
E) copy of being signed is preserved by each signer.These signers can select to rent storage box from service centre 910 and preserve and preserve its copy safely;
When F) obtaining asking, service centre's 910 verifications are also printed a written copy of the document, and this copy has service centre 910 and is a kind of photosensitive composition that the document generated.This photosensitive composition engages with last signer's e-seal.
A official documentation there is a plurality of signers' occasion, can uses the system server of certain mechanism but not a service centre and may further comprise the steps:
A) generate a official documentation (for example design documentation of a building) by a proponent;
B) this proponent's registration enters this system server.This proponent signs with its private cipher key and the document is sent to the next man to carry out verification/approval by system server;
C) this system server notifies the next man's the document to arrive, and this person signs this part document;
D) this system server generates the record of the document and stores this record in order to further verification;
E) document of signing at last is stored in the archive file of this mechanism;
F) receive when request, the system server verification is also printed a written copy of the document.This printed copy has the photosensitive composition that appends to the document.This photosensitive composition is from system server, designated this particular document that is used for, and engage with last signer's e-seal.
The embodiment of the invention preferably uses all-purpose computer to be implemented.Particularly Fig. 1 is to the processing of Fig. 9 or functionally can run on the form of software on the computer or computer program and implemented.The method or the treatment step of the legitimacy of protection electronic document and corresponding printing document are finished by the instruction in the software, and this software is moved by computer.This software can be embodied as one or more modules that are used to finish this treatment step.A module is the part of a computer program, and it finishes a specific function or correlation function usually.In addition, as described below, the functional hardware parts that a module also can be encapsulation use with other assembly or module.
Particularly this software can be stored in a kind of computer can with or readable medium in, comprise floppy disk, hard disk, magneto optical disk, compact disc-ROM, non-volatile memory device tape or other any amount, well-known to those skilled in the art.This software is preferably from this computer-usable medium computer of packing into, and moved by this computer subsequently.Computer program comprises the computer-usable medium with this software or is recorded in computer program on these medium that this program can be moved by a computer.In computer, preferably enable a kind of convenience system that is used for the virtual goods transaction with this computer program.
This computer system can be via a communication interface, use suitable communication channel---for example as adjusting the demodulator communication channel, and computer network, or the like---and be connected in one or more computer.This computer network can comprise Local Area Network, wide area network (WAN), corporate intranet, and/or the Internet.
Can use a large amount of Computer Systems Organizations and not depart from scope and spirit of the present invention.But the computer of practical application embodiment comprises IBM-PC/AT or compatible, the Macintosh of PC (TM) series, Sun Sparcstation (TM), work station or the like.But the above only is the example of the computer type of the practical application embodiment of the invention.
Usually, the method for embodiment is as software or program and exist, and this software or program are recorded on the hard disk as computer-readable media, and reads and control with computer system.For instance, this program coding can be offered the user on a compact disc-ROM or floppy disk in some cases, other method is to read from network by an adjustment modem device that is connected on the computer by the user.Also have in addition, this software also can be from other computer-readable media this computer system of packing into, this class readable media comprises tape, read-only memory or integrated circuit, magneto optical disk, radio between this computer and the miscellaneous equipment or infrared transmission channel, the computer-readable card as the pcmcia card, and comprised that electronic mail transmits and be recorded in the Internet and the corporate intranet of the information of Web website and similar website.The above only is the example of related computer readable medium.Other computer-readable media be can use and scope of the present invention and spirit do not departed from.
Electronic document and printing document that its legitimacy is protected have so promptly been described, and a kind of method that is used to protect electronics and prints the document legitimacy, a kind of device, a kind of computer program and a kind of system.Although only described a small amount of embodiment, it will be apparent to those skilled in the art that in view of this description, can carry out a large amount of variations and change and do not depart from scope of the present invention and spirit.

Claims (95)

1. electronic document that is used to duplicate corresponding printing document, this printing document has the legitimacy of described protected electronic documents, and described printing document is the printing edition of described electronic document, and described electronic document comprises:
The original document content of electronic format;
The synopsis of the described content of described original document of electronic format;
Be used to differentiate described electronic format original document E-seal or claim the e-seal, described e-seal comprises the visible seal of a management organization and is embedded in described synopsis in the described visible seal; And
Append to described sensitization or the photosensitive composition of being differentiated document, be used for printing with a kind of believable print routine, described sensitization or photosensitive composition have comprised information, are used in the copy of described printing document or duplicating or changing of the change version described printing document of indication.
2. electronic document as claimed in claim 1 further comprises watermark in described e-seal, be used for described synopsis is embedded described visible seal.
3. electronic document as claimed in claim 2 was wherein encrypted described synopsis before described visible seal is carried out watermark processing.
4. electronic document as claimed in claim 3, in embedding address, shape and the border of wherein said watermark, at least one of them is a key, be used for described synopsis is encrypted, described e-seal is made watermarked handle, or both be used for described synopsis encryption also is used for described e-seal is done the watermarked processing.
5. electronic document as claimed in claim 1, wherein said synopsis are the compression expression of described original document, by from comprising that selected step generates following one group:
Use a kind of secure hash program to come the described content of hash;
Select the key project of described content; And
The feature of the described content of extracting.
6. electronic document as claimed in claim 1, wherein said synopsis is the compression expression of described original document, generate by the block mode summary derivation that is applied to described content, each piece has preliminary dimension and shape, described synopsis comprises a label array, and each label all is relevant to the kind of described content relevant block.
7. electronic document as claimed in claim 1, wherein said visible seal comprise following content at least one of them: document header, logo or figure, graphic symbol and signature.
8. electronic document as claimed in claim 1, wherein said sensitization or photosensitive composition comprise the sequence number that is used for described electronic document.
9. electronic document as claimed in claim 1, wherein said electronic document comprises:
Two pages of described content or multipage and multimedia messages be among the two, at least one of them; And
One or more landmarks, be used for locating described content, described e-seal and other document component at least one of them.
10. electronic document as claimed in claim 1 further comprises second e-seal, and this second e-seal has:
To described second e-seal, content comprises the described content of described original document and described (first) e-seal; And
The visible seal of a management organization and a synopsis, this synopsis are relevant to the described content that is embedded into described second the e-seal in the described visible seal.
11. electronic document as claimed in claim 1 further comprises the invisible watermark that is embedded in the described e-seal, is used to protect the ownership of this management organization that has described e-seal.
12. from the printing document that electronic document duplicates, this electronic document has the legitimacy of described protected printing document, described printing document is the printing edition of described electronic document, and described printing document comprises:
The reproducting content of original document;
E-seal or claim the e-seal is used for differentiating the described original document that duplicates at described printing document, and described e-seal comprises the visible seal of management organization and is embedded in the synopsis of the described content of the described original document in the described visible seal; And
A kind of sensitization or photosensitive composition, this kind composition is replicated in described through in the document of differentiating with a kind of credible print routine, described sensitization or photosensitive composition have comprised information, are used in the copy of described printing document or duplicating or revising of the revision described printing document of indication.
13. printing document as claimed in claim 12 has further comprised a watermark in the described e-seal that duplicates, so that described synopsis is embedded in the described visible seal.
14. printing document as claimed in claim 13 was wherein encrypted described synopsis before described visible seal is carried out watermark processing.
15. printing document as claimed in claim 14, in embedding address, shape and the border of wherein said watermark, at least one of them is a key, be used for described synopsis is encrypted, described e-seal is made watermarked handle, or both be used for described synopsis encryption also is used for described e-seal is done the watermarked processing.
16. printing document as claimed in claim 12, wherein said synopsis are the compression expression of described original document, by from comprising that selected step generates following one group:
Use a kind of secure hash program to come the described content of hash;
Select the key project of described content; And
The feature of the described content of extracting.
17. printing document as claimed in claim 12, wherein said synopsis is the compression expression of described original document, generate by the block mode summary derivation that is applied to described content, each piece has preliminary dimension and shape, described synopsis comprises a label array, and each label all is relevant to the kind of described content relevant block.
18. printing document as claimed in claim 12, the wherein said visible seal that duplicates comprise following content at least one of them: document header, logo or figure, graphic symbol and signature.
19. printing document as claimed in claim 12, wherein said sensitization or photosensitive composition comprise the sequence number that is used for described electronic document.
20. printing document as claimed in claim 12, wherein said electronic document comprises:
Two pages of described content or multipage and multimedia messages be among the two, at least one of them; And
One or more landmarks, be used for locating described content, described e-seal and other document component at least one of them.
21. printing document as claimed in claim 12 further comprises second e-seal that duplicates, this second e-seal has:
To described second e-seal, content comprises the described content of described original document and described (first) e-seal; And
The visible seal of a management organization and a synopsis, this synopsis are relevant to the described content that is embedded into described second the e-seal in the described visible seal.
22. printing document as claimed in claim 12 further comprises the invisible watermark that is embedded in the described e-seal, is used to protect the ownership of this management organization that has described e-seal.
23. a method of protecting electronic document and corresponding printing document legitimacy, described printing document is the printing edition of described electronic document, said method comprising the steps of:
Original document to electronic format generates synopsis;
With E-seal or claim the original document that the e-seal is differentiated described electronic format, described e-seal comprises the visible seal of management organization and is embedded in described synopsis in the described visible seal; And
A kind of sensitization or photosensitive composition are appended in the described document through differentiating, so that print with a kind of believable print routine, described sensitization or photosensitive composition have comprised information, are used in the copy of described printing document or duplicating or revising of the revision described printing document of indication.
24. method as claimed in claim 23, wherein said discriminating step comprise with described synopsis described visible seal is carried out watermark processing, described synopsis is embedded the step of described visible seal.
25. method as claimed in claim 24, wherein said discriminating step are included in described visible seal is carried out the step that watermark processing is encrypted described synopsis before.
26. method as claimed in claim 25, in embedding address, shape and the border of wherein said watermark, at least one of them is a key, be used for described synopsis is encrypted, described e-seal is made watermarked handle, or both be used for described synopsis encryption also is used for described e-seal is done the watermarked processing.
27. method as claimed in claim 23, wherein said synopsis are the compression expression of described original document, by from comprising that selected step generates following one group:
Use a kind of secure hash program to come the described content of hash;
Select the key project of described content; And
The feature of the described content of extracting.
28. method as claimed in claim 23, wherein said synopsis is the compression expression of described original document, generate by the block mode summary derivation that is applied to described content, each piece has preliminary dimension and shape, described synopsis comprises a label array, and each label all is relevant to the kind of described content relevant block.
29. method as claimed in claim 23, wherein said visible seal comprise following content at least one of them: document header, logo or figure, graphic symbol and signature.
30. method as claimed in claim 23, wherein said sensitization or photosensitive composition comprise the sequence number that is used for described electronic document.
31. method as claimed in claim 23, wherein said electronic document comprises:
Two pages of described content or multipage and multimedia messages be among the two, at least one of them; And
One or more landmarks, be used for locating described content, described e-seal and other document component at least one of them.
32. method as claimed in claim 23 further comprises second e-seal, this second e-seal has:
To described second e-seal, content comprises the described content of described original document and described (first) e-seal; And
The visible seal of a management organization reaches-part synopsis, and this synopsis is relevant to the described content that is embedded into described second the e-seal in the described visible seal.
33. method as claimed in claim 23 further comprises an invisible watermark is embedded in the described e-seal, has the proprietorial step of this management organization of described e-seal with protection.
34. a device of protecting electronic document and corresponding printing document legitimacy, described printing document is the printing edition of described electronic document, and described device comprises:
Be used for the original document of electronic format is generated the device of synopsis;
Be used for differentiating with E-seal or title e-seal the device of the original document of described electronic format, described e-seal comprises the visible seal and the described synopsis that is embedded in the described visible seal of management organization; And
A kind of sensitization or photosensitive composition appended in the described document through differentiating so that the device that prints with a kind of believable print routine, described sensitization or photosensitive composition have comprised information, are used in the copy of described printing document or duplicating or revising of the revision described printing document of indication.
35. device as claimed in claim 34, wherein said identification device comprise with described synopsis described visible seal is carried out watermark processing, described synopsis is embedded the device of described visible seal.
36. device as claimed in claim 35, wherein said identification device are included in described visible seal is carried out the device that watermark processing is encrypted described synopsis before.
37. device as claimed in claim 36, in embedding address, shape and the border of wherein said watermark, at least one of them is a key, be used for described synopsis is encrypted, described e-seal is made watermarked handle, or both be used for described synopsis encryption also is used for described e-seal is done the watermarked processing.
38. device as claimed in claim 34, wherein said synopsis are the compression expression of described original document, by from comprising that selected device generates following one group:
Use a kind of secure hash program to come the device of the described content of hash;
Be used to select the key item destination device of described content; And
The device of feature of described content is used to extract.
39. device as claimed in claim 34, wherein said synopsis is the compression expression of described original document, the device of deriving by the block mode summary that is used for described content generates, each piece has preliminary dimension and shape, described synopsis comprises a label array, and each label all is relevant to the kind of described content relevant block.
40. device as claimed in claim 34, wherein said visible seal comprise following content at least one of them: document header, logo or figure, graphic symbol and signature.
41. device as claimed in claim 34, wherein said sensitization or photosensitive composition comprise the sequence number that is used for described electronic document.
42. device as claimed in claim 34, wherein said electronic document comprises:
Two pages of described content or multipage and multimedia messages be among the two, at least one of them; And
One or more landmarks, be used for locating described content, described e-seal and other document component at least one of them.
43. device as claimed in claim 34 further comprises second e-seal, this second e-seal has:
To described second e-seal, content comprises the described content of described original document and described (first) e-seal; And
The visible seal of a management organization and a synopsis, this synopsis are relevant to the described content that is embedded into described second the e-seal in the described visible seal.
44. device as claimed in claim 34 further comprises an invisible watermark is embedded in the described e-seal, has the proprietorial device of this management organization of described e-seal with protection.
45. computer program with computer-usable medium; this computer-usable medium has embedding computer-readable program coding wherein; be used to protect the legitimacy of electronic document and corresponding printing document; described printing document is the printing edition of described electronic document, and described computer program comprises:
Be used for the original document of electronic format is generated the computer-readable program coding of synopsis;
Be used for differentiating with E-seal or title e-seal the computer-readable program coding of the original document of described electronic format, described e-seal comprises the visible seal and the described synopsis that is embedded in the described visible seal of management organization; And
A kind of sensitization or photosensitive composition appended in the described document through differentiating so that the computer-readable program that prints with a kind of believable print routine is encoded, described sensitization or photosensitive composition have comprised information, are used in the copy of described printing document or duplicating or revising of the revision described printing document of indication.
46. computer program as claimed in claim 45, the wherein said computer-readable program coding that is used to differentiate comprises and being used for described synopsis, come described visible seal is carried out watermark processing, thereby described synopsis is embedded the computer-readable program coding of described visible seal.
47. computer program as claimed in claim 46, the wherein said computer-readable program coding that is used to differentiate has comprised and being used for before described visible seal carries out watermark processing, the computer-readable program that described synopsis is encrypted has been encoded.
48. computer program as claimed in claim 47, in embedding address, shape and the border of wherein said watermark, at least one of them is a key, be used for described synopsis is encrypted, described e-seal is made watermarked handle, or both be used for described synopsis encryption also is used for described e-seal is done the watermarked processing.
49. computer program as claimed in claim 45, wherein said synopsis are the compression expression of described original document, by generating from comprising that selected computer-readable program is encoded following one group:
Use a kind of secure hash program to come the computer-readable program coding of the described content of hash;
Be used to select the computer-readable program coding of the key project of described content; And
The computer-readable program coding of feature of described content is used to extract.
50. computer program as claimed in claim 45, wherein said synopsis is the compression expression of described original document, the computer-readable program coding of deriving by the block mode summary that is used for described content generates, each piece has preliminary dimension and shape, described synopsis comprises a label array, and each label all is relevant to the kind of described content relevant block.
51. computer program as claimed in claim 45, wherein said visible seal comprise following content at least one of them: document header, logo or figure, graphic symbol and signature.
52. computer program as claimed in claim 45, wherein said sensitization or photosensitive composition comprise the sequence number that is used for described electronic document.
53. computer program as claimed in claim 45, wherein said electronic document comprises:
Two pages of described content or multipage and multimedia messages be among the two, at least one of them; And
One or more landmarks, be used for locating described content, described e-seal and other document component at least one of them.
54. computer program as claimed in claim 45 further comprises second e-seal, this second e-seal has:
To described second e-seal, content comprises the described content of described original document and described (first) e-seal; And
The visible seal of a management organization and a synopsis, this synopsis are relevant to the described content that is embedded into described second the e-seal in the described visible seal.
55. computer program as claimed in claim 45 further comprises an invisible watermark is embedded in the described e-seal, has the proprietorial computer-readable program coding of this management organization of described e-seal with protection.
56. a system that utilizes network to protect the legitimacy of electronic document and corresponding printing document, described printing document is the printing edition of described electronic document, and described system comprises:
Be used for the original document of electronic format is generated the device of synopsis;
Be used for differentiating with E-seal or title e-seal the device of the original document of described electronic format, described e-seal comprises the visible seal and the described synopsis that is embedded in the described visible seal of management organization; And
A kind of sensitization or photosensitive composition appended in the described document through differentiating so that the device that prints with a kind of believable print routine, described sensitization or photosensitive composition have comprised information, are used in the copy of described printing document or duplicating or revising of the revision described printing document of indication.
57. system as claimed in claim 56, wherein said identification device comprises and is used for described synopsis described visible seal being carried out watermark processing, described synopsis embedded the device of described visible seal.
58. system as claimed in claim 57, wherein said identification device has comprised and being used for before described visible seal carries out watermark processing, with the device of described synopsis encryption.
59. system as claimed in claim 58, wherein said visible seal comprise following content at least one of them: document header, logo or figure, graphic symbol and signature.
60. system as claimed in claim 56, wherein said synopsis is the compression expression of described original document, by from comprising that selected device generates following one group:
Use a kind of secure hash program to come the device of the described content of hash;
Be used to select the key item destination device of described content; And
The device of described content characteristic is used to extract.
61. system as claimed in claim 56, wherein said synopsis is the compression expression of described original document, the device of deriving by the block mode summary that is used for described content generates, each piece has preliminary dimension and shape, described synopsis comprises a label array, and each label all is relevant to the kind of described content relevant block.
62. system as claimed in claim 56, wherein said visible seal comprise following content at least one of them: document header, logo or figure, graphic symbol and signature.
63. system as claimed in claim 56, wherein said sensitization or photosensitive composition comprise the sequence number that is used for described electronic document.
64. as the system of claim 56, wherein said electronic document comprises:
Two pages of described content or multipage and multimedia messages be among the two, at least one of them; And
One or more landmarks, be used for locating described content, described e-seal and other document component at least one of them.
65. system as claimed in claim 56 further comprises second e-seal, this second e-seal has:
To described second e-seal, content comprises the described content of described original document and described (first) e-seal; And
The visible seal of a management organization and a synopsis, this synopsis are relevant to the described content that is embedded into described second the e-seal in the described visible seal.
66. system as claimed in claim 56 further comprises a kind of believable printing or copying equipment, is used to print the described document through differentiating that comprises described sensitization or photosensitive composition.
67. as the described system of claim 66, wherein said credible printing or copying equipment can be remote apart via one or more assemblies of described access to netwoks and position and described system.
68. system as claimed in claim 56 has further comprised device, is used for invisible watermark is embedded the ownership that described e seal is protected this management organization that has described e-seal.
69. a system that is used to protect the legitimacy of electronic document and corresponding printing document, described system comprises:
Be used to generate the device of electronic document through differentiating, described electronic document through differentiating comprises the content of electronic format original document, be used to differentiate the E-seal of described electronic format original document or claim the e-seal, described e-seal comprises the visible seal of a management organization and is embedded in the interior described synopsis of described visible seal;
Be used for generating a kind of sensitization or photosensitive composition that appends to described through the discriminating electronic document, so that the device that prints with a kind of credible print routine, described sensitization or photosensitive composition have comprised information, are used in the copy of described printing document or duplicating or revising of the revision described printing document of indication;
The device that is used for the described legitimacy of verification through differentiating electronic document; And
Device, it is according to described calibration equipment, and it is described through discriminating electronic document and described sensitization or photosensitive composition to use described credible print routine to print, thereby a printing document through differentiating is provided.
70. as the described system of claim 69, wherein said legitimacy calibration equipment comprised be used to contrast be included among described one or more e-seals in differentiating electronic document, a corresponding e-seal and the device of a watermarked synopsis of verification.
71. as the described system of claim 70, wherein said legitimacy calibration equipment further comprises and being used for described through differentiating the device of electronic document location and the one or more e-seals of verification.
72. as the described system of claim 70, wherein said legitimacy calibration equipment further comprises the device that is used for the validity of each among the one or more e-seals of verification, these one or more e-seals are included in described in differentiating electronic document.
73., further comprise as the described system of claim 69:
Based on described electronic document and the device of the described legitimacy protection of verification through differentiate printing document.
74., wherein be used for the described described device of verification and further comprise through differentiating the legitimacy protection of printing document as the described system of claim 73:
Be used among described one or more e-seal, the device of the visual examination of the described visible seal of each e-seal;
It is described through differentiating the device of the described photosensitive composition of printing document to be used for verification;
Be used to scan described through differentiate printing document, and among described one or more e-seals, from the extract device of a watermark of each e-seal; And
Be used for from extract a synopsis and of each described watermark described synopsis of the extracting device of verification in addition.
75. a method that is used to protect the legitimacy of electronic document and corresponding printing document said method comprising the steps of:
The electronic document of generation through differentiating, described electronic document through differentiating comprises the content of the original document of electronic format, be used to differentiate the E-seal of described electronic format original document or claim the e-seal, described e-seal comprises the visible seal of a management organization and is embedded in the interior synopsis of described visible seal;
Generate a kind of described sensitization or photosensitive composition in differentiating electronic document that append to, so that print with a kind of credible print routine, described sensitization or photosensitive composition have comprised information, are used in the copy of described printing document or duplicating or revising of the revision described printing document of indication;
Verification is described through differentiating the legitimacy of electronic document;
According to described checking procedure, it is described through discriminating electronic document and described photosensitive composition to use described credible print routine to print, thereby a printing document through differentiating is provided.
76. as the described method of claim 75, wherein said legitimacy checking procedure comprises that contrast is included among described one or more e-seals in differentiating electronic document, a corresponding e-seal and the step of a watermarked synopsis of verification.
77. as the described method of claim 76, wherein said legitimacy checking procedure further is included in the described also step of the one or more e-seals of verification of locating in differentiating electronic document.
78. as the described method of claim 76, wherein said legitimacy checking procedure further comprises the step of the validity of each among the one or more e-seals of verification, these one or more e-seals are included in described in differentiating electronic document.
79., further comprise based on described electronic document and verification is described through differentiating the step of the legitimacy protection of printing document as the described method of claim 75.
80. as the described method of claim 79, wherein the described described step through differentiating the legitimacy protection of printing document of verification further may further comprise the steps:
For among described one or more e-seals, each described visible seal carries out visual examination;
Verification is described through differentiating the described photosensitive composition of printing document;
Scan described through differentiate printing document, and among described one or more e-seals, from the watermark of extracting of each e-seal; And
From each described watermark, extract a synopsis and to the verification in addition of described synopsis of extracting.
81. the computer program with computer-usable medium, this computer-usable medium have embedding computer-readable program coding wherein, are used to protect the legitimacy of electronic document and corresponding printing document, described computer program comprises:
Be used to generate through differentiating the computer-readable program coding of electronic document, described electronic document through differentiating comprises the content of electronic format original document, be used to differentiate the E-seal of described electronic format original document or claim the e-seal, described e-seal comprises the visible seal of a management organization and is embedded in the interior synopsis of described visible seal;
Generate and a kind ofly append to sensitization in differentiating electronic document or photosensitive composition so that the computer-readable program that prints with a kind of believable print routine is encoded, described sensitization or photosensitive composition have comprised information, are used in the copy of described printing document or duplicating or revising of the revision described printing document of indication;
The computer-readable program coding that is used for the described legitimacy of verification through differentiating electronic document;
According to the described computer-readable program coding that is used for verification, it is described through discriminating electronic document and described sensitization or photosensitive composition to use described credible print routine to print, thereby the computer-readable program coding of a printing document through differentiating is provided.
82. as the described computer program of claim 81, the wherein said computer-readable program coding that is used for the verification legitimacy comprised be used to contrast be included among described one or more e-seals in differentiating electronic document, a corresponding e-seal and the computer-readable program coding of a watermarked synopsis of verification.
83. as the described computer program of claim 82, the wherein said computer-readable program coding that is used for the verification legitimacy further comprises and being used for described through differentiating the computer-readable program coding of electronic document location and the one or more e-seals of verification.
84. as the described computer program of claim 82, the wherein said computer-readable program coding that is used for the verification legitimacy further comprises the computer-readable program coding that is used for the validity of each among the one or more e-seals of verification, and these one or more e-seals are included in described in differentiating electronic document.
85., further comprise as the described computer program of claim 81:
Based on described electronic document and the computer-readable program coding of the described legitimacy protection of verification through differentiate printing document.
86. as the described computer program of claim 85, the wherein said computer-readable program coding that is used for the verification legitimacy further comprises:
Be used among described one or more e-seal, the computer-readable program coding of the visual examination of the described visible seal of each e-seal;
It is described through differentiating the computer-readable program coding of the described photosensitive composition of printing document to be used for verification;
Be used to scan described through differentiate printing document, and among described one or more e-seals, from the extract computer-readable program coding of a watermark of each e-seal; And
Be used for from extract a synopsis and of each described watermark described synopsis of the extracting computer-readable program coding of verification in addition.
87. a method of delivering credible document via network said method comprising the steps of:
Foundation is in the secure communications links between one or more locational each side;
The identity of verification each side;
The device that makes side signature original document is provided;
The protection electronic format by the legitimacy of sign document, the described protected content that is comprised the electronic format original document by sign document, the synopsis of the described content of described electronic format original document, and be used to differentiate the E-seal of described electronic format original document or claim the e-seal that described e-seal comprises the visible seal and the described synopsis that is embedded in the described visible seal of management organization;
From being positioned at the transmit leg of primary importance, with the shielded recipient who is sent to the second place that is positioned at described network by the signature electronic document of portion;
With regard to the described protected electronic documents that is sent out, notify described recipient;
Described second remote location at described network receives the described protected electronic documents that is sent out; And
The receipt of the described protected electronic documents that is sent out is sent to the transmit leg that is positioned at described primary importance.
88., further may further comprise the steps as the described method of claim 87:
In the legitimacy of the described protected electronic documents that is sent out of the described second remote location verification of described network, with the legitimacy of the document guaranteeing to print;
A kind of sensitization or photosensitive composition are appended in the described document through differentiating, so that print with a kind of believable print routine, described sensitization or photosensitive composition have comprised information, are used in the copy of described printing document or duplicating or revising of the revision described printing document of indication; And
Use a kind of credible print routine to print the copy of described protected electronic documents.
89., be the affirmation/notarization method that may further comprise the steps further as the described method of claim 87:
Foundation has publisher, the owner and the addressee's of the document secure network;
For the owner obtains a electronic document and is credit explanation of the document appointment;
The credible copy of the document is delivered to this addressee.
90. as the described method of claim 89, further comprise the step that the electronic security(ELSEC) storage box is provided, this electronic security(ELSEC) storage box is used for the storage of digital certificates.
91., be the electronic checkout method of commerce that may further comprise the steps further as the described method of claim 87:
Foundation from the service centre to payee, the secure network link of requestee and one or more associated bank;
Sign eCheck and described check is sent to this payee, described check is the described electronic document of being signed;
For this payee cashes described check;
Clear this transaction; And
If conforming to rule, this check do not refuse to pay.
92., be the method that has being used to of may further comprise the steps many signatories' document signature as the described method of claim 87:
Set up the secure network link between service centre and the signer;
Freeze the version that reaches an agreement of described electronic document; And
Sign described electronic document in the mode of serial or parallel.
93., further comprise the step of using a kind of scanning imaging system the original document of described layout to be converted to the original document of described electronic format as the described method of claim 87.
94., further be included in the step of the described protected electronic documents legitimacy that is sent out of a position verification of described network as the described method of claim 87.
95., further comprise to side's generator, the step that makes it to sign described original document as the described method of claim 87.
CNB998168270A 1999-08-21 1999-08-21 Legitimacy protection of electronic document and a printed copy thereof Expired - Fee Related CN1305251C (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/SG1999/000086 WO2001015382A1 (en) 1999-08-21 1999-08-21 Legitimacy protection of electronic document and a printed copy thereof

Publications (2)

Publication Number Publication Date
CN1361960A true CN1361960A (en) 2002-07-31
CN1305251C CN1305251C (en) 2007-03-14

Family

ID=20430233

Family Applications (1)

Application Number Title Priority Date Filing Date
CNB998168270A Expired - Fee Related CN1305251C (en) 1999-08-21 1999-08-21 Legitimacy protection of electronic document and a printed copy thereof

Country Status (5)

Country Link
JP (1) JP2003527778A (en)
CN (1) CN1305251C (en)
CA (1) CA2374196A1 (en)
GB (1) GB2365184B (en)
WO (1) WO2001015382A1 (en)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN100367752C (en) * 2004-08-02 2008-02-06 精工爱普生株式会社 Intelligent reprography for alterable cost, capable of compiling print output
CN100409224C (en) * 2003-02-10 2008-08-06 吴建明 Novel electronic signature stamp technique
CN101651764A (en) * 2008-08-12 2010-02-17 富士施乐株式会社 Image processing system, image processing apparatus, authorized person information management apparatus and method thereof
CN101120307B (en) * 2005-02-18 2010-05-19 佳能株式会社 Information processing apparatus for processing print data, method thereof
CN102541480A (en) * 2010-12-21 2012-07-04 北大方正集团有限公司 Filtering method and device for printing
CN103065101A (en) * 2012-12-14 2013-04-24 北京思特奇信息技术股份有限公司 Anti-counterfeiting method for documents
CN104298653A (en) * 2013-07-18 2015-01-21 北大方正集团有限公司 Method and device for identifying document attribute by changing page effect
CN108776664A (en) * 2018-04-19 2018-11-09 北京立思辰计算机技术有限公司 Force file recovery method and system

Families Citing this family (25)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6724895B1 (en) 1998-06-18 2004-04-20 Supersensor (Proprietary) Limited Electronic identification system and method with source authenticity verification
US6968317B1 (en) 2000-04-28 2005-11-22 Charles Schwab & Co., Inc. Method and apparatus for new accounts program
US7043636B2 (en) 2000-09-26 2006-05-09 Telefonaktiebolaget Lm Ericsson (Publ) Data integrity mechanisms for static and dynamic data
WO2002091668A2 (en) * 2001-05-03 2002-11-14 Telefonaktiebolaget L M Ericsson Method and system for data integrity protection
DE60133266T2 (en) 2001-05-03 2009-04-23 Telefonaktiebolaget Lm Ericsson (Publ) Method and device for protecting data integrity
GB0111063D0 (en) 2001-05-04 2001-06-27 Abathorn Ltd Method and apparatus for the creation of a self authenticating
US7137000B2 (en) 2001-08-24 2006-11-14 Zih Corp. Method and apparatus for article authentication
SE520755C2 (en) * 2001-12-21 2003-08-19 Karl Erik Landberg Computer networking arrangement (bilateral)
SE520754C2 (en) * 2001-12-21 2003-08-19 Karl Erik Landberg Computer networking arrangement (multilateral)
JP4554358B2 (en) 2002-05-14 2010-09-29 メディアセック テクノロジーズ ゲーエムべーハー Visible authentication pattern for printed documents
US6782116B1 (en) * 2002-11-04 2004-08-24 Mediasec Technologies, Gmbh Apparatus and methods for improving detection of watermarks in content that has undergone a lossy transformation
AU2003281380A1 (en) * 2002-07-02 2004-01-23 Telefonaktiebolaget Lm Ericsson (Publ) Method of securing and exposing a logotype in an electronic device
WO2005034425A1 (en) 2003-10-06 2005-04-14 International Business Machines Corporation Documenting security related aspects in the process of container shipping
JP4143641B2 (en) 2005-12-07 2008-09-03 キヤノン株式会社 Image processing apparatus, program for executing the image processing method, and medium storing the program
KR20080113264A (en) * 2006-04-28 2008-12-29 마이크로소프트 코포레이션 Secure signatures
CN101311950B (en) * 2007-05-25 2012-01-18 北京书生国际信息技术有限公司 Electronic stamp realization method and device
EP2048867B1 (en) * 2007-10-10 2012-05-16 Deutsche Thomson OHG Method and system for generation and verification of a digital seal on an analog document
JP2013081165A (en) * 2011-09-23 2013-05-02 Kiyoshi Yazawa Document with fixed date
CN103338103A (en) * 2013-06-04 2013-10-02 中联重科股份有限公司 Data encryption method and system and handheld device
CN103729656A (en) * 2014-01-22 2014-04-16 河北远东通信***工程有限公司 Seal imprint identification method and identification system
JP6183400B2 (en) * 2015-03-31 2017-08-23 コニカミノルタ株式会社 Contract creation program, contract validation program, final encryption creation program, contract creation system, contract validation system, and final encryption creation system
CN110598531A (en) * 2019-07-30 2019-12-20 云南昆钢电子信息科技有限公司 Method and system for recognizing electronic seal based on face of mobile terminal
US10755095B1 (en) 2020-01-02 2020-08-25 Capital One Services, Llc System for scanning solicitations for fraud detection
CN112016129B (en) * 2020-06-08 2024-03-29 杭州印界科技集团有限公司 Engineering drawing signature authorization and printing system and printer
EP4152184A1 (en) * 2021-09-17 2023-03-22 Freshape SA Process of signing documents

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4981370A (en) * 1990-01-29 1991-01-01 Dziewit Halina S Document authentication apparatus
US5748807A (en) * 1992-10-09 1998-05-05 Panasonic Technologies, Inc. Method and means for enhancing optical character recognition of printed documents
US5606609A (en) * 1994-09-19 1997-02-25 Scientific-Atlanta Electronic document verification system and method
US5748738A (en) * 1995-01-17 1998-05-05 Document Authentication Systems, Inc. System and method for electronic transmission, storage and retrieval of authenticated documents
JP3540511B2 (en) * 1996-06-18 2004-07-07 株式会社東芝 Electronic signature verification device
JP2818582B2 (en) * 1996-08-13 1998-10-30 新潟日本電気ソフトウェア株式会社 Electronic seal making method and device
JPH11143969A (en) * 1997-11-07 1999-05-28 Ffc:Kk Authentication device for electronic seal impression

Cited By (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN100409224C (en) * 2003-02-10 2008-08-06 吴建明 Novel electronic signature stamp technique
CN100367752C (en) * 2004-08-02 2008-02-06 精工爱普生株式会社 Intelligent reprography for alterable cost, capable of compiling print output
CN101120307B (en) * 2005-02-18 2010-05-19 佳能株式会社 Information processing apparatus for processing print data, method thereof
CN101651764A (en) * 2008-08-12 2010-02-17 富士施乐株式会社 Image processing system, image processing apparatus, authorized person information management apparatus and method thereof
CN101651764B (en) * 2008-08-12 2013-11-20 富士施乐株式会社 Image processing system, image processing apparatus, authorized person information management apparatus and method thereof
CN102541480A (en) * 2010-12-21 2012-07-04 北大方正集团有限公司 Filtering method and device for printing
CN102541480B (en) * 2010-12-21 2014-12-24 北大方正集团有限公司 Filtering method and device for printing
CN103065101A (en) * 2012-12-14 2013-04-24 北京思特奇信息技术股份有限公司 Anti-counterfeiting method for documents
CN104298653A (en) * 2013-07-18 2015-01-21 北大方正集团有限公司 Method and device for identifying document attribute by changing page effect
CN104298653B (en) * 2013-07-18 2017-11-24 北大方正集团有限公司 The method and apparatus for identifying document properties by changing page effect
CN108776664A (en) * 2018-04-19 2018-11-09 北京立思辰计算机技术有限公司 Force file recovery method and system
CN108776664B (en) * 2018-04-19 2023-06-16 北京立思辰计算机技术有限公司 Forced file recycling method and system

Also Published As

Publication number Publication date
GB2365184A (en) 2002-02-13
GB2365184B (en) 2004-06-16
GB0127490D0 (en) 2002-01-09
CN1305251C (en) 2007-03-14
CA2374196A1 (en) 2001-03-01
WO2001015382A1 (en) 2001-03-01
JP2003527778A (en) 2003-09-16

Similar Documents

Publication Publication Date Title
CN1305251C (en) Legitimacy protection of electronic document and a printed copy thereof
CA2594018C (en) Method and process for creating an electronically signed document
US8583931B2 (en) Electronic signing apparatus and methods
US6751336B2 (en) Digital authentication with digital and analog documents
US8903744B2 (en) System and method for controlling access to personal identification information contained in documents
US6425081B1 (en) Electronic watermark system electronic information distribution system and image filing apparatus
JP4800553B2 (en) Certification watermark for applications related to print objects
US7770013B2 (en) Digital authentication with digital and analog documents
US8078878B2 (en) Securing documents with electronic signatures
CN1209730C (en) Digital anti-fake method
US20100161993A1 (en) Notary document processing and storage system and methods
US20120308003A1 (en) Authentic barcodes using digital signatures
US20080100874A1 (en) Notary document processing and storage system and methods
US20090015876A1 (en) Method to certify facsimile transmissions
CN116842583B (en) Electronic signature system and method with PDF signature as core
CN1808490A (en) Business operating method and system for digital seals
US20040216031A1 (en) Verifying the veracity and creator of a printed document
US9277097B2 (en) Method for authenticating a document
EP1704667B1 (en) Electronic signing apparatus and methods
JP2004058410A (en) Method, system and apparatus for printing secret information
JP4923388B2 (en) Content certification system
CN1220932C (en) Electronic autograph on document
CN1091285C (en) Two-dimensional image code anti-fake method
JP2004030404A (en) Secure print system
JPH11212462A (en) Electronic watermark system, electronic information delivery system, picture filing device, and storage medium

Legal Events

Date Code Title Description
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C06 Publication
PB01 Publication
ASS Succession or assignment of patent right

Owner name: TRUSTCOPY PTD LTD.

Free format text: FORMER OWNER: ROOM #, KENTELIQISHUZISHIYAN

Effective date: 20050225

C41 Transfer of patent application or patent right or utility model
TA01 Transfer of patent application right

Effective date of registration: 20050225

Address after: Singapore City

Applicant after: Trustcopy Ptd Ltd.

Address before: Singapore City

Applicant before: Kent Ridge Digital Labs

C14 Grant of patent or utility model
GR01 Patent grant
C17 Cessation of patent right
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20070314

Termination date: 20130821