WO2009036619A1 - Procédé de génération de crêtes dermiques aléatoires de marque de crédit - Google Patents
Procédé de génération de crêtes dermiques aléatoires de marque de crédit Download PDFInfo
- Publication number
- WO2009036619A1 WO2009036619A1 PCT/CN2007/003395 CN2007003395W WO2009036619A1 WO 2009036619 A1 WO2009036619 A1 WO 2009036619A1 CN 2007003395 W CN2007003395 W CN 2007003395W WO 2009036619 A1 WO2009036619 A1 WO 2009036619A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- credit
- pattern
- digital
- random
- identification
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/60—Digital content management, e.g. content distribution
Definitions
- the invention relates to a credit document anti-counterfeiting technology, in particular to a digital signature credit identification random ridge generation method in the implementation of e-government and e-commerce. Background technique
- the seals, emblems, or personal signatures described above are collectively referred to as the “trust identifiers”.
- the traditional seal and personal signature credit identification method can be incorporated into the computer information technology of modern office, using the electronic signature technology of image processing, the seal, the emblem, the individual Signed electronic image file Insert into an electronic file, and then print the electronic file with the seal, emblem, and personal signature together using a digital graphic printing device (such as a color printer) under computer control.
- a digital graphic printing device such as a color printer
- a computer electronic file can provide valid evidence through digital signature technology.
- the security authentication technology supports the identification of authenticity of paper documents using physical, chemical, and pattern recognition methods.
- judicial practice there are often cases where the credit identification of a document is difficult to distinguish, such as:
- the seals in the two contracts cannot be judged under the pattern recognition, but the contents of the contract are inconsistent, in one file.
- the personal signature also triggers a true and false argument.
- a seal, emblem, or personal signature is a credit mark of a legal person or natural person.
- the forgery of a credit mark infringes upon the interests of others and undermines the normal operation of state management and social economy. Summary of the invention
- the present invention provides a credit identification random ridge generation method, which can enable a digital signature signed on a paper to carry a digital signature random digital ridge with a unique pattern feature, thereby effectively preventing and identifying And crack down on criminal acts of forging credit documents.
- a credit identification random ridge generation method :
- the hash value obtains a binary digital signature value
- the set of digital signature values are arranged in a digital pattern according to the geometric shape of the credit identification pattern, and are superimposed on the credit logo graphic pattern, the digital strokes and credits of the digital pattern
- the overlapping intersections of the graphics in the logo pattern are used as ridge tracks to form a digital signature credit identifier random ridge.
- the long digital signature value is calculated again by using a hash function to obtain a short hash value, and the set of hash values are arranged in a digital pattern according to the geometric pattern of the credit identification pattern, and are superimposed on the credit logo graphic pattern.
- the overlapping intersection of the digital stroke digital drawing and the credit identification graphic is used as a trajectory to form a digital signature credit identification random ridge.
- the visual color of the stroke in which the digital stroke in the generated digital signature random tiling pattern and the credit identification graphic do not overlap, is consistent with the background color of the credit identification graphic pattern; the digital stroke and the credit identifier in the generated random ridge pattern
- the overlap of the intersecting strokes of the graphic Color forming a visual color difference with the primary color of the credit logo graphic pattern.
- the visual color of the digital stroke in the generated digital signature random tiling pattern is consistent with the background color of the credit identification graphic pattern.
- a system for generating a credit identification random line includes the following devices:
- the input and computing device is configured to prepare an electronic file to be signed in the computer system, select a format file or plain text as a data source, input a hash function to calculate a hash value, and use an asymmetric key (The public key encryption algorithm) encrypts the hash value to obtain a binary digital signature value;
- a random ridge generating device is configured to form a hash value or a digital signature value to form a credit identification random ridge.
- the random ridge generation device further includes the following devices:
- the overlapping intersection of the middle picture and the text is used as a trajectory to form a digital signature credit identification random ridge.
- the random ridge generation device further includes the following devices:
- a device for recalculating a longer digital signature value using a hash function to obtain a shorter hash value arranging the set of binary hash values in a digital pattern according to a credit identifier pattern geometry, Above the credit logo graphic pattern, the overlapping portion of the digital stroke digital signature and the credit identification graphic is used as a trajectory, and the digital signature credit identifier is a random ridge.
- the random ridge generating device further includes the following devices: arranged in a digital pattern according to the geometric shape of the credit identification pattern, and superimposed on the credit identification pattern, the overlapping portion of the digital stroke of the digital pattern and the graphic in the credit identification pattern as a pattern Line trajectory, forming a random line of credit identification.
- the random ridge generation device further includes the following devices:
- a device for converting a binary value into a decimal or hexadecimal number arranged in a digital pattern according to the geometric shape of the credit identification pattern, and stacked on the letter On the top of the logo pattern, the overlapping portion of the digital stroke of the digital pattern and the graphic image in the credit logo pattern serves as a trajectory to form a credit line random ridge.
- the random ridge generation device further includes the following devices:
- the digital stroke in the digital signature random ridge pattern is not overlapped on the credit identification graphic, and the visual color of the intersecting stroke is consistent with the background color of the credit identification graphic pattern; the digital stroke in the generated random ridge pattern
- the color of the overlapping intersecting strokes on the credit identification graphic forms a visualized color difference with the credit identification graphic pattern primary colors.
- the random ridge generation device further includes the following devices:
- a device for visual color of a digital stroke in a generated digital signature random tiling pattern that coincides with a background color of a credit identification graphic pattern
- the random ridge generation system also includes the following devices:
- Step 1 Digitally scan a document printed on a medium such as a paper with a credit mark.
- Step 2 Zoom in to see the image of the credit mark (such as seal) obtained by scanning, to see if there is a trajectory, if it is not, it is forged; if it is, continue.
- the credit mark such as seal
- Step 3 Obtain the hash value of the electronic document or the plain text of the document in the format of the credit identification file, use the digital certificate of the credit identifier signer, and regenerate according to the generation parameters and rules of the original credit identifier "random digital line" The credit identification of "random digital lines,,.
- Step 4 Make this set of “random digital lines” and overlay them on the credit mark to be verified. Observe the coincidence of the track traces. If the line tracks overlap, the credit mark (such as seal stamp) is true.
- a system for inspecting a method for generating a credit line random ridge line comprising the following means: an input device for digitally scanning a document printed by a shield such as a paper with a credit mark.
- the identification device is used to enlarge the image of the credit mark (such as stamp) obtained by scanning, to see if there is a trajectory, and if it is not, it is regarded as forgery; if there is, continue.
- a generating device configured to obtain a hash value of a format electronic file of the credit identification file or a plain text of the file, and encrypt the hash with an asymmetric key of the digital certificate of the credit identification unit Value, according to the credit parameter "random number line” generation parameter and 'rule, regenerate the "random number line” for this credit.
- the identification device is used to make the set of "random digital lines" and is superimposed on the credit mark to be verified to observe the coincidence of the track traces, and the credit marks (such as seal stamps) are true when the track tracks are coincident.
- 1 is a flow chart of generating a credit signature digital signature random ridge line
- Figure 2 is a credit identification pattern or graphic diagram to be used
- Figure 3 is a diagram of a visible credit identification of a complete random digital line overlay
- Figure 4 is a complete digital signature random line credit identification map
- Figure 5 is a cross-sectional representation of a truncated random digital line overlay
- Figure 6 is a truncated digital signature random line credit identification.
- the invention relates to a method for generating a random identification line of credit identifiers.
- Preparing a computer electronic file to be signed in step 111 in the computer system Preparing a computer electronic file to be signed in step 111 in the computer system; preparing an electronic image of the pending credit identification pattern (such as an overprint stamp) step 112; using the electronic file content of step 111 as a data source, inputting The column function computes a hash value step 120; encrypting this hash value step 130 using an asymmetric key in the RSA or ECC digital signature technology architecture; obtaining a digital signature value step 140.
- RSA signature value is 1024bit. Due to the limited geometric area of the credit logos (such as seals) we use every day, the data generated by the digital pattern is too long, and there are many characters. The more characters in the limited geometric area of the seal, the smaller the character size, resulting in a trajectory. Unclear, or will destroy the integrity of the credit logo graphic, in order to not destroy the integrity of the effective content of the credit logo and improve the clarity of the trajectory, you can use the hash function to calculate the set of longer digital signature values. A shorter hash value step 150, such as 160 bits.
- the digital signals generated in step 140 or step 150 are arranged in a digital signature digital pattern in accordance with the credit identifier geometry, and an electronic image step 112 is performed using the ready-to-use credit identification pattern (such as an overprint stamp).
- Step 160 The generated digital signature digital pattern is superimposed on the electronic image of the credit identification pattern in step 112, 171 of FIG. 3, and 173 of FIG. 5, so that the strokes in the digital signature digital pattern are cut through the visible text of the credit identification, forming
- the credit identification digital signature random ridge, 172 of FIG. 4, 174 of FIG. 6, generates a digital signature random ridge credit identification step 170.
- Figure 3 is a visible credit identification diagram of a complete random digital line overlay. As shown, the digital digits of the digital pattern in the figure are 40 hexadecimal numbers.
- Figure 4 is a credit map of the complete random digital line cut. As shown in the figure, the non-red line in the figure is the intersection of random digital lines.
- Figure 5 is a simplified credit identification diagram of a truncated random digital line overlay. As shown, the digital digits of the digital pattern in the figure are 20 hexadecimal digits.
- Figure 6 is a diagram of the credit identification of the truncated random digital line cut. As shown, the non-red line in the figure is the intersection of the random digital lines.
- a visible ridge track is formed on the logo image, such as a purple color similar to the red color of the seal stamp of FIGS. 3 to 6.
- the background color of the credit logo graphic is white, which can be considered as colorless, and the digital pattern stroke is defined as colorless; for example, part of Europe
- the country uses black paper to print documents,
- the background color of the credit logo graphic is black, and the digital pattern stroke is defined as black; this method forms a visual chromatic aberration, which is beneficial for observation and comparison check.
- the digital font should be thinner to avoid damage to the credit logo.
- CA company legal digital certification company
- a document requiring a credit identification must have a hash value of the content of the document, and the credit identifier must have a digital signature random number line.
- the counterfeiter forges a credit identification document, and must also forge a set of digital signature random digital lines in the credit identification.
- the contents of the file are unchangeable; digital signatures using a valid digital certificate are undeniable, and the order in which the numbers are arranged is unique and non-repeatable.
- the digital signature digital and digital signature random digital lines generated by the real file must be coincident; the digital signature character lines in the fake document credit identifier must not coincide.
- the anti-counterfeiting test steps are as follows
- Step 1 Set the normal scanner 600DPI and above, RGB color scan stamp printing.
- Step 2 Zoom in to view the scanned image obtained by scanning to see if there is a trajectory. If it is not, it is regarded as forgery; if it is, continue.
- Step 3 Obtain the hash value of the electronic document or the plain text content of the credit identification document, use the digital certificate of the credit identifier signer, and regenerate the credit according to the generation parameters and rules of the credit identifier "random digital line" The "random digital line" of the logo.
- Step 4 Make this set of "random digital lines" and stack them on the credits that need to be verified. W recognize the above, observe the coincidence of the trajectory of the ridge, and the credit mark (such as the seal) is true when the trajectory of the ridge is coincident.
- the digital signature system composed of a hash function and an asymmetric key (public key encryption algorithm) is applied to the effective authentication of paper documents, and unified in the era of computer information.
- the electronic document and paper document authentication method of the document solves the problem that the computer-edited printed paper documents that are ubiquitous in the world are difficult to be authenticated.
- the technical scheme of the invention forms a set of random ridge pattern formed by a digital signature digital having a unique data relationship with the document content on the credit identifier of the paper document, and maintains the original graphic features of the credit logo, so that the credit logo displays the legal person
- the basic characteristics of institutions and natural persons are closely combined with the contents of the documents, reaching one text, one standard, one grain and one code.
- the exclusive evidence chain of the document content is not modifiable and the identity of the signer is undeniable.
- the digital signature technology system conducts effective technical inspection of credit marks, which can prevent criminal acts of pseudo-paper quality credit documents, strengthen social management, and safeguard the interests of legitimate holders of credit labels.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Collating Specific Patterns (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
- Editing Of Facsimile Originals (AREA)
Abstract
L'invention concerne un procédé de génération de crêtes dermiques aléatoires de marque de crédit. Le procédé comprend : préparer un fichier électronique nécessitant de souscrire à un motif de marque de crédit dans un système informatique (111), considérer le contenu du fichier électronique comme une ressource de données, calculer des valeurs de hachage en entrant une fonction de hachage (120), crypter les valeurs de hachage par une clé secrète asymétrique (à savoir par un algorithme de cryptage par clé publique) (130) de façon à obtenir des valeurs numériques de signature (140), agencer et répartir les valeurs numérique de signature dans un motif de numéro en fonction de la géométrie du motif de marque de crédit (160), masquer le motif de nombre sur le motif de marque de crédit, considérer la partie masquée entre les segments saisis de nombres du motif du nombre et le contexte graphique de la marque de crédit sous forme de suivi de crêtes dermiques de façon à former la crête dermique aléatoire de marque de crédit de la signature numérique (170).
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CNB2007101218456A CN100518064C (zh) | 2007-09-17 | 2007-09-17 | 信用标识随机纹线生成方法 |
CN200710121845.6 | 2007-09-17 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2009036619A1 true WO2009036619A1 (fr) | 2009-03-26 |
Family
ID=39297847
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2007/003395 WO2009036619A1 (fr) | 2007-09-17 | 2007-11-30 | Procédé de génération de crêtes dermiques aléatoires de marque de crédit |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN100518064C (fr) |
WO (1) | WO2009036619A1 (fr) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103106442A (zh) * | 2013-01-22 | 2013-05-15 | 北京印刷学院 | 单变量参数递变多元加密防伪信息存储商标 |
Families Citing this family (45)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2010107490A1 (fr) * | 2009-03-18 | 2010-09-23 | Touchtunes Music Corporation | Serveur de divertissement et services de réseau social associés |
CN102486821A (zh) * | 2010-12-02 | 2012-06-06 | 北大方正集团有限公司 | 字库版权的控制方法和装置 |
CN102945498A (zh) * | 2012-10-22 | 2013-02-27 | 北京印刷学院 | 多参数递进变序加密二进制防伪印刷方法 |
CN102945487A (zh) * | 2012-10-22 | 2013-02-27 | 北京印刷学院 | 同向同步递进加密二进制防伪印刷方法 |
CN102945494A (zh) * | 2012-10-22 | 2013-02-27 | 北京印刷学院 | 单变量二重参数位移递增加密二进制防伪印刷方法 |
CN102945499A (zh) * | 2012-10-22 | 2013-02-27 | 北京印刷学院 | 单参数位移三维单变量递增循环加密二进制防伪印刷方法 |
CN102945486A (zh) * | 2012-10-22 | 2013-02-27 | 北京印刷学院 | 单参数递变跨步右移递进加密二进制防伪印刷方法 |
CN102945484A (zh) * | 2012-10-22 | 2013-02-27 | 北京印刷学院 | 相向递增加密二进制防伪印刷方法 |
CN102945483A (zh) * | 2012-10-22 | 2013-02-27 | 北京印刷学院 | 多参数相向递增加密二进制防伪印刷方法 |
CN102945502A (zh) * | 2012-10-22 | 2013-02-27 | 北京印刷学院 | 单变量三维加密二进制防伪印刷方法 |
CN102945485A (zh) * | 2012-10-22 | 2013-02-27 | 北京印刷学院 | 多参数左移变位跨步递进加密二进制防伪印刷方法 |
CN103093411B (zh) * | 2013-01-10 | 2015-12-02 | 华南师范大学 | 基于随机二态图像的加密-解密方法 |
CN103106489A (zh) * | 2013-01-22 | 2013-05-15 | 北京印刷学院 | 单参数三元加密防伪信息存储商标 |
CN103106444A (zh) * | 2013-01-22 | 2013-05-15 | 北京印刷学院 | 单变量参数递变三元加密防伪信息存储商标 |
CN103106475A (zh) * | 2013-01-22 | 2013-05-15 | 北京印刷学院 | 多参数变量递变三元变量循环加密防伪信息存储商标 |
CN103106496A (zh) * | 2013-01-22 | 2013-05-15 | 北京印刷学院 | 多参数一元循环加密防伪信息存储商标 |
CN103116787A (zh) * | 2013-01-22 | 2013-05-22 | 北京印刷学院 | 多参数变量递变一元加密防伪信息存储商标 |
CN103106515A (zh) * | 2013-01-22 | 2013-05-15 | 北京印刷学院 | 多变量参数递变一元加密防伪信息存储商标 |
CN103116773A (zh) * | 2013-01-22 | 2013-05-22 | 北京印刷学院 | 参数递变三元变量循环加密防伪信息存储商标 |
CN103106453A (zh) * | 2013-01-22 | 2013-05-15 | 北京印刷学院 | 多参数三元变量循环加密防伪信息存储商标 |
CN103106504A (zh) * | 2013-01-22 | 2013-05-15 | 北京印刷学院 | 单变量参数递变二元加密防伪信息存储商标 |
CN103116789A (zh) * | 2013-01-22 | 2013-05-22 | 北京印刷学院 | 单参数双变量三元循环加密防伪信息存储商标 |
CN103106526A (zh) * | 2013-01-22 | 2013-05-15 | 北京印刷学院 | 多参数多变量三元循环加密防伪信息存储商标 |
CN103106470A (zh) * | 2013-01-22 | 2013-05-15 | 北京印刷学院 | 多变量多参数递变二元变量循环加密防伪信息存储商标 |
CN103106448A (zh) * | 2013-01-22 | 2013-05-15 | 北京印刷学院 | 单变量参数递变二元变量循环加密防伪信息存储商标 |
CN103106490A (zh) * | 2013-01-22 | 2013-05-15 | 北京印刷学院 | 多参数多元变量循环加密防伪信息存储商标 |
CN103116783A (zh) * | 2013-01-22 | 2013-05-22 | 北京印刷学院 | 参数递变二元变量循环加密防伪信息存储商标 |
CN103106488A (zh) * | 2013-01-22 | 2013-05-15 | 北京印刷学院 | 多变量参数递变三元变量循环加密防伪信息存储商标 |
CN103116785A (zh) * | 2013-01-22 | 2013-05-22 | 北京印刷学院 | 多参数多变量一元循环加密防伪信息存储商标 |
CN103106428A (zh) * | 2013-01-22 | 2013-05-15 | 北京印刷学院 | 单参数一元循环加密防伪信息存储商标 |
CN103106486A (zh) * | 2013-01-22 | 2013-05-15 | 北京印刷学院 | 单参数多变量三元循环加密防伪信息存储商标 |
CN103136563A (zh) * | 2013-01-22 | 2013-06-05 | 北京印刷学院 | 单参数多变量多元循环加密防伪信息存储商标 |
CN103116786A (zh) * | 2013-01-22 | 2013-05-22 | 北京印刷学院 | 多参数变量递变二元加密防伪信息存储商标 |
CN103106507A (zh) * | 2013-01-22 | 2013-05-15 | 北京印刷学院 | 多参数单变量一元加密防伪信息存储商标 |
CN103106493A (zh) * | 2013-01-22 | 2013-05-15 | 北京印刷学院 | 参数递变三元循环加密防伪信息存储商标 |
CN103106469A (zh) * | 2013-01-22 | 2013-05-15 | 北京印刷学院 | 单参数多变量一元加密防伪信息存储商标 |
CN103106505A (zh) * | 2013-01-22 | 2013-05-15 | 北京印刷学院 | 单参数双变量三元加密防伪信息存储商标 |
CN103106482A (zh) * | 2013-01-22 | 2013-05-15 | 北京印刷学院 | 多参数单变量二元加密防伪信息存储商标 |
CN103106440A (zh) * | 2013-01-22 | 2013-05-15 | 北京印刷学院 | 多参数一元加密防伪信息存储商标 |
CN103106520A (zh) * | 2013-01-22 | 2013-05-15 | 北京印刷学院 | 多参数多变量二元循环加密防伪信息存储商标 |
CN103116799A (zh) * | 2013-01-22 | 2013-05-22 | 北京印刷学院 | 多参数多变量多元循环加密防伪信息存储商标 |
CN103106445A (zh) * | 2013-01-22 | 2013-05-15 | 北京印刷学院 | 单参数多变量二元加密防伪信息存储商标 |
CN105447401A (zh) * | 2014-08-28 | 2016-03-30 | ***通信集团公司 | 文本加密方法及装置 |
CN107025412B (zh) * | 2016-01-29 | 2020-04-17 | 唐文凯 | 一种防止非法移动使用信用标识的方法 |
CN109949889B (zh) * | 2019-03-29 | 2020-09-11 | 镇江市第一人民医院 | 一种电子护理病历*** |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20030196086A1 (en) * | 2002-04-12 | 2003-10-16 | Canon Kabushiki Kaisha | Information processing apparatus, information processing system, information processing method, storage medium and program |
CN1635533A (zh) * | 2003-12-30 | 2005-07-06 | 刘瑞祯 | 数字****** |
CN2782387Y (zh) * | 2005-03-22 | 2006-05-24 | 李锦� | 重叠底纹防伪*** |
CN1829149A (zh) * | 2006-02-08 | 2006-09-06 | 于蕾 | 电子防伪***的制作方法 |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1455899A (zh) * | 2000-07-25 | 2003-11-12 | 有限会社信息安全 | 保密信息记录媒介、保护方法、保护存储方法及信息访问报警*** |
CN100510954C (zh) * | 2006-02-13 | 2009-07-08 | 湖南童森科技有限公司 | 给照片嵌入可机读水印的方法和装置 |
-
2007
- 2007-09-17 CN CNB2007101218456A patent/CN100518064C/zh not_active Expired - Fee Related
- 2007-11-30 WO PCT/CN2007/003395 patent/WO2009036619A1/fr active Application Filing
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20030196086A1 (en) * | 2002-04-12 | 2003-10-16 | Canon Kabushiki Kaisha | Information processing apparatus, information processing system, information processing method, storage medium and program |
CN1635533A (zh) * | 2003-12-30 | 2005-07-06 | 刘瑞祯 | 数字****** |
CN2782387Y (zh) * | 2005-03-22 | 2006-05-24 | 李锦� | 重叠底纹防伪*** |
CN1829149A (zh) * | 2006-02-08 | 2006-09-06 | 于蕾 | 电子防伪***的制作方法 |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103106442A (zh) * | 2013-01-22 | 2013-05-15 | 北京印刷学院 | 单变量参数递变多元加密防伪信息存储商标 |
CN103106442B (zh) * | 2013-01-22 | 2015-07-15 | 北京印刷学院 | 单变量参数递变多元加密防伪信息存储商标 |
Also Published As
Publication number | Publication date |
---|---|
CN101163007A (zh) | 2008-04-16 |
CN100518064C (zh) | 2009-07-22 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2009036619A1 (fr) | Procédé de génération de crêtes dermiques aléatoires de marque de crédit | |
JP7093352B2 (ja) | 複合二次元バーコード、電子証書媒体、生成、読取装置および方法 | |
JP3373811B2 (ja) | 白黒2値文書画像への透かし情報埋め込み・検出方法及びその装置 | |
CN101593324B (zh) | 基于可信计算应用技术的网络多级审批方法及*** | |
CN100458845C (zh) | 一种电子***制作方法 | |
JP2006157914A (ja) | 文書認証方法、検出可能な文書生成方法、装置及びプログラム | |
CN1421814A (zh) | 一种数字防伪方法 | |
WO2001015382A1 (fr) | Protection de la legitimite d'un document electronique et d'une copie imprimee associee | |
JP2003264685A (ja) | 文書画像出力方法及び装置、改ざん判定方法及びシステム、並びに改ざん判定システムの制御用プログラム | |
CN112464181B (zh) | 一种电子签章打印纸质文件防伪的方法及*** | |
CN111160860A (zh) | 一种文件的打印及盖章方法 | |
KR20140033035A (ko) | 보안 문서들을 생성하고 인증하기 위한 방법 및 장치 | |
Mthethwa et al. | Proposing a blockchain-based solution to verify the integrity of hardcopy documents | |
US8578168B2 (en) | Method and apparatus for preparing and verifying documents | |
US20080059803A1 (en) | Method for the authentication of printed document | |
Dlamini et al. | Mitigating the challenge of hardcopy document forgery | |
KR100430469B1 (ko) | 문서 위조/변조 방지 시스템 | |
CN112765568A (zh) | 一种基于第三方认证的电子***实施方法 | |
CN1321507C (zh) | 基于图形码子母***族信息关联机制的软证件防伪方法 | |
JPH08297743A (ja) | 印刷物の検証情報作成装置及び印刷物の検証装置 | |
JP2009535898A (ja) | 安全な署名 | |
CN112765569A (zh) | 一种表意性电子***的实施方法 | |
JP2003060890A (ja) | 通信ネットワークを利用した個人認証システム | |
JP4047271B2 (ja) | 改ざん検証用画像生成装置、および、改ざん検証用画像生成装置の制御方法、および、改ざん検証用画像情報生成装置のプログラム、および、記録媒体 | |
CN102054308A (zh) | 一种基于手机终端的火车票数字水印防伪方法 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 07845758 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
32PN | Ep: public notification in the ep bulletin as address of the adressee cannot be established |
Free format text: NOTING OF LOSS OF RIGHTS PERSUANT TO RULE 112(1) EPC OF 050710 |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 07845758 Country of ref document: EP Kind code of ref document: A1 |