CN1959711B - Electronic certificate and its authentication system - Google Patents
Electronic certificate and its authentication system Download PDFInfo
- Publication number
- CN1959711B CN1959711B CN2005101197376A CN200510119737A CN1959711B CN 1959711 B CN1959711 B CN 1959711B CN 2005101197376 A CN2005101197376 A CN 2005101197376A CN 200510119737 A CN200510119737 A CN 200510119737A CN 1959711 B CN1959711 B CN 1959711B
- Authority
- CN
- China
- Prior art keywords
- module
- signature
- proof
- information
- identification systems
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
- 238000000034 method Methods 0.000 claims description 6
- 238000013475 authorization Methods 0.000 claims description 4
- 238000011156 evaluation Methods 0.000 claims description 4
- 230000004913 activation Effects 0.000 claims 2
- 230000009849 deactivation Effects 0.000 claims 2
- 238000005516 engineering process Methods 0.000 description 3
- 230000006855 networking Effects 0.000 description 3
- 238000013459 approach Methods 0.000 description 2
- 230000008676 import Effects 0.000 description 2
- 238000005242 forging Methods 0.000 description 1
- 238000004321 preservation Methods 0.000 description 1
- 238000012795 verification Methods 0.000 description 1
Images
Landscapes
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The invention is an automated system used in the data center of a certification bureau connected to the internet, which enables any member of the certification bureau to electronically certify his documents remotely using a computer, electronic writing board, electronic pen and printer connected to the internet.
Description
Technical field
The present invention relates to a kind of file security system, be particularly related to the system and method that its correctness and security were discerned and proved to a kind of true and false to fileinfo and signature and seal newly developed.
Background technology
System now uses stickup, hot stamping and watermark to find correctness and safety to these files with bore hole
Bring the pseudo-thing of threat.It is revealed, once have many swindling to use system of the prior art in the file of forging in the case.
We are fully aware of according to the above, have a kind of urgent needs, promptly, fileinfo is stored in a lane database and preserves with the form of 2D bar code, information is encrypted, to overcome the problem that file exists in security.
Summary of the invention
The present invention provides the ability that the correctness of file and security are confirmed to realize above-mentioned purpose.The present invention solves the problems of the technologies described above the technical scheme that is adopted: the present invention is a kind of automatic system, and it is operated in the data center of the proof office that links with internet, it makes this proof office computing machine that any one member uses to link to each other with internet, digital writing plate, electronic pen and printing function and remotely with electronic method his file is proved authentication.
The personnel of administration and registration body use this system Registrar and user's information note, use an electronic pen with their record of signature on the digital recording plate, and be stored in lane database to information and signature.
The member can use the fileinfo of this system's input oneself and compare the validity of checking signature by signature that will be to be proved with the member's signature that is registered under the registration in its signature of record on the digital tablet, system with electronic pen.If signature be effectively, this document information just be stored in proof company data center, in order to from now on when authentication request the subsequent use file of checking to distinguish true from false and to produce a 2D bar code.A kind of information encrypted of this 2D bar code in using two kinds of encryption methods then is made up of fileinfo.The member uses this system in his printer, to print his fileinfo, signature, and seal and 2D bar code perhaps authorize someone in a different place it to be printed.Proof personnel use this system (on a computing machine that does not link to each other with internet and a scanner that is used for file is scanned, moving in his request in this system) and remove to understand the 2D bar code; With other keys fileinfo is deciphered; The information decompress(ion) contractd show to prove its correct and safety, in case be deceived.
Description of drawings:
The planimetric map that the individual that on behalf of the member, Fig. 1 note through electronic pen and electronic writing plate signs.
Fig. 2 represents the planimetric map of the seal of a company.
Fig. 3 represents the planimetric map of the seal of a proof office.
Fig. 4 represents the planimetric map of a 2D bar code.
Fig. 5 represents the planimetric map of electronic writing plate and electronic pen.
Fig. 6 represents the planimetric map of a scanner.
Embodiment
Embodiment describes in further detail the present invention below in conjunction with accompanying drawing.Understand the present invention for ease, most preferred embodiment is combined accompanying drawing to be described herein now.The present invention's correct approach with safety (in case being deceived) of file of witnessing, the present invention is true or false user's (he thinks the correct and safety of documentary evidence, in case be deceived) affirmation file.The present invention is made up of following several modules:
Primary module: be on the application server that the data server with proof office data center links to each other, to move. prove that the office data center is connected with internet.This module is through being connected with other database or with other module its data being upgraded.Be used in the browser that moves on the personal computer and activate this module.The user is can the constructing system key right with this module, the input manager personal information, and login their signature.
Administration module: it with application server that internet links to each other on move, and be used in the browser that moves on the PC and activate this module.Managerial personnel can use this module to make following thing anywhere:
[A] checks managerial personnel's number, password and the signature of load module.
[B] imports proof office information and seal in system.
[C] imports the proof accredited personnel's of office information and logins their signature.
[D] activates or cancels the accredited personnel of proof office.
[E] witness numbering and password of innings accredited personnel.
The report of [F] print management.
Registering modules: with application server that internet links to each other on move, activate by the internet browser that on PC, moves.The accredited personnel can be from doing following thing with this module Anywhere:
To the accredited personnel's that will get into module numbering, password and signature are checked [G].
The information of the requirement proof of [H] input company, like the new line that letter is signed, letter pin, and seal.
The numbering of [I] company incorporated, information with use the electronic pen that links to each other with PC on the digital writing plate, to register their signature.
[J] activates the numbering of signer and company or cancel.
[K] provides corporate member's numbering and password.
[L] prints member's transaction reporting.
The proof module: it with application server that internet links to each other on operation and the internet browser that is running in PC activate.The member can make following thing with this module Anywhere:
[a] getting into the module pronucleus to membership number, password and signature.
[b] input and preservation need the fileinfo of proof.
[c] should signature with proof with electronic pen registration member signature on digiboard.
The signature figure that [d] this system will be registered compares with the signature figure that is stored in lane database.
[e] if signature is correct, this system just shows member's signature, and its company's seal proves the seal of office, and Certificate Number, proves time and the 2D bar code on the internet browser at date of certification.
[f] member can print be presented at its with printer that its PC links to each other on permit.
[g] member can authorize will prove that printing is to others.
The expense that [h] takes place is directly deducted from member's account.
[i] all files that have been proved to be are stored in lane database to prove its correct and safety, in case be deceived.
Authorization module: it with application server that internet links to each other on move, and activate by an internet browser that on PC, moves, the people who is authorized to can do following thing from using this module Anywhere:
[j] getting into the numbering of module pronucleus to the licensee, password.
[k] member can print be presented at its with printer that its PC links to each other on permit.
[1] all authorization message is stored in lane database and takes in order to accessing from now on.
The online evaluation module of networking: it one with application server that internet links to each other on move, and activate by an internet browser that on its PC, moves.The surveyor can use this module to do following thing anywhere:
[m] numbers password at entering module pronucleus to the reference.
[n] transfers file to be proved through the input file Certificate Number.
[o] compares the information that is revealed, and be correct and safe in case cheated to prove it.
The online evaluation module of networking: it moves on surveyor's PC, and activates through moving on the module on the independent PC that links to each other with scanning machine at.The reference can do following thing with this module:
[p] scans the file that has been proved to be with scanner.
The information of [q] deciphering in the bidimensional sign indicating number is (after deciphering random by key with the system decrypts key; And compressed fileinfo is deciphered the back with random by key) perhaps (hash code is deciphered and itself and compressed fileinfo hash code are compared) with the system decrypts sign indicating number, compressed file information is carried out decompress(ion) contract its demonstration.
[r] relatively or print the information be shown identifies its correct and safety, in case be deceived.
[s] is because not identical with it system's existence on form and form in the prior art system, so the present invention is unique.
Most preferred embodiment of the present invention:
Module of the present invention is connected mutually, is also shared a database, and they carry out work as a module.Use primary module, administration module and Registering modules are realized proof office, supvr, Registrar, company and the member registration at the proof office data.With a digiboard and one 3 signatures of electronic pen registration as shown in Figure 5 or more signature, they are signatures of each gerentocratic signature of (see figure 1), Registrar and member.The member uses the proof module can get into fileinfo, on digiboard, registers their signature with electronic pen, and described electronic pen is connected with its PC.After this, system's figure of will signing compares with the signature figure that is stored in lane database, identifies the correct of signature.If correct, this information is stored in lane database, like this, and prover is just accused and accomplished.The member can use the printer that links to each other with its PC to use this system print member's as shown in Figure 1 signature; The seal of his company (as shown in Figure 2); Proof office seal as shown in Figure 3, proves time and a 2D bar code as shown in Figure 4 at Certificate Number, date of certification; Like this, authentication procedure is just accused and is accomplished.
The member can authorize any others print documentary evidence anywhere.
Described 2D bar code is a standard code, but their generation approach is different, with a kind of bar code that produces in the method for two kinds of generations of the present invention bar code.On level and vertical both direction, be furnished with bar code.Produce and print it with 2D sign indicating number generation program, this program is sent to information on the belt strip.Encryption technology is used two kinds of keys, and a kind of being used for encrypts, and a kind ofly is used for separating our PK1 of being known of Miru.It produces a kind of sign indicating number that is used for any information data of uniqueness hash code (hash code) program.
This system compresses fileinfo, with the key at random that system produces compressed fileinfo is encrypted, and with the system encryption key key is at random encrypted, and goes out the 2D bar code from encrypted key at random and encrypted compressed file information generating.Perhaps use the system encryption key that compressed file information hash code (Hash code) is encrypted, produce the 2D bar code from encrypted hash code and the fileinfo that has been compressed.
Described 2D bar code comprises following information:
[1] fileinfo
[2] member's name
[3] CompanyName
[4] prove office's name
[5] prove office's seal
[6] system decrypts key name
[7] key or hash code at random
Off-grid proof moduleMake the reference after file being scanned, can understand the 2D bar code with (as shown in Figure 6) scanner; (key is at random deciphered with the system decrypts key; With key at random compressed file information is deciphered) perhaps (hash code is deciphered and itself and compressed file information hash code are compared) with the system decrypts key; Compressed file information is decompressed; And as previously mentioned, module shows that the reference can compare to confirm that its correct and safety are in case be deceived with the fileinfo that is printed.
The reference can confirm that from the information that demonstration is proved to be file it is correct and safe in case be deceived through internet with networking module.
The scope of embodiment of the present invention can be used to the following item of maintaining secrecy with above-mentioned claim: Department of Commerce and industrial file, and bank and finance and economics file, government and legal document, medical treatment needs to be maintained secrecy in case the file of being deceived with insurance file and all.
Claims (9)
1. digital certificates and identification systems comprise:
A 2D bar code; Said 2D bar code is to be produced and printed by a proof module; Produce with method of encrypting at the 2D bar code described in this proof module, in said proof module, a system encryption key produces through a primary module; Described encryption key is used to described 2D bar code is encrypted, and described 2D bar code is prepared by an evaluation module; It is characterized in that:
Described digital certificates and identification systems were checked user number, password and signature before getting into the proof module; Get into and preserve the fileinfo of required proof then, use electronic pen, login member's signature is to prove signature on digiboard; The signature figure of having been logined and the member who the is stored in database figure of signing is compared, if signature is correct, system will show that the member signs; The seal of its company, proving the seal at center proves number; Prove time and 2D bar code date of certification, and described member can print the certificate on the printer that is presented at him; And printer links to each other with its PC, and described member can authorize to print and give other people, and they can remove to print documentary evidence with an authorization module; On this document transaction value by directly from member account deduction, at there, all documentary evidence information be stored in a lane database with prove its correct with safety in case deception.
2. digital certificates as claimed in claim 1 and identification systems is characterized in that: these digital certificates and identification systems also include an administration module, and it moves on an application server, and this application server is connected with internet.
3. digital certificates as claimed in claim 2 and identification systems; It is characterized in that: described management mould can be used to verify gerentocratic number soon; Password and signature, registration proof office information with they the Registrar's of the seal of lane database, registration proof office information and login their signature, activation or deactivation proof office the Registrar, Subscriber Number and password are provided and print control report to the Registrar of proof office.
4. digital certificates as claimed in claim 2 and identification systems is characterized in that: these digital certificates and identification systems also include a Registering modules, and this Registering modules moves on said application server.
5. electronic identification as claimed in claim 4 and identification systems is characterized in that: the keeper can use this registration mould soon to Registrar's number, password and signature with get into mould fast, get into the company information that is asked to prove, electronic pen login their signature, activation or deactivation that the number information of the new line signed as letter, pin that letter is signed and seal etc., company incorporated and using links with the PC signatory's or company number, their numbering and password be provided and print transaction reporting to the member of company.
6. digital certificates as claimed in claim 1 and identification systems; It is characterized in that: said authorization module is examined licensee's number password by before the module of described proof module mandate in entering, and number can print permit on the printer that is presented at him.
7. electronic identification as claimed in claim 1 and identification systems; It is characterized in that: these digital certificates and firm system also include an online proof module; This online proof module is checked verifier's number, password before getting into module; Regain the file that will prove through getting into the documentary evidence number, the information that relatively is shown confirms its correctness and safety, avoids being deceived.
8. electronic identification as claimed in claim 1 and identification systems; It is characterized in that: these digital certificates and firm system also comprise an off-line and identify module; Identify that at this off-line described off-line (Offline) evaluation module is moved in the module on identifier's personal computer; And, through operate in one with independently personal computer that a scanning machine links to each other on module be activated.
9. electronic identification as claimed in claim 8 and identification systems; It is characterized in that: described off-line identifies that module scans certified file with scanner, after to described information decoding, reads out in the information in the 2D bar code, and compressed file information is carried out decompress(ion) contracts its demonstration; The information that relatively is shown again; Prove that it is correct, safety is in case be deceived.
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN2005101197376A CN1959711B (en) | 2005-11-03 | 2005-11-03 | Electronic certificate and its authentication system |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN2005101197376A CN1959711B (en) | 2005-11-03 | 2005-11-03 | Electronic certificate and its authentication system |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| CN1959711A CN1959711A (en) | 2007-05-09 |
| CN1959711B true CN1959711B (en) | 2012-02-15 |
Family
ID=38071397
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CN2005101197376A Expired - Fee Related CN1959711B (en) | 2005-11-03 | 2005-11-03 | Electronic certificate and its authentication system |
Country Status (1)
| Country | Link |
|---|---|
| CN (1) | CN1959711B (en) |
Families Citing this family (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN103426081A (en) * | 2013-08-14 | 2013-12-04 | 席志刚 | Method and system for remote intelligent seal control and safety anti-fake |
| DE102014010339A1 (en) * | 2014-07-11 | 2016-01-14 | Giesecke & Devrient Gmbh | Method for reading out an identity document |
Citations (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN1289985A (en) * | 2000-10-13 | 2001-04-04 | 姚志邦 | Antiforge method and device for deposit receipt of bank |
| CN1289972A (en) * | 2000-10-13 | 2001-04-04 | 姚志邦 | Antiforge method and device for property right certificate |
-
2005
- 2005-11-03 CN CN2005101197376A patent/CN1959711B/en not_active Expired - Fee Related
Patent Citations (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN1289985A (en) * | 2000-10-13 | 2001-04-04 | 姚志邦 | Antiforge method and device for deposit receipt of bank |
| CN1289972A (en) * | 2000-10-13 | 2001-04-04 | 姚志邦 | Antiforge method and device for property right certificate |
Also Published As
| Publication number | Publication date |
|---|---|
| CN1959711A (en) | 2007-05-09 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US10637665B1 (en) | Blockchain-based digital identity management (DIM) system | |
| US8086867B2 (en) | Secure identity and privilege system | |
| US7519825B2 (en) | Electronic certification and authentication system | |
| US20030012374A1 (en) | Electronic signing of documents | |
| US11444784B2 (en) | System and method for generation and verification of a subject's identity based on the subject's association with an organization | |
| JPH02291043A (en) | Method for performig signature and certification by digital system | |
| Qureshi et al. | SeVEP: Secure and verifiable electronic polling system | |
| CN112398920A (en) | Medical privacy data protection method based on block chain technology | |
| RU2647642C1 (en) | Method of the document certification with an irreversible digital signature | |
| US11640616B2 (en) | System and method of counting votes in an electronic voting system | |
| CN1959711B (en) | Electronic certificate and its authentication system | |
| KR100453616B1 (en) | Method, article and apparatus for registering registrants, such as voter registrants | |
| EP1688891B1 (en) | Electronic certification and authentication system | |
| Obaidat et al. | Protecting the integrity of elections using biometrics | |
| Prosser et al. | Security assets in e-voting | |
| Abo-Rizka et al. | A Novel E-voting in Egypt | |
| EP3568788A1 (en) | System and method for authenticating security certificates | |
| CN109120397B (en) | Document authentication method and system based on identification password | |
| US7237120B1 (en) | Method for producing and checking forge-proof documents | |
| EP3491575B1 (en) | Method and system for the authentic determination of the identity of an electronic document with itself at a later date or with a copy thereof | |
| Jillbert et al. | ONLINE VOTING FOR E-DEMOCRACY IN DEVELOPING COUNTRIES: IS IT POSSIBLE? | |
| Bernhard | Physical Cryptographic Signatures for Absentee Ballots | |
| Minihan | Electronic signature technologies: a tutorial.(Cover Story) | |
| JP2008090407A (en) | History management system | |
| CN117725627A (en) | Digital signature method based on real-name authentication and digital certificate |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| C06 | Publication | ||
| PB01 | Publication | ||
| C10 | Entry into substantive examination | ||
| SE01 | Entry into force of request for substantive examination | ||
| C14 | Grant of patent or utility model | ||
| GR01 | Patent grant | ||
| CF01 | Termination of patent right due to non-payment of annual fee | ||
| CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20120215 Termination date: 20161103 |