CN105138873A - Image-based safety certification method and device - Google Patents
Image-based safety certification method and device Download PDFInfo
- Publication number
- CN105138873A CN105138873A CN201510516025.1A CN201510516025A CN105138873A CN 105138873 A CN105138873 A CN 105138873A CN 201510516025 A CN201510516025 A CN 201510516025A CN 105138873 A CN105138873 A CN 105138873A
- Authority
- CN
- China
- Prior art keywords
- image
- watermark
- scanned copy
- file eigenvalue
- management system
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T1/00—General purpose image data processing
- G06T1/0021—Image watermarking
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- General Engineering & Computer Science (AREA)
- Databases & Information Systems (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Editing Of Facsimile Originals (AREA)
- Image Processing (AREA)
Abstract
The invention discloses an image-based safety certification method and device. The method comprises the steps that images are collected to generate a first scanning copy, safety certification is carried out on the first scanning copy, a first file feature code of the images is obtained through calculation, and/or a first watermark of the images is generated according to image information, so that the first file feature code and/or the first watermark are/is stored in a file management system; images are collected to generate a second scanning copy, safety certification is carried out on the second canning copy, a second file feature code of the images is obtained through calculation, and/or a second watermark of the images is generated according to image information; after the second file feature code and/or the second watermark are/is the same as the first file feature code and/or the first watermark, images in the file management system are allowed to be processed. Safety and reliability of file management are improved.
Description
Technical field
The present invention relates to technical field of security authentication, espespecially a kind of safety certifying method based on image and device.
Background technology
Along with the development of electronic information technology, many traditional workflows and working method are all to the future development of electronization, procedure, especially in file administration field, traditional paper document and bill are preserved and authentication method can not meet storage and the use of magnanimity information.In the development tide of archives electronization, electronic information technology serves key effect.Utilize the present information means such as cyber-net to collect archives and bill, arrange, store and process, building database, efficient information retrieval function is provided.
But existing archive management method often depends on single personnel's legitimacy certification, that can not really accomplish in the electronic process such as archives and bill is safe and reliable.
Summary of the invention
In order to solve the problems of the technologies described above, the invention provides a kind of safety certifying method based on image and device, improve the safety and reliability of file administration.
In order to reach the object of the invention, the invention provides a kind of safety certifying method based on image, comprise: collection generation first scanned copy is carried out to image, the first file eigenvalue that safety certification calculates described image is carried out to described first scanned copy, and/or, generate the first watermark of described image according to image information, described first file eigenvalue and/or described first watermark are kept in archive management system; Collection generation second scanned copy is carried out to described image, the second file eigenvalue that safety certification calculates computed image is carried out to described second scanned copy, and/or, the second watermark of described image is generated according to image information; Determine the second file eigenvalue and/or the second watermark identical with the first file eigenvalue that archive management system is preserved and/or the first watermark after, allow to process the described image in archive management system.
Further, described the first file eigenvalue that safety certification calculates described image is carried out to described first scanned copy, described the second file eigenvalue that safety certification calculates computed image is carried out to described second scanned copy, be specially: md5 encryption is carried out to all pixel information of the first scanned copy and the second scanned copy, and calculate the first file eigenvalue of the first scanned copy and the second file eigenvalue of the second scanned copy respectively by digest algorithm.
Further, described the first watermark generating described image according to image information, described the second watermark generating described image according to image information, be specially: by the identical information in image, and by Linux standard criterion LSB algorithm, generate the first watermark of the first scanned copy and the second watermark of the second scanned copy respectively.
Further, described collection generation second scanned copy is carried out to described image before, also comprise: the authentication that user is set, described authentication comprise user name, password, fingerprint and face feature scanning in one or more; After determining that user is legal according to the authentication arranged, user is allowed to enter archive management system.
Further, described first file eigenvalue and/or the first watermark and described image are bound, and the first file eigenvalue of described image and binding and/or the first watermark are kept in archive management system.
Further, described determine the second file eigenvalue and/or the second watermark identical with the first file eigenvalue that archive management system is preserved and/or the first watermark after, allow to process the described image in archive management system, be specially: in the first file eigenvalue that archive management system is inquired about and described image is corresponding and/or the first watermark, first file eigenvalue and the second file eigenvalue are compared, and/or first watermark and the second watermark compare, if identical, then allow to process the described image in archive management system
Present invention also offers a kind of safety certification device based on image, comprising: acquisition module, for carrying out collection generation first scanned copy and the second scanned copy to image; First processing module, the first scanned copy for generating described acquisition module carries out the first file eigenvalue that safety certification calculates described image, and/or, generate the first watermark of described image according to image information, described first file eigenvalue and/or described first watermark are kept in archive management system; The second file eigenvalue that safety certification calculates computed image is carried out to the second scanned copy that described acquisition module generates, and/or, the second watermark of described image is generated according to image information; Second judge module, for judge the second file eigenvalue and/or the second watermark and the first file eigenvalue that archive management system is preserved and/or the first watermark whether identical; Second processing module, if for described second judge module judge identical after, allow to process the described image in archive management system.
Further, described first processing module, specifically for: md5 encryption is carried out to all pixel information of the first scanned copy and the second scanned copy, and calculates the first file eigenvalue of the first scanned copy and the second file eigenvalue of the second scanned copy respectively by digest algorithm; By to the identical information in image, and by Linux standard criterion LSB algorithm, generate the first watermark of the first scanned copy and the second watermark of the second scanned copy respectively.
Further, described device also comprises: arrange module, and for arranging the authentication of user, described authentication comprises one or more in the scanning of user name, password, fingerprint and face feature;
According to the authentication arranged, first judge module, for judging that whether user is legal; Described second processing module, also for judge at described first judge module legal after, allow user enter archive management system.
Further, described first processing module, also for: described first file eigenvalue and/or the first watermark and described image are bound, and the first file eigenvalue of described image and binding and/or the first watermark are kept in archive management system; Described second judge module, specifically for: in the first file eigenvalue that archive management system is inquired about and described image is corresponding and/or the first watermark, first file eigenvalue and the second file eigenvalue are compared, and/or the first watermark and the second watermark are compared.
Compared with prior art, the present invention includes and collection generation first scanned copy is carried out to image, the first file eigenvalue that safety certification calculates described image is carried out to described first scanned copy, and/or, generate the first watermark of described image according to image information, described first file eigenvalue and/or described first watermark are kept in archive management system; Collection generation second scanned copy is carried out to described image, the second file eigenvalue that safety certification calculates computed image is carried out to described second scanned copy, and/or, the second watermark of described image is generated according to image information; Determine the second file eigenvalue and/or the second watermark identical with the first file eigenvalue that archive management system is preserved and/or the first watermark after, allow to process the described image in archive management system.The present invention is except carrying out safety certification to user, the scanned copy of image is also gathered respectively by image acquisition phase and image authentication stage, according to scanned copy spanned file condition code and/or watermark respectively, and two stage file eigenvalue and/or watermark are compared, confirm that the identical rear archive management system that just can enter processes image, so, improve the safety and reliability of file administration.
Other features and advantages of the present invention will be set forth in the following description, and, partly become apparent from instructions, or understand by implementing the present invention.Object of the present invention and other advantages realize by structure specifically noted in instructions, claims and accompanying drawing and obtain.
Accompanying drawing explanation
Accompanying drawing is used to provide the further understanding to technical solution of the present invention, and forms a part for instructions, is used from and explains technical scheme of the present invention, do not form the restriction to technical solution of the present invention with the embodiment one of the application.
Fig. 1 is the schematic flow sheet based on the safety certifying method of image in a kind of embodiment of the present invention.
Fig. 2 is the structural representation based on the safety certification device of image in a kind of embodiment of the present invention.
Embodiment
For making the object, technical solutions and advantages of the present invention clearly understand, hereinafter will be described in detail to embodiments of the invention by reference to the accompanying drawings.It should be noted that, when not conflicting, the embodiment in the application and the feature in embodiment can combination in any mutually.
Can perform in the computer system of such as one group of computer executable instructions in the step shown in the process flow diagram of accompanying drawing.Further, although show logical order in flow charts, in some cases, can be different from the step shown or described by order execution herein.
Fig. 1 is the schematic flow sheet based on the safety certifying method of image in a kind of embodiment of the present invention.As shown in Figure 1, the process of this safety certification comprises image acquisition phase and image authentication stage:
Step 101, collection generation first scanned copy is carried out to image, the first file eigenvalue that safety certification calculates this image is carried out to the first scanned copy, and/or, generate the first watermark of this image according to the information in image, the first file eigenvalue and/or the first watermark are kept in archive management system.
This step belongs to image acquisition phase, in this step, collection generation first scanned copy is carried out to the image such as archives and bill, the authentication method good to the first scanned copy predefine or strategy carry out safety certification calculating, draw the first file eigenvalue of this image, such as md5 encryption is carried out to all pixel information of scanned copy, and calculate the first file eigenvalue by digest algorithm; Such as, and/or generate the first watermark by the key feature information in image according to assignment algorithm, the key message be concerned about user is as the date, and signature waits and generates the first watermark with Linux standard criterion (LSB, LinuxStandardsBase) algorithm.Image and the first file eigenvalue and/or the first watermark are bound, the first file eigenvalue of image and binding and/or the first watermark are kept in the database of archive management system.
Step 102, arranges the authentication of user.
In this step, one or more that can arrange user name, password, fingerprint and face feature scanning etc. are as authentication.
In the present embodiment, first carry out step 101, then carry out step 102, other orders are also passable certainly, such as, first carry out steps 102, then carry out steps 101, or carry out step 102 at the sweep phase carrying out step 101, do not limit at this.
Step 103, the authentication according to arranging judges that whether user is legal, if legal, carry out step 104; If illegal, refusal user enters archive management system.
In this step, to needing the user entering archive management system to carry out safety certification, such as, carry out safety certification according to modes such as the user name arranged, password, fingerprint and/or face feature scannings.If safety certification is passed through, then carry out follow-up step; If safety certification is not passed through, then archive management system cannot be entered.
Step 104, carries out collection generation second scanned copy to image, carries out to the second scanned copy the second file eigenvalue that safety certification calculates this image, and/or, the second watermark of this image is generated according to the information in image.
This step belongs to the image authentication stage, in this step, collection generation second scanned copy is carried out to the image such as archives and bill, safety certification calculating is carried out to the second scanned copy authentication method identical with image acquisition phase or strategy, draw the second file eigenvalue of this image, such as md5 encryption is carried out to all pixel information of scanned copy, and calculate the second file eigenvalue by digest algorithm; And/or, the second watermark is generated according to assignment algorithm by the key feature information in the image identical with image acquisition phase, the key message be such as concerned about user is as the date, and signature waits and generates the second watermark with Linux standard criterion (LSB, LinuxStandardsBase) algorithm.
Step 105, judge the second file eigenvalue and/or the second watermark and the first file eigenvalue that archive management system is preserved and/or the first watermark whether identical, if identical, allow user to process the image in archive management system; If not identical, refusal user processes the image in archive management system.
In this step, in the first file eigenvalue that archive management system is inquired about and image is corresponding and/or the first watermark, first file eigenvalue and the second file eigenvalue are compared, and/or first watermark and the second watermark compare, if identical, user is allowed to process the image in archive management system; If not identical, refusal user processes the image in archive management system.
Compared to the prior art, the present invention is carrying out on the basis of safety certification to user, also by carrying out safety certification to the image in archive management system, improve the safety and reliability of file administration.
Fig. 2 is the structural representation based on the safety certification device of image in a kind of embodiment of the present invention.As shown in Figure 2, comprising:
Acquisition module, for carrying out collection generation first scanned copy and the second scanned copy to image;
First processing module, for carrying out the first file eigenvalue that safety certification calculates this image to the first scanned copy, and/or, the first watermark of this image is generated according to the information in image; The second file eigenvalue that safety certification draws this image is carried out to the second scanned copy, and/or, the second watermark of this image is generated according to the information in image;
Module is set, for arranging the authentication of user;
According to the authentication arranged, first judge module, for judging that whether user is legal;
Second judge module, for determine at the first judge module legal after, judge the first file eigenvalue and the second file eigenvalue, and/or whether the first watermark identical with the second watermark;
Second processing module, for determine at the first judge module illegal after, refusal user enter archive management system; The second judge module determine identical after, allow user the image in archive management system is processed; The second judge module determine not identical after, refusal user the image in archive management system is processed.
The ins and outs that safety certification device of the present invention relates to and safety certifying method similar, therefore to be not repeated herein.
In the present invention, except carrying out safety certification to user, the scanned copy of image is also gathered respectively by image acquisition phase and image authentication stage, according to scanned copy spanned file condition code and/or watermark respectively, and two stage file eigenvalue and/or watermark are compared, confirm that the identical rear archive management system that just can enter processes image, so, improve the safety and reliability of file administration.
Although the embodiment disclosed by the present invention is as above, the embodiment that described content only adopts for ease of understanding the present invention, and be not used to limit the present invention.Those of skill in the art belonging to any the present invention; under the prerequisite not departing from the spirit and scope disclosed by the present invention; any amendment and change can be carried out in the form implemented and details; but scope of patent protection of the present invention, the scope that still must define with appending claims is as the criterion.
Claims (10)
1. based on a safety certifying method for image, it is characterized in that, comprising:
Collection generation first scanned copy is carried out to image, the first file eigenvalue that safety certification calculates described image is carried out to described first scanned copy, and/or, generate the first watermark of described image according to image information, described first file eigenvalue and/or described first watermark are kept in archive management system;
Collection generation second scanned copy is carried out to described image, the second file eigenvalue that safety certification calculates computed image is carried out to described second scanned copy, and/or, the second watermark of described image is generated according to image information;
Determine the second file eigenvalue and/or the second watermark identical with the first file eigenvalue that archive management system is preserved and/or the first watermark after, allow to process the described image in archive management system.
2. the safety certifying method based on image according to claim 1, it is characterized in that, described the first file eigenvalue that safety certification calculates described image is carried out to described first scanned copy, described the second file eigenvalue that safety certification calculates computed image is carried out to described second scanned copy, is specially:
Md5 encryption is carried out to all pixel information of the first scanned copy and the second scanned copy, and calculates the first file eigenvalue of the first scanned copy and the second file eigenvalue of the second scanned copy respectively by digest algorithm.
3. the safety certifying method based on image according to claim 1, is characterized in that, described the first watermark generating described image according to image information, and described the second watermark generating described image according to image information, is specially:
By to the identical information in image, and by Linux standard criterion LSB algorithm, generate the first watermark of the first scanned copy and the second watermark of the second scanned copy respectively.
4. the safety certifying method based on image according to claim 1, is characterized in that, described collection generation second scanned copy is carried out to described image before, also comprise:
Arrange the authentication of user, described authentication comprises one or more in the scanning of user name, password, fingerprint and face feature;
After determining that user is legal according to the authentication arranged, user is allowed to enter archive management system.
5. the safety certifying method based on image according to any one of Claims 1 to 4, it is characterized in that, described first file eigenvalue and/or the first watermark and described image are bound, and the first file eigenvalue of described image and binding and/or the first watermark are kept in archive management system.
6. the safety certifying method based on image according to claim 5, it is characterized in that, described determine the second file eigenvalue and/or the second watermark identical with the first file eigenvalue that archive management system is preserved and/or the first watermark after, allow to process the described image in archive management system, be specially:
In the first file eigenvalue that archive management system is inquired about and described image is corresponding and/or the first watermark, first file eigenvalue and the second file eigenvalue are compared, and/or first watermark and the second watermark compare, if identical, then allow to process the described image in archive management system.
7. based on a safety certification device for image, it is characterized in that, comprising:
Acquisition module, for carrying out collection generation first scanned copy and the second scanned copy to image;
First processing module, the first scanned copy for generating described acquisition module carries out the first file eigenvalue that safety certification calculates described image, and/or, generate the first watermark of described image according to image information, described first file eigenvalue and/or described first watermark are kept in archive management system; The second file eigenvalue that safety certification calculates computed image is carried out to the second scanned copy that described acquisition module generates, and/or, the second watermark of described image is generated according to image information;
Second judge module, for judge the second file eigenvalue and/or the second watermark and the first file eigenvalue that archive management system is preserved and/or the first watermark whether identical;
Second processing module, if for described second judge module judge identical after, allow to process the described image in archive management system.
8. the safety certification device based on image according to claim 6, is characterized in that, described first processing module, specifically for:
Md5 encryption is carried out to all pixel information of the first scanned copy and the second scanned copy, and calculates the first file eigenvalue of the first scanned copy and the second file eigenvalue of the second scanned copy respectively by digest algorithm;
By to the identical information in image, and by Linux standard criterion LSB algorithm, generate the first watermark of the first scanned copy and the second watermark of the second scanned copy respectively.
9. the safety certification device based on image according to claim 6, is characterized in that, described device also comprises:
Arrange module, for arranging the authentication of user, described authentication comprises one or more in the scanning of user name, password, fingerprint and face feature;
According to the authentication arranged, first judge module, for judging that whether user is legal;
Described second processing module, also for judge at described first judge module legal after, allow user enter archive management system.
10. the safety certification device based on image according to claim 6, it is characterized in that, described first processing module, also for: described first file eigenvalue and/or the first watermark and described image are bound, and the first file eigenvalue of described image and binding and/or the first watermark are kept in archive management system;
Described second judge module, specifically for: in the first file eigenvalue that archive management system is inquired about and described image is corresponding and/or the first watermark, first file eigenvalue and the second file eigenvalue are compared, and/or the first watermark and the second watermark are compared.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510516025.1A CN105138873A (en) | 2015-08-20 | 2015-08-20 | Image-based safety certification method and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510516025.1A CN105138873A (en) | 2015-08-20 | 2015-08-20 | Image-based safety certification method and device |
Publications (1)
Publication Number | Publication Date |
---|---|
CN105138873A true CN105138873A (en) | 2015-12-09 |
Family
ID=54724218
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510516025.1A Pending CN105138873A (en) | 2015-08-20 | 2015-08-20 | Image-based safety certification method and device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105138873A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109145563A (en) * | 2018-08-13 | 2019-01-04 | 阿里巴巴集团控股有限公司 | A kind of auth method and device |
CN115511473A (en) * | 2022-11-02 | 2022-12-23 | 北京共识数信科技有限公司 | Intelligent letter management method, system and storage medium based on big data |
Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2000083159A (en) * | 1998-04-13 | 2000-03-21 | Internatl Business Mach Corp <Ibm> | Method for distributing and authenticating data set by using water-mark and device therefor |
JP2002215029A (en) * | 2001-01-22 | 2002-07-31 | Seiko Epson Corp | Information authentication device and digital camera using the same |
CN101059863A (en) * | 2006-04-20 | 2007-10-24 | 刘瑞祯 | Embed and detection method for identifying water mark, its system and uses |
CN101079101A (en) * | 2007-06-19 | 2007-11-28 | 中山大学 | Zernike moment based robust hashing image authentification method |
CN102194208A (en) * | 2011-05-26 | 2011-09-21 | 西安理工大学 | Image falsification detecting and falsification positioning method based on image signature |
CN102208096A (en) * | 2011-05-26 | 2011-10-05 | 西安理工大学 | Image tamper detection and tamper localization method based on discrete wavelet transformation |
CN103106656A (en) * | 2013-01-21 | 2013-05-15 | 西安理工大学 | Image signature generation method and tampering detection and locating method based on contourlet transformation |
CN103238159A (en) * | 2010-09-28 | 2013-08-07 | 华为技术有限公司 | System and method for image authentication |
CN104462896A (en) * | 2014-11-19 | 2015-03-25 | 福建亿榕信息技术有限公司 | Reliable video data acquisition and certification method with security certification function |
-
2015
- 2015-08-20 CN CN201510516025.1A patent/CN105138873A/en active Pending
Patent Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2000083159A (en) * | 1998-04-13 | 2000-03-21 | Internatl Business Mach Corp <Ibm> | Method for distributing and authenticating data set by using water-mark and device therefor |
JP2002215029A (en) * | 2001-01-22 | 2002-07-31 | Seiko Epson Corp | Information authentication device and digital camera using the same |
CN101059863A (en) * | 2006-04-20 | 2007-10-24 | 刘瑞祯 | Embed and detection method for identifying water mark, its system and uses |
CN101079101A (en) * | 2007-06-19 | 2007-11-28 | 中山大学 | Zernike moment based robust hashing image authentification method |
CN103238159A (en) * | 2010-09-28 | 2013-08-07 | 华为技术有限公司 | System and method for image authentication |
CN102194208A (en) * | 2011-05-26 | 2011-09-21 | 西安理工大学 | Image falsification detecting and falsification positioning method based on image signature |
CN102208096A (en) * | 2011-05-26 | 2011-10-05 | 西安理工大学 | Image tamper detection and tamper localization method based on discrete wavelet transformation |
CN103106656A (en) * | 2013-01-21 | 2013-05-15 | 西安理工大学 | Image signature generation method and tampering detection and locating method based on contourlet transformation |
CN104462896A (en) * | 2014-11-19 | 2015-03-25 | 福建亿榕信息技术有限公司 | Reliable video data acquisition and certification method with security certification function |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109145563A (en) * | 2018-08-13 | 2019-01-04 | 阿里巴巴集团控股有限公司 | A kind of auth method and device |
CN115511473A (en) * | 2022-11-02 | 2022-12-23 | 北京共识数信科技有限公司 | Intelligent letter management method, system and storage medium based on big data |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110598376B (en) | Copyright authentication method, device and equipment based on block chain and storage medium | |
US7971063B2 (en) | Method and device for safeguarding of a document with inserted signature image and biometric data in a computer system | |
EP3543891B1 (en) | A computer implemented method and a system for tracking of certified documents lifecycle and computer programs thereof | |
CN111581653A (en) | Contract document signing method, device, equipment and computer readable storage medium | |
CN100464561C (en) | Image reading apparatus, electronic document generation method, and storing medium storing electronic document generation program | |
CN112487490B (en) | Tamper identification method, device and medium | |
CN102609542B (en) | X-ray digital image feature database for detecting power equipment | |
US7761922B1 (en) | Methods and apparatus for contemporaneously acquiring and certifying content | |
CN113343313A (en) | Verification report validity identification method, legal service system and readable storage medium | |
CN105138873A (en) | Image-based safety certification method and device | |
JP3872933B2 (en) | Document authentication method, system, document creation device, document authentication device, and recording medium | |
CN111008387A (en) | Anti-counterfeiting tracing system and method for printed document based on digital signature and document DNA | |
CN111222172A (en) | Electronic signature method and system for mobile terminal based on face real-name authentication protection | |
WO2024217381A1 (en) | Trusted evidence storage method and apparatus for evidence, and medium and device | |
CN109299588A (en) | A kind of seal device and its method of affixing one's seal | |
CN101758695A (en) | Printed document anti-counterfeiting method based on fingerprint feature | |
CN104462896A (en) | Reliable video data acquisition and certification method with security certification function | |
US20080040813A1 (en) | Image reading apparatus, an image information verification apparatus, an image reading method, an image information verification method, and an image reading program | |
US11971929B2 (en) | Secure signing method, device and system | |
CN107861699A (en) | A kind of office print system and method based on iris authentication and smart card authentication | |
CN113254396A (en) | Case collaborative management system for multiple departments | |
UA127687C2 (en) | Signing method system and/or device | |
CN117910011B (en) | Method, equipment and medium for detecting total data integrity of single set of electronic archive file | |
JP4319020B2 (en) | Electronic application data management system with attachments, electronic application data management method with attachments | |
CN110889369A (en) | Self-service machine equipment and operation method thereof |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20151209 |