CN113626776A - Information carrier concept attribute transfer and electronic signature printable method - Google Patents
Information carrier concept attribute transfer and electronic signature printable method Download PDFInfo
- Publication number
- CN113626776A CN113626776A CN202110900878.0A CN202110900878A CN113626776A CN 113626776 A CN113626776 A CN 113626776A CN 202110900878 A CN202110900878 A CN 202110900878A CN 113626776 A CN113626776 A CN 113626776A
- Authority
- CN
- China
- Prior art keywords
- file
- image
- information
- signature
- regularization
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 130
- 238000012546 transfer Methods 0.000 title description 16
- 230000008569 process Effects 0.000 claims abstract description 59
- 238000012795 verification Methods 0.000 claims abstract description 52
- 238000005516 engineering process Methods 0.000 claims abstract description 40
- 238000012545 processing Methods 0.000 claims abstract description 19
- 241000282414 Homo sapiens Species 0.000 claims abstract description 17
- 239000000969 carrier Substances 0.000 claims abstract description 15
- 238000001914 filtration Methods 0.000 claims abstract description 4
- 230000005540 biological transmission Effects 0.000 claims description 24
- 230000007547 defect Effects 0.000 claims description 20
- 238000013473 artificial intelligence Methods 0.000 claims description 19
- 230000006870 function Effects 0.000 claims description 16
- 230000000694 effects Effects 0.000 claims description 14
- 230000008901 benefit Effects 0.000 claims description 5
- 230000008859 change Effects 0.000 claims description 5
- 238000012937 correction Methods 0.000 claims description 5
- 238000013528 artificial neural network Methods 0.000 claims description 3
- 238000013461 design Methods 0.000 claims description 3
- 238000007726 management method Methods 0.000 claims description 3
- 230000001364 causal effect Effects 0.000 claims description 2
- 238000005457 optimization Methods 0.000 claims description 2
- 238000003860 storage Methods 0.000 claims description 2
- 238000002360 preparation method Methods 0.000 claims 2
- 230000015572 biosynthetic process Effects 0.000 claims 1
- 230000019771 cognition Effects 0.000 claims 1
- 230000007812 deficiency Effects 0.000 claims 1
- 238000010191 image analysis Methods 0.000 claims 1
- 230000010365 information processing Effects 0.000 claims 1
- 238000007781 pre-processing Methods 0.000 claims 1
- 238000007429 general method Methods 0.000 abstract 1
- 238000004989 laser desorption mass spectroscopy Methods 0.000 abstract 1
- 238000012015 optical character recognition Methods 0.000 description 9
- 238000011160 research Methods 0.000 description 7
- 230000007246 mechanism Effects 0.000 description 6
- 230000009471 action Effects 0.000 description 4
- 238000011161 development Methods 0.000 description 4
- 230000018109 developmental process Effects 0.000 description 4
- 230000008520 organization Effects 0.000 description 4
- 238000004458 analytical method Methods 0.000 description 3
- 230000006399 behavior Effects 0.000 description 3
- 238000010586 diagram Methods 0.000 description 3
- 238000003384 imaging method Methods 0.000 description 3
- 239000003999 initiator Substances 0.000 description 3
- 230000000873 masking effect Effects 0.000 description 3
- 238000005070 sampling Methods 0.000 description 3
- 230000004075 alteration Effects 0.000 description 2
- 230000009286 beneficial effect Effects 0.000 description 2
- 230000006835 compression Effects 0.000 description 2
- 238000007906 compression Methods 0.000 description 2
- 238000009826 distribution Methods 0.000 description 2
- 230000002452 interceptive effect Effects 0.000 description 2
- 230000002427 irreversible effect Effects 0.000 description 2
- 238000012423 maintenance Methods 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 238000010422 painting Methods 0.000 description 2
- 238000012360 testing method Methods 0.000 description 2
- 230000001960 triggered effect Effects 0.000 description 2
- 230000003542 behavioural effect Effects 0.000 description 1
- 230000000903 blocking effect Effects 0.000 description 1
- 238000004364 calculation method Methods 0.000 description 1
- 238000006243 chemical reaction Methods 0.000 description 1
- 239000003086 colorant Substances 0.000 description 1
- 238000010835 comparative analysis Methods 0.000 description 1
- 238000012790 confirmation Methods 0.000 description 1
- 238000005520 cutting process Methods 0.000 description 1
- 230000007123 defense Effects 0.000 description 1
- 238000001514 detection method Methods 0.000 description 1
- 238000011156 evaluation Methods 0.000 description 1
- 230000006872 improvement Effects 0.000 description 1
- 238000007689 inspection Methods 0.000 description 1
- 210000001503 joint Anatomy 0.000 description 1
- 230000000704 physical effect Effects 0.000 description 1
- 238000003672 processing method Methods 0.000 description 1
- 230000001737 promoting effect Effects 0.000 description 1
- 238000004451 qualitative analysis Methods 0.000 description 1
- 238000004445 quantitative analysis Methods 0.000 description 1
- 238000009877 rendering Methods 0.000 description 1
- 230000011218 segmentation Effects 0.000 description 1
- 239000007787 solid Substances 0.000 description 1
- 238000012706 support-vector machine Methods 0.000 description 1
- 238000012549 training Methods 0.000 description 1
- 238000013519 translation Methods 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/16—Program or content traceability, e.g. by watermarking
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Technology Law (AREA)
- Multimedia (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Storage Device Security (AREA)
- Editing Of Facsimile Originals (AREA)
Abstract
The invention discloses a method for transmitting concept attributes of an information carrier and realizing the printing of an electronic signature, and provides a method for efficiently connecting electronic office ecology and paper office ecology by adding human beings such as the effectiveness of a printable electronic file to the concept attributes of the information carrier and transmitting the concept attributes to a printed part of the information carrier through an image processing technology. Regularizing an original file image in a preset mode, and filtering partial information to obtain a minimum protection scale; converting the regularized image into a code uniquely corresponding to the original file by using algorithms such as digital abstract, signature and the like, and storing the code in a covering area added on the file in the form of a graphic code; and identifying information on the printed matter, re-regularizing the acquired image, and comparing to complete verification of the specific concept attribute. The process mainly comprises 6 steps. The invention can be applied to OA, LIMS and other electronic office systems, and can be widely applied to various industries because the invention describes a general method for transmitting specific concept attributes among information carriers.
Description
Technical Field
The invention relates to a method for bringing brand-new vitality to various fields such as paperless office and the like before popularization of a brain-computer interface. The conceptual properties of an information carrier are a product of human thinking, such as the validity of an electronic signature file. The invention finds that the content and the concept attribute of the information carrier can be transmitted under the condition of meeting the requirements; the algorithmic techniques (digital digests, digital signatures) used to guarantee the above-mentioned transfers belong to the field of cryptography; the image processing technology for ensuring the transmission belongs to the field of computer vision; the affair used for maintaining the corresponding relation between the individual identity and the public key belongs to the extension of the trusted service field. The application method described by the invention depends on the realization of the related technologies of image processing, two-dimensional code generation and recognition and optical character recognition, and the artificial intelligence technology used in the specific implementation can ensure that the technical rings can meet the requirements of the invention, so the artificial intelligence technology also has the necessity. Key words: interpretive, paperless office, Office Automation (OA), Laboratory Information Management System (LIMS), artificial intelligence, cryptography, PKI-based trusted services, image processing, two-dimensional codes, Optical Character Recognition (OCR), interpretive (hermeneutics).
Background
Electronic signature technology is a technology that has been popularized for a long time, especially in the field of electronic commerce, however, how to use traditional paper office means in administrative office departments and enterprises and public institutions in a large amount? It is necessary to find out the most core problems faced by paperless office implementation, i.e. the shortcomings of the application of the existing electronic signature technology and electronic contract technology, and to propose a feasible solution. In the process of finding an answer, the present invention finds that the application of electronic signatures can be broadened to the range of electronic signatures, that is: so that it mimics the traditional physical signature as much as possible in its function. A physical seal is applied to the document contents or parts of the document contents, and the validity of the document is protected, which can be regarded as a conceptual attribute attached to the document, and then can the behavior be normalized? Namely: any person who meets the conditions can be attached to the conceptual properties of the information carrier and transferred to the information carrier, such as its printed matter, by some method. The invention provides a feasible method for the concept attribute transmission of the printable electronic signature and the information carrier by two research objects.
For the traditional OA and LIMS systems, the whole set of procedures provided by the system is often different from the procedures that the user actually needs to perform. The root cause of the difference is that the credible service provided by the credible service is difficult to be excessive in the paper link and the electronic link, once a node in the link is forced to use a paper file, in order to ensure the legality and the validity of the subsequent process, the whole process link is forced to use the traditional paper method, or the fact that the node is invalid is artificially covered (hidden danger is left). When a node is faced with too strong operational randomness, (for example, when a sampling person goes out for sampling in the product inspection and detection industry, no network signal exists in a sampling place, the power is off, and the sampled person does not accept an electronic version file. The above is the reason why the current paperless office does not benefit the majority of office staff. Even more important is the need for security of important documents in the administrative office environment, where the documents must be turned into paper versions for the relevant operations to prevent possible compromise through electronic systems. Faced with this difficulty, we can find three existing ways to make electronic contracts any time available after printing, by searching for internet information and patent listings. Referring to patent CN106951943B and some electronic signature platform, the three ways are: 1. and backing up the file to a server which is evaluated through network security level protection according to the national requirements, and comparing the file to confirm the validity of the file after the user logs in the server according to the satisfied conditions. 2. The information code (two-dimensional code) printed on the printed file is used for restoring a complete electronic document file (contract) to compare and confirm the validity of the electronic document file (contract), and a digital signature algorithm is used in the restoring process, so that the source can be verified. 3. The printed file is modified qualitatively or quantitatively by using the electronic watermark technology, the watermark can only be identified by a machine accessed to a specific system, and when the watermark is bound with the user identity, the source of the file can be judged and the tampering can be identified. The comparison between the three techniques and the related techniques of the new electronic signature provided by the present invention will be developed below to clarify the comprehensive advantages of the present invention. The electronic signature can imitate the function of physical signature, and the essence of the function is that the user can recognize the content contained in the information carrier, and the explanation of the content has public property, so that the document can have the concept attribute given to the document by human beings of validity, legality and the like. The present invention will be described in detail with reference to the various steps of the electronic signature method, and the application of this interpretation and the related methods to the transfer of the conceptual attributes of the information carrier by the same method as the electronic signature of the present invention are hereby incorporated into the essential scope of protection of this patent.
The technology for connecting the papery office ecology and the electronic office ecology is an important means for implementing paperless office work and protecting natural ecology before the brain-computer interface in the science fiction works really comes out, and is also an important base point for human to understand the propagation and the generation effects of information in the society until the human self. The conscious activities of individuals are like a black box, the inside of the black box cannot be directly observed by the outside, and the functions in the black box can be presumed only through the action of the individual behaviors on the outside. Since personal consciousness may not be studied by a strict scientific method, statistical studies on public phenomena in the world, i.e., society, are now the mainstream methods for psychological and social studies. Similarly, the invention is an application method based on public research and has a great potential.
Disclosure of Invention
The primary purpose of the invention is to further reduce the pushing difficulty of paperless office work, solve the disadvantages of the prior art by a brand-new technology, and carry out corresponding transverse comparison after the specific contents of the invention are explained; the invention changes the concept of the electronic signature from the figure only attached to the file to be generated after adding a specific figure and carrying out certain image processing, and is a verification method for proving a certain concept attribute of an information carrier to human beings, namely an objective existence for proving the additional relation, so that the printed matter with the electronic signature file can have the functions of file participant identity confirmation similar to the file with a physical signature, expressing the approval of the signer to the content of the file and the like, and supports the printing of any file which can be imaged, and the concept attribute of the validity and the like of the electronic signature file is equivalent to the concept attribute transmitted to the printed matter. Therefore, another object of the present invention is to connect the electronic office ecology and the paper office ecology by using a transmission method of concept attributes given to an information carrier by human beings, so that qualitative and quantitative analysis of the credit concept of the paper document becomes feasible, social benefits of scientific research nature are generated, and guidance is provided for application of concept attribute transmission beyond the validity of the electronic document.
In order to achieve the above object, the present invention provides a method for printing an electronic document with an electronic signature into a paper document, verifying the content and source of the paper document, ensuring that tampering above a certain spatial dimension (minimum protection dimension) can be identified, and being capable of being used for transferring specific concept attributes between information carriers. The method is characterized in that: 1. converting information carriers such as electronic files with wide sources into regularized image files meeting requirements by adopting modes such as an image processing technology and the like; 2. the method has the limitation of minimum protection scale, ensures the content consistency by reducing the protection fineness, and further realizes the transmission of concept attributes; 3. the regularized image file is converted into a code for verifying the content and source of the paper file and preventing tampering by adopting a digital abstract and a digital signature algorithm which are approved by the country or have other credibility; 4. directly attaching the signed ciphertext to information carriers such as a printed file and the like, converting the ciphertext into a graphic code and attaching the graphic code; 5. the requirements of different application scenes can be met by self-defining the digital abstract and the digital signature algorithm, so that the method has expansibility; 6. when the conditions are met, the verification process can be carried out in an off-line condition, so that the method is suitable for various open links in office ecology; 7. the method can have a plurality of verification stages, and can find out the non-conformity of the content or the source in advance so as to quickly eliminate the files to be verified; 8. the verification process is divided into two parts of document content verification and source verification, and a method of covering a designated area is introduced, so that mutual interference of all verification methods is eliminated. 9. The maximization eliminates the requirement on the format of the signed source file and eliminates the need for storing the signed file.
The principle of the invention is as follows: dividing the characteristics of the embodiment forms of the concept attributes such as the effectiveness of the file into content consistency and recognition uniqueness, wherein the content consistency refers to the same public interpretation of the content of various existing forms of the electronic file, the recognition uniqueness refers to the fact that the content of the file is recognized as the public interpretation by the file source side, the fact can be recorded on a certain information carrier, the fact of the public interpretation can be restored through the recording, and the transfer of the causal relationship of a specific fact is the transfer of the recognition uniqueness; the effectiveness of the information carrier is a concept attribute endowed to human beings, for example, if the information carrier has other concept attributes such as currency, and the content consistency and the recognition uniqueness of the attribute in the evolution of the information transmitter are accepted by the public, the concept attribute can also be considered to be transmitted (copied) to the evolution after the evolution from the pre-evolution stage along with the evolution of the information transmitter; the underlying principle of the invention is the publicity of human thinking; the specific principle of the invention is that the unique corresponding relation in the evolution process of the information carrier (the image regularization, the digital abstract, the digital signature and the ciphertext of the electronic file are attached to the printed matter) enables the evolved file to record the approved fact, realizes the transfer of the approved uniqueness (the introduction of the identity information), the minimum protection scale established by some means (such as image regularization) enables the imaging information carriers (the first electronic document and the last printed matter) presented in the public domain above the scale to be protected without external damage (information loss in the printing, circulation and scanning processes), the content consistency is realized, and the record of the approved fact is placed on the information carrier (printing) with the content consistency in a certain form (the content of the covered area), so that the finally evolved information carrier is proved to have the content consistency and the approval uniqueness of the carrier before the demonstration at the same time.
The main content of the invention comprises the following steps: 1. covering an area for storing graphic codes such as a signature ciphertext or a two-dimensional code and the like later on a presentation image of a file needing to be covered with an electronic signature under the condition of not influencing the content of the file, and covering a signature graphic at a designated position outside the covered area; 2. regularizing the image by using a special image processing technology such as artificial intelligence application, and then converting the image into a file with a specific format to perform irreversible operations such as digital summarization and the like for reducing the code length; 3. the operation result of the last step is digitally signed by using a private key of a file initiator, the signed ciphertext or a graphic code converted from the ciphertext is covered in a covering area on the image which is just finished with the first step but is not regularized, and other information (changeable form) for ensuring the verifiability is also covered in the covering area; 4. the printed image is a paper file with credible content source; 5. upon verification, the paper document is scanned into an electronic image and transmitted back to the system or associated system that previously generated the print. The system first performs generalized preliminary image rectification so that the masked region can be identified, and then reads the content and additional information of the ciphertext or graphic code in the region. And correcting the defects of the image, such as chromatic aberration, deformation, positioning error and the like again according to the identified information and the data stored in the system. Then, covering the covering area identified in the image again and regularizing again according to the found parameters; 6. if the regularized image is completely consistent with the regularized image code level when the file is signed or the code obtained through the same digital abstract class operation is the same, the content of the file is the same, and if the code identified in the covering area is the asymmetric encryption ciphertext of the abstract code and the owner of the encryption key is the person to be checked, the source of the file is determined as the person to be checked. The ciphertext graphic codes and other information except the information for assisting verification in the coverage area are not in a verifiable range, the essence of the 6 steps is to divide the validity of the electronic document into content consistency and recognition uniqueness, the transmission of the valid electronic document to paper can be realized under the condition of public recognition, and the transmission method is an interpretive application in the public field and has universality.
Because of the complex practical application scenario, please refer to the drawings of the specification and read the following steps developed in detail to assist the comparative analysis (the following contents are only used to more clearly illustrate the technical solution of the present invention, and the protection scope of the present invention should not be limited thereby):
1. the method comprises the following steps of covering an area for storing graphic codes such as signature ciphertext or two-dimensional codes and the like later on a presentation image of a file needing to be covered with an electronic signature under the condition of not influencing the content of the file, and covering a signature graphic at a specified position outside the covered area: a) the document files needing to be stamped with the electronic signature are not limited to electronic files with specific formats such as txt, docx, xlsx, pdf, ppt and the like, and the invention can be applied to any imaginable and printable files, file sets and electronic entities such as jpeg, png, mhtml and the like. Because the digital abstract algorithm used later effectively restricts the calculated amount, the invention can also be applied to the products of video, audio and other files which are subjected to image conversion according to a certain rule. b) When the step is actually carried out, a software system or a platform is usually needed, when the signature is carried out on the platform, the file is firstly imaged and the preview of the imaged file is displayed, and because the information of the covered area does not participate in the subsequent digital abstract type operation, the tampering of the part cannot be prevented, and therefore, a user needs to observe the position where the preview and the selection of the area to be covered do not influence the content of the file. c) The covering after the covering area is selected is generally to replace pixels in the image area with uniform colors, and different covering modes can be provided according to different requirements. The covering area needs to be added with a positioning mark, and the positioning mark d) of the two-dimensional code can be referred to, if the covering is finished, the image with special size and special shape needs to be adjusted, a conventional document such as a word format file can be automatically segmented and adjusted according to the size of paper under the condition of avoiding the covering area, and the special source image needs to select an adjusting mode under the help of a system to ensure that the adjusted image is in a printable state. Because the information loss caused by adjustment cannot be protected by the method, the system needs to be guided appropriately, and simple adjustment modes are zooming, translation and segmentation; e) the signature graph needs to be covered outside the covering area on the image because the signature graph needs to participate in the operation of the subsequent steps, so the signature graph also belongs to the content of the file. The signature graph cannot guarantee that the signature graph or the content and the source of the file cannot be tampered, but the signature graph can be used as a conventional component to be added to the file for convenience of circulation, identification and subsequent operation, and the signature graph usually avoids blocking identification of other contents of the file unless the identification of specific contents is intentionally blocked;
2. the image is regularized by utilizing a special image processing technology such as artificial intelligence application, and then is converted back to a file with a specific format to perform irreversible operations such as digital summarization and the like for reducing the code length: a) the regularization is the core step of the present invention, and for a computer, an image is data in a grid form, and when the image is presented on a display, a data transmission mode and an imaging module thereof need to be considered, and when the image is printed, an output mode of a printer and a mode of a paper bearing image need to be considered. Meanwhile, for the verification of the printed matter to be verified which is confirmed to be effective, only when the regularized image in the step is completely consistent with the image which is identified again and regularized in the step 5, codes of the regularized image and the image after digital abstract operation (without file acquisition time information) can be completely consistent. Therefore, the regularization intuitively removes the redundant part of the image with the help of a computer algorithm, properly reduces the resolution, adjusts the color distribution in the image so as to identify the same reference color (for example, presetting a gray list with equal intervals and adjusting the lowest gray of the image to the nearest value in the list), and also graduates different channels of the color so that the defect of changing the property type can be more effectively erased by regularization. The positioning mark added in the covering process can be used for defining the correct orientation of the file, and the mark can be additionally added to ensure that the positioning mode of the file is confirmed in the verification process. After the problems of color and positioning are solved, the system still needs to consider the defects introduced again in the processes of bearing and transmitting the image, and adopts an attention model under an artificial intelligence algorithm to highlight the part containing the information in the image, and a method used by an Optical Character Recognition (OCR) technology can also be referred to for helping to position the area with the information. Here, one of the core links determining whether the system of the present invention can work correctly is that the regularized image should be as close to the original image as possible, because the minimum protected scale is smaller, and the minimum protected scale is the maximum modification scale of the same regularized image obtained by modifying the original image. The minimum protection scale of the file can be dynamically set according to indexes such as image entropy and the like. If the technology allows, the system should ignore information presentation smaller than this scale when indicating to the user that this minimum scale is accurate and the user is using the file. The system can reduce the times of displaying the regularized image and prevent the parameters from being cracked by the outside. The system should adopt a scientific method to count the verification failure and the error passing caused by the regularization, reasonably set the regularization parameters and set the parameter adjustment quantity for the secondary verification after the verification failure. b) The regularized images are subjected to a digital digest-like operation, and although regularization has compressed the images, they can be compressed again here to improve system operating efficiency. The additional parameters can be introduced into the operation of the digital abstract class, which leads to that only a user who has access to the additional parameters can verify the file, when the file code is short enough and does not need to utilize the digital abstract algorithm to carry out additional encryption, the operation of the digital abstract can be omitted, and the full text of the file code is directly subjected to digital signature (so that the normalized image is exposed, and the security is reduced); c) because the normalized image uniquely corresponds to the original image on the minimum protection scale and the regularization process is the behavioral consequence of signature of the source side, the fact of approval of the content of the original image is transmitted to the regularized image, namely the existence of the regularization image proves the fact of unique approval of the original file. The digital digest operation also produces a recognized unique result, so that the recognized fact is passed on;
3. the operation result of the last step is digitally signed by using a private key of a file initiator, the signed ciphertext or a graphic code converted from the ciphertext is covered in a covering area on the image which is just finished with the first step but is not regularized, and other information (changeable form) for ensuring the verifiability is also covered in the covering area; a) due to the nature of asymmetric encryption, private key signatures can only be decrypted by corresponding public keys, and the application of digital signature technology and various algorithms thereof is mature at present. For the system, only the interface with the CA organization is needed to ensure that the authentication and information transmission process can maintain credibility, but the proper storage of the historical certificate is required to be noticed, or a new certificate issuing and updating mode is established by negotiation with the CA organization, and the certificate validity period is directly related to the validity period of the final printed product. Only the private key of the source user of the file is needed here because the invention understands a copy of the electronically signed file as only the content of the file and the source of the file. The file source is expanded, so that the method can be applied to the field of electronic contracts, and different digital signature modes can be provided according to requirements. For example, the effect of using the private key of the initiator of the contract and the public key of the receiver of the contract for encryption to simultaneously generate trusted transmission, and for example, performing sequential multiple signatures or broadcast multiple signatures in a certain manner may all provide different requirements for the system function, but as long as the signatures are all regarded as the source of the document, the system function is not excluded from the document paperification process in the present invention. b) The normalized image uniquely corresponds to the content of the original document image, but is not suitable for the final printing effect because it is a product of computer vision and artificial intelligence technology. Therefore, the method is only used for calculating the abstract code which is also uniquely corresponding to the original file content. Besides the ciphertext (graphic code) obtained after the asymmetric encryption of the digest code, the covering area also contains other information used for ensuring the verifiability, including but not limited to marks used for auxiliary positioning and correction and codes and graphs used for indicating parameters used by information such as regularization and compression modes, and the information can also be used for identifying tampering to a certain extent before all operations are completed during verification, so that the expansibility is embodied; c) the digital signature process also has a unique corresponding relation, so that the fact that a source party approves an original document is also transmitted, and identity information is introduced at the same time, so that the fact can be restored in the subsequent verification process, and the digital signature process and the operation result are simultaneously used for combining the content consistency and the approval uniqueness so as to restore the conceptual attributes of the information carrier, such as effectiveness and the like, subsequently;
4. printing the image finished in the previous step, namely a paper file with credible content source; a) since the file was previously imaged and adjusted (to facilitate pagination), the file is now in a printable state. After a file is printed for the first time, the system should lock the states of the position information of the signature and the like (if the information when the signature is stored in the system), that is, the failure of the parameters which are stored in the system and used for verification and only belong to the signature at this time needs to be prevented, and the invention suggests that the system only keeps the general parameters and stores the parameters which change along with the file in the printing part covering area. b) The system should prompt the user to check the print for information loss due to minimum protection scale limitations and information loss due to the masked area. c) Since the file is typically signed only by the user's private key, anyone who has obtained the public key of the source can verify it. Therefore, the printed part can be operated by turning hands and the like, and the use of the file and the intervention on the validity of the file by a third party are facilitated to a certain extent. d) Because of the mechanism of the present invention, a printed product can allow a certain degree of defects without losing its verifiability, the minimum protection scale mentioned above is a reference for the allowable defects, but the present invention does not develop more specifically, and needs to be studied when in practical use. e) The verification method adopted by the invention can interfere with the verification link of the traditional electronic watermark technology, the deformation of a certain scale is allowed by the invention because the changed content (cryptology operation result) is limited in the covering area, and the electronic watermark can cover the changed content to the whole text in order to ensure that the whole text of the file is not distorted. Compatibility of the two is not entirely impossible but requires higher demands on the technology. f) The function of the file before printing is also equal to that of the traditional electronic signature file, and the traditional electronic signature mode can be replaced to a certain extent;
5. upon verification, the paper document is scanned into an electronic image and passed to the system or its associated system that was previously used to generate the print. The system first performs generalized preliminary image rectification so that the masked region can be identified, and then reads the content and additional information of the ciphertext or graphic code in the region. And correcting the defects of the image, such as chromatic aberration, deformation, positioning error and the like again according to the identified information and the data stored in the system. Then, covering the covering area identified in the image again and regularizing again according to the found parameters; a) paper documents which are printed, circulated and scanned (shot) naturally have defects, the research on the image defects is always an important battlefield for the development of artificial intelligence, and the artificial intelligence in the world plays a remarkable role in the field of image processing at present, for example, the artificial intelligence technology is used for carrying out operations such as image Registration (Registration) and the like to finish the primary correction of images, so that the reliability is quite high. b) In analogy to the process of two-dimensional code recognition, a covering region is positioned from a preprocessed image, codes and graphs in the covering region are read in analogy to an OCR optical character recognition mode, and a ciphertext and a graph code for verification and parameters for assisting in further correction are recognized. Further correction, re-covering and re-regularization are carried out. The pattern scale of the error caused by the system performing these steps should be less than the minimum guard scale. If the printed piece is not tampered or the tampered scale is smaller than the minimum protection scale and the defect problem is solved, the regularized image is completely consistent with the image code layer after regularization in the step 2, so that a completely consistent abstract code can be obtained through the same digital abstract algorithm. c) If the parameters identified from the covering area contradict with the data and the file contents (including signature graphs) stored in the system, the tampering of the file contents and the sources can be judged before all operations are completed, and the parameters can be combined and used in a plurality of verification modes. d) The same verification process can be directly carried out by using the image file before printing, so that the paper file equivalent to the electronic file is really realized;
6. if the regularized image is completely consistent with the regularized image code level when the file is signed or the code obtained through the same digital abstract class operation is the same, the content of the file is the same, and if the code identified in the covering area is the asymmetric encryption ciphertext of the abstract code and the owner of the encryption key is the person to be checked, the source of the file is determined as the person to be checked. The ciphertext graphic code and other information except the information for assisting verification in the coverage area are not in a verifiable range. a) Due to the presence of the masked area proposed by the present invention, the system does not have any information to store for a single signature. When the signature is verified, the public key of the claimed signer is required to be accessed, so that the verification part of the system is required to properly store the user identification code, the user name and the user public key, and the usability is improved. b) If various data related to the signature exist in the system database, the verification can be carried out in advance: and manually identifying the purported source person through the signature graph outside the covering area on the document to be verified, and if the data such as the signature record, the signature graph, the verification mode and the like searched in the system according to the purported source person are inconsistent with the information which can be extracted from the inside and the outside of the document covering area, the content or the source of the document is proved to be tampered. c) The core verification in the invention is as follows: whether the ciphertext (graphic code content) on the file to be checked can be decrypted by a public key of a purported source person (the person to be checked, manual identification from the content outside the file covering area, machine identification from the covering area and optional selection), and the decrypted code is completely consistent with the code of the regularized image after (optional compression and) digital abstract operation according to the acquired parameters. Namely, the ciphertext, the abstract code and the regularized image all generate the certification of the signature process by a source (the owner of a verified private key) by the same signature fact, and then the certification of the source is presumed to the specific concept attribute according to the system application, and the complete consistency of the regularized image and the regularized image can be used as the basis for the public to acknowledge the consistency of the contents before and after the signature. d) When the step of summarization is omitted, the normalized image obtained by decrypting the ciphertext can be used for restoring the file content, but the method is not beneficial to the confidentiality of the algorithm in the system. e) If the same way as the method can be adopted to divide the transmission of the concept attributes of a certain file into the content consistency and the authorized uniqueness of the information carrier before and after evolution, the method can also be applied to realize the transmission of the concept attributes before and after the evolution of the information carrier. For example, the monetary content is the record of the increase and decrease of the transfer value and the identity, and the recognition of the monetary is the fact that the transfer action is completed by using a private key.
In the invention, the content and source credibility of the file and the transmission analysis of the file effectiveness after the step 3 are completed: firstly, when a user uses the system, in order to facilitate the operation, maintenance and management of the system, the user needs to create an account number, the user identity is bound with an identity code in the system, the user can check whether the content is correct when uploading a file to be stamped with an electronic signature, and the user identity and the signature process are prepared to be linked together before the signature; when the electronic signature is added, the concept of minimum protection scale is introduced in the invention. The normalized image and the original image are uniquely corresponding to the original file image above the scale, the digital abstract algorithm is also an algorithm for guaranteeing the consistency of contents during design, the probability of obtaining the same digital abstract code by two different files is extremely close to zero (the probability of more than two same abstract result codes in one hundred thousand different files is about one 28 times of 10), and meanwhile, when the method is widely applied, the algorithm can be further upgraded to guarantee the uniqueness and the credibility, so the abstract code and the original file content are also recognized as uniquely corresponding; the digital signature operation performed after the uniqueness is ensured uses a private key of a file source for encryption so that the identity information can be marked, when verification is performed, if a ciphertext can be decrypted by using a public key of an assumed source and a decryption result is consistent with an abstract code (or a regularized image full text), the authenticity of the assumed source is confirmed, otherwise, the assumed source is proved to be wrong, so that the source credibility of the file is also ensured, and the credibility of the source and the maintenance of the identity information and signature process by a system prove the fact that the source side approves the file to be established. The image regularization, digital abstract and digital signature algorithm transmit the uniqueness of approval to the ciphertext, the minimum protection scale determined in the image regularization process enables the file before and after evolution outside the covering area to have recognized content consistency, and the ciphertext is attached to the covering area in a certain form, so that the validity of the file is restored. In the signature process, a user can visually know the signature effect and the printing effect, and the reliability of the system applying the invention is further improved. The verification part of the invention has good compatibility with other verification methods, and can carry out compatible operation in practical application.
The main technical difficulties of the invention are as follows: as mentioned in the related technical field section, the application of the invention depends very much on the image processing assisted by artificial intelligence technology, which is embodied as "regularization" and "re-regularization" during verification, and the final verification of the correct file must require that the regularized image during signature and the re-regularized image during verification have a code level completely consistent, because only this code or its digest code can be used as the correct result after signature ciphertext decryption to complete verification. According to the principle of the invention, images before and after evolution are needed to realize the content consistency in the evolution process of the information carrier, even if image defects are introduced after printing, the content still has the same public definitions, and the concept of 'minimum protection scale' generated by regularization is just the product of the regularization function for resisting the defects of printing pieces and circulation links and realizing the content consistency; the transfer of uniqueness of approval, i.e., approval of the signing process embodied by the signing action of the source side, is transferred to the evolved carrier. The file images which can be viewed by a source party are normalized, and are uniquely converted into normalized images after the source party allows and knows the limitation of signature processes such as 'minimum protection scale' and the like on an evolved information carrier, namely different normalized images are inevitably caused by different pre-regularization images. And then attach the code that is calculated through the digital abstract electronic signature in covering the district then accurately transmit and record this kind of recognition fact, and then make the file after evolution bear the recognition fact of the source side, so to say, the regularization process is the transmission process that both content conformance and recognition uniqueness have, regularization fully embodies the publicity of human social function, namely the public explanation to the information carrier content. Regularization and rescaling of images is feasible with the technology of the present generation: firstly, the image difference larger than the minimum protection scale is required to be different in the code layer of the regularized image, the image difference can generate the code difference, only the redundant information is required to be filtered in the regularization process not too much, and the regularization processing method is embodied as the character-forming difference that the unit size of the regularization processed image area is smaller than the conventional font size, such as 'Wu, Wu'; and secondly, the circulated image is regularized again to filter out introduced defects, so that the code level is completely consistent with the original regularized image, and the printed image is printed based on the original text, so that the filtering of redundant information in the regularization process is not too little, specifically, the unit of the image processing area is larger than the image deformation size caused by the defects of dirt and the like caused by human body contact, the unit and the regularization unit are applied by the same method, or a certain correlation is formed between the unit and the regularization unit, so that the code is completely consistent, and the unit is also the basis of the minimum protection size. In addition, in order to ensure that the method meeting the relevant requirements for filtering redundant information is not empty, the attention model in the artificial intelligence technology can be adopted to delete the contents of the rest image areas outside the core area bearing the information and efficiently shield the defects at the outer side, the relevant technology of Optical Character Recognition (OCR) can be adopted to directly mark the text part of the file contents and compare the text part with the existing font in the database, and the defects in the space occupied by the font can be efficiently removed. It is expected that the system actually adopting the method is difficult to have a smaller minimum protection scale in the initial stage and the practicability is difficult to improve, but with the further development of technologies such as artificial intelligence and image processing, the image regularization method meeting the requirements of the method gradually has practicability. If the regularization fails to meet the requirement, or the generated minimum protection scale is too large, the system can not provide the content consistency and the acceptance uniqueness of the evolution process accepted by the public due to the problem of accuracy, which may also be the reason why the invention does not come into existence prematurely. The system judges the density distribution of the information of the file image to be stamped with the electronic signature from the aspect of an algorithm under the help of an artificial intelligence technology. The help system determines a suitable minimum protection metric without losing the information that the user wants to protect, all of which rely on the trained neural network. That is to say, before the system is put into operation formally, the artificial intelligence should be adjusted repeatedly, so as to solve the problem of overlarge minimum protection scale as much as possible. The artificial intelligence in the world has huge development potential and is vigorous. Such as models in artificial neural networks, from basic perceptrons, to later Boltzmann machines considering physical effects, support vector machines, these models are undoubtedly the basic components of artificial intelligence development. Through the continuous application, improvement and search of new models of the models; processing massive data sets for training and testing; by disclosing one more analysis, scoring, feedback system on the network, we have reason to believe that the technical problem of the present invention will be solved quickly and make the present invention fully feasible.
The invention has the following beneficial effects: the invention greatly improves the current situation that the electronic office ecology and the paper office ecology are difficult to be compatible. Firstly, the invention understands the file to be stamped with the electronic signature as the set of the information carrier and the data presented in an imaging way, so that the invention can be suitable for stamping any file capable of being imaged; the invention divides the document in the circulation process into the content of the document and the source of the document, and simultaneously does not prevent the possibility of introducing other frameworks, so that the document with the electronic signature can not only be limited to an electronic contract, for example, even one landscape painting with the electronic signature can be used for marking the source of the landscape painting, which brings infinite possibility for various industries, such as financial industry; finally, the explanation of the content consistency and the authorized uniqueness of the invention relates to the public field, and the application relating to the public field can be independently used as the application of credibility, namely the application of the service field, such as content credibility and source credibility. The invention defines the credibility of the document and the printed matter thereof as the unique transmission relation of the content and the source, the uniqueness of the transmission relation is proved by using the recognizable property of tampering, and the further analysis of the transmission of the credit can lead us to develop the concept of qualitatively and quantitatively researching the credit in the information transmitter made by human beings based on the credit system of the invention.
The application of the invention in special scenes is explained. 1. In order to make the electronic signature have the similar function as the physical signature, the invention can support three multi-signature modes (two types derived from the multi-signature technology and one type added in the invention): for sequential multiple signatures, the background that is hidden by the overlay of the subsequent signature pattern must be restored (e.g., placing the subsequent signature in a solid color space), and the image that is hidden by the subsequent signature must be restored sequentially and decrypted sequentially during verification. Information about multiple signatures still needs to be stored in the same covering area, so that a reserved space is needed in the covering area when the signatures are signed for the first time; for the broadcast multiple signatures, because of using special groups of keys, the nodes for final collection of the signatures can place the respective signature graphs of the signers on the file images, and the covering areas also need to store the cipher texts similar to the broadcast multiple signature technology and the parameters such as random numbers received by all sources, and the complexity is higher than that of the broadcast multiple signature technology; the third multi-signature means applicable to the present invention is proposed, that is, the electronic signature is regarded as a physical signature, and the signatures obtained from the original text are signed by respective private keys. The respective signature images and the covering areas are arranged in the reserved multi-person signature areas (if the original text images have no required reserved space, another page is used for recording multi-person signatures independently), negotiation is carried out in advance to ensure that the signature images are not overlapped with each other, and the background of the multi-person signature areas can be restored (such as pure color). And during verification, the respective public keys are used, the covering areas and the signature graphs of other people are removed, and the corresponding position backgrounds are restored and then verified respectively. Therefore, the function of the multi-signature mode is basically the same as that of the multi-physical signature, and the effect is the same as that of the physical signature when the signature positions are different. 2. The same file can be divided into areas protected by the existing signature and parts which can be filled in by self definition. The principle of content protection due to the present invention is based on image content consistency. Therefore, the file content can be allowed to be modified to the maximum extent for participants in a wide office scene. For example, a contract provider may first sign a particular region of the same document (typically, various provider terms and provider signature regions) to indicate an acceptance of the content provided. And then the receiver uses the public key of the provider to verify the validity, adds the required content, such as the full name of the unit, and then performs signature operation on the full text. 3. The invention is also suitable for the situation of signature borrowing. The system should provide or use a trusted channel when borrowing occurs. The additional information and parameters generated by the signature borrowing can also be recorded in the covering area of the printed piece, and an additional verification stage can also be added according to the additional information and parameters. 4. As mentioned above, paperless office work is difficult to pursue in scenarios involving confidential documents. After the method is implemented, the identity information can be added to the secret stored on the paper document, and the possibility of electronic compatibility is provided. For example, the operation and circulation of the file are performed in a credible electronic environment, the file is printed into a paper edition when being filed, all marks in the electronic environment are removed, and the paper file is scanned again to be restored into the credible electronic edition when needing to be called again. Certain risks can be brought by the convenience of operation. The invention limits the risk of secret leakage to the system in the operation circulation process and the risk of paperized files, successfully eliminates the secret leakage caused by electronic residual information, and even if an attacker steals the secret key of a user, the files cannot acquire the secret content because of paperization.
The foregoing describes a method for rendering printed items of electronic documents still valid, and indicates that any transfer of conceptual attributes that can be accomplished using this method, and that can establish both content consistency and recognized uniqueness, can be accomplished. The concrete description is as follows. The concept attribute shall be defined first as the conscious activity of a human individual about a certain information carrier and its content, and since the individual's consciousness is not in a directly observable domain, in society the establishment of the concept attribute must rely on public recognition, such as monetary recognition. The concept attribute can be understood as conscious activity caused by additional content of the original information carrier content, for example, the original content is ' e.g. Zhang Sanqi Liqu transfer ' in an information carrier, the transfer is really received by Zhang Sanqi Liqu transfer and is recorded in an authority system ', the additional content is used for explaining the validity and the currency of the information carrier, and the consistency and the uniqueness of the content can be understood as revealing the two contents. Therefore, if the transmission of concept attribute carriers is to be realized, the evolved information carriers need to trigger the same conscious activities, and the two contents must be completely transferred and transmitted, wherein the existence form of the latter is generally more complicated than that of the former. The generalized concept attribute transfer method is as follows:
the information carrier after evolution should first be made to have the same objective content as the information carrier before evolution, such as copying, cutting, printing, scanning, isomorphic printing, etc. For example, because a mask area for storing a ciphertext graphic code later is added, the source side is required to confirm that the addition of the mask area does not cause the change of the content to which the concept attribute is to be added when signing, and the specific details are similar to the steps 1, 3, 4 and 5 in the 6 steps of the invention;
the triggering of one or more mechanisms is then made available as a basis for the public to acknowledge additional content related to the conceptual attribute. The trigger of the mechanism includes but is not limited to that a behavior source side executes a certain action under the condition of acquiring necessary information, and a certain index of an operation executed by a system side meets the condition which can be acquired by the public. The source side confirms the signature process, the system side publishes related statistical information, and the fact that the system side is supervised by the government is the additional content with the basis, and the specific details are similar to the 2 nd, 3 rd, 5 th and 6 th steps in the 6 th step of the invention;
finally, the two contents, namely the objective content of the original information carrier and the basis of the related additional content for prompting the public to acknowledge the concept attribute, need to be put on the same evolved information carrier in a certain way. The method needs to avoid the damage to the presentation of the two contents, just as the writing of the ciphertext graphic code in the covering area does not influence the presentation of the information outside the covering area in the invention. The basis for promoting the public to acknowledge the concept attribute-related additional content includes but is not limited to the record of the source side identity, the information presentation which can be generated after the above-described mechanism is triggered, and the auxiliary mark which is used for ensuring the verifiability, traceability and tamper resistance of the presented information, etc. The identity of a source party is visually displayed by a signature graph added outside a covering area, the authenticity of a ciphertext in the covering area is verified through the decryption or not, the existence of information in the covering area is proved under the conditions that related statistical information is disclosed and government supervision is implemented, and the verification is triggered by a signature process mechanism.
Drawings
The core content of the invention is the definition and application method for information carrier concept attribute transmission, and the method for printing electronic signature is explained in detail, the method is embodied as the operation flow of an electronic signature system and a platform, so the attached drawing is a logic diagram for expressing the concept attribute transmission process and the relationship among concepts and a pre-estimation flow diagram for applying the system and the platform of the invention and manufactured by referring to the UML protocol. The accompanying drawings, which are incorporated in and constitute a part of this specification, and in which:
FIG. 1: the printable electronic signature and the concept attribute transfer process logic diagram;
FIG. 2: the electronic signature function flow chart of the system and the platform;
FIG. 2A: the upper left portion of FIG. 2;
FIG. 2B: the lower left portion of FIG. 2;
FIG. 2C: the upper right portion of FIG. 2;
FIG. 2D: the lower right portion of fig. 2.
Detailed Description
The implementation of the invention is necessary in that the invention can effectively accelerate the promotion of paperless office work and improve the working efficiency of various industries in society. The system of the invention is generally a public-oriented signature platform, and before formally carrying out specific work, the system can be found to have certain superiority by comparing with the prior electronic signature similar technology:
the technical characteristics indicated in the above table indicate that the existing widely used signature technology does not solve the problem of difficult connection with the papery office system, so that only the electronic commerce industry has widely used electronic signatures. The nature of the problem is that the statement of money is somewhat simpler than the statement of concepts. For consciousness, concept and thought trend in a society, the concept can not use the existing signature technology to implement credibility guarantee. The invention relates the image and the information to be transmitted by the image, introduces the identity information, expands the electronic signature application into the electronic signature application, and expands the electronic file validity into the concept attribute of the information carrier, which is a unique route before the brain-computer interface comes into the world and is a prerequisite for further research.
The comparison between the electronic signature paper and the physical signature is shown in the following table:
from the point of view of the authors of the present invention, the country should become the sponsor of credit, the determinant of the public concept. When an individual in the society sends a file to the society, the individual should have a certain responsibility for the effect which can be produced by the file, and the country should maintain the corresponding relationship between the responsibility and the individual as reasonably as possible and properly control the effect produced after the file is sent. Under comprehensive consideration, the paperless office pushed by the country has the following advantages:
1. the method can prevent large-scale internet enterprises from further monopolizing and properly avoid monopolizing various identity-related data;
2. the national defense strength in the aspect of information technology can be effectively improved;
3. the office efficiency of administrative and public institution can be greatly improved;
4. for subsequent public research on information carriers
The authors of the present invention will continue to work in relation to the present invention, considering to provide criteria for image regularization in the present invention. After the conditions are met, the organization researchers carry out specific scientific researches on the artificial intelligence part of the invention, and the organization software company is in butt joint with an internet credit institution and develops a system and a platform for tests.
The invention relates to the application in the public field, which needs the public to approve the application, which is embodied by the approval of the public to CA mechanism, AI evaluation information, the system and the platform applying the invention and the applied algorithm, and also comprises the file content of additional concept attributes and the public explanation of the concept attributes. Therefore, when the present invention is embodied, the accuracy information of the AI algorithm, the failure rate information of the signature file under various conditions, the function of the system design, the implementation mode, etc. should be disclosed.
It will be apparent to those skilled in the art that various modifications and variations can be made in the present invention without departing from the spirit or scope of the invention. Such as: the masking region in step 1 described herein is used to provide a location for storing the signature ciphertext without interfering with other operations, and also to provide for subsequent content consistency and uniqueness combinations, and the adjustment of the imaged document in step 1 is to ensure that the document can be printed. Optimization techniques for details of the configuration of the masking zone, the manner of masking, the manner of adjustment, etc., are not per se encompassed within the scope of the present invention. However, the consideration of ' not interfering with the previous calculation ', the consideration of ensuring the printability of the file according to the situation ' and the application of various forms of covering and adjusting in the field are the scope of the invention. In addition, whether to omit a digital digest algorithm or not, whether to use a digital signature algorithm which does not adopt asymmetric encryption and modify subsequent verification details, which cannot be used as a dissimilarity of the present invention, are also within the scope of the present invention. As for other applications of the information carrier concept attribute delivery, if the method adopts the same logic as the present invention and has the same specific principle as the present invention, namely, the unique delivery and evolution process content consistency is recognized. It is within the scope of the invention.
Claims (8)
1. A method for adding human beings such as validity of a printable electronic file to concept attributes of an information carrier, transmitting the concept attributes to a printed piece of the information carrier through an image processing technology, and expanding an electronic signature technology to the field of electronic signatures is characterized in that: regularizing a source file image or an image to be verified by utilizing an image processing technology, wherein the regularized image uniquely corresponds to the image before regularization; adopting a digital abstract algorithm and a digital signature algorithm with credibility, converting the regularized image into a code which is uniquely corresponding to the regularized image, and directly or indirectly attaching the code to a printed file; by pre-and post-operation, configuration and means such as reserving a covering area and the like, the correct printed piece generated based on the unique corresponding relation can be ensured to have verifiability and non-imitability of content and source and the concept attributes successfully transmitted to the printed piece.
2. The comprehensive application of document validity according to claim 1, wherein the document validity refers to the fact that the information recorded in the document, i.e. the public definition of the content, is recognized as being approved by the source, and then the fact that the public is prompted to approve the approval of the source for the document validity is recorded in an information carrier providing the functions of tracing and verifying the document content by some means, and the conformity of the state is a conceptual attribute, and the information carrier can be the document itself, such as a physical seal, covered on a paper document, or other information carriers, such as the existence of a traditional electronic signature document in a related system, and is characterized in that: the instantiation of the logical processing of the concept attribute and the derived attribute, such as the generation, approval, negation and the transmission of the validity between information carriers, can be instantiated by four methods of preparing, publishing, removing publishing and replacing the main body of the state.
3. The transmission of concept attributes appended to information transmitters by human beings according to claim 1, wherein the concept attributes are attributes that are assigned to things by human conscious activities, the present claim only relates to the concept attributes that can be transmitted between information carriers by using content consistency and recognition uniqueness in the evolution process of the information carriers, for example, the identity (identity) of the information carriers is not transmittable, and the validity can be transmitted, for example, the duplication of electronic data can generate a duplicate of a conventional electronic signature file with the same validity; the electronic signature process is to attach the conceptual attribute meeting the condition of the validity of the electronic file to the electronic file in a mode similar to the traditional electronic signature and expand the application range of the validity to a printed matter of the electronic file; the transmission of the concept attributes is characterized in that: if the information carrier has the same content which is acknowledged after a certain evolution, namely, the information carrier has content consistency, and the evolution process prompts the public to acknowledge the state that the causal relationship of the approved fact of the concept attributes such as the effectiveness of the file and the like of the source is transferred, namely, the authorized uniqueness, the concept attributes such as the effectiveness of the series of information carriers can be considered to be transferred to the evolved state before the evolution.
4. The regularization according to claim 1, whose core principle is that image analysis, processing technique or other technical means applying artificial intelligence neural network is used to reduce the file image informatics redundancy by a proper amount, such as reducing the overall resolution, removing regions not containing main information, reshaping glyphs, defect filtering, etc.; the image regularization when the source side executes the electronic signature can be different deductions of the same method with the re-regularization when the source side verifies, the regularization when signing is used for obtaining the minimum protection scale suitable for a finished signature, keeping the unique corresponding relation from an original file to a final ciphertext and reserving correction allowance for the re-regularization, and the re-regularization when verifying is used for judging whether the information presentation of the file to be verified above the minimum protection scale outside a covering area is the same as the information presentation of the original file provided by the source side under the same condition or not and simultaneously is used for verifying the identity information in the ciphertext;
the regularization is to satisfy the above-mentioned usage, and realize the content consistency and the recognition uniqueness of the concept attribute transmission in the information carrier evolution, that is, the regularization related to this claim is characterized in that:
the change and difference of the information presentation which can be identified by the source and is about to execute the signature process on the content of the source inevitably causes the change and difference of the regularized image, so that the existence of the regularized product can promote the public to admit the source to execute the signature process, and further refer to the design application of the system for providing the signature process to infer the admission of the source to the specific concept attribute; the information carrier after circulation and evolution meeting the requirements can obtain an image which is completely consistent with the code level of the regularized image in the signature process through re-regularization, so that the defects introduced in the information carrier evolution process, such as deformation, deficiency, spots and the like, need to be counteracted, when the defects have overlarge effects, the original regularized image cannot be obtained, and further the information carrier after evolution loses the concept attributes endowed in the signature process;
in order to satisfy the two requirements, a spatial index for distinguishing the information presentation which can be regularized and protected from tampering from the information presentation which can be regularized and filtered is used, namely, the minimum protection scale provided by the invention, and in the process of signing by a source, the information presentation which is to be endowed with the concept attribute is in the range which can be regularized and protected, namely: the same regularization image can be obtained only by the unique information presentation in the range, and the ciphertext of the same digital signature and the digital abstract is also obtained only by the unique regularization image, so that the recognition uniqueness is realized, and the information presentation which can be filtered by regularization is not protected by regularization, namely, the defect introduced in the evolution process is not regarded as the content of the file, so that the content of the information carriers before and after the evolution can be regarded as the same by the public, and the content consistency is realized;
since regularization is an approximation method for accurate cognition, methods for evaluating accuracy and the like thereof need to be reliable and public.
5. The trusted algorithms for digital abstract and digital signature as claimed in claim 1, wherein the trusted direct algorithms for digital abstract and digital signature are not or nearly not decipherable under the existing technical conditions, and the classification means the self-definition of the algorithm and code allowed to cooperate to realize the delivery of concept attributes without changing the characteristics and principles thereof, and the algorithm and code should be properly protected from embezzlement and imitation, so as to maintain the public of the system applying the present invention and avoid serious consequences.
6. The tandem operation and configuration, means for ensuring that a correct printed article, generated based on said unique correspondence, can have verifiability and non-imitability of content and origin and said conceptual attributes successfully delivered to the printed article of claim 1, wherein:
the method comprises the following steps of 1, reserving image processing such as an image covering area and the like, preparing signature related data, 2, conducting image regularization, digital abstract operation, preparing conditions for subsequent verification steps, interacting a system and a source person, 3, introducing identity information through digital signature operation, converting results into a proper format, and then attaching the proper format to a file before printing, 4, printing, circulating and introducing defects of the file, feeding back the required system to the public due to file circulation, 5, identifying the image for verification, processing, obtaining verification auxiliary information, conducting image regularization again, 6, confirming the verification result, maintaining the credibility of the system, and 6 main steps;
a method for recording the approval fact of a file source party to the evolution process of the information carrier on the evolved information carrier by utilizing the unique corresponding relation of the images before and after regularization and the unique corresponding relation of the operation processes such as digital abstract, signature and the like; and to enable the verification process to perform the following optimization methods, which have been specifically indicated by the present invention: the method has the advantages of applicability of an offline scene, support of early completion verification, independence of file content verification and source verification, release of storage dependence, opening of file format limitation and reproduction of physical signature characteristics.
7. The method for expanding the electronic signature technology to the electronic signature field according to the claim 1 is characterized in that a certain concept attribute is added to a certain information carrier, and a process for proving the objective existence of the additional relation is prepared, the electronic signature field comprises an operation level and a public application level, the method for expanding the electronic signature technology to the electronic signature field is applied to the operation level and is a main body protected by the claim, and the method is characterized in that: setting an object of traditional electronic signature operation as a code formed by an original file through evolution of a certain image level, wherein the code needs to be uniquely corresponding to the original file, and any change to the original file, which can make a source party be identified as ambiguity, can cause different codes after the evolution, and the regularization provided by the invention is the evolution; the codes after the operation are used for the electronic signature and verification process, and the process comprises but is not limited to the processes of preparation in advance, image evolution, identity information introduction, circulation allowing printing and paper formation, image preprocessing and pre-verification based on the existing information, and final verification of comparison with the images after re-evolution after decryption.
8. The pre-preparation according to claim 7, characterized in that, the application platform and system based on information processing is built, including but not limited to office automation and laboratory information management system and electronic contract platform, so that the system has the necessary functions of maintaining the validity of the file, processes the data in the signing process, and stores, docks and interacts with human machine when necessary; introducing an identity authentication application based on PKI, and introducing the identity information of a source into the following signature process; the file is preprocessed and patterned, and the single or multiple signature processes with the characteristics of the invention can meet the requirements of the invention.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110900878.0A CN113626776A (en) | 2021-08-06 | 2021-08-06 | Information carrier concept attribute transfer and electronic signature printable method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110900878.0A CN113626776A (en) | 2021-08-06 | 2021-08-06 | Information carrier concept attribute transfer and electronic signature printable method |
Publications (1)
Publication Number | Publication Date |
---|---|
CN113626776A true CN113626776A (en) | 2021-11-09 |
Family
ID=78383096
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110900878.0A Pending CN113626776A (en) | 2021-08-06 | 2021-08-06 | Information carrier concept attribute transfer and electronic signature printable method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN113626776A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN117114719A (en) * | 2023-10-24 | 2023-11-24 | 四川数智云链科技有限公司 | Digital anti-counterfeiting method based on whole flow of supply chain |
-
2021
- 2021-08-06 CN CN202110900878.0A patent/CN113626776A/en active Pending
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN117114719A (en) * | 2023-10-24 | 2023-11-24 | 四川数智云链科技有限公司 | Digital anti-counterfeiting method based on whole flow of supply chain |
CN117114719B (en) * | 2023-10-24 | 2024-02-09 | 四川数智云链科技有限公司 | Digital anti-counterfeiting method based on whole flow of supply chain |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10245875B1 (en) | Digitally encoded seal for document verification | |
CN109417479B (en) | Cryptographic logic rewritable block chains | |
CN112950220B (en) | Enterprise digital identity management system and method based on blockchain | |
CA2594018C (en) | Method and process for creating an electronically signed document | |
AU620291B2 (en) | Public key/signature cryptosystem with enhanced digital signature certification | |
US11755998B2 (en) | Smart data annotation in blockchain networks | |
EP3318999A1 (en) | Method for issuing a virtual version of a document | |
EP3543891B1 (en) | A computer implemented method and a system for tracking of certified documents lifecycle and computer programs thereof | |
EA003620B1 (en) | System and method for electronic transmission, storage and retrieval of authenticated documents | |
CN116842583B (en) | Electronic signature system and method with PDF signature as core | |
EP3319006A1 (en) | Method for offline authenticity testing of a virtual document | |
JP2006285592A (en) | Contract alteration preventing system, and contract alteration preventing method | |
CN116057554A (en) | Method for managing transaction data sets, participant unit, transaction register and payment system | |
CA3038506A1 (en) | Computerized voting system | |
WO2022008319A1 (en) | Issuing entity and method for issuing electronic coin data sets, and payment system | |
CN112991045A (en) | Medical health consumption financing method, device, equipment and medium based on block chain | |
US20030037238A1 (en) | Paperless records in aircraft maintenance | |
JP2008090389A (en) | Electronic information verification program, apparatus and method | |
CN113626776A (en) | Information carrier concept attribute transfer and electronic signature printable method | |
US9277097B2 (en) | Method for authenticating a document | |
CN103647650A (en) | Rule definition based automatic signature/signature verification device and method | |
CN111984957A (en) | Confidential document identification and tracking system based on fingerprint anti-counterfeiting | |
CN115238315A (en) | Method for realizing doctor-patient common signature authentication electronic medical record system | |
CN116057555A (en) | Payment system, coin register, participant unit, transaction register, supervision register and method for making payment using electronic coin data set | |
CN109120397B (en) | Document authentication method and system based on identification password |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |