Certificate false-proof verification method base on identification authentication technology

A technology for identification authentication and certificate, which is applied in the field of ID photo, seal, signature and biometric information security and authentication, and can solve the problems of poor security performance, high cost of establishing a system, easy to be imitated, etc., and is easy to generate and read. The effect of taking, preventing impersonation and forgery, and being easy to verify

Inactive Publication Date: 2014-09-03
CHENGDU EHENGXIN TECH
View PDF7 Cites 30 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] At present, the commonly used anti-counterfeiting methods for documents are one type of anti-counterfeiting method based on printing technology, plus photos, signatures and seals. This method has the advantages of low cost and direct recognition through vision, but the anti-counterfeiting performance is poor and the reliability of visual recognition is low. easily imitated
Another type of technology that applies intelligent identification has the characteristics of good anti-counterfeiting performance and is difficult to imitate and tamper with. The use of existing encryption technology requires background networking to the CA center of the issuing unit to obtain inventory data. The cost of establishing a system is relatively high, and it is not suitable for general use. to promote

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Certificate false-proof verification method base on identification authentication technology
  • Certificate false-proof verification method base on identification authentication technology
  • Certificate false-proof verification method base on identification authentication technology

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0039] Example 1: see figure 2 , the identity information of the certificate in this embodiment includes the image of the portrait photo and the text information of the certificate.

[0040] Specific steps are as follows:

[0041] Step 1, document information input: After the certificate issuer takes a photo of the certificate holder, on the one hand, the photo is directly output, printed or pasted on the certificate; on the other hand, the photo is properly compressed to generate a compressed image file , to combine the image file and the certification text information into a certified plaintext original document. Issuing information includes, but is not limited to: photographs, written records of the certificate, name of the issuing authority, place and time of issuing the certificate, and other information.

[0042] Step 2, encryption and two-dimensional code generation: use the CPK identification private key based on identification authentication to digitally sign the o...

Embodiment 2

[0046] Example 2: see image 3 , the identity information of the certificate in this embodiment includes not only portrait photos and text information, but also other images and biological information. Other images are stamp images and signature images, and the biological information includes human iris images, voice recording voiceprints, and fingerprints. .

[0047] Specific steps are as follows:

[0048] Step 1, certificate information input: Compress portrait photos, stamp images, and signature images respectively to generate compressed image files, merge image files and other certificate issuance information into a certified plaintext original file, and collect other certificate issuance information Proceed according to the corresponding technical method at the certificate issuing end;

[0049] Step 2, encryption and two-dimensional code generation: use the CPK private key based on identity authentication to digitally sign the original document of the certified plaintex...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a certificate false-proof verification method base on an identification authentication technology; a picture, words, a stamp, a signature and bioinformation of the certificate are processed to generate a file; a CPK identification private key based on identification authentication can be used to carry out digital signature and encrypt the file, and a cryptograph containing the digital signature is recorded on the certificate through a two dimension code; in certificate identification, a CPK identification public key based on identification authentication is used to carry out label verification, and the certificate information can be restored after the label verification is done so as to carry out comparison verification; if the cryptograph is over large, the cryptograph can be cut into more than two sub files respectively generating a two dimension code, and the two dimension codes can be decoded so as to splice into a complete cryptograph. A CPK identification public key for label verification can be obtained by local calculation, so connecting to a CA data base is not needed for signature verification and decoding the cryptograph; a smart phone, a laptop or a notebook computer can be used to realize verification in an offline mode; certificate detail information can be obtained through connecting to the internet so as to carry out certificate authentication, thereby completing false-proof and verification of the certificate.

Description

technical field [0001] The invention relates to an anti-counterfeit authentication technology of certificates, in particular to an anti-counterfeit authentication method for certificate photos, characters, seals, signatures and biological information based on identification authentication technology. Background technique [0002] Documents are the identification of individuals or organizations, and are the basis for the normal conduct of various social and economic activities. False certificates are rampant in society today, seriously affecting social order, and some have caused bad social impact and even brought greater economic losses. Therefore, the anti-counterfeiting verification of documents is really a need for normal social activities and is the basis for ensuring the validity of documents. [0003] At present, the commonly used anti-counterfeiting methods for documents are one type of anti-counterfeiting method based on printing technology, plus photos, signatures ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06Q30/02H04L9/32
Inventor 刘建国陈谦
Owner CHENGDU EHENGXIN TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products