Movatterモバイル変換


[0]ホーム

URL:


CN101427242A - Secure signatures - Google Patents

Secure signatures
Download PDF

Info

Publication number
CN101427242A
CN101427242ACNA200780014717XACN200780014717ACN101427242ACN 101427242 ACN101427242 ACN 101427242ACN A200780014717X ACNA200780014717X ACN A200780014717XACN 200780014717 ACN200780014717 ACN 200780014717ACN 101427242 ACN101427242 ACN 101427242A
Authority
CN
China
Prior art keywords
signature
electronic signature
content
document
digital signature
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CNA200780014717XA
Other languages
Chinese (zh)
Inventor
J·卡希尔
D·X·查尔斯
K·杰恩
K·E·劳特
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Microsoft Corp
Original Assignee
Microsoft Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Microsoft CorpfiledCriticalMicrosoft Corp
Publication of CN101427242ApublicationCriticalpatent/CN101427242A/en
Pendinglegal-statusCriticalCurrent

Links

Images

Landscapes

Abstract

Systems and methods for secure signatures are described. In one aspect, a secure signature is generated. The secure signature strongly binds an image of an electronic signature (an ''electronic signature'') to content in either electronic or printed form. Responsive to receiving a request from a user, the systems and methods determine whether an electronic signature associated with a printed page represents a secure signature. If so, the systems and methods determine and notify the user of whether the secure signature was cryptographically bound by a signer of the electronic signature to the content being signed.

Description

Security signature
Background
The handwritten signature of obtaining a people is to set up this people's (signatory) identity and carry out document that (for example, record, contract, p.m.entry etc.) wish, and this people is by the tradition of the wish of the content of the document binding and useful technology.Even in this digital Age, handwritten signature also is the necessary part of the contract of legal agreements, bank and credit card trade and all kinds.When a personal electric ground handwritten signature document (for example, using such as the subsidiary pen of a pad equipment such as graphics pad, board PC), the document is added or logically be associated with to the digital picture of this signature (for example, JEPG, TIFF or other image type).The digital picture of handwritten signature is the electronic signature of the equivalent of binding legally as this individual handwritten signature.By using image processing software, a people's electronic signature can be sheared from document/duplicated and pastes usually/copy in the different documents to be used for undelegated use.This undelegated use comprises, for example, and forgery, duplicity promise etc.The identity theft problem that highlights rapidly demonstrates the easiness of the unauthorized use of electronic signature.
General introduction
The system and method that is used for security signature has been described.On the one hand, generate security signature.This security signature closely is tied to the image (" electronic signature ") of electronic signature or the content of electronic form or print form.In response to receiving request from the user, this system and method determines whether the electronic signature that is associated with the page of printing represents security signature.If then this system and method is determined and is notified this security signature of user whether to be tied to the content of being signed cryptographically by the signer of this electronic signature.
It is some notions that will further describe in the following detailed description for the form introduction of simplifying that this general introduction is provided.This general introduction is not intended to identify the key feature or the essential feature of theme required for protection, is not intended to be used to help to determine the scope of theme required for protection yet.
The accompanying drawing summary
Fig. 1 illustrates the example system that is used for security signature according to an embodiment.
Fig. 2 illustrates the example process that is used for security signature according to an embodiment.
Fig. 3 illustrates the further operation according to the example process that is used for security signature of Fig. 2 of an embodiment.
Describe in detail
General view
Referring to figs. 1 to Fig. 3, the system and method that is used for security signature is described below.This system and method bound or be tied to the optional network specific digit document of being signed by signing electronically certain content increases security to the digital picture (that is, " electronic signature ") of a people's handwritten signature.As described below, it also is tied to the printing edition (being ink/toner in this regard) of electronic signature image the printing edition of electronic document.For this reason, this system and method is from this people's electronic signature with generate first collision resistant Hash the combination of content of the document of signature electronically.By using this people/signer's private key, this system and method uses a kind of in the multiple possible public key cryptography technology that this collision resistant Hash is digitally signed.This creates public key digital signature.By using reversible technique (for example, least significant bit (LSB) mapping etc.), this system and method with this public key digital signature insertions/embeddings be associated with this electronic signature in, with generation " security signature ".This security signature comprises the fingerprint of digitally signing of electronic signature and the original document content of deciphering with the PKI that uses this right people of private/public key only.This security signature is tied to this content with this people's signature.At this moment, the document can be distributed to the final user for checking and printing.
Veritably whether bound/tied is to the content of electronics or printing (non-electronics) document for the signature of verifying a people, and this system and method determines at first whether this signature is " security signature ".As mentioned above, security signature comprises the public key digital signature of the hashed value that generates from the content of the document of this people's electronic signature and the actual signature of this people.(if the document that comprises this signature is paper spare/document printing, then scans the document to generate the electronic document of this document printing of expression).If this system and method does not detect the public key digital signature (that is, this signature is not security signature) of this embedding in the digital picture of this signature, then this system and method will not verify that this electronic signature binds the signer to the content of document veritably.Property illustrative purposes presented for purpose of illustration can comprise the document of the digital picture of security signature by printing, and depicts to generate " clean " signature on the version of the printing of this digital picture and forge a people's signature.In this scene, should " clean " signature will not be included in the public key digital signature that the signature with the signer that can detect and embed, the signer on the program is tied to the certain content of document.
If this system and method can extract public key digital signature from this signature, then should signature expression security signature.The public key digital signature that uses this people/signer's PKI (private/public key is right) deciphering to extract subsequently.This system and method calculates document content second collision resistant Hash of (in this example, document content comprises that this people's handwritten signature (that is electronic signature) deducts the digital picture of the public key digital signature that is extracted).If first and second hash are complementary, then this system and method verifies that this people's signature represents that this people will carry out the intention of the document; Otherwise, do not verify this relation.
Now these and other aspect that is used for security signature will be described in more detail.
Example system
Although also nonessential, the system and method that is used for security signature will described by the general context of the computer executable instructions of carrying out such as computing equipments such as personal computers.Program module generally comprises the execution particular task or realizes the routine of particular abstract, program, object, assembly, data structure or the like.Though described this system and method in aforementioned context, action described below and operation also can realize with hardware.
Fig. 1 illustrates the example system that is used forsecurity signature 100 according to an embodiment.In this was realized,system 100 comprisedcomputing equipment 102, as universal computing device, server, laptop computer, mobile computing device, board PC etc.Board PC generally includes and allows the user to replace touch-screen or the digitizing figure input technology that keyboard or mouse come the operational computations machine with stylus or digital pen.In one realizes,computing equipment 102 be coupled to such as allow the user use stylus (a class plotting unit) provide/draw the mode of handwritten signature-be similar to usefulness pencil and paper drawing image-I/O equipment 104 such as figure board.
Computing equipment 102 comprises the one ormore processors 106 that are coupled to such as corresponding tangible computer-readable recording medium such assystem storage 108grades.Processor 106 can be microprocessor, microcomputer, microcontroller, digital signal processor etc.System storage 108 comprises, for example, the volatile random access memory that is used for the routine data that the computer program instructions that can be carried out byprocessor 106 and these computer program instructions generate and/or use (for example, RAM) and non-volatile ROM (read-only memory) (for example, ROM, flash memory etc.).Such computer program instructions is illustrated asprogram module 110 and routine data is illustrated as routine data 112.In this was realized, for example,program module 110 comprised secure hand-written signature module 114 and such asother program modules 116 such as the operating system that runtime environment is provided (OS), public key cryptography application program, device drivers.
Secure hand-written signature module 114 (hereinafter being commonly referred to " secure signature module 114 ") generates thesecurity signature 118 that a people's electronic signature is tied to cryptographically the content (for example, the one page or the pages content of expression record, contract, p.m.entry, official document) of document 120.The digital image version of electronic signature this people's of expression (being also referred to as " signer ") handwritten signature.This electronic signature is illustrated as the appropriate section of " other routine data " 124.In one realized, secure signature module 114 was from receiving electronic signature such as I/O equipment such as card reader, graphics pad.For example, in one realized, a people used the pen/stylus that is attached to digital pen pad equipment (for example, graphics pad, board PC etc.) to generate electronic signature.In this scene, electronic signature is affixed to or otherwise logically is associated with document 120.At this moment, electronic signature expression user carries out the wish (that is, the user is by the wish of the content ofdocument 120 binding) of the content of document 120.In view of this electronic signature, secure signature module 114 following establishments are cryptographically tied/bound to user's electronic signature thesecurity signature 118 of the content ofdocument 120.
Make that D is by the bitmap of theoriginal document 120 of user's electronic ground signature.Use in the multiple possible known collision resistant Cryptographic Hash Function (for example, SHA1 etc.), secure signature module 114 generates h (D), and it is the collision resistant cryptographic Hash ("hash 126 ") of D.Secure signature module 114 generates h (D) from the content of this signer's electronic signature and document 120.By (for example using public-key cryptographic application/infrastructure, RSA, DSA, ECDSA, BLS etc.) and this user/signer's private key, secure signature module 114 is calculated public key digital signature 122 (R) and (is noted from h (D), herein, system's foundation structure that uses public-key is verified the signer's who is stated identity).That is, secure signature module 114 is signed h (D) cryptographically to generate R.Secure signature module 114 is subsequently by generatingsecurity signature 118 with R (122) insertion/embedding or each position of logically being associated with electronic signature.In this way,security signature 118 is cryptographically tied/bound to electronic signature the content of document 120.In one realized, secure signature module 114 used least significant bit (LSB) (LSB) mapping techniques that R (122) insertion/embedding (or logically related) is arrived the image ofelectronic signature 118 to preserve the readability and the sharpness of security signature 118.In one realized, this LSB mapping techniques was created the fuzzy gray level image (Hash pattern) of the value of coding R.Unbred eyes are almost discovered less than this two-dimensional model.Yet, this two-dimensional model can program on sign and from screen capture or print image, extract can and contrast the mode that document content verifies by reconstruct.
In this is realized, security signature 114 be createdsecurity signature 118 by will R (122) embedding in signing electronically, so that R visually not eye-catching concerning the observer (for example, be hidden or invisible).In this was realized, if the user generatesdocument printing 128 fromdocument 120, the R that then is embedded in thesecurity signature 118 that is associated withdocument 120 still was embedded on one page ofdocument printing 128 and is illustrated in the ink/toner version of security signature.As describing in more detail at following joint, signature verification module 130 can detect and extraction R from the bitmap of the scanning input of document printing 128 (document D ').Thus, the operation of thegeneration security signature 118 of security signature 114 is tied to signer's electronic signature the page of printing.
The user is by confirming that with the security signature ofsystem 100 module 130 interfaces come certifying signature people's electronic signature (bysecurity signature 118 sealings) whether this signer to be tied to veritably the content (that is, electronic signature is not forged, shears and pastes and wait until that document is medium) of document.The user can or be coupled to remote computing device 136 interfaces ofcomputing equipment 102 withcomputing equipment 102 by network 132.(network 132 can comprise any combination of Local Area Network and general wide area network (WAN) communication environment, is common in the network of office, enterprise-wide. computer networks, Intranet and the Internet etc. as those).In one realized, security signature confirmed that module 130 conveys to the user with user interface (UI) and/or webpage.This UI and webpage allow user's specified documents D ' to comprise electronic signature and comprise the signer's that thesecurity signature 118 of this electronic signature is claimed PKI.(if the document that comprises this signature is paper spare/document printing 128, and then scanninginput document printing 128 is to generate electronic document D ').Property illustrative purposes presented for purpose of illustration, this PKI and D ' are by representing from therequest 140 of remote computing device 136 or specifying.
The bitmap of the handwritten signature part of signature verification 130 normal indication D '.In one realizes, the position that user/operator's Manual Logos are associated with signature (as, define the size of bitmap etc. with pointing device drafting rectangle).At this moment, do not understand unformatted, the conventional the digital picture whether signature bit that is identified comprises asecurity signature 118 or a people's handwritten signature.(for example, on the version of the printing ofsecurity signature 118, forge to depict to multipotency generate electronic signature).The signature of this forgery will not comprise public key digital signature detectable and that embed, the reality/actual signature people in the printing edition ofsecurity signature 118 on the program.Secure signature verification 130 attempts extracting public key digital signature R (122) from the position that is associated with electronic signature.In one realized, this least significant bit (LSB) by the pixel density value that the part correlation of writing down and being identified joins was finished.If public key digital signature R does not exist, then the electronic signature in the part that is identified is not that security signature 118 (that is, this electronic signature is not no cryptographic tie of the content of D ') and module 130 notify the user not verify about document D ' the authenticity of signature of content.
If extracted digital signature R from the electronic signature of the part that identified, then this electronic signature is security signature 118.Extract operation with the pixel density value removing/zero clearing (zero-out) in thesecurity signature 118 that is identified, thereby cause unformatted electronic signature.In case this electronic signature is extracted out, then signature verification is followed and is the selected digital signature protocol of this scheme.In more detail, Signature Confirmation 130 uses digital signature R that received PKI deciphering extracted to identify the first collision resistant cryptographic Hash value h (D) 126.In one realized, under the situation of RSA digital signature R, this PKI that will be referred to use the signer carried out exponentiation and verification and assessment to R and checks that whether the result is complementary with signer's disclosed certificates/keys.The second collision resistant Hash h (D ') of the D ' that comprises content and electronic signature is calculated in signature verification 130 subsequently.(when calculating h (D '), D ' still compriseselectronic signature 118, but this electronic signature no longer issecurity signature 118, because it no longer comprises the digital signature R that is embedded into).
Signature Confirmation logical one 30 is first andsecond hashed values 126 relatively.If first andsecond hashed values 126 are identical, then Signature Confirmation 130 electronic signature of notifying the user to be sealed in thesecurity signature 118 represents that author/signer is bound to the wish of the content of D '.Otherwise Signature Confirmation 130 notice user's electronic signatures do not represent that author/signer is bound to the wish of the content of D '.
Example process
Fig. 2 illustrates the example process that is used forsecurity signature 200 according to an embodiment.The property purpose of description will be come the operation ofdescription process 200 with reference to some assembly of figure 1 presented for purpose of illustration.In this was described, the certain figures of this assembly was wherein introduced in the leftmost numeral indication of Reference numeral first.In one realizes, the operation of the correspondingmodule implementation procedure 200 in secure signature module 114 and the secure verification module 130.The operation atframe 202 places receives the electronic signature thatdocument 120 is carried out in indication from signatory/signer.The operation offrame 204 is expanded this electronic signature to generate thesecurity signature 118 of the content that is tied to document 120 cryptographically of will signing electronically.In one realized, this finished by generate collision resistant Hash from the content ofdocument 120 and electronic signature.The password foundation structure that uses public-key is subsequently signed this collision resistant Hash cryptographically to generate public key digital signature 122.In this was realized, the operation offrame 204 was inserted in theelectronic signature 118 public keydigital signature 122 to generate security signature 118.In this way,security signature 118 is cryptographically tied/bound to signer's electronic signature the certain content of document 120.For example, thesecurity signature 118 of shearing and pasting the different document from original document will not be cryptographically tied to the content of this different document.
Whether the operation Receipt Validation signer's atframe 208 places electronic signature is tied/bound to document D safely ' requests for content.This request comprises the document D that (or otherwise sign) will be verified ' and the document signature people's that claimed the right PKI of private/public key.The operation offrame 210 attempt from embed or with electronic signature that received document logically is associated extract public key digital signature R (122).If this public key digital signature R is present in the electronic signature, then this electronic signature is security signature 118.Extract operation and from this electronic signature, delete/remove (for example, zero clearing) any indication R.The operation offrame 212 determines whether find public key digital signature R in this electronic signature.If this electronic signature is not digitally signed, then the page or leaf that operates in Fig. 3 ofprocess 200 is gone up with reference to " A " and is located to continue, and can not be verified as the expression signer in this electronic signature of notifying the user to be associated with D ' and carry out document D ' the wish of content.Otherwise, the public key digital signature R (122) that the PKI of manipulating the signer of frame 214 (this PKI receives in the request that the operation withframe 202 is associated) deciphering is extracted.These decryption oprerationss cause the first hashed value h (D) 126.The operation offrame 216 is from document D ' content and the electronic signature of having removed the public key digital signature that is extracted (seeing also the operation of frame 210) calculate second hashed value 126 (that is collision resistant Hash value).At this moment, the page or leaf that operates in Fig. 3 ofprocess 200 is gone up with reference to " B " and is located to continue.
Fig. 3 illustrates the further operation according to the example process that is used forsecurity signature 200 of Fig. 2 of an embodiment.The operation offrame 302 is first and second hashed values 126 (please refer to the operation of theframe 216 of previously described Fig. 2) relatively.As implied above, first hashedvalue 126 be deciphering with embedding or logically be associated with document D ' result of the public keydigital signature 122 that is associated of thesecurity signature 118 of (120).Second hashed value 126 is used the collision resistant Hash functions from document D ' content and corresponding electronic signature (having removed thesecurity signature 118 of digital signature) calculate.Iffirst hashed value 126 is identical withsecond hashed value 126, thenframe 306 places that operate in offrame 304 continue.The wish of operational notification user's of frame 306 (that is the requestor of theframe 202 of Fig. 2) and document D ' be associated electronic signature represent that the signatory carries out document D ' content.If first hashedvalue 126 is different withsecond hashed value 126, thenframe 308 places that operate in offrame 304 continue.The operational notification user and the document D of frame 308 ' electronic signature that is associated can not be verified as the wish that the expression signatory carries out the content of (for example, being bound to) document.At this moment, the operation ofprocess 200 stops.
Conclusion
Although with to the special-purpose language description of the operation of architectural feature and/or method or action security signature, be appreciated that the realization that presents in the appended claims not necessarily will be limited to above-mentioned concrete feature or action.For example, though the operation that is associated with secure hand-written signature module 114 (Fig. 1) is to illustrate and describe as the seal operation to secure verification module/logical one 30, the operation of these corresponding program modules can be independently of one another.In one realized, for example, the operation of the operation blow-by module 130 of secure hand-written signature module 114 was operated and is realized but be totally independent of these.In one realized, for example, operating on the computing equipment different with the operation of module 130 of module 114 realized.Therefore, above-mentioned concrete feature and operation are as the exemplary form that realizes theme required for protection and disclosed.

Claims (20)

CNA200780014717XA2006-04-282007-04-05Secure signaturesPendingCN101427242A (en)

Applications Claiming Priority (3)

Application NumberPriority DateFiling DateTitle
US74599306P2006-04-282006-04-28
US60/745,9932006-04-28
US11/611,6242006-12-15

Publications (1)

Publication NumberPublication Date
CN101427242Atrue CN101427242A (en)2009-05-06

Family

ID=40616743

Family Applications (1)

Application NumberTitlePriority DateFiling Date
CNA200780014717XAPendingCN101427242A (en)2006-04-282007-04-05Secure signatures

Country Status (1)

CountryLink
CN (1)CN101427242A (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN103098047A (en)*2010-05-042013-05-08多塞股份公司Systems and methods for distributed electronic signature documents including version control
CN107665314A (en)*2017-09-252018-02-06北京国富安电子商务安全认证有限公司The trusted processes method and device signed on the electronic document
CN112840595A (en)*2018-09-202021-05-25高铭科维科技无锡有限公司System and method for binding information to tangible objects
CN112861189A (en)*2021-02-042021-05-28北京百度网讯科技有限公司Signature generation method, signature verification device, signature verification equipment and medium
CN113468573A (en)*2021-07-212021-10-01广西盖德科技有限公司Method and system for carrying out digital signature by using printing mode

Cited By (11)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN103098047A (en)*2010-05-042013-05-08多塞股份公司Systems and methods for distributed electronic signature documents including version control
US9251131B2 (en)2010-05-042016-02-02Docusign, Inc.Systems and methods for distributed electronic signature documents including version control
CN103098047B (en)*2010-05-042017-02-15多塞股份公司Systems and methods for distributed electronic signature documents including version control
US9798710B2 (en)2010-05-042017-10-24Docusign, Inc.Systems and methods for distributed electronic signature documents including version control
CN107665314A (en)*2017-09-252018-02-06北京国富安电子商务安全认证有限公司The trusted processes method and device signed on the electronic document
CN107665314B (en)*2017-09-252019-11-08北京国富安电子商务安全认证有限公司The trusted processes method and device signed on the electronic document
CN112840595A (en)*2018-09-202021-05-25高铭科维科技无锡有限公司System and method for binding information to tangible objects
CN112840595B (en)*2018-09-202023-08-04高铭科维科技无锡有限公司System and method for binding information to a tangible object
CN112861189A (en)*2021-02-042021-05-28北京百度网讯科技有限公司Signature generation method, signature verification device, signature verification equipment and medium
CN112861189B (en)*2021-02-042024-02-06北京百度网讯科技有限公司 Signature generation method and verification method, device, equipment and media
CN113468573A (en)*2021-07-212021-10-01广西盖德科技有限公司Method and system for carrying out digital signature by using printing mode

Similar Documents

PublicationPublication DateTitle
EP1662699B1 (en)Document authentication combining digital signature verification and visual comparison
US20080148054A1 (en)Secure Signatures
US8370632B2 (en)Apparatus and method for incorporating signature into electronic documents
CN1227622C (en)Image processing apparatus and image processing method, program and storing media
US8085445B2 (en)Method to certify facsimile transmissions
WO2014154109A1 (en)Generating method, verifying method for electronic bill with anti-fake two dimension (2d) code and system for same
CN102880833A (en)Two-dimensional code anti-fake verification method for documents
JPH1011509A (en)Electronic document security system, electronic stamping security system and electronic signature security system
CA2374196A1 (en)Legitimacy protection of electronic document and a printed copy thereof
CN101465734A (en)Online artificial signing system and method
US20070133792A1 (en)Image processing apparatus, control method therefor, computer program, and computer-readable storage medium
CN101427242A (en)Secure signatures
JP4257150B2 (en) Print document falsification detection device and falsification detection method
US20080059803A1 (en)Method for the authentication of printed document
KR20080113264A (en) Computing device, computer readable data storage medium, and computer implemented method for secure signature
JP3468608B2 (en) Verification device for printed matter
CN110309677A (en)A kind of secure anti-counterfeiting method and system of electronics license
JP2004013287A (en)Document issuing system
KR101417825B1 (en)Method of verification of electronic filing document and apparatuse for using the same
CN116842579A (en)Handwriting electronic signature method
RU2543928C1 (en)Method for generation of electronic document and its copies
JP4297040B2 (en) Electronic watermarked document handling apparatus, electronic watermarked document handling system, and electronic watermarked document handling method
KR100951587B1 (en) How to Sign Documents with Code Images
KR100723649B1 (en) Generation and Verification of Civil Certificate for Internet Issue
Fischer et al.Watermarks and Text Transformations in Visual Document Authentication.

Legal Events

DateCodeTitleDescription
C06Publication
PB01Publication
C10Entry into substantive examination
SE01Entry into force of request for substantive examination
C02Deemed withdrawal of patent application after publication (patent law 2001)
WD01Invention patent application deemed withdrawn after publication

Open date:20090506


[8]ページ先頭

©2009-2025 Movatter.jp