[go: up one dir, main page]

TWI850002B - Individual encrypted signature system and signing method thereof - Google Patents

Individual encrypted signature system and signing method thereof Download PDF

Info

Publication number
TWI850002B
TWI850002B TW112124340A TW112124340A TWI850002B TW I850002 B TWI850002 B TW I850002B TW 112124340 A TW112124340 A TW 112124340A TW 112124340 A TW112124340 A TW 112124340A TW I850002 B TWI850002 B TW I850002B
Authority
TW
Taiwan
Prior art keywords
information
identification
identification element
ciphertext
signature
Prior art date
Application number
TW112124340A
Other languages
Chinese (zh)
Other versions
TW202501288A (en
Inventor
羅世融
謝雅超
林連豐
林宥縈
Original Assignee
辰晧電子股份有限公司
羅世融
謝雅超
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 辰晧電子股份有限公司, 羅世融, 謝雅超 filed Critical 辰晧電子股份有限公司
Priority to TW112124340A priority Critical patent/TWI850002B/en
Application granted granted Critical
Publication of TWI850002B publication Critical patent/TWI850002B/en
Publication of TW202501288A publication Critical patent/TW202501288A/en

Links

Images

Landscapes

  • Storage Device Security (AREA)

Abstract

本發明為個體加密簽證系統及其簽署方法,透過一行動裝置中的一簽證管理程式實施,該簽證管理程式儲存有一主識別元件的一第一識別資訊及一第一密文資訊,且能讀取一次識別元件的一第二識別資訊及一第二密文資訊;該簽證管理程式能執行一非對稱加密演算法而可根據該主識別元件中的一私鑰資訊,將該第一識別資訊、該第二識別資訊及一加密資訊進行加密演算成一加密簽證資訊,並將該加密簽證資訊寫入該次識別元件中,於實際的使用情境中,一個體可於其周邊產品上設置該次識別元件,以供他人掃取確認所述的周邊商品是否出自於該個體。The present invention is a personal encrypted signature system and a signature method thereof, which are implemented through a signature management program in a mobile device. The signature management program stores a first identification information and a first ciphertext information of a primary identification element, and can read a second identification information and a second ciphertext information of a primary identification element; the signature management program can execute an asymmetric encryption algorithm and can encrypt the first identification information, the second identification information and an encryption information into an encrypted signature information according to a private key information in the primary identification element, and write the encrypted signature information into the secondary identification element. In an actual use scenario, an individual can set the secondary identification element on his peripheral product so that others can scan and confirm whether the peripheral product comes from the individual.

Description

個體加密簽證系統及其簽署方法Individual encrypted signature system and signing method thereof

本發明關於一種數位簽證,特別是指個人加密簽證系統及個體加密簽證簽署方法。 The present invention relates to a digital visa, and in particular to a personal encrypted visa system and a personal encrypted visa signing method.

傳統紙本文件作業的時代,當一簽署人簽署一契約時,係透過其個人的一筆跡或一章印來證明該簽署人的身分,即該筆跡或該章印具有難以被他人模仿的唯一性;而隨著數位化時代的來臨,則可透過一數位簽章來查驗一數位文件中的簽署人身分,該數位簽章的功能類似傳統上的該筆跡或該章印的功能;該數位簽章通常是用於一企業、一組織等法人機構所擁有,所述的法人機構須經一數位憑證認證機構(CA)進行身分驗證,以獲得一數位憑證,該數位憑證可理解為所述的法人機構之電子身分證,用以作為證明其身分的依據。 In the era of traditional paper document processing, when a signatory signs a contract, his/her identity is proved by his/her personal handwriting or seal, that is, the handwriting or seal is unique and difficult to be imitated by others; with the advent of the digital era, the identity of the signatory in a digital document can be verified by a digital signature, and the function of the digital signature is similar to the traditional handwriting or seal; the digital signature is usually used by a legal entity such as an enterprise or an organization. The legal entity must be verified by a digital certificate certification authority (CA) to obtain a digital certificate, which can be understood as the electronic ID card of the legal entity, used as the basis for proving its identity.

一個體(如一商家)欲使他人(如其顧客)在使用其周邊產品時能檢驗:該周邊產品是否出自於該個體,即可透過上述該數位簽章的概念達成,然而,該數位簽章僅能透過前述的方式且經過繁瑣地流程取得(如同申請一自然人憑證),且當數位簽章取得後,仍缺乏一電子載體能供該數位簽章存放,即在此數位化的時代中,對於一個體而言,缺乏一種容易設定且具有公信力的一證明方式以證明一產品或作品由該個體產出。 If an individual (such as a merchant) wants others (such as its customers) to verify whether the peripheral product is produced by the individual when using it, this can be achieved through the concept of the digital signature mentioned above. However, the digital signature can only be obtained through the aforementioned method and through a cumbersome process (just like applying for a natural person certificate), and after the digital signature is obtained, there is still a lack of an electronic carrier for the digital signature to be stored. That is, in this digital age, for an individual, there is a lack of an easy-to-set and credible way to prove that a product or work is produced by the individual.

現有的一數位簽章皆需經繁瑣的流程取得,使得不易證明一物品源自一個體(即證明該物品的原創性),有鑑於此,本發明提供一種個體加密簽證系統及其簽署方法,以克服前述問題。 Existing digital signatures require a cumbersome process to obtain, making it difficult to prove that an item comes from an individual (i.e., prove the originality of the item). In view of this, the present invention provides a personal encryption signature system and its signing method to overcome the aforementioned problem.

本發明個體加密簽證系統,包含: 一主識別元件,具有一第一識別資訊、一第一密文資訊及一私鑰資訊;一次識別元件,具有一第二識別資訊、一第二密文資訊;一行動裝置,具有一簽證管理程式的資料,該簽證管理程式用以讀取該第一識別資訊、該第一密文資訊、該第二識別資訊及該第二密文資訊;一雲端伺服器,與該行動裝置通訊連接,以接收該第一識別資訊、該第一密文資訊、該第二識別資訊及該第二密文資訊,並透過該第一識別資訊與該第一密文資訊驗證該主識別元件,及透過該第二識別資訊與該第二密文資訊驗證該次識別元件,以分別確認該主識別元件與該次識別元件是否各分別為一合法識別元件;當該主識別元件與該次識別元件各分別為合法識別元件,該行動裝置讀取該私鑰資訊,透過該簽證管理程式執行一非對稱式加密演算法,根據該私鑰資訊將該第一識別資訊、該第二識別資訊及一加密資訊進行加密演算成一加密簽證資訊,並將該加密簽證資訊寫入該次識別元件中。 The personal encryption visa system of the present invention comprises: a main identification element having a first identification information, a first ciphertext information and a private key information; a primary identification element having a second identification information and a second ciphertext information; a mobile device having data of a visa management program, the visa management program is used to read the first identification information, the first ciphertext information, the second identification information and the second ciphertext information; a cloud server, which is connected to the mobile device for communication to receive the first identification information, the first ciphertext information, the second identification information and the second ciphertext information, and transmits the first identification information and the second ciphertext information to the cloud server. The first ciphertext information verifies the primary identification element, and the secondary identification element is verified through the second identification information and the second ciphertext information to respectively confirm whether the primary identification element and the secondary identification element are respectively a legitimate identification element; when the primary identification element and the secondary identification element are respectively a legitimate identification element, the mobile device reads the private key information, executes an asymmetric encryption algorithm through the certificate management program, and encrypts the first identification information, the second identification information and an encryption information into an encrypted certificate information according to the private key information, and writes the encrypted certificate information into the secondary identification element.

本發明個體加密簽證簽署方法,透過一行動裝置的一簽證管理程式實施,該簽證管理程式儲存有一主識別元件的一第一識別資訊及一第一密文資訊,該方法包含:(a)讀取一次識別元件的一第二識別資訊;(b)傳送該第二識別資訊給一雲端伺服器,以供該雲端伺服器根據該第二識別資訊判斷該次識別元件是否為一合法識別元件;(c)讀取該次識別元件的一第二密文資訊;(d)傳送該第二密文資訊給該雲端伺服器,以供該雲端伺服器根據該第二密文資訊判斷該次識別元件是否為一合法識別元件;(e)接收步驟(b)及(d)的判斷結果,當步驟(b)及(d)的判斷結果皆為是,讀取該主識別元件的一私鑰資訊; (f)根據該私鑰資訊將該第一識別資訊、該第二識別資訊及一加密資訊進行非對稱加密演算而得一加密簽證資訊,並將該加密簽證資訊寫入該次識別元件中。 The present invention provides a method for signing a personal encrypted signature. The method is implemented by a signature management program of a mobile device. The signature management program stores a first identification information and a first ciphertext information of a primary identification element. The method comprises: (a) reading a second identification information of a primary identification element; (b) transmitting the second identification information to a cloud server so that the cloud server can determine whether the secondary identification element is a legitimate identification element according to the second identification information; (c) reading a second ciphertext information of the secondary identification element; (d) transmitting the second ciphertext information of the secondary identification element to a cloud server. (e) receiving the judgment results of steps (b) and (d), and when the judgment results of steps (b) and (d) are both yes, reading a private key information of the primary identification element; (f) performing an asymmetric encryption operation on the first identification information, the second identification information and an encrypted information according to the private key information to obtain an encrypted signature information, and writing the encrypted signature information into the secondary identification element.

本發明應用於實際的使用情境中時,一個體(如一商家)可於其周邊產品上設置該次識別元件,以供他人(如其顧客)掃取確認所述的周邊商品是否出自於該個體,對於該商家而言,僅需透過該簽證管理程式感應該主識別元件及該次識別元件並填入一些資訊,即可完成該主識別元件及該次識別元件的設定,對於資訊的可信度而言,該主識別元件與該次識別元件分別為經本發明系統驗證的一合法識別元件,而該第一識別資訊與該第二識別資訊分別為該主識別元件與該次識別元件的唯一識別碼,且該加密簽證資訊包含該第一識別資訊與該第二識別資訊,故該加密簽證資訊係具有其可信度而能證明該次識別元件的部分資訊源自該主識別元件的資訊。 When the present invention is applied in actual usage scenarios, an individual (such as a merchant) can set the secondary identification element on its peripheral products so that others (such as its customers) can scan and confirm whether the peripheral products are from the individual. For the merchant, it only needs to sense the primary identification element and the secondary identification element through the visa management program and fill in some information to complete the setting of the primary identification element and the secondary identification element, which is more reliable for the information. For example, the primary identification element and the secondary identification element are respectively a legal identification element verified by the system of the present invention, and the first identification information and the second identification information are respectively the unique identification codes of the primary identification element and the secondary identification element, and the encrypted signature information includes the first identification information and the second identification information, so the encrypted signature information has its credibility and can prove that part of the information of the secondary identification element is derived from the information of the primary identification element.

10:主識別元件 10: Main identification element

11:第一記憶體 11: First Memory

12:第一系統資料區塊 12: First system data block

13:第一明文資料區塊 13: The first plaintext data block

14:第一類別資料區塊 14: First category data block

15:第一密文資料區塊 15: First ciphertext data block

16:第一簽證資料區塊 16: First visa data block

20:次識別元件 20: Secondary identification element

21:第二記憶體 21: Second memory

22:第二系統資料區塊 22: Second system data block

23:第二明文資料區塊 23: Second plaintext data block

24:第二類別資料區塊 24: Second category data block

25:第二密文資料區塊 25: Second ciphertext data block

26:第二簽證資料區塊 26: Second visa data block

30,30’:行動裝置 30,30’: Mobile devices

40:雲端伺服器 40: Cloud Server

41:識別資訊資料庫 41: Identification information database

42:主網頁管理平台 42: Main webpage management platform

43:主網頁 43: Main page

50:立即掃描鈕 50: Scan now button

500:確認鈕 500:Confirm button

501:取消鈕 501:Cancel button

502:取消掃描鈕 502:Cancel scan button

51:擁有者簡介 51: Owner Profile

52:編輯資料鈕 52: Edit data button

520:欄位 520: Field

53:作品管理鈕 53: Works management button

530:創建作品鈕 530: Create Work Button

531:第一作品 531: First Work

532:作品編輯鈕 532: Works edit button

533:作品檢視鈕 533: Works view button

534:作品簡介 534: Introduction of the work

535:擁有者連結鈕 535: Owner link button

536:驗證鈕 536:Verification button

54:變更密碼鈕 54: Change password button

C1:第一識別資訊 C1: First identification information

C2:第二識別資訊 C2: Second identification information

S1:第一類別資訊 S1: First category information

S2:第一密文資訊 S2: First ciphertext information

S3:主網頁編輯連結資訊 S3: Main page edit link information

S4:主網頁連接資訊 S4: Main page connection information

S5:第二類別資訊 S5: Second category information

S6:第二密文資訊 S6: Second ciphertext information

S7:私鑰資訊 S7: Private key information

S8:公鑰資訊 S8: Public key information

S9:加密簽證資訊 S9: Encrypted visa information

S10:讀取指令 S10: Read instruction

V1:識別資訊驗證 V1: Identification information verification

V2:密文資訊驗證 V2: Ciphertext information verification

圖1:本發明個體加密簽證系統之電路方塊圖。 Figure 1: Circuit block diagram of the personal encryption signature system of the present invention.

圖2A:本發明中的簽證管理程式之起始介面示意圖。 Figure 2A: Schematic diagram of the initial interface of the visa management program in the present invention.

圖2B:本發明中的簽證管理程式之密碼輸入介面示意圖。 Figure 2B: Schematic diagram of the password input interface of the visa management program in the present invention.

圖2C:本發明中的簽證管理程式之提示掃描介面示意圖。 Figure 2C: Schematic diagram of the scanning prompt interface of the visa management program in the present invention.

圖3:本發明個體加密簽證系統執行識別資訊驗證及密文資訊驗證之電路方塊圖。 Figure 3: Block diagram of the circuit for executing identification information verification and ciphertext information verification in the personal encryption signature system of the present invention.

圖4:本發明個體加密簽證系統之電路方塊圖,其中,行動裝置讀取主網頁編輯連結資訊以連結至主網頁管理平台。 Figure 4: A circuit block diagram of the personal encrypted authentication system of the present invention, wherein the mobile device reads the main web page editing link information to link to the main web page management platform.

圖5A:本發明中的簽證管理程式之主網頁介面示意圖。 Figure 5A: Schematic diagram of the main web page interface of the visa management program in the present invention.

圖5B:本發明中的簽證管理程式之主編輯介面示意圖。 Figure 5B: Schematic diagram of the main editing interface of the visa management program in the present invention.

圖6:本發明個體加密簽證系統之電路方塊圖,其中,另一行動裝置讀取主網頁連結資訊以連結至主網頁。 Figure 6: A circuit block diagram of the personal encryption authentication system of the present invention, wherein another mobile device reads the main web page link information to link to the main web page.

圖7:本發明中的簽證管理程式之作品管理介面示意圖。 Figure 7: Schematic diagram of the work management interface of the license management program in the present invention.

圖8:本發明個體加密簽證系統進行加密簽證簽署流程之電路方塊圖。 Figure 8: Circuit block diagram of the encrypted signature signing process of the personal encrypted signature system of the present invention.

圖9A:本發明中的簽證管理程式之作品管理介面示意圖,其中,顯示有一第一作品。 Figure 9A: A schematic diagram of the work management interface of the license management program in the present invention, wherein a first work is displayed.

圖9B:本發明中的簽證管理程式之作品編輯介面示意圖。 Figure 9B: Schematic diagram of the work editing interface of the licensing management program in the present invention.

圖9C:本發明中的簽證管理程式之次網頁示意圖。 Figure 9C: Schematic diagram of the second web page of the visa management program in the present invention.

圖10:本發明個體加密簽證系統進行加密簽證驗證之電路方塊圖。 Figure 10: Block diagram of the circuit for the personal encrypted signature system of the present invention to perform encrypted signature verification.

圖11:本發明個體加密簽證簽署方法之流程圖。 Figure 11: Flowchart of the individual encrypted signature signing method of the present invention.

為能詳細瞭解本發明的技術特徵及實用功效,並可依照發明內容來實現,茲進一步以如圖式所示的實施例,詳細說明如後: In order to understand the technical features and practical effects of the present invention in detail and to implement it according to the content of the invention, the following is a detailed description of the embodiments shown in the figure:

本發明為一種個體加密簽證系統其簽署方法,請參閱圖1,該個體加密簽證系統包含一主識別元件10、至少一次識別元件20、一行動裝置30及一雲端伺服器40,其中,該行動裝置30與該雲端伺服器40通訊連接。 The present invention is a personal encryption signature system and its signing method. Please refer to Figure 1. The personal encryption signature system includes a master identification element 10, at least one primary identification element 20, a mobile device 30 and a cloud server 40, wherein the mobile device 30 is connected to the cloud server 40 for communication.

該主識別元件10為支援近場通訊技術(NFC)的一標籤(Tag),且具有一第一識別資訊C1,該第一識別資訊C1包含該主識別元件10的一唯一識別碼(UID)及其簽證(UID Signature),具體而言,該主識別元件10包含一射頻晶片及一感應天線,該射頻晶片與該感應天線電性連接,該射頻晶片用來存儲及處理訊號,該感應天線用以接收及傳遞訊號,其中,該射頻晶片中包含有一第一記憶體11,該第一記憶體11中儲存有該第一識別資訊C1,且該第一記憶體11包含一第一系統資料區塊(Block)12、一第一明文資料區塊13、一第一類別資料區塊14、一第一密文資料區塊15及一第一簽證資料區塊16,而該第一識別資訊C1 即儲存於該第一系統資料區塊12中,關於前述的各第一資料區塊的功能及其中儲存的資訊將於後文進一步說明。 The main identification element 10 is a tag supporting near field communication technology (NFC) and has a first identification information C1. The first identification information C1 includes a unique identification code (UID) and a signature (UID Signature) of the main identification element 10. Specifically, the main identification element 10 includes a radio frequency chip and a sensing antenna. The radio frequency chip is electrically connected to the sensing antenna. The radio frequency chip is used to store and process signals, and the sensing antenna is used to receive and transmit signals. The radio frequency chip includes a first memory 11. The first memory 11 stores the first identification information C1, and the first memory The body 11 includes a first system data block 12, a first plaintext data block 13, a first category data block 14, a first ciphertext data block 15 and a first certification data block 16, and the first identification information C1 is stored in the first system data block 12. The functions of the aforementioned first data blocks and the information stored therein will be further described later.

該至少一次識別元件20的硬體結構與該主識別元件10大致相同,各該次識別元件20亦分別具有一第二記憶體21,差別在於該第二記憶體21中儲存的資訊與該第一記憶體11中的資訊不同,各該第二記憶體21包含一第二系統資料區塊22、一第二明文資料區塊23、一第二類別資料區塊24、一第二密文資料區塊25及一第二簽證資料區塊26,且各該次識別元件20分別具有一第二識別資訊C2,該第二識別資訊C2包含各該次識別元件20的一唯一識別碼及其簽證,且儲存於該第二系統資料區塊22中,關於各第二資料區塊的功能及其中儲存的資訊亦於後文進一步說明。 The hardware structure of the at least one primary identification element 20 is substantially the same as that of the primary identification element 10. Each of the secondary identification elements 20 also has a second memory 21. The difference is that the information stored in the second memory 21 is different from the information in the first memory 11. Each of the second memories 21 includes a second system data block 22, a second plaintext data block 23, a second category data block 24, a second ciphertext data block 25 and a second signature data block 26, and each of the sub-identification elements 20 has a second identification information C2, the second identification information C2 includes a unique identification code and a signature of each of the sub-identification elements 20, and is stored in the second system data block 22. The function of each second data block and the information stored therein will be further described later.

該主識別元件10及各該次識別元件20能分別被設置在任何物體上,故該主識別元件10及該次識別元件20的外觀構造並不加以為限,舉例而言,該主識別元件10及各該次識別元件20能分別被設計為一貼紙而分別貼附於一物體上。 The main identification element 10 and each of the secondary identification elements 20 can be respectively set on any object, so the appearance structure of the main identification element 10 and the secondary identification element 20 is not limited. For example, the main identification element 10 and each of the secondary identification elements 20 can be respectively designed as a sticker and attached to an object.

該行動裝置30用以讀取該第一記憶體11及該第二記憶體21中的資訊,或對該第一記憶體11及該第二記憶體21寫入資訊,具體而言,該行動裝置30具有一簽證管理程式的資料(APP),且該行動裝置30具有一支援近場通訊技術(NFC)的讀取器(Reader),當該行動裝置30感應該主識別元件10或該次識別元件20時,該行動裝置30與該主識別元件10或該次識別元件20通訊連接,而能相互傳遞資訊;該行動裝置30可以是手機、平板電腦等行動設備。 The mobile device 30 is used to read the information in the first memory 11 and the second memory 21, or write information to the first memory 11 and the second memory 21. Specifically, the mobile device 30 has data of a visa management program (APP), and the mobile device 30 has a reader (Reader) that supports near field communication technology (NFC). When the mobile device 30 senses the primary identification element 10 or the secondary identification element 20, the mobile device 30 communicates with the primary identification element 10 or the secondary identification element 20, and can transmit information to each other; the mobile device 30 can be a mobile device such as a mobile phone, a tablet computer, etc.

該雲端伺服器40作為一資料存取及管理的核心,整合及管理不同的資料庫,且該雲端伺服器40具有資料存取、資料運算、資料比對等功能,舉例而言,該雲端伺服器40可為一建置於公有雲(如Amazon AWS,Microsoft Azure)的應用服務器,而該行動裝置30能透過該簽證管理程式與該雲端伺服器 40通訊連接。為能具體了解本發明個體加密簽證系統的運作方式,以下配合該簽證管理程式的操作示意圖進行說明。 The cloud server 40 serves as a core for data access and management, integrating and managing different databases, and has functions such as data access, data calculation, and data comparison. For example, the cloud server 40 can be an application server built on a public cloud (such as Amazon AWS, Microsoft Azure), and the mobile device 30 can communicate with the cloud server 40 through the visa management program. In order to understand the operation of the individual encrypted visa system of the present invention in detail, the following is an explanation with the operation diagram of the visa management program.

當使用者操作該行動裝置30以執行該簽證管理程式時,如圖2A所示,該行動裝置30顯示該簽證管理程式的一起始介面,且該起始介面具有一立即掃描鈕50;當該立即掃描鈕50受到觸碰時,該行動裝置30顯示如圖2B所示的一密碼輸入介面,該密碼輸入介面用以供使用者輸入該主識別元件10的一預設密碼,且該密碼輸入介面包含一確認鈕500及一取消鈕501,該確認鈕500用以供使用者確認輸入該預設密碼以跳轉至下一介面,該取消鈕501用以返回該起始介面,其中,該預設密碼係用以取得該記憶體10中部分資料區塊的讀寫(讀取及寫入)之權限,具體而言,係取得該第一類別資料區塊14、該第一密文資料區塊15及該第一簽證資料區塊16的讀寫權限。 When the user operates the mobile device 30 to execute the visa management program, as shown in FIG. 2A , the mobile device 30 displays a start interface of the visa management program, and the start interface has an immediate scan button 50; when the immediate scan button 50 is touched, the mobile device 30 displays a password input interface as shown in FIG. 2B , and the password input interface is used for the user to input a default password of the main identification element 10, and the password input interface includes a A confirmation button 500 and a cancel button 501, wherein the confirmation button 500 is used for the user to confirm the input of the default password to jump to the next interface, and the cancel button 501 is used to return to the starting interface, wherein the default password is used to obtain the read and write (read and write) permissions of some data blocks in the memory 10, specifically, to obtain the read and write permissions of the first category data block 14, the first ciphertext data block 15 and the first signature data block 16.

當該確認鈕500受到觸碰時,該行動裝置30顯示如圖2C所示的一提示掃描介面,使用者即可使透過該行動裝置30接近該主識別元件10,以感應該主識別元件10進行該預設密碼的驗證,其中,該提示掃描介面具有一取消掃描鈕502,該取消掃描鈕502用以將畫面跳轉回該密碼輸入介面,關於該預設密碼如何驗證,係該行動裝置30透過其讀取器及該簽證管理程式,並運用近場通訊技術與該主識別元件10進行資訊的傳遞而完成,關於近場通訊技術如何進行資訊的讀取與寫入為所屬領域的通常知識,容不再此多加敘述,簡言之,該行動裝置30透過該簽證管理程式將使用者輸入的密碼調製成一請求訊號,再由該讀取器將該請求訊號發送給該主識別單元10的感應天線,所述的感應天線將接收該請求訊號給該射頻晶片,該射頻晶片將解調該請求訊號並比對其中的內容(使用者輸入的密碼),驗證是否與該預設密碼相同。 When the confirmation button 500 is touched, the mobile device 30 displays a prompt scanning interface as shown in FIG. 2C , and the user can approach the main identification element 10 through the mobile device 30 to sense the main identification element 10 to verify the preset password. The prompt scanning interface has a cancel scanning button 502, and the cancel scanning button 502 is used to jump the screen back to the password input interface. Regarding how to verify the preset password, the mobile device 30 communicates with the main identification element 10 through its reader and the visa management program using near field communication technology. The information is transmitted and completed. How to read and write information using near field communication technology is common knowledge in the relevant field and will not be described in detail here. In short, the mobile device 30 modulates the password entered by the user into a request signal through the visa management program, and then the reader sends the request signal to the inductive antenna of the main identification unit 10. The inductive antenna will receive the request signal to the RF chip, and the RF chip will demodulate the request signal and compare the content (the password entered by the user) therein to verify whether it is the same as the preset password.

當該預設密碼驗證失敗,該行動裝置30跳轉回該密碼輸入介面(如圖2B所示),以供使用者再次輸出該預設密碼;當該預設密碼驗證成功,該 行動裝置30將讀取該主識別元件10中的資訊,同時進行以下三項資訊的驗證: When the default password verification fails, the mobile device 30 jumps back to the password input interface (as shown in FIG. 2B ) for the user to input the default password again; when the default password verification succeeds, the mobile device 30 will read the information in the main identification element 10 and verify the following three pieces of information at the same time:

1.驗證讀取的識別元件是否為一主識別元件。 1. Verify whether the read identification element is a master identification element.

2.透過驗證一識別資訊確認讀取的識別元件是否合法(非仿造)。 2. Confirm whether the read identification component is legitimate (not counterfeit) by verifying the identification information.

3.透過驗證一密文資訊確認讀取的識別元件是否合法。 3. Confirm whether the read identification element is legal by verifying the ciphertext information.

1.驗證讀取的識別元件是否為一主識別元件:如圖3所示,該行動裝置30讀取該第一類別資料區塊14以辨識此識別元件為一主識別元件或一次識別元件,具體而言,該第一類別資料區塊14與該第二類別資料區塊24中皆具有一類別資訊,該類別資訊為本系統自行定義的一資訊格式,該行動裝置30讀取該類別資訊進行一識別元件類別的辨識,為了在後文中便於區分理解,該第一類別資料區塊14中具有一第一類別資訊,該第二類別資料區塊24中具有一第二類別資訊,此處該行動裝置30讀取的該類別資訊為該第一類別資訊S1,而能判定此識別元件為該主識別元件10;如果該行動裝置30感應該主識別元件10,讀取到的類別資訊卻並非該第一類別資訊,則該行動裝置30將顯示”權限不足”的一錯誤提示訊息而跳轉回如圖2A的該起始介面。 1. Verify whether the read identification element is a primary identification element: As shown in FIG. 3 , the mobile device 30 reads the first category data block 14 to identify the identification element as a primary identification element or a primary identification element. Specifically, the first category data block 14 and the second category data block 24 both have category information. The category information is an information format defined by the system. The mobile device 30 reads the category information to identify the category of an identification element. For the sake of easy distinction and understanding in the following text, the The first category data block 14 contains a first category information, and the second category data block 24 contains a second category information. Here, the category information read by the mobile device 30 is the first category information S1, and the identification element can be determined to be the main identification element 10; if the mobile device 30 senses the main identification element 10, but the category information read is not the first category information, the mobile device 30 will display an error message of "Insufficient authority" and jump back to the starting interface as shown in Figure 2A.

2.透過驗證一識別資訊確認讀取的識別元件是否合法(非仿造):該行動裝置30讀取該第一系統資料區塊12中的該第一識別資訊C1,並將該第一識別資訊C1上傳至該雲端伺服器40進行一識別資訊驗證V1,具體而言,該雲端伺服器40可存取一識別資訊資料庫41,該識別資訊資料庫41中預儲存有複數識別參照資訊。當該雲端伺服器40接收該第一識別資訊C1時,該雲端伺服器40透過比對該第一識別資訊C1是否與該複數識別參照資訊中的其中一者相同,以確認該主識別元件10是否合法(非仿造),且將回傳其比對結果給該行動裝置30,以供該行動裝置30進行後續流程;當比對結果為是,表示該主識別元件10為一合法識別元件,當比對結果為否,表示該主識別元件10可能為其他廠家非法仿造的識別元件,該行動裝置30將顯示”非合法元件”的一錯誤提示訊息而跳 轉回如圖2A的該起始介面;透過驗證該第一識別資訊C1確認該主識別元件10是否為合法的一識別元件,以防止盜用或仿造相同識別碼的識別元件進行後續之簽證加密。 2. Confirm whether the read identification element is legitimate (not counterfeit) by verifying an identification information: The mobile device 30 reads the first identification information C1 in the first system data block 12, and uploads the first identification information C1 to the cloud server 40 for an identification information verification V1. Specifically, the cloud server 40 can access an identification information database 41, in which a plurality of identification reference information is pre-stored. When the cloud server 40 receives the first identification information C1, the cloud server 40 compares the first identification information C1 with one of the plurality of identification reference information to confirm whether the main identification element 10 is legitimate (not counterfeit), and returns the comparison result to the mobile device 30 for the mobile device 30 to perform subsequent processes; when the comparison result is yes, it means that the main identification element 10 is a legitimate identification element. When the comparison result is negative, it indicates that the main identification element 10 may be an identification element illegally counterfeited by other manufacturers. The mobile device 30 will display an error message of "illegal element" and jump back to the starting interface as shown in Figure 2A; by verifying the first identification information C1, it is confirmed whether the main identification element 10 is a legal identification element to prevent the subsequent signature encryption of the identification element with the same identification code from being stolen or counterfeited.

3.透過驗證一密文資訊確認讀取的識別元件是否合法:該行動裝置30讀取該第一密文資料區塊15中的一第一密文資訊S2(Cipher),再將該第一密文資訊S2上傳至該雲端伺服器40進行一密文資訊驗證V2,驗證該第一密文資訊S2中的內容及格式,具體而言,該第一密文資料區塊15能根據其他資料區塊的資訊產生一密文(Cipher),而該第一密文資訊S2即為該第一密文資料區塊15運用一對稱式加密演算法,將該第一識別資訊C1與一系統訊息透過一系統金鑰的資訊進行加密演算而成,其中,該對稱式加密演算法為符合進階加密標準(Advanced Encryption Standard,AES)及密碼區塊連結模式(Cipher Block Chaining Mode,CBC)的一演算法,例如:AES-128 CBC演算法,而該系統訊息為本系統自行定義的一隨機碼。 3. Confirming whether the read identification element is legal by verifying a ciphertext information: The mobile device 30 reads a first ciphertext information S2 (Cipher) in the first ciphertext data block 15, and then uploads the first ciphertext information S2 to the cloud server 40 for a ciphertext information verification V2 to verify the content and format of the first ciphertext information S2. Specifically, the first ciphertext data block 15 can generate a ciphertext (Cipher) according to the information of other data blocks, and the first ciphertext information S2 is the first ciphertext data block 15 using a symmetric encryption algorithm to encrypt the first identification information C1 and a system message through a system key information, wherein the symmetric encryption algorithm is in accordance with the Advanced Encryption Standard (ADES). Encryption Standard, AES) and Cipher Block Chaining Mode (CBC), for example: AES-128 CBC algorithm, and the system message is a random code defined by the system.

且該雲端伺服器40中預存有該系統金鑰的資訊及能進行該對稱式加密演算法,當該行動裝置30讀取該第一密文資訊S2時,該行動裝置30上傳該第一密文資訊S2該雲端伺服器40,該雲端伺服器40透過該系統金鑰及該第一識別資訊C1計算出一第一驗證密文資訊,並比對該第一驗證密文資訊是否與該第一密文資訊S2相符,且該雲端伺服器40將回傳其比對結果給該行動裝置30,以供該行動裝置30對該主識別元件10進行後續資訊的讀取或寫入;當比對結果為是,表示該主識別元件10中的密文資訊係該雲端伺服器40可識別,而該主識別元件10為一合法識別元件;當比對結果為否,表示該主識別元件10可能為其他廠家非法仿造的識別元件,該行動裝置30將顯示”非合法元件”的一錯誤提示訊息而跳轉回如圖2A的該起始介面;透過驗證該第一密文資訊S2,再次檢核該主識別元件10是否為本系統可進行後續簽證加密的一識別元件。 The cloud server 40 has pre-stored information about the system key and can perform the symmetric encryption algorithm. When the mobile device 30 reads the first ciphertext information S2, the mobile device 30 uploads the first ciphertext information S2 to the cloud server 40. The cloud server 40 calculates a first verification ciphertext information through the system key and the first identification information C1, and compares the first verification ciphertext information to see whether it matches the first ciphertext information S2. The cloud server 40 returns the comparison result to the mobile device 30 so that the mobile device 30 can verify the identity of the main identification element 10. Read or write the subsequent information; when the comparison result is yes, it means that the ciphertext information in the main identification element 10 is identifiable by the cloud server 40, and the main identification element 10 is a legal identification element; when the comparison result is no, it means that the main identification element 10 may be an identification element illegally counterfeited by other manufacturers, and the mobile device 30 will display an error message of "illegal element" and jump back to the starting interface as shown in Figure 2A; by verifying the first ciphertext information S2, check again whether the main identification element 10 is an identification element that can be subsequently signed and encrypted by this system.

當該主識別元件10完成該識別資訊驗證V1及該密文資訊驗證V2,請參閱圖4,該行動裝置30讀取該第一明文資料區塊13中的一主網頁編輯連結資訊S3,而連結至該雲端伺服器40中的一主網頁管理平台42;具體而言,該第一明文資料區塊13中儲存有複數明文資訊(Plaintext),該複數明文資訊係符合近場通訊數據交換格式(NFC Date Exchange Format,NDEF)的,而該複數明文資訊的其中一者即為該主網頁編輯連結資訊S3,其內容反映一網頁編輯連結,而該主網頁管理平台42為一主網頁的管理後台,使用者可透過該主網頁管理平台42對該主網頁的顯示內容進行編輯,其中,該主網頁係對應該第一識別資訊C1,且該主網頁的網址係包含該主識別元件10的唯一識別碼。 When the main identification element 10 completes the identification information verification V1 and the ciphertext information verification V2, please refer to FIG. 4 , the mobile device 30 reads a main web page editing link information S3 in the first plaintext data block 13 and connects to a main web page management platform 42 in the cloud server 40; specifically, the first plaintext data block 13 stores a plurality of plaintext information (Plaintext), and the plurality of plaintext information is in accordance with the NFC Date Exchange format (NFC Date Exchange Format, NDEF), and one of the plurality of plain text information is the main web page edit link information S3, whose content reflects a web page edit link, and the main web page management platform 42 is a management background of a main web page, and the user can edit the display content of the main web page through the main web page management platform 42, wherein the main web page corresponds to the first identification information C1, and the URL of the main web page includes the unique identification code of the main identification element 10.

當該行動裝置30連結至該主網頁管理平台42,該行動裝置30將跳轉至如圖5A所示的一主網頁介面,該主網頁介面包含一擁有者簡介51、一編輯資料鈕52、一作品管理鈕53及一變更密碼鈕54,該擁有者簡介51即為該主識別元件10擁有者的相關資訊,例如可包含:一擁有者名稱、一擁有者頭像、一擁有者簡述等資訊;當使用者(擁有者)觸碰該編輯資料鈕52時,該行動裝置30將顯示如圖5B的一主編輯介面,該主編輯介面包含複數欄位520而能供使用者編輯該擁有者簡介51的顯示內容,其中,該複數欄位520中包含一第一識別資訊欄,該第一識別資訊欄的內容是不可變更修改的,其中顯示該第一識別資訊C1的內容(該主識別元件的唯一識別碼)。 When the mobile device 30 is connected to the main webpage management platform 42, the mobile device 30 will jump to a main webpage interface as shown in FIG. 5A. The main webpage interface includes an owner profile 51, an edit data button 52, a work management button 53, and a change password button 54. The owner profile 51 is the relevant information of the owner of the main identification element 10, for example, it may include: an owner name, an owner avatar, an owner brief description, etc. When using When the user (owner) touches the edit data button 52, the mobile device 30 will display a main editing interface as shown in FIG. 5B. The main editing interface includes a plurality of fields 520 for the user to edit the display content of the owner profile 51. The plurality of fields 520 include a first identification information field. The content of the first identification information field cannot be changed or modified. The content of the first identification information C1 (the unique identification code of the main identification element) is displayed.

請參閱圖6,當無編輯權限的一使用者透過支援近場通訊技術的一行動裝置30’掃取該主識別元件10時,該行動裝置30’讀取該第一明文資料區塊13中的一主網頁連結資訊S4,而連結至該雲端伺服器40中的該主網頁43,其中,無編輯權限係指未透過該簽證管理程式輸入該主識別元件10的該預設密碼,而無該第一記憶體11的讀寫權限,故無法讀取如前所述的該主網頁編輯連結資訊S3以對該主網頁43進行編輯;當該行動裝置30’連結至該主網頁43時,該 行動裝置30’上顯示該主網頁43的內容,與前述的該主網頁介面不同,該主網頁43僅顯示該擁有者簡介51的內容。 Please refer to FIG6 . When a user without editing authority scans the main identification element 10 through a mobile device 30′ supporting near field communication technology, the mobile device 30′ reads a main webpage link information S4 in the first plaintext data block 13 and links to the main webpage 43 in the cloud server 40. The user without editing authority means that the main identification element 10 has not been entered through the certification management program. The default password does not have the read and write permissions of the first memory 11, so it is impossible to read the main page edit link information S3 as mentioned above to edit the main page 43; when the mobile device 30' is linked to the main page 43, the content of the main page 43 is displayed on the mobile device 30'. Unlike the aforementioned main page interface, the main page 43 only displays the content of the owner profile 51.

請再參閱圖5A,當使用者(有編輯權限)者觸碰該作品管理鈕53,該行動裝置30將顯示如圖7所示的一作品管理介面,該作品管理介面包含一創建作品鈕530,當該創建作品鈕530受到觸碰時,該行動裝置30將顯示如圖2C所示的該提示掃描介面,使用者即可使透過該行動裝置30接近該次識別元件20的其中一者,以對該次識別元件20進行資料的讀取或寫入,主要目的為替該次識別元件20寫入一加密簽證資訊。 Please refer to Figure 5A again. When the user (with editing privileges) touches the work management button 53, the mobile device 30 will display a work management interface as shown in Figure 7. The work management interface includes a create work button 530. When the create work button 530 is touched, the mobile device 30 will display the prompt scanning interface as shown in Figure 2C. The user can approach one of the sub-identification elements 20 through the mobile device 30 to read or write data to the sub-identification element 20. The main purpose is to write an encrypted signature information for the sub-identification element 20.

具體請參閱圖8,在寫入該加密簽證資訊前,如前所述,該簽證管理程式需先確認感應的識別元件的類別及其是否為本系統的一合法識別元件,故首先該行動裝置30讀取該第二類別資料區塊24中的該類別資訊,以辨識此識別元件為何種識別元件,而因為該第二類別資料區塊24中的該類別資訊為一第二類別資訊S5,而能判定此識別元件為該次識別元件20;同時,該行動裝置30讀取該第二資料區塊12中的該第二識別資訊C2,並將該第二識別資訊C2上傳至該雲端伺服器進行該識別資訊驗證V1,比對該第二識別資訊C2是否與該複數識別資訊中的其中一者相同以確認該次識別元件20是否為一合法識別元件。 Please refer to FIG. 8 for details. Before writing the encrypted signature information, as mentioned above, the signature management program must first confirm the type of the sensed identification element and whether it is a legal identification element of the system. Therefore, the mobile device 30 first reads the type information in the second type data block 24 to identify what type of identification element this identification element is. Since the type information in the second type data block 24 is a second type information S5, and can determine that the identification element is the secondary identification element 20; at the same time, the mobile device 30 reads the second identification information C2 in the second data block 12, and uploads the second identification information C2 to the cloud server for the identification information verification V1, comparing whether the second identification information C2 is the same as one of the multiple identification information to confirm whether the secondary identification element 20 is a legal identification element.

且該行動裝置30讀取該第二密文資料區塊25中的一第二密文資訊S6,再將該第二密文資訊S6上傳至該雲端伺服器40進行該密文資訊驗證V2,其中該第二密文資訊S6係該第二密文資料區塊25運用該對稱式加密演算法,將該第二識別資訊C2與該系統訊息透過該系統金鑰的資訊進行加密演算而成;關於該第二識別資訊C2與該第二密文資訊S6如何分別進行該識別資訊驗證V1及該密文資訊驗證V2,如前述的該第一識別資訊C1與該第一密文資訊S2的驗證方式,容在此不再贅述。 The mobile device 30 reads a second ciphertext information S6 in the second ciphertext data block 25, and then uploads the second ciphertext information S6 to the cloud server 40 for the ciphertext information verification V2, wherein the second ciphertext information S6 is obtained by encrypting the second identification information C2 and the system message through the information of the system key using the symmetric encryption algorithm in the second ciphertext data block 25; how the second identification information C2 and the second ciphertext information S6 respectively perform the identification information verification V1 and the ciphertext information verification V2 is similar to the aforementioned verification method of the first identification information C1 and the first ciphertext information S2, and will not be further described here.

當該行動裝置30確認該次識別元件20為本系統的一合法識別元件時,該行動裝置30將對該次識別元件20寫入一加密簽證資訊S9,即進行一簽署流程(Signing)。首先,該行動裝置30讀取該第一簽證資料區塊16中的一私鑰資訊S7而獲得一公鑰資訊S8,並將該公鑰資訊S8上傳至該雲端伺服器40,以供該雲端伺服器40儲存該公鑰資訊S8,具體而言,該行動裝置30係透過該簽證管理系統執行一非對稱式加密演算法(Asymmetric cryptography),透過該私鑰資訊S7計算產生該公鑰資訊S8。 When the mobile device 30 confirms that the sub-identity element 20 is a legitimate identification element of the system, the mobile device 30 will write an encrypted signature information S9 to the sub-identity element 20, that is, perform a signing process (Signing). First, the mobile device 30 reads a private key information S7 in the first signature data block 16 to obtain a public key information S8, and uploads the public key information S8 to the cloud server 40 for the cloud server 40 to store the public key information S8. Specifically, the mobile device 30 executes an asymmetric cryptography algorithm through the signature management system to calculate the public key information S8 through the private key information S7.

接著,該簽證管理系統透過該私鑰資訊,將該第一識別資訊C1、該第二識別資訊C2及一加密資訊進行非對稱加密演算成該加密簽證資訊S9,其中,該加密資訊與前述的該系統資訊的功能類似,皆為本系統自行定義的一隨機碼,兩者的差異在於其各自的內容或位元長度可能不同;再者,該行動裝置30將該加密簽證資訊S9寫入該第二簽證資料區塊26中,並將設定該第二簽證資料區塊26為唯讀的形式,而完成對該次識別元件20的簽署流程。 Next, the visa management system uses the private key information to asymmetrically encrypt the first identification information C1, the second identification information C2 and an encryption information into the encrypted visa information S9, wherein the encryption information has a similar function to the aforementioned system information, and both are random codes defined by the system. The difference between the two is that their respective contents or bit lengths may be different; furthermore, the mobile device 30 writes the encrypted visa information S9 into the second visa data block 26, and sets the second visa data block 26 to read-only form, thereby completing the signing process for the secondary identification element 20.

當該次識別元件20完成該簽署流程,即完成一作品的建立,該作品管理介面將如圖9A顯示一第一作品531,其中,該第一作品531的顯示名稱預設為該次識別元件20的唯一識別碼(即該第二識別資訊C2的內容),後續使用者可透過觸碰該作品管理介面中的一作品編輯鈕532,以跳轉至如圖9B所示一作品編輯介面進行編輯,具體而言,當該作品編輯鈕532受到觸碰時,該行動裝置30讀取該第二明文資料區塊23中的一次網頁編輯連結資訊,而連接至該雲端伺服器40中的一次網頁管理平台,因為此部分的運作方式如前述的該行動裝置30讀取該第一明文資料區塊13中的該主網頁編輯連結資訊S3,容不再贅述。 When the sub-identification element 20 completes the signing process, that is, completes the creation of a work, the work management interface will display a first work 531 as shown in FIG. 9A, wherein the display name of the first work 531 is preset to the unique identification code of the sub-identification element 20 (that is, the content of the second identification information C2). Subsequent users can touch a work editing button 532 in the work management interface to jump to a work as shown in FIG. 9B. The editing interface is used for editing. Specifically, when the work editing button 532 is touched, the mobile device 30 reads the primary webpage editing link information in the second plaintext data block 23 and connects to the primary webpage management platform in the cloud server 40. Since the operation of this part is the same as the aforementioned mobile device 30 reading the main webpage editing link information S3 in the first plaintext data block 13, it will not be described in detail.

當該第一作品531的作品簡介編輯完成,使用者可再觸碰該作品管理介面中的一作品檢視鈕533跳轉至如圖9C所示的一次網頁,以檢視該第一作品531的作品簡介,具體而言,當該作品檢視鈕533被觸碰時,該行動裝置30 讀取該第二明文資料區塊23中的一次網頁連結資訊,而連結至該雲端伺服器40中的該次網頁,其中,當一使用者未透過該簽證管理程式,而透過其自身的行動裝置直接感應該次識別元件20時,其自身的行動裝置亦顯示該次網頁的內容。 When the work introduction of the first work 531 is edited, the user can touch a work view button 533 in the work management interface to jump to the primary webpage shown in FIG. 9C to view the work introduction of the first work 531. Specifically, when the work view button 533 is touched, the mobile device 30 reads the primary webpage link information in the second plaintext data block 23 and links to the secondary webpage in the cloud server 40. When a user directly senses the secondary identification element 20 through his own mobile device without using the visa management program, his own mobile device also displays the content of the secondary webpage.

請參閱圖9C,該次網頁的顯示內容包含一作品簡介534、一擁有者連結鈕535及一驗證鈕536,該作品簡介534顯示該第一作品531的相關資訊,而該擁有者連結鈕535用以供連結至該主網頁43,該驗證鈕536用以供驗證該次識別元件20的該加密簽證資訊S9,具體而言,該加密簽證資訊S9的驗證需透過一具有該簽證管理程式的行動裝置進行,故以下以該行動裝置30說明如何驗證該加密簽證資訊S9。 Please refer to FIG. 9C . The displayed content of the secondary webpage includes a work introduction 534, an owner link button 535 and a verification button 536. The work introduction 534 displays the relevant information of the first work 531, and the owner link button 535 is used to link to the main webpage 43. The verification button 536 is used to verify the encrypted signature information S9 of the secondary identification element 20. Specifically, the verification of the encrypted signature information S9 needs to be performed through a mobile device with the signature management program. Therefore, the following uses the mobile device 30 to explain how to verify the encrypted signature information S9.

當該驗證鈕536受到觸碰時,請參閱圖10,該雲端伺服器40傳送一讀取指令S10給該行動裝置30,該行動裝置30將顯示如圖2C所示的該提示掃描介面,提示使用者感應該次識別元件20,以讀取該第二簽證資料區塊26中的該加密簽證資訊S9;接著,該行動裝置30將傳送該加密簽證資訊S9給該雲端伺服器40,該雲端伺服器40透過該非對稱式加密演算法並根據儲存的該公鑰資訊S8、該第一識別資訊C1及該第二識別資訊C2,計算出一驗證簽證資訊並比對該驗證簽證資訊是否與該加密簽證資訊S9相同,當比對結果為是,表示該次識別元件20係透過本系統完成加密簽證的,當比對結果為否,表示該次識別元件20可能並非出自於該主識別元件10的擁有者;且該雲端伺服器40比對完成後,將回傳該加密簽證資訊S9的驗證結果給該行動裝置30。 When the verification button 536 is touched, please refer to FIG. 10 , the cloud server 40 sends a read instruction S10 to the mobile device 30, and the mobile device 30 will display the prompt scanning interface shown in FIG. 2C , prompting the user to sense the secondary identification element 20 to read the encrypted signature information S9 in the second signature data block 26; then, the mobile device 30 will send the encrypted signature information S9 to the cloud server 40, and the cloud server 40 will use the asymmetric encryption algorithm and store the encrypted signature information S9 according to the stored The public key information S8, the first identification information C1 and the second identification information C2 are used to calculate a verification certificate information and compare the verification certificate information with the encrypted certificate information S9. When the comparison result is yes, it means that the secondary identification element 20 is encrypted and signed by this system. When the comparison result is no, it means that the secondary identification element 20 may not be from the owner of the primary identification element 10. After the cloud server 40 completes the comparison, it will return the verification result of the encrypted certificate information S9 to the mobile device 30.

本發明個體加密簽證簽署方法,透過上述個體加密簽證系統中的該簽證管理程式實施,其中,該簽證管理程式儲存該第一識別資訊C1及該第一密文資訊,該主識別元件10中儲存有該私鑰資訊S7,請參閱圖11,該方法包含有: The personal encryption signature signing method of the present invention is implemented through the signature management program in the above-mentioned personal encryption signature system, wherein the signature management program stores the first identification information C1 and the first ciphertext information, and the main identification element 10 stores the private key information S7, please refer to Figure 11, the method includes:

P10:讀取該次識別元件20的一第二識別資訊C2。 P10: Read the second identification information C2 of the secondary identification element 20.

P20:傳送該第二識別資訊C2給一雲端伺服器40,以供該雲端伺服器40根據該第二識別資訊C2判斷該次識別元件20是否為一合法識別元件;具體而言,即進行該識別資訊驗證V1,關於該識別資訊驗證V1的方式如前所述,容不再重述,其中,當判斷結果為否,該簽證管理程式將顯示”非合法元件”的一錯誤提示訊息而跳轉回如圖2A的該起始介面。 P20: The second identification information C2 is transmitted to a cloud server 40, so that the cloud server 40 can judge whether the secondary identification element 20 is a legal identification element according to the second identification information C2; specifically, the identification information verification V1 is performed. The method of the identification information verification V1 is as described above and will not be repeated. When the judgment result is negative, the certification management program will display an error message of "illegal element" and jump back to the starting interface as shown in FIG2A.

P30:讀取該次識別元件20的一第二密文資訊S6。 P30: Read the second ciphertext information S6 of the secondary identification element 20.

P40:傳送該第二密文資訊S6給該雲端伺服器40,以供該雲端伺服器40根據該第二密文資訊S6判斷該次識別元件20是否為一合法識別元件;具體而言,即進行該密文資訊驗證V2,關於該密文資訊驗證V2的方式如前所述,容不再重述,其中,當判斷結果為否,該簽證管理程式將顯示”非合法元件”的一錯誤提示訊息而跳轉回如圖2A的該起始介面。 P40: The second ciphertext information S6 is transmitted to the cloud server 40, so that the cloud server 40 can judge whether the secondary identification element 20 is a legal identification element according to the second ciphertext information S6; specifically, the ciphertext information verification V2 is performed. The method of the ciphertext information verification V2 is as described above and will not be repeated. When the judgment result is negative, the certification management program will display an error message of "illegal element" and jump back to the starting interface as shown in FIG2A.

P50:接收步驟P20與P40的判斷結果,當步驟P20與P40的判斷結果皆為是,讀取該私鑰資訊。 P50: Receive the judgment results of steps P20 and P40. When the judgment results of steps P20 and P40 are both yes, read the private key information.

P60:根據該私鑰資訊將該第一識別資訊C1、該第二識別資訊C2及一加密資訊進行非對稱加密演算而得一加密簽證資訊S9,並將該加密簽證資訊S9寫入該次識別元件20中。 P60: According to the private key information, the first identification information C1, the second identification information C2 and an encryption information are subjected to an asymmetric encryption operation to obtain an encrypted signature information S9, and the encrypted signature information S9 is written into the secondary identification element 20.

本發明個體加密簽證系統其簽署方法,其共同的特徵在於該行動裝置30具有該簽證管理程式,且該簽證管理程式能執行一非對稱加密演算法而可根據該主識別元件10中的一私鑰資訊,將該第一識別資訊C1、該第二識別資訊C2及一加密資訊進行加密演算而得該加密簽證資訊S9,並將該加密簽證資訊寫入該次識別元件20中。於實際的使用情境中,一個體(如一商家)即可於其周邊產品上設置該次識別元件20,以供他人(如其顧客)掃取確認所述的周邊商品是否出自於該個體,對於該商家而言,僅需透過感應並填入一些基本資訊即 可完成設定該主識別元件10及該次識別元件20,對於資訊的合法性與可信度而言,本發明系統分別對該主識別元件10及該次識別元件20分別進行二資訊驗證(一識別資訊驗證及一密文資訊驗證),確認該主識別元件10與該次識別元件20分別為一合法識別元件,方將該加密簽證資訊S9寫入該次識別元件20中,且本系統中的雲端伺服器還具有該加密簽證資訊的驗證功能,以防止不肖人士仿製該次識別元件20,故本發明中的該加密簽證資訊係具有可信度的而能證明該次識別元件20的部分資訊源自該主識別元件10的資訊。 The personal encrypted signature system and its signing method of the present invention have the common feature that the mobile device 30 has the signature management program, and the signature management program can execute an asymmetric encryption algorithm and can encrypt the first identification information C1, the second identification information C2 and an encryption information according to a private key information in the primary identification element 10 to obtain the encrypted signature information S9, and write the encrypted signature information into the secondary identification element 20. In actual use scenarios, an individual (such as a merchant) can set the secondary identification element 20 on its peripheral products so that others (such as its customers) can scan and confirm whether the peripheral products are from the individual. For the merchant, it is only necessary to complete the setting of the primary identification element 10 and the secondary identification element 20 through sensing and filling in some basic information. For the legitimacy and credibility of the information, the system of the present invention performs two information verifications on the primary identification element 10 and the secondary identification element 20 respectively ( An identification information verification and a ciphertext information verification) are performed to confirm that the primary identification element 10 and the secondary identification element 20 are respectively a legal identification element, and then the encrypted signature information S9 is written into the secondary identification element 20. The cloud server in this system also has the verification function of the encrypted signature information to prevent unscrupulous persons from copying the secondary identification element 20. Therefore, the encrypted signature information in the present invention is credible and can prove that part of the information of the secondary identification element 20 is derived from the information of the primary identification element 10.

綜上所述,乃僅記載本發明為呈現解決問題所採用的技術手段之實施方式或實施例而已,並非用來限定本發明專利實施之範圍。即凡與本發明專利申請範圍文義相符,或依本發明專利範圍所做的均等變化與修飾,皆為本發明專利範圍所涵蓋。 In summary, the above only records the implementation methods or examples of the technical means adopted by the present invention to solve the problem, and is not used to limit the scope of implementation of the present invention. That is, all equivalent changes and modifications that are consistent with the scope of the patent application of the present invention or made according to the scope of the patent of the present invention are covered by the scope of the patent of the present invention.

10:主識別元件 10: Main identification element

11:第一記憶體 11: First Memory

12:第一系統資料區塊 12: First system data block

13:第一明文資料區塊 13: First plaintext data block

14:第一類別資料區塊 14: First category data block

15:第一密文資料區塊 15: First ciphertext data block

16:第一簽證資料區塊 16: First visa data block

20:次識別元件 20: Secondary identification element

21:第二記憶體 21: Second memory

22:第二系統資料區塊 22: Second system data block

23:第二明文資料區塊 23: Second plaintext data block

24:第二類別資料區塊 24: Second category data block

25:第二密文資料區塊 25: Second ciphertext data block

26:第二簽證資料區塊 26: Second visa data block

30:行動裝置 30: Mobile devices

40:雲端伺服器 40: Cloud Server

C1:第一識別資訊 C1: First identification information

C2:第二識別資訊 C2: Second identification information

Claims (10)

一種個體加密簽證系統,包含:一主識別元件,儲存有一第一識別資訊、一第一密文資訊及一私鑰資訊;一次識別元件,儲存有一第二識別資訊、一第二密文資訊;一行動裝置,具有一簽證管理程式的資料,該簽證管理程式用以讀取該第一識別資訊、該第一密文資訊、該第二識別資訊及該第二密文資訊;一雲端伺服器,與該行動裝置通訊連接,以接收該第一識別資訊、該第一密文資訊、該第二識別資訊及該第二密文資訊,並透過該第一識別資訊與該第一密文資訊驗證該主識別元件,及透過該第二識別資訊與該第二密文資訊驗證該次識別元件,以分別確認該主識別元件與該次識別元件是否各分別為一合法識別元件;當該主識別元件與該次識別元件各分別為合法識別元件,該行動裝置讀取該私鑰資訊,透過該簽證管理程式執行一非對稱式加密演算法,根據該私鑰資訊將該第一識別資訊、該第二識別資訊及一加密資訊進行加密演算成一加密簽證資訊,並將該加密簽證資訊寫入該次識別元件中。 A personal encryption visa system includes: a master identification element storing a first identification information, a first ciphertext information and a private key information; a primary identification element storing a second identification information and a second ciphertext information; a mobile device having data of a visa management program, the visa management program being used to read the first identification information, the first ciphertext information, the second identification information and the second ciphertext information; a cloud server communicating with the mobile device to receive the first identification information, the first ciphertext information, the second identification information and the second ciphertext information, and to communicate with the first identification information and the second ciphertext information to obtain the first identification information, the first ciphertext information, the second identification information and the second ciphertext information. The first ciphertext information verifies the primary identification element, and the secondary identification element is verified through the second identification information and the second ciphertext information to respectively confirm whether the primary identification element and the secondary identification element are respectively a legitimate identification element; when the primary identification element and the secondary identification element are respectively a legitimate identification element, the mobile device reads the private key information, executes an asymmetric encryption algorithm through the certificate management program, and encrypts the first identification information, the second identification information and an encryption information into an encrypted certificate information according to the private key information, and writes the encrypted certificate information into the secondary identification element. 如請求項1所述之個體加密簽證系統,其中,該主識別元件與該次識別元件分別為支援近場通訊技術的一標籤,該第一識別資訊包含該主識別元件的唯一識別碼,該第二識別資訊包含該次識別元件的唯一識別碼。 The personal encryption authentication system as described in claim 1, wherein the primary identification element and the secondary identification element are tags supporting near field communication technology, the first identification information includes a unique identification code of the primary identification element, and the second identification information includes a unique identification code of the secondary identification element. 如請求項1所述之個體加密簽證系統,其中,該主識別元件與該次識別元件分別具有一第一明文資料區塊與一第二明文資料區塊,該第一明文資料區塊與該第二明文資料區塊中儲存有複數明文資訊,該複數明文資訊係符合近場通訊數據交換格式(NFC Date Exchange Format,NDEF)。 The individual encryption authentication system as described in claim 1, wherein the primary identification element and the secondary identification element respectively have a first plaintext data block and a second plaintext data block, wherein the first plaintext data block and the second plaintext data block store a plurality of plaintext information, and the plurality of plaintext information complies with the Near Field Communication Data Exchange Format (NFC Date Exchange Format, NDEF). 如請求項1所述之個體加密簽證系統,其中,該雲端伺服器可存取一識別資訊資料庫,該識別資訊資料庫中預儲存有複數識別參照資訊,當 該雲端伺服器接收該第一識別資訊時,比對該第一識別資訊是否與該複數識別參照資訊中的其中一者相同,若有相同則確認該主識別元件是否為合法識別元件。 As described in claim 1, the cloud server can access an identification information database, in which multiple identification reference information is pre-stored. When the cloud server receives the first identification information, it compares whether the first identification information is the same as one of the multiple identification reference information. If they are the same, it confirms whether the main identification element is a legitimate identification element. 如請求項1所述之個體加密簽證系統,其中,該主識別元件與該次識別元件分別具有一第一密文資料區塊與一第二密文資料區塊,該第一密文資料區塊與該第二密文資料區塊分別記錄有該第一密文資訊與該第二密文資訊。 The individual encryption signature system as described in claim 1, wherein the primary identification element and the secondary identification element respectively have a first ciphertext data block and a second ciphertext data block, and the first ciphertext data block and the second ciphertext data block respectively record the first ciphertext information and the second ciphertext information. 如請求項1所述之個體加密簽證系統,其中,該第一密文資訊是將該第一識別資訊與一系統訊息透過一系統金鑰的資訊進行對稱式加密演算而成;該第二密文資訊係將該第二識別資訊與該系統訊息透過該系統金鑰的資訊進行對稱式加密演算而成。 The individual encryption signature system as described in claim 1, wherein the first ciphertext information is obtained by symmetric encryption calculation of the first identification information and a system message through information of a system key; the second ciphertext information is obtained by symmetric encryption calculation of the second identification information and the system message through information of the system key. 如請求項6所述之個體加密簽證系統,其中,該雲端伺服器儲存有該系統金鑰且能執行一對稱式加密演算法,該雲端伺服器透過該系統金鑰及該第一識別資訊計算出一第一驗證密文資訊,再比對該第一驗證密文資訊是否與該第一密文資訊相同,根據比對結果確認該主識別元件是否為合法識別元件。 As described in claim 6, the cloud server stores the system key and can execute a symmetric encryption algorithm. The cloud server calculates a first verification ciphertext information through the system key and the first identification information, and then compares whether the first verification ciphertext information is the same as the first ciphertext information, and confirms whether the main identification element is a legal identification element based on the comparison result. 如請求項1所述之個體加密簽證系統,其中,該主識別元件與該次識別元件分別具有一第一簽證資料區塊與一第二簽證資料區塊,該第一簽證資料區塊中存有該私鑰資訊,該第二簽證資料區塊中存有該加密簽證資訊。 The personal encryption signature system as described in claim 1, wherein the primary identification element and the secondary identification element respectively have a first signature data block and a second signature data block, the first signature data block stores the private key information, and the second signature data block stores the encrypted signature information. 如請求項1所述之個體加密簽證系統,其中,該雲端伺服器中儲存有透過該私鑰資訊產生的一公鑰資訊,該雲端伺服器透過該非對稱式加密演算法,並根據該公鑰資訊、該第一識別資訊及該第二識別資訊計算出一驗證簽證資訊以進行該加密簽證資訊的驗證。 The individual encrypted signature system as described in claim 1, wherein the cloud server stores a public key information generated by the private key information, and the cloud server calculates a verification signature information based on the public key information, the first identification information and the second identification information through the asymmetric encryption algorithm to verify the encrypted signature information. 一種個體加密簽證簽署方法,透過一行動裝置的一簽證管理程式實施,該簽證管理程式儲存有一主識別元件的一第一識別資訊及一第一密文資訊,該方法包含:(a)讀取一次識別元件的一第二識別資訊;(b)傳送該第二識別資訊給一雲端伺服器,以供該雲端伺服器根據該第二識別資訊判斷該次識別元件是否為一合法識別元件;(c)讀取該次識別元件的一第二密文資訊;(d)傳送該第二密文資訊給該雲端伺服器,以供該雲端伺服器根據該第二密文資訊判斷該次識別元件是否為合法識別元件;(e)接收步驟(b)及(d)的判斷結果,當步驟(b)及(d)的判斷結果皆為是,讀取該主識別元件的一私鑰資訊;(f)根據該私鑰資訊將該第一識別資訊、該第二識別資訊及一加密資訊進行非對稱加密演算而得一加密簽證資訊,並將該加密簽證資訊寫入該次識別元件中。 A personal encryption signature signing method is implemented by a signature management program of a mobile device. The signature management program stores a first identification information and a first ciphertext information of a primary identification element. The method comprises: (a) reading a second identification information of a primary identification element; (b) transmitting the second identification information to a cloud server so that the cloud server can determine whether the secondary identification element is a legitimate identification element according to the second identification information; (c) reading a second ciphertext information of the secondary identification element; (d) transmitting the second ciphertext information of the secondary identification element to a cloud server; (e) receiving the judgment results of steps (b) and (d), and when the judgment results of steps (b) and (d) are both yes, reading a private key information of the primary identification element; (f) performing an asymmetric encryption operation on the first identification information, the second identification information and an encryption information according to the private key information to obtain an encrypted signature information, and writing the encrypted signature information into the secondary identification element.
TW112124340A 2023-06-29 2023-06-29 Individual encrypted signature system and signing method thereof TWI850002B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
TW112124340A TWI850002B (en) 2023-06-29 2023-06-29 Individual encrypted signature system and signing method thereof

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
TW112124340A TWI850002B (en) 2023-06-29 2023-06-29 Individual encrypted signature system and signing method thereof

Publications (2)

Publication Number Publication Date
TWI850002B true TWI850002B (en) 2024-07-21
TW202501288A TW202501288A (en) 2025-01-01

Family

ID=92929545

Family Applications (1)

Application Number Title Priority Date Filing Date
TW112124340A TWI850002B (en) 2023-06-29 2023-06-29 Individual encrypted signature system and signing method thereof

Country Status (1)

Country Link
TW (1) TWI850002B (en)

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105827656A (en) * 2016-05-30 2016-08-03 宇龙计算机通信科技(深圳)有限公司 Identity authentication method based on NFC payment and device
TWI740409B (en) * 2019-03-25 2021-09-21 美商美光科技公司 Verification of identity using a secret key

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105827656A (en) * 2016-05-30 2016-08-03 宇龙计算机通信科技(深圳)有限公司 Identity authentication method based on NFC payment and device
TWI740409B (en) * 2019-03-25 2021-09-21 美商美光科技公司 Verification of identity using a secret key

Also Published As

Publication number Publication date
TW202501288A (en) 2025-01-01

Similar Documents

Publication Publication Date Title
US11218480B2 (en) Authenticator centralization and protection based on authenticator type and authentication policy
US10142114B2 (en) ID system and program, and ID method
KR101863953B1 (en) System and method for providing electronic signature service
KR101019354B1 (en) A method for realizing data security storage and algorithm memory through semiconductor memory device
TW201741922A (en) Biometric-based safety authentication method and device
CN110598433B (en) Block chain-based anti-fake information processing method and device
US12463816B2 (en) Decentralized zero-trust identity verification-authentication system and method
JP2009212731A (en) Card issuing system, card issuing server, and card issuing method, and program
US20220398601A1 (en) System and Method for Verifying Authenticity of Physical Goods
CN117203939A (en) Securely manage accounts on display devices using contactless cards
JP2010218440A (en) Account settlement system, account settlement method, and information processor
CN114667713A (en) Security authentication based on passport data stored in contactless card
TWI471804B (en) Blank smart card device issuance system
JP6318868B2 (en) Authentication system and portable communication terminal
TWI850002B (en) Individual encrypted signature system and signing method thereof
KR20090041473A (en) Genuine authentication server and method for authenticating the authenticity of goods using OTP electronic tag
JP4541740B2 (en) Authentication key update system and authentication key update method
TWI770279B (en) Voucher verification auxiliary device, system and method thereof
CN115860037B (en) Anti-counterfeiting method, anti-counterfeiting system and anti-counterfeiting assembly for precious stones
WO2024232407A1 (en) Appraisal certification system
KR101619290B1 (en) Method and ic tag for prevention of forgery of documents
US20250373429A1 (en) Method, apparatus and recording medium for determining validation of ticket
TWI906543B (en) Decentralized zero-trust identity verification-authentication system and method
KR101480035B1 (en) Security apparatus for financial service
KR101813069B1 (en) Financial service proving method using keylock