WO2010046864A1 - Document verification - Google Patents
Document verification Download PDFInfo
- Publication number
- WO2010046864A1 WO2010046864A1 PCT/IB2009/054650 IB2009054650W WO2010046864A1 WO 2010046864 A1 WO2010046864 A1 WO 2010046864A1 IB 2009054650 W IB2009054650 W IB 2009054650W WO 2010046864 A1 WO2010046864 A1 WO 2010046864A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- electronic code
- code
- person
- electronic
- document
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Ceased
Links
Classifications
-
- G—PHYSICS
- G09—EDUCATION; CRYPTOGRAPHY; DISPLAY; ADVERTISING; SEALS
- G09C—CIPHERING OR DECIPHERING APPARATUS FOR CRYPTOGRAPHIC OR OTHER PURPOSES INVOLVING THE NEED FOR SECRECY
- G09C5/00—Ciphering apparatus or methods not provided for in the preceding groups, e.g. involving the concealment or deformation of graphic data such as designs, written or printed messages
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
- H04L9/3231—Biological data, e.g. fingerprint, voice or retina
Definitions
- THIS INVENTION relates to document verification.
- the invention relates to a method of authenticating a document and to a document authentication system.
- the inventor is aware of methods of encrypting electronically stored documents by means of encryption algorithms. However, sometimes it is not possible for a viewer of a document to determine the encryption status of the document. The inventor identified a need to combine encryption technology with display and print technology so as to create a document upon visual inspection whereof which the encryption status can be confirmed.
- a method of authenticating a document including encrypting verification data into an electronic code; visually representing the electronic code; and electronically overlaying the visually represented electronic code onto the source document.
- the method may include the prior step of reading a source document in electronic format onto a computer.
- the description of the trusted person may include any one or more of the person's name and surname, the person's professional title, a unique session password issued to a particular person, and the like.
- the biomethc data of a trusted person may include a person's fingerprint, retina scan, DNA sequence data, and the like.
- Visually representing the electronic code may include arranging the code in any one or more of alphanumeric string sets, one-, or two dimensional bar code data, or the like.
- the alpha numeric string sets may be in the form of any one of binary-, trinary-, octal-, hexadecimal-, and decimal character sets, or the like.
- the electronic code may be arranged in a matrix of hexadecimal numbers.
- the electronic code may be arranged in the form of a seal containing alphanumeric strings arcuately arranged in a seal.
- the code may be visually recognizable and readable by a person, such as being represented in alphanumeric characters.
- the code may not be visually recognizable and readable by a person.
- the code may be represented in any one of a one-dimensional barcode and a two-dimensional barcode.
- the method may include incorporating recognizable features into the code.
- the recognizable features may be in the form of any one or more of a retina scan, a fingerprint scan, or the like.
- the recognisable features are easily recognizable, such as a fingerprint, then the features may be compared with authentic features, such as a previously taken fingerprint of a person.
- Electronically overlaying the visually represented electronic code onto the source document may include combining the graphic representation of the source document, with the visually represented electronic code.
- a combined document may be in a Portable Document Format (PDF) type file.
- PDF Portable Document Format
- the method may include the prior step of obtaining an input on the placement of the electronic code onto the source document.
- an authentication system which includes document reading means for reading a document in electronic format; identification verification means for identifying a trusted person; electronic code generation means for representing verification data electronically; processing means for receiving a source document from the document reading means, for reading the identity of a trusted person, for generating an electronic code in response to the identity of the trusted person and for combining the source document with the electronic code originating from the electronic code generation means.
- Figure 1 shows one example of an electronic code as represented in the method in accordance with the invention
- Figure 2 shows another example of an electronic code as represented in a method in accordance with the invention.
- Figure 3 shows the example of the electronic code of Figure 1 , in use on a document.
- Figure 1 shows an example of a visually represented electronic code 10.
- the electronic code has been generated in accordance with a method of authenticating a document.
- the method Prior to representing the electronic code 10, the method included the step of encrypting verification data into the electronic code.
- a trusted person has been pre-authohzed to authenticate documents.
- the trusted person can for example be a notary.
- the person is pre-issued with a unique identification code.
- the trusted person's fingerprint is scanned electronically.
- the fingerprint is encrypted electronically as a string of alphanumeric characters by means of commercially available software such as the software known in the trade as Bio-Key.
- the trusted person's pre-issued unique identification code is combined together with other information such as the trusted person's name and surname, the person's professional title and the time and date on which the electronic code is generated. These details are then combined with the encrypted fingerprint data.
- the electronic code 10 is then arranged in rows 12 (12.1 and 12.4 shown) and in columns 14 (14.5 and 14.7 shown) of paired hexadecimal numbers.
- the electronic code 10 is then overlaid on a visual representation of the fingerprint 16.
- the complete fingerprint template is available in the audit trail of the transaction and can be verified by the user and time stamp.
- FIG 2 another example of an electronic code 20 is shown.
- the electronic code is overlaid with a seal where another electronic code 30 represents another set of verification data.
- the codes 20, 30 are overlaid on a seal of a notary.
- the seal contains information such as the name of the notary 22, his title 24, the date 26 and the time 28.
- FIG 3 the code 10 of Figure 1 is shown in use on a document 40.
- the document is in Portable Document Format (PDF).
- PDF Portable Document Format
- the document 40 was authenticated by reading the document into a computer, encrypting verification data into an electronic code 10, visually representing the electronic code, and electronically overlaying the visually represented electronic code onto the source document.
- a flow diagram 50 of a method of authenticating a document is shown.
- a document to be encrypted is displayed.
- the position of the seal placement is determined.
- an authenticator's fingerprint is scanned and at 58, the image of the fingerprint and the biomethc minutiae relating to the fingerprint is stored on a computer.
- the fingerprint and the biometric minutiae relating to the fingerprint are combined at 60 and the combined image is overlaid on the electronic document at 62.
- a portion of the minutiae is overlaid as text onto the electronic version of the document to be encrypted.
- the method is implemented by means of an authentication system, which includes document reading means for reading a document in electronic format, such as a personal computer, identification verification means for identifying a trusted person by means of a fingerprint scanner, electronic code generation means for representing verification data electronically, which in this example is commercially available software, known in the trade as Bio-Key, and processing means in the form of a PDF writer for receiving a source document from the document reading means, for reading the identity of a trusted person, for generating an electronic code in response to the identity of the trusted person and for combining the source document with the electronic code originating from the electronic code generation means.
- document reading means for reading a document in electronic format, such as a personal computer
- identification verification means for identifying a trusted person by means of a fingerprint scanner
- electronic code generation means for representing verification data electronically, which in this example is commercially available software, known in the trade as Bio-Key
- processing means in the form of a PDF writer for receiving a source document from the document reading means, for reading the identity of a trusted person, for generating an
- the inventor believes that the authentication system implementing the method of authenticating a document will be of particular use in jurisdictions where documents can validly be signed electronically.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Biodiversity & Conservation Biology (AREA)
- Health & Medical Sciences (AREA)
- Biomedical Technology (AREA)
- General Health & Medical Sciences (AREA)
- Life Sciences & Earth Sciences (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Collating Specific Patterns (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
A method of authenticating a document, the method including encrypting verification data into an electronic code, visually representing the electronic code, and electronically overlaying the visually represented electronic code onto the source document.
Description
DOCUMENT VERIFICATION
THIS INVENTION relates to document verification. In particular, the invention relates to a method of authenticating a document and to a document authentication system.
BACKGROUND OF THE INVENTION
The inventor is aware of methods of encrypting electronically stored documents by means of encryption algorithms. However, sometimes it is not possible for a viewer of a document to determine the encryption status of the document. The inventor identified a need to combine encryption technology with display and print technology so as to create a document upon visual inspection whereof which the encryption status can be confirmed.
SUMMARY OF THE INVENTION
According to one aspect of the invention, there is provided a method of authenticating a document, the method including encrypting verification data into an electronic code; visually representing the electronic code; and electronically overlaying the visually represented electronic code onto the source document.
The method may include the prior step of reading a source document in electronic format onto a computer.
The method may include overlaying the electronic code onto the electronic format of the source document.
Encrypting verification data into an electronic code may include coding any one or more of a description of a trusted person, biomethc data of a trusted person, time- and date data, and the like, into the electronic code.
The description of the trusted person may include any one or more of the person's name and surname, the person's professional title, a unique session password issued to a particular person, and the like.
The biomethc data of a trusted person may include a person's fingerprint, retina scan, DNA sequence data, and the like.
Visually representing the electronic code may include arranging the code in any one or more of alphanumeric string sets, one-, or two dimensional bar code data, or the like.
The alpha numeric string sets may be in the form of any one of binary-, trinary-, octal-, hexadecimal-, and decimal character sets, or the like.
The electronic code may be arranged in a matrix of hexadecimal numbers. The electronic code may be arranged in the form of a seal containing alphanumeric strings arcuately arranged in a seal.
In one embodiment, the code may be visually recognizable and readable by a person, such as being represented in alphanumeric characters.
In another embodiment, the code may not be visually recognizable and readable by a person.
The code may be represented in any one of a one-dimensional barcode and a two-dimensional barcode.
The method may include incorporating recognizable features into the code. The recognizable features may be in the form of any one or more of a retina scan, a fingerprint scan, or the like. In particular, if the recognisable features are easily recognizable, such as a fingerprint, then the features may be compared with authentic features, such as a previously taken fingerprint of a person.
Electronically overlaying the visually represented electronic code onto the source document may include combining the graphic representation of the source document, with the visually represented electronic code. For example a combined document may be in a Portable Document Format (PDF) type file.
The method may include the prior step of obtaining an input on the placement of the electronic code onto the source document.
According to another aspect of the invention, there is provided an authentication system, which includes document reading means for reading a document in electronic format; identification verification means for identifying a trusted person; electronic code generation means for representing verification data electronically; processing means for receiving a source document from the document reading means, for reading the identity of a trusted person, for generating an electronic code in response to the identity of the trusted person and for combining the source document with the electronic code originating from the electronic code generation means.
The invention extends to a set of computer executable instructions which, when executed on a computer, performs the method as described above.
The invention will now be described, by way of example only with reference to the following drawing(s):
DRAWING(S)
In the drawing(s):
Figure 1 shows one example of an electronic code as represented in the method in accordance with the invention;
Figure 2 shows another example of an electronic code as represented in a method in accordance with the invention; and
Figure 3 shows the example of the electronic code of Figure 1 , in use on a document.
EMBODIMENT OF THE INVENTION
In Figure 1 shows an example of a visually represented electronic code 10. The electronic code has been generated in accordance with a method of authenticating a document.
Prior to representing the electronic code 10, the method included the step of encrypting verification data into the electronic code.
In this example, a trusted person has been pre-authohzed to authenticate documents. The trusted person can for example be a notary. The person is pre-issued with a unique identification code.
Upon implementing the method the trusted person's fingerprint is scanned electronically. The fingerprint is encrypted electronically as a string of alphanumeric characters by means of commercially available software such as the software known in the trade as Bio-Key.
The trusted person's pre-issued unique identification code is combined together with other information such as the trusted person's name and surname, the person's professional title and the time and date on which the electronic code is generated. These details are then combined with the encrypted fingerprint data.
As can be seen in Figure 1 , the electronic code 10 is then arranged in rows 12 (12.1 and 12.4 shown) and in columns 14 (14.5 and 14.7 shown) of paired hexadecimal numbers.
The electronic code 10 is then overlaid on a visual representation of the fingerprint 16.
Advantageously, the complete fingerprint template is available in the audit trail of the transaction and can be verified by the user and time stamp.
However, to combat the irregular usage of the fingerprint, an arbitrary blank 18 is removed from the fingerprint 16.
In Figure 2 another example of an electronic code 20 is shown. The electronic code is overlaid with a seal where another electronic code 30 represents another set of verification data. The codes 20, 30 are overlaid on a seal of a notary. The seal contains information such as the name of the notary 22, his title 24, the date 26 and the time 28.
In Figure 3, the code 10 of Figure 1 is shown in use on a document 40. The document is in Portable Document Format (PDF).
The document 40 was authenticated by reading the document into a computer, encrypting verification data into an electronic code 10, visually representing the electronic code, and electronically overlaying the visually represented electronic code onto the source document.
In Figure 4, a flow diagram 50 of a method of authenticating a document is shown. At 52 a document to be encrypted, is displayed. At 54, the position of the seal placement is determined. At 56 an authenticator's fingerprint is scanned and at 58, the image of the fingerprint and the biomethc minutiae relating to the fingerprint is stored on a computer. The fingerprint and the biometric minutiae relating to the fingerprint are combined at 60 and the combined image is overlaid on the electronic document at 62. At 64, a portion of the minutiae is overlaid as text onto the electronic version of the document to be encrypted.
The method is implemented by means of an authentication system, which includes document reading means for reading a document in electronic format, such as a personal computer, identification verification means for identifying a trusted person by means of a fingerprint scanner, electronic code generation means for representing verification data electronically, which in this example is commercially available software, known in the trade as Bio-Key, and processing means in the form of a PDF writer for receiving a source document from the document reading means, for reading the identity of a trusted person, for generating an electronic code in response to the identity of the trusted person and for combining the source document with the electronic code originating from the electronic code generation means.
The inventor believes that the authentication system implementing the method of authenticating a document will be of particular use in jurisdictions where documents can validly be signed electronically.
Claims
1. A method of authenticating a document, the method including encrypting verification data into an electronic code; visually representing the electronic code; and electronically overlaying the visually represented electronic code onto the source document.
2. A method as claimed in claim 1 , which includes the prior step of reading a source document in electronic format onto a computer.
3. A method as claimed in claim 2, which includes overlaying the electronic code onto the electronic format of the source document.
4. A method as claimed in claim 1 , in which encrypting verification data into an electronic code includes coding any one or more of a description of a trusted person, biometric data of a trusted person, and time- and date data into the electronic code.
5. A method as claimed in claim 4, in which the description of the trusted person includes any one or more of the person's name and surname, the person's professional title, and a unique session password issued to a particular person.
6. A method as claimed in claim 4, in which the biometric data of a trusted person includes any one or more of a person's fingerprint, retina scan, and DNA sequence data.
7. A method as claimed in claim 1 , in which visually representing the electronic code includes arranging the code in any one or more of alphanumeric string sets, one-, and two dimensional bar code data.
8. A method as claimed in claim 7, in which the alpha numeric string sets are in the form of any one of binary-, trinary-, octal-, hexadecimal-, and decimal character sets.
9. A method as claimed in claim 8, in which the electronic code is arranged in a matrix of hexadecimal numbers.
10. A method as clamed in claim 8, in which the electronic code is arranged in the form of a seal containing alphanumeric strings arcuately arranged in a seal.
11. A method as claimed in claim 1 , in which the code is visually recognizable and readable by a person.
12. A method as claimed in claim 1 , in which the code is not visually recognizable and readable by a person.
13. A method as claimed in claim 12, in which the code is represented in any one of a one-dimensional barcode and a two-dimensional barcode.
14. A method as claimed in claim 11 , which includes incorporating recognizable features into the code.
15. A method as claimed in claim 14, in which the recognizable features are in the form of any one or both of a retina scan, and a fingerprint scan.
16. A method as claimed in claim 12, in which electronically overlaying the visually represented electronic code onto the source document includes combining the graphic representation of the source document, with the visually represented electronic code.
17. A method as claimed in claim 16, which includes obtaining an input on the placement of the electronic code onto the source document.
18. An authentication system, which includes document reading means for reading a document in electronic format; identification verification means for identifying a trusted person; electronic code generation means for representing verification data electronically; processing means for receiving a source document from the document reading means, for reading the identity of a trusted person, for generating an electronic code in response to the identity of the trusted person and for combining the source document with the electronic code originating from the electronic code generation means.
19. A set of computer executable instructions which, when executed on a computer, performs the method as described in claim 1.
Priority Applications (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| AP2011005693A AP2011005693A0 (en) | 2008-10-22 | 2009-10-21 | Document verification. |
| ZA2011/03198A ZA201103198B (en) | 2008-10-22 | 2011-05-03 | Document verification |
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| ZA2008/09087 | 2008-10-22 | ||
| ZA200809087 | 2008-10-22 |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| WO2010046864A1 true WO2010046864A1 (en) | 2010-04-29 |
Family
ID=42118988
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| PCT/IB2009/054650 Ceased WO2010046864A1 (en) | 2008-10-22 | 2009-10-21 | Document verification |
Country Status (3)
| Country | Link |
|---|---|
| AP (1) | AP2011005693A0 (en) |
| WO (1) | WO2010046864A1 (en) |
| ZA (1) | ZA201103198B (en) |
Cited By (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US12411993B2 (en) | 2022-05-31 | 2025-09-09 | Seal Pact, LLC | Digital signature system |
| US12499276B2 (en) | 2022-05-31 | 2025-12-16 | Seal Pact, LLC | Digital signature system |
Citations (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20050240771A1 (en) * | 1995-02-13 | 2005-10-27 | Intertrust Technologies Corporation | Trusted and secure techniques, systems and methods for item delivery and execution |
| US20070217847A1 (en) * | 2006-03-15 | 2007-09-20 | Kyocera Mita Corporation | Method of image forming and image forming apparatus |
| US20080141117A1 (en) * | 2004-04-12 | 2008-06-12 | Exbiblio, B.V. | Adding Value to a Rendered Document |
-
2009
- 2009-10-21 WO PCT/IB2009/054650 patent/WO2010046864A1/en not_active Ceased
- 2009-10-21 AP AP2011005693A patent/AP2011005693A0/en unknown
-
2011
- 2011-05-03 ZA ZA2011/03198A patent/ZA201103198B/en unknown
Patent Citations (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20050240771A1 (en) * | 1995-02-13 | 2005-10-27 | Intertrust Technologies Corporation | Trusted and secure techniques, systems and methods for item delivery and execution |
| US20080141117A1 (en) * | 2004-04-12 | 2008-06-12 | Exbiblio, B.V. | Adding Value to a Rendered Document |
| US20070217847A1 (en) * | 2006-03-15 | 2007-09-20 | Kyocera Mita Corporation | Method of image forming and image forming apparatus |
Cited By (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US12411993B2 (en) | 2022-05-31 | 2025-09-09 | Seal Pact, LLC | Digital signature system |
| US12499276B2 (en) | 2022-05-31 | 2025-12-16 | Seal Pact, LLC | Digital signature system |
Also Published As
| Publication number | Publication date |
|---|---|
| AP2011005693A0 (en) | 2011-06-30 |
| ZA201103198B (en) | 2012-01-25 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| EP1662699B1 (en) | Document authentication combining digital signature verification and visual comparison | |
| EP2350911B1 (en) | Method and device for electronically capturing a handwritten signature and safeguarding biometric data | |
| US20030012374A1 (en) | Electronic signing of documents | |
| US20130212397A1 (en) | Apparatus and method for incorporating signature into electronic documents | |
| WO2006020096A3 (en) | Method, system and device for authentication and identification for computerized and networked systems | |
| WO2014098136A1 (en) | Information code, method for generating information code, device for reading information code, and system for using information code | |
| US11030282B2 (en) | Method and device for securing a document, method and device for control corresponding thereto and secure document | |
| CN1825341A (en) | Biometric authentication device, terminal device and automatic transaction device | |
| JP6201706B2 (en) | Information code usage system | |
| JP2024038205A (en) | Signing methods, systems and/or devices | |
| KR101573857B1 (en) | A Printed Document Having Function Of Preventing From Forging/Manipulating, The Method Thereof and The Inspecting Method Of The Printed Document | |
| EP1280098A1 (en) | Electronic signing of documents | |
| JP2004013287A (en) | Document issuing system | |
| WO2010046864A1 (en) | Document verification | |
| RU2647642C1 (en) | Method of the document certification with an irreversible digital signature | |
| WO2001075782A1 (en) | Individual body identifying method by two-dimensional code, hybrid individual person authenticating system, and off-line person identifying system | |
| WO2003009217A1 (en) | Electronic signing of documents | |
| KR20150116428A (en) | A Printed Document Having Function Of Preventing From Forging/Manipulating, The Method Thereof and The Inspecting Method Of The Printed Document | |
| EP4176360B1 (en) | Process of signing documents | |
| JP2010079515A (en) | Authentication system, key for use in the same, authentication method, and program | |
| JP2011088330A (en) | Label printing system | |
| JP6296623B2 (en) | Digital self-written verification apparatus, digital self-written verification method, and digital self-written verification program | |
| JP3875404B2 (en) | Authentication system and recording medium | |
| JP2003141471A (en) | Browsing permission authentication method and system using IC card | |
| EP3671503B1 (en) | Graphometric document signing method and system |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| 121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 09821677 Country of ref document: EP Kind code of ref document: A1 |
|
| NENP | Non-entry into the national phase |
Ref country code: DE |
|
| 122 | Ep: pct application non-entry in european phase |
Ref document number: 09821677 Country of ref document: EP Kind code of ref document: A1 |