[go: up one dir, main page]

WO2010046864A1 - Document verification - Google Patents

Document verification Download PDF

Info

Publication number
WO2010046864A1
WO2010046864A1 PCT/IB2009/054650 IB2009054650W WO2010046864A1 WO 2010046864 A1 WO2010046864 A1 WO 2010046864A1 IB 2009054650 W IB2009054650 W IB 2009054650W WO 2010046864 A1 WO2010046864 A1 WO 2010046864A1
Authority
WO
WIPO (PCT)
Prior art keywords
electronic code
code
person
electronic
document
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Ceased
Application number
PCT/IB2009/054650
Other languages
French (fr)
Inventor
Emerald Veldtman
Arie Van Beest
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
VIRTUAL DOCUMENTS Pty Ltd
Original Assignee
VIRTUAL DOCUMENTS Pty Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by VIRTUAL DOCUMENTS Pty Ltd filed Critical VIRTUAL DOCUMENTS Pty Ltd
Priority to AP2011005693A priority Critical patent/AP2011005693A0/en
Publication of WO2010046864A1 publication Critical patent/WO2010046864A1/en
Anticipated expiration legal-status Critical
Priority to ZA2011/03198A priority patent/ZA201103198B/en
Ceased legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G09EDUCATION; CRYPTOGRAPHY; DISPLAY; ADVERTISING; SEALS
    • G09CCIPHERING OR DECIPHERING APPARATUS FOR CRYPTOGRAPHIC OR OTHER PURPOSES INVOLVING THE NEED FOR SECRECY
    • G09C5/00Ciphering apparatus or methods not provided for in the preceding groups, e.g. involving the concealment or deformation of graphic data such as designs, written or printed messages
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3231Biological data, e.g. fingerprint, voice or retina

Definitions

  • THIS INVENTION relates to document verification.
  • the invention relates to a method of authenticating a document and to a document authentication system.
  • the inventor is aware of methods of encrypting electronically stored documents by means of encryption algorithms. However, sometimes it is not possible for a viewer of a document to determine the encryption status of the document. The inventor identified a need to combine encryption technology with display and print technology so as to create a document upon visual inspection whereof which the encryption status can be confirmed.
  • a method of authenticating a document including encrypting verification data into an electronic code; visually representing the electronic code; and electronically overlaying the visually represented electronic code onto the source document.
  • the method may include the prior step of reading a source document in electronic format onto a computer.
  • the description of the trusted person may include any one or more of the person's name and surname, the person's professional title, a unique session password issued to a particular person, and the like.
  • the biomethc data of a trusted person may include a person's fingerprint, retina scan, DNA sequence data, and the like.
  • Visually representing the electronic code may include arranging the code in any one or more of alphanumeric string sets, one-, or two dimensional bar code data, or the like.
  • the alpha numeric string sets may be in the form of any one of binary-, trinary-, octal-, hexadecimal-, and decimal character sets, or the like.
  • the electronic code may be arranged in a matrix of hexadecimal numbers.
  • the electronic code may be arranged in the form of a seal containing alphanumeric strings arcuately arranged in a seal.
  • the code may be visually recognizable and readable by a person, such as being represented in alphanumeric characters.
  • the code may not be visually recognizable and readable by a person.
  • the code may be represented in any one of a one-dimensional barcode and a two-dimensional barcode.
  • the method may include incorporating recognizable features into the code.
  • the recognizable features may be in the form of any one or more of a retina scan, a fingerprint scan, or the like.
  • the recognisable features are easily recognizable, such as a fingerprint, then the features may be compared with authentic features, such as a previously taken fingerprint of a person.
  • Electronically overlaying the visually represented electronic code onto the source document may include combining the graphic representation of the source document, with the visually represented electronic code.
  • a combined document may be in a Portable Document Format (PDF) type file.
  • PDF Portable Document Format
  • the method may include the prior step of obtaining an input on the placement of the electronic code onto the source document.
  • an authentication system which includes document reading means for reading a document in electronic format; identification verification means for identifying a trusted person; electronic code generation means for representing verification data electronically; processing means for receiving a source document from the document reading means, for reading the identity of a trusted person, for generating an electronic code in response to the identity of the trusted person and for combining the source document with the electronic code originating from the electronic code generation means.
  • Figure 1 shows one example of an electronic code as represented in the method in accordance with the invention
  • Figure 2 shows another example of an electronic code as represented in a method in accordance with the invention.
  • Figure 3 shows the example of the electronic code of Figure 1 , in use on a document.
  • Figure 1 shows an example of a visually represented electronic code 10.
  • the electronic code has been generated in accordance with a method of authenticating a document.
  • the method Prior to representing the electronic code 10, the method included the step of encrypting verification data into the electronic code.
  • a trusted person has been pre-authohzed to authenticate documents.
  • the trusted person can for example be a notary.
  • the person is pre-issued with a unique identification code.
  • the trusted person's fingerprint is scanned electronically.
  • the fingerprint is encrypted electronically as a string of alphanumeric characters by means of commercially available software such as the software known in the trade as Bio-Key.
  • the trusted person's pre-issued unique identification code is combined together with other information such as the trusted person's name and surname, the person's professional title and the time and date on which the electronic code is generated. These details are then combined with the encrypted fingerprint data.
  • the electronic code 10 is then arranged in rows 12 (12.1 and 12.4 shown) and in columns 14 (14.5 and 14.7 shown) of paired hexadecimal numbers.
  • the electronic code 10 is then overlaid on a visual representation of the fingerprint 16.
  • the complete fingerprint template is available in the audit trail of the transaction and can be verified by the user and time stamp.
  • FIG 2 another example of an electronic code 20 is shown.
  • the electronic code is overlaid with a seal where another electronic code 30 represents another set of verification data.
  • the codes 20, 30 are overlaid on a seal of a notary.
  • the seal contains information such as the name of the notary 22, his title 24, the date 26 and the time 28.
  • FIG 3 the code 10 of Figure 1 is shown in use on a document 40.
  • the document is in Portable Document Format (PDF).
  • PDF Portable Document Format
  • the document 40 was authenticated by reading the document into a computer, encrypting verification data into an electronic code 10, visually representing the electronic code, and electronically overlaying the visually represented electronic code onto the source document.
  • a flow diagram 50 of a method of authenticating a document is shown.
  • a document to be encrypted is displayed.
  • the position of the seal placement is determined.
  • an authenticator's fingerprint is scanned and at 58, the image of the fingerprint and the biomethc minutiae relating to the fingerprint is stored on a computer.
  • the fingerprint and the biometric minutiae relating to the fingerprint are combined at 60 and the combined image is overlaid on the electronic document at 62.
  • a portion of the minutiae is overlaid as text onto the electronic version of the document to be encrypted.
  • the method is implemented by means of an authentication system, which includes document reading means for reading a document in electronic format, such as a personal computer, identification verification means for identifying a trusted person by means of a fingerprint scanner, electronic code generation means for representing verification data electronically, which in this example is commercially available software, known in the trade as Bio-Key, and processing means in the form of a PDF writer for receiving a source document from the document reading means, for reading the identity of a trusted person, for generating an electronic code in response to the identity of the trusted person and for combining the source document with the electronic code originating from the electronic code generation means.
  • document reading means for reading a document in electronic format, such as a personal computer
  • identification verification means for identifying a trusted person by means of a fingerprint scanner
  • electronic code generation means for representing verification data electronically, which in this example is commercially available software, known in the trade as Bio-Key
  • processing means in the form of a PDF writer for receiving a source document from the document reading means, for reading the identity of a trusted person, for generating an
  • the inventor believes that the authentication system implementing the method of authenticating a document will be of particular use in jurisdictions where documents can validly be signed electronically.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Biodiversity & Conservation Biology (AREA)
  • Health & Medical Sciences (AREA)
  • Biomedical Technology (AREA)
  • General Health & Medical Sciences (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Collating Specific Patterns (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

A method of authenticating a document, the method including encrypting verification data into an electronic code, visually representing the electronic code, and electronically overlaying the visually represented electronic code onto the source document.

Description

DOCUMENT VERIFICATION
THIS INVENTION relates to document verification. In particular, the invention relates to a method of authenticating a document and to a document authentication system.
BACKGROUND OF THE INVENTION
The inventor is aware of methods of encrypting electronically stored documents by means of encryption algorithms. However, sometimes it is not possible for a viewer of a document to determine the encryption status of the document. The inventor identified a need to combine encryption technology with display and print technology so as to create a document upon visual inspection whereof which the encryption status can be confirmed.
SUMMARY OF THE INVENTION
According to one aspect of the invention, there is provided a method of authenticating a document, the method including encrypting verification data into an electronic code; visually representing the electronic code; and electronically overlaying the visually represented electronic code onto the source document.
The method may include the prior step of reading a source document in electronic format onto a computer.
The method may include overlaying the electronic code onto the electronic format of the source document. Encrypting verification data into an electronic code may include coding any one or more of a description of a trusted person, biomethc data of a trusted person, time- and date data, and the like, into the electronic code.
The description of the trusted person may include any one or more of the person's name and surname, the person's professional title, a unique session password issued to a particular person, and the like.
The biomethc data of a trusted person may include a person's fingerprint, retina scan, DNA sequence data, and the like.
Visually representing the electronic code may include arranging the code in any one or more of alphanumeric string sets, one-, or two dimensional bar code data, or the like.
The alpha numeric string sets may be in the form of any one of binary-, trinary-, octal-, hexadecimal-, and decimal character sets, or the like.
The electronic code may be arranged in a matrix of hexadecimal numbers. The electronic code may be arranged in the form of a seal containing alphanumeric strings arcuately arranged in a seal.
In one embodiment, the code may be visually recognizable and readable by a person, such as being represented in alphanumeric characters.
In another embodiment, the code may not be visually recognizable and readable by a person.
The code may be represented in any one of a one-dimensional barcode and a two-dimensional barcode. The method may include incorporating recognizable features into the code. The recognizable features may be in the form of any one or more of a retina scan, a fingerprint scan, or the like. In particular, if the recognisable features are easily recognizable, such as a fingerprint, then the features may be compared with authentic features, such as a previously taken fingerprint of a person.
Electronically overlaying the visually represented electronic code onto the source document may include combining the graphic representation of the source document, with the visually represented electronic code. For example a combined document may be in a Portable Document Format (PDF) type file.
The method may include the prior step of obtaining an input on the placement of the electronic code onto the source document.
According to another aspect of the invention, there is provided an authentication system, which includes document reading means for reading a document in electronic format; identification verification means for identifying a trusted person; electronic code generation means for representing verification data electronically; processing means for receiving a source document from the document reading means, for reading the identity of a trusted person, for generating an electronic code in response to the identity of the trusted person and for combining the source document with the electronic code originating from the electronic code generation means.
The invention extends to a set of computer executable instructions which, when executed on a computer, performs the method as described above. The invention will now be described, by way of example only with reference to the following drawing(s):
DRAWING(S)
In the drawing(s):
Figure 1 shows one example of an electronic code as represented in the method in accordance with the invention;
Figure 2 shows another example of an electronic code as represented in a method in accordance with the invention; and
Figure 3 shows the example of the electronic code of Figure 1 , in use on a document.
EMBODIMENT OF THE INVENTION
In Figure 1 shows an example of a visually represented electronic code 10. The electronic code has been generated in accordance with a method of authenticating a document.
Prior to representing the electronic code 10, the method included the step of encrypting verification data into the electronic code.
In this example, a trusted person has been pre-authohzed to authenticate documents. The trusted person can for example be a notary. The person is pre-issued with a unique identification code.
Upon implementing the method the trusted person's fingerprint is scanned electronically. The fingerprint is encrypted electronically as a string of alphanumeric characters by means of commercially available software such as the software known in the trade as Bio-Key. The trusted person's pre-issued unique identification code is combined together with other information such as the trusted person's name and surname, the person's professional title and the time and date on which the electronic code is generated. These details are then combined with the encrypted fingerprint data.
As can be seen in Figure 1 , the electronic code 10 is then arranged in rows 12 (12.1 and 12.4 shown) and in columns 14 (14.5 and 14.7 shown) of paired hexadecimal numbers.
The electronic code 10 is then overlaid on a visual representation of the fingerprint 16.
Advantageously, the complete fingerprint template is available in the audit trail of the transaction and can be verified by the user and time stamp.
However, to combat the irregular usage of the fingerprint, an arbitrary blank 18 is removed from the fingerprint 16.
In Figure 2 another example of an electronic code 20 is shown. The electronic code is overlaid with a seal where another electronic code 30 represents another set of verification data. The codes 20, 30 are overlaid on a seal of a notary. The seal contains information such as the name of the notary 22, his title 24, the date 26 and the time 28.
In Figure 3, the code 10 of Figure 1 is shown in use on a document 40. The document is in Portable Document Format (PDF).
The document 40 was authenticated by reading the document into a computer, encrypting verification data into an electronic code 10, visually representing the electronic code, and electronically overlaying the visually represented electronic code onto the source document. In Figure 4, a flow diagram 50 of a method of authenticating a document is shown. At 52 a document to be encrypted, is displayed. At 54, the position of the seal placement is determined. At 56 an authenticator's fingerprint is scanned and at 58, the image of the fingerprint and the biomethc minutiae relating to the fingerprint is stored on a computer. The fingerprint and the biometric minutiae relating to the fingerprint are combined at 60 and the combined image is overlaid on the electronic document at 62. At 64, a portion of the minutiae is overlaid as text onto the electronic version of the document to be encrypted.
The method is implemented by means of an authentication system, which includes document reading means for reading a document in electronic format, such as a personal computer, identification verification means for identifying a trusted person by means of a fingerprint scanner, electronic code generation means for representing verification data electronically, which in this example is commercially available software, known in the trade as Bio-Key, and processing means in the form of a PDF writer for receiving a source document from the document reading means, for reading the identity of a trusted person, for generating an electronic code in response to the identity of the trusted person and for combining the source document with the electronic code originating from the electronic code generation means.
The inventor believes that the authentication system implementing the method of authenticating a document will be of particular use in jurisdictions where documents can validly be signed electronically.

Claims

CLAIMS:
1. A method of authenticating a document, the method including encrypting verification data into an electronic code; visually representing the electronic code; and electronically overlaying the visually represented electronic code onto the source document.
2. A method as claimed in claim 1 , which includes the prior step of reading a source document in electronic format onto a computer.
3. A method as claimed in claim 2, which includes overlaying the electronic code onto the electronic format of the source document.
4. A method as claimed in claim 1 , in which encrypting verification data into an electronic code includes coding any one or more of a description of a trusted person, biometric data of a trusted person, and time- and date data into the electronic code.
5. A method as claimed in claim 4, in which the description of the trusted person includes any one or more of the person's name and surname, the person's professional title, and a unique session password issued to a particular person.
6. A method as claimed in claim 4, in which the biometric data of a trusted person includes any one or more of a person's fingerprint, retina scan, and DNA sequence data.
7. A method as claimed in claim 1 , in which visually representing the electronic code includes arranging the code in any one or more of alphanumeric string sets, one-, and two dimensional bar code data.
8. A method as claimed in claim 7, in which the alpha numeric string sets are in the form of any one of binary-, trinary-, octal-, hexadecimal-, and decimal character sets.
9. A method as claimed in claim 8, in which the electronic code is arranged in a matrix of hexadecimal numbers.
10. A method as clamed in claim 8, in which the electronic code is arranged in the form of a seal containing alphanumeric strings arcuately arranged in a seal.
11. A method as claimed in claim 1 , in which the code is visually recognizable and readable by a person.
12. A method as claimed in claim 1 , in which the code is not visually recognizable and readable by a person.
13. A method as claimed in claim 12, in which the code is represented in any one of a one-dimensional barcode and a two-dimensional barcode.
14. A method as claimed in claim 11 , which includes incorporating recognizable features into the code.
15. A method as claimed in claim 14, in which the recognizable features are in the form of any one or both of a retina scan, and a fingerprint scan.
16. A method as claimed in claim 12, in which electronically overlaying the visually represented electronic code onto the source document includes combining the graphic representation of the source document, with the visually represented electronic code.
17. A method as claimed in claim 16, which includes obtaining an input on the placement of the electronic code onto the source document.
18. An authentication system, which includes document reading means for reading a document in electronic format; identification verification means for identifying a trusted person; electronic code generation means for representing verification data electronically; processing means for receiving a source document from the document reading means, for reading the identity of a trusted person, for generating an electronic code in response to the identity of the trusted person and for combining the source document with the electronic code originating from the electronic code generation means.
19. A set of computer executable instructions which, when executed on a computer, performs the method as described in claim 1.
PCT/IB2009/054650 2008-10-22 2009-10-21 Document verification Ceased WO2010046864A1 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
AP2011005693A AP2011005693A0 (en) 2008-10-22 2009-10-21 Document verification.
ZA2011/03198A ZA201103198B (en) 2008-10-22 2011-05-03 Document verification

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
ZA2008/09087 2008-10-22
ZA200809087 2008-10-22

Publications (1)

Publication Number Publication Date
WO2010046864A1 true WO2010046864A1 (en) 2010-04-29

Family

ID=42118988

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/IB2009/054650 Ceased WO2010046864A1 (en) 2008-10-22 2009-10-21 Document verification

Country Status (3)

Country Link
AP (1) AP2011005693A0 (en)
WO (1) WO2010046864A1 (en)
ZA (1) ZA201103198B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US12411993B2 (en) 2022-05-31 2025-09-09 Seal Pact, LLC Digital signature system
US12499276B2 (en) 2022-05-31 2025-12-16 Seal Pact, LLC Digital signature system

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050240771A1 (en) * 1995-02-13 2005-10-27 Intertrust Technologies Corporation Trusted and secure techniques, systems and methods for item delivery and execution
US20070217847A1 (en) * 2006-03-15 2007-09-20 Kyocera Mita Corporation Method of image forming and image forming apparatus
US20080141117A1 (en) * 2004-04-12 2008-06-12 Exbiblio, B.V. Adding Value to a Rendered Document

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050240771A1 (en) * 1995-02-13 2005-10-27 Intertrust Technologies Corporation Trusted and secure techniques, systems and methods for item delivery and execution
US20080141117A1 (en) * 2004-04-12 2008-06-12 Exbiblio, B.V. Adding Value to a Rendered Document
US20070217847A1 (en) * 2006-03-15 2007-09-20 Kyocera Mita Corporation Method of image forming and image forming apparatus

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US12411993B2 (en) 2022-05-31 2025-09-09 Seal Pact, LLC Digital signature system
US12499276B2 (en) 2022-05-31 2025-12-16 Seal Pact, LLC Digital signature system

Also Published As

Publication number Publication date
AP2011005693A0 (en) 2011-06-30
ZA201103198B (en) 2012-01-25

Similar Documents

Publication Publication Date Title
EP1662699B1 (en) Document authentication combining digital signature verification and visual comparison
EP2350911B1 (en) Method and device for electronically capturing a handwritten signature and safeguarding biometric data
US20030012374A1 (en) Electronic signing of documents
US20130212397A1 (en) Apparatus and method for incorporating signature into electronic documents
WO2006020096A3 (en) Method, system and device for authentication and identification for computerized and networked systems
WO2014098136A1 (en) Information code, method for generating information code, device for reading information code, and system for using information code
US11030282B2 (en) Method and device for securing a document, method and device for control corresponding thereto and secure document
CN1825341A (en) Biometric authentication device, terminal device and automatic transaction device
JP6201706B2 (en) Information code usage system
JP2024038205A (en) Signing methods, systems and/or devices
KR101573857B1 (en) A Printed Document Having Function Of Preventing From Forging/Manipulating, The Method Thereof and The Inspecting Method Of The Printed Document
EP1280098A1 (en) Electronic signing of documents
JP2004013287A (en) Document issuing system
WO2010046864A1 (en) Document verification
RU2647642C1 (en) Method of the document certification with an irreversible digital signature
WO2001075782A1 (en) Individual body identifying method by two-dimensional code, hybrid individual person authenticating system, and off-line person identifying system
WO2003009217A1 (en) Electronic signing of documents
KR20150116428A (en) A Printed Document Having Function Of Preventing From Forging/Manipulating, The Method Thereof and The Inspecting Method Of The Printed Document
EP4176360B1 (en) Process of signing documents
JP2010079515A (en) Authentication system, key for use in the same, authentication method, and program
JP2011088330A (en) Label printing system
JP6296623B2 (en) Digital self-written verification apparatus, digital self-written verification method, and digital self-written verification program
JP3875404B2 (en) Authentication system and recording medium
JP2003141471A (en) Browsing permission authentication method and system using IC card
EP3671503B1 (en) Graphometric document signing method and system

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 09821677

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 09821677

Country of ref document: EP

Kind code of ref document: A1