WO1999027503A1 - The system and method of protection and handling of documents - Google Patents

The system and method of protection and handling of documents Download PDF

Info

Publication number
WO1999027503A1
WO1999027503A1 PCT/SK1998/000018 SK9800018W WO9927503A1 WO 1999027503 A1 WO1999027503 A1 WO 1999027503A1 SK 9800018 W SK9800018 W SK 9800018W WO 9927503 A1 WO9927503 A1 WO 9927503A1
Authority
WO
WIPO (PCT)
Prior art keywords
document
block
crypto
generation
γçö
Prior art date
Application number
PCT/SK1998/000018
Other languages
French (fr)
Inventor
Ivan Kocis
Original Assignee
Ivan Kocis
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ivan Kocis filed Critical Ivan Kocis
Priority to HU0100435A priority Critical patent/HUP0100435A3/en
Priority to AU11847/99A priority patent/AU1184799A/en
Publication of WO1999027503A1 publication Critical patent/WO1999027503A1/en

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07DHANDLING OF COINS OR VALUABLE PAPERS, e.g. TESTING, SORTING BY DENOMINATIONS, COUNTING, DISPENSING, CHANGING OR DEPOSITING
    • G07D7/00Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency
    • G07D7/004Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency using digital security elements, e.g. information coded on a magnetic thread or strip
    • G07D7/0047Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency using digital security elements, e.g. information coded on a magnetic thread or strip using checkcodes, e.g. coded numbers derived from serial number and denomination

Definitions

  • the invention relates to the system and method of protection of integrity of printed documents, and to prevention of their unauthorized modification, counterfeiting and performing of related activities, as well as to minimizing of the influence of the human factor.
  • the literature describes several ways of the protection of documents, all of which are aimed at the protection and encryption of documents and the prevention of their unauthorized modification and counterfeiting. Considering the system and mode of the protection, there are three basic concepts.
  • the first of them deals with the protection of a document as such (i.e. checks, various types of identification documents).
  • This group of documents carries protective marks including e.g. a protective type of paper they are made from, ink and fibers sensitive to ultraviolet light, pantographs, artificial water-marks, embossing, etc.
  • Numerous reports deal with the protection of checks and other documents, e.g. deeds of donation, motor vehicle identification documents and certificates of titles, airline tickets, school diplomas, various admission tickets, securities, bonds, certified copies of school certificates and various types of legal documents, etc.
  • the system involves e.g.
  • protective inks either indicating that the document has been altered or enabling the verification of the original copy
  • inks fluorescent inks, infra-red inks, inks penetrating into the depth of the paper the document is printed on
  • thermochromic inks chemically reactive types of paper, protective fibers, water-marks, etc.
  • the systems very often utilize also the photomicrograph.
  • This group of "hidden marks” represents an effective deterring means offering an efficient protection against copying and scanning of documents.
  • the documents belonging into this group should include several marks (e.g. some types of recently used checks carry up to 16 anti- criminal marks).
  • Other often used modes of protection utilize various printing techniques such as multicolor prismatic printing, holographic printing, foil embossing, etc.
  • EP 0084441 A2 830727 deals with the mode and technology used for the protection of computer software against unauthorized use. This class of protection methods is the most numerous one and more examples shall be given in the text below.
  • Protection of the base of the document through different printing, graphic and paper production technology-related elements may involve chemical, optical, electromagnetic and similar protective elements representing an effective barrier to the illegal production of the protected documents (bills, checks, bonds, securities, admission tickets, etc.).
  • the third group is represented by technologies protecting either a certain form of the contents of the document - e.g. its scanned/printed form (including fax) - or a part of a document which is in data form, with the aim to authenticate both the document and its consents.
  • the protective mark does not allow for the determination of the data form of the document or of its part.
  • This type of protection is represented by various authentication methods based on signature, and is used in the case of electronic form of documents (e.g. US Patents Nos. 5530755, 5255106, 5388158, 5157726).
  • the authentication of the document (of its scanned graphic version) will be carried out at the document inspection/use point, verifying thus the integrity/intactness of the content of the document.
  • the document itself - in the data form - remains inactive.
  • a specific category of technologies is represented by techniques protecting through partially cryptographical methods the content of a document in its printed bitmap form. After encryption (also scrambling), a signature will be created and printed at the sending side. At the receiving side, the document will be decrypted (descrambled) and the correctness/authenticity of the signature will be checked.
  • This category allows for direct protection of the contents of the document, regardless of its original data form (e.g. US Patents Nos. 5321749, 5491536).
  • the method and the system of the protection of printed documents and operations related to their use are based on the generation of falsification-proof and non-alterable ways of information transfer within the variable environment of the system as a whole.
  • the information which is in an electronic form is being transformed into a printed document (hard copy).
  • Another important aspects of this invention are the exclusion of the human factor from all critical operations, and the introduction of an effective and falsification-proof feedback from the critical operations themselves as well as from the points where these critical operations are being effected (places of the creation and inspection of the document).
  • the subject of the invention is a system designated for the protection of physical documents against illegal and unauthorized modification or counterfeiting, and allowing for falsification-proof confirmation of the inspection of the document and minimizing of the influence of the human factor.
  • the system consists of:
  • At least one document generation block creating from the data source and with the involvement of an authorized operator the physical form of the document, a crypto-mark carried by the document, and a shadow document database;
  • At least one document inspection block scanning and verifying the authenticity of the crypto mark carried by the document, displaying the critical parts of the document, generating the crypto stamp to be placed by an authorized operator or equipment onto the document, and creating the feedback document database;
  • the document generation block consists of a processor, carrying out the data processing and containing the crypto keys, a document printing block, a crypto mark generation block, a safety block, a real time block, a displaying block, and a shadow document database generating block.
  • the document inspection block consists of a processor carrying out the data processing and containing the crypto keys, a document printing block, a crypto mark scanning block, a safety block, a real time block, displaying block, a shadow document database generating block, and a crypto stamp generation block.
  • the key generation and distribution block consists of a generating block, a key storage block, and a key distribution block.
  • the database comparison block consists of a comparison and evaluation block, a comparison conditions block, an alarm and warning generating block, and a statistical summaries block.
  • the subject of the invention includes also the method of protection of physical document against their illegal and unauthorized modification and counterfeiting, and allowing for falsification-proof confirmation of the inspection of the document and minimizing of the influence of the human factor.
  • the system consists of:
  • the crypto mark thus generated becomes unseparated part of the physical document which thus becomes its carrier transferring the crypto mark to the place(s) of the use of the document;
  • the subject of the invention includes also the collecting at the point of the generation of the document of all document thus created, their equipment with electronic signature and dispatching either individually or in batches in the encrypted (protected) form as a shadow database into the database comparison block.
  • All documents that have passed the inspection step shall be gradually accumulated at the document inspection point where they shall be electronically signed and dispatched either individually or in batches in an encrypted (protected) form as a feedback database into the database comparison block.
  • the crypto mark thus generated if it is in the form of an individual physical object (e.g. sticker, annex, supplement, etc.), shall be permanently attached to the document.
  • an individual physical object e.g. sticker, annex, supplement, etc.
  • the crypto mark - if generated in the same way as the document - becomes unseparated part thereof printed (in the form of a bar code or a chain of OCR symbols) on the part of the surface of the carrier material (e.g. paper) designated for that purpose.
  • the carrier material e.g. paper
  • the crypto mark thus generated may be embedded either into the text of the document and/or into its graphical part (e.g. through watermarking, etc.) or into the printing background of the document.
  • the DB comparison block performs the comparison of the database operations over the contents of the shadow DB and feedback DB.
  • the crypto stamp generation block located at the document inspection point will generate a crypto stamp, by cryptographic operation.
  • the crypto stamp will be either placed, affixed onto or coupled with the document.
  • the key generation block will create the encryption and decryption keys which will be distributed by the key distribution block through safe channel(s) into the document generation and document control blocks.
  • the operator will then perform the operation related to the verification of his/her authorization to carry out the given set of activities, performed against the document generation block through the security block.
  • the operator will then perform the operation related to the verification of his/her authorization to carry out the given set of activities, performed against the document inspection block through the safety block.
  • the invention provides solution for the generation of a structure involving safe transfer channels between the document generation, document inspection, key generation and distribution, document database comparison, and document source blocks and determining the relationships of those blocks with the printed document and the crypto mark attached to it, and also with the crypto stamp.
  • the invention introduces into one of the most critical activity, i.e. into the procedure of the inspection of the document, at least two operations contributing significantly to the enhancement of both the safety of that activity and the future auditing of the document. Those two operations are the machine-mediated transfer of the contents of the document, or of its most important parts, from the crypto mark, and the transfer of the scanned information into the computer.
  • the computer verifies the authenticity and integrity of the document and generates its original/authentic and true form.
  • the computer generates a crypto stamp.
  • the crypto stamp that is being affixed (either printed or hand-written) onto the document, serves as an undeniable proof that the operator has carried out the required control activity.
  • Another important aspect of the invention is the closure of a inspection feedback between the place(s) of generation and inspection of the document, which is effected in the DB comparison block, and which represents a cryptographic and safe closure of all activities directly associated with the cycle consisting of the generation, transport, and inspection of the document.
  • the security aspect of the invention is further enhanced by the activities effected within the security block which are aimed at safe determination of the authorization of a given operator to carry out activities associated with the generation/creation and inspection of the document.
  • the key generation and distribution block carries out safety operations resulting in cryptographically safe generation of keys, their storage, and safe distribution to the points of their use.
  • Figure 1 shows all of the above mentioned blocks which represent the principal components of the invention, and their mutual interconnection and/or functional relationships.
  • Figure 2 shows the DB comparison block
  • the system as a whole represents a safe and functional environment enabling the creation of a critical document 300.
  • the document is generated in the document source 200 which itself is located within the document generation block 100
  • the crypto mark 400 may be affixed onto a document either at the time of its generation or later.
  • Document 300 with the crypto mark 400 affixed to it is transferred to the document inspection point that is located within the document inspection block 500 Both blocks are connected through a safe and authenticated way with an operator 800 (and/or 801)
  • the operator 801 verifies his/her authorization to perform the inspection operations Having scanned the crypto mark 400 from the document 300, the document control block 500 carries out a cryptographic verification of the integrity of the document 300 and displays its electronic form. Operator 801 makes a decision regarding the conclusion of the document control and enters the corresponding command into block 500 The document control block 500 generates through a cryptological method a crypto stamp 900, which will be displayed and either manually attached or directly printed onto the document 400.
  • the generation of a document in the document generation block 100 is either accompanied or followed by the generation of a cryptographically protected shadow document database (DB) 101.
  • the document is stored in the shadow DB KU and sent in an encrypted and protected form into the DB comparison block 600
  • the feedback DB block 503 creates a cryptographically protected database of inspected documents and the electronic form of the document is saved and sent in a protected and encrypted form into the DB comparison block 600
  • the key element of the document generation block 100 is the processor 102 integrating within the document generation block 100 the (program) functions of other blocks.
  • the crypto mark generation block 103 which may be realized either as an independent block or as a software function within the processor block 102 generates through its cryptographic function a crypto mark that will be subsequently printed onto the document 300.
  • the document itself will be created either independently from the crypto mark through the print function 105 or within a single united technological step.
  • the document generation block contains the document display block 106 displaying for the needs of the operator 800 the information contained in an electronic or any other form in the document source 200.
  • the operator identifies and authenticates himself/herself through the security block 104.
  • the real time block 107 maintains the information on the real time required by the cryptographic operations needed for the generation of the crypto mark.
  • the crypto mark scanning block 501 transforms the machine-readable crypto mark into the electronic form that is subsequently sent to the processor 502.
  • the processor 502 carries out cryptographically the integrity verification and transmits the electronic form of the document 300 into the displaying block 506 where it will be made available to the operator 801 who has meanwhile authenticated himself/herself against the document inspection block 5CK) through the security block 505.
  • the crypto stamp generation block 504 will generate a crypto stamp 900.
  • the operator 8CU will affix the crypto stamp 900 to the inspected document 300 either manually according to information displayed on the displaying block 504 or, alternatively, via an automated equipment (printer) connected to the crypto stamp generation block 504-
  • Key generation and distribution block 700 performs a cryptographically safe generation of keys used in the cryptographic operations carried out within items 100, 500, and 600.
  • the key storage block 702 located within the key generation and distribution block stores the keys that are used for the needs of blocks 100, 500, and 600.
  • the key distribution blocks 701A and 701B perform - through communication with blocks 100, 500, and 600 - the distribution of the keys and their updating.
  • the key generation block 703 generates the crythographically safe keys.
  • the DB comparison block 600 which is shown in more detail in Figure 2, performs the comparison of individual items from two databases, i.e. from shadow DB 0 and feedback DB 503 sent into block 600 from block 500.
  • the comparison and evaluation proceeds within the block 601 according the appropriate comparison and evaluation criteria available from block 603.
  • the results are entered into the alarm and warning block 602.
  • the statistics summary block 604 creates databases for the needs of higher statistical operations.
  • Example 2
  • One of the preferred applications of the presented invention is its use for the protection of both customs documents and operations involving those documents.
  • Customs documents are generated in an electronic form to be subsequently converted into their printed versions on internationally standardized forms. At the places of their creation, the appropriate customs officials affix to the documents thus created their traditional stamps and signatures.
  • the document contains less than 200 characters which form the critical information.
  • the invention enables the documents to be marked by a sticker carrying a crypto mark containing, besides the electronic signature with the secret key of the customs house where the document has been created, also the entire critical information characterizing the document, which is in an encrypted form.
  • the crypto mark may be, for example, in the form of a complex bar code printed by a laser printer on a paper base (the sticker).
  • One copy of the document remains at the place of its generation, while the other copy (provided with the same sticker) is transferred by the party involved in the customs transaction (e.g. the importer or exporter) to the document control point (e.g. the customs house at the border crossing).
  • the party involved in the customs transaction e.g. the importer or exporter
  • the document control point e.g. the customs house at the border crossing
  • the inspecting authority scans the crypto mark by a laser scanner connected to a computer and the information it contains will be displayed on the screen.
  • the critical parts of the documents thus displayed shall be compared with their counterparts which are in the printed form of the same document. Having performed the remaining operations of the customs proceedings (inspection of the cargo and verification of its intactness), the customs officer concludes the proceeding by entering the appropriate command into the computer.
  • the data will be entered in an encrypted form into a shadow database, this procedure will be followed by the displaying of a set of numerals representing the crypto stamp which will be written by the customs officer (by hand) onto the document that is being inspected.
  • Every customs officer (the operator), whether at the place of the creation of the document or at the document inspection point, proves to the computer his/her authorization to perform the required customs-related operation by the use of a special token (e.g. a special form of a chip card).
  • a special token e.g. a special form of a chip card.
  • the identity of the customs officer will be recorded in both databases (i.e. the shadow DB located at the place of creation of the document and the feedback DB located at the document inspection point).
  • the electronic signature is performed by an asymmetric cryptographic method ensuring the minimization of the danger of the loss of the key (i.e. in the case when the computer at the document control point is a portable hand-held bar code scanner with a built-in micro processor, a small displaying unit and a keyboard capable of the full scale generation of the crypto stamp).
  • the Center carries out the complex process of the item-matching process which is based on data extracted from both databases (shadow and feedback) and generates the warning/alarm messages for the appropriate customs authorities.
  • the crypto mark and or crypto stamp may be used successfully also in the number of other applications, e.g. in customs warehouses, in the handling of documents associated with the flow of goods to and from warehouses, etc.
  • the invention may be utilized also in the handling of the documentation and accompanying subsequent operations within large transport systems (cargo, air, rail, and road transport).
  • a viability of the industrial applicability of the invention may by documented by its possible use in the areas of customs-related operations and logistical operations within large transportation system, as outlined in the above described examples.

Abstract

The solution deals with a system for the protection of physical documents against illegal and unauthorized alteration, modification or counterfeiting, and allowing for falsification-proof confirmation of the inspection of the document, and minimizing the influence of the human factor. The system consists of at least one document generation block (300), creating from the document data source (200) with the involvement of an operator (800) and/or (801) the physical form of the document. The system also includes the crypto mark (400) carried by the document which then becomes a component part of the shadow document database (101); at least one document control block (500) which scans the crypto mark (400) carried by the document, verifies its authenticity, displays the critical part of the document and generates the crypto stamp (900). The crypto stamp is affixed either by the authorized operator (800) and/or (801) or an appropriate equipment onto the document which thus becomes a component part of the feedback document database (503); at least one keys generation and distribution block (700); at least one document database comparison block (600); and at least one document source block (200). The solution also deals with the method of protection of physical documents, which consists of cryptographic processing of the selected data at the point of the creation of the document, and transformation of the data into a form serving as a base for the generation of the crypto mark; the system includes also the generation of the crypto mark and its scanning at the point where the inspection of the document takes place and transformation into a data form followed by verification of integrity and validity of those data and approval of the document inspection; the final step consists of the generation and displaying of the crypto stamp and its affixing onto the inspected document for its further use.

Description

The system and method of protection and handline of documents
Technical Field
The invention relates to the system and method of protection of integrity of printed documents, and to prevention of their unauthorized modification, counterfeiting and performing of related activities, as well as to minimizing of the influence of the human factor.
Beckground Art
The literature describes several ways of the protection of documents, all of which are aimed at the protection and encryption of documents and the prevention of their unauthorized modification and counterfeiting. Considering the system and mode of the protection, there are three basic concepts.
The first of them deals with the protection of a document as such (i.e. checks, various types of identification documents). This group of documents carries protective marks including e.g. a protective type of paper they are made from, ink and fibers sensitive to ultraviolet light, pantographs, artificial water-marks, embossing, etc. Numerous reports deal with the protection of checks and other documents, e.g. deeds of donation, motor vehicle identification documents and certificates of titles, airline tickets, school diplomas, various admission tickets, securities, bonds, certified copies of school certificates and various types of legal documents, etc. The system involves e.g. protective inks either indicating that the document has been altered or enabling the verification of the original copy (deletable inks, fluorescent inks, infra-red inks, inks penetrating into the depth of the paper the document is printed on, thermochromic inks, chemically reactive types of paper, protective fibers, water-marks, etc. (Copyright 1996 FORM magazine, 433 - E. Monroe Avenue, Alexandria, VA 22301). Apart from water-marks and fluorescent ink, the systems very often utilize also the photomicrograph. This group of "hidden marks" represents an effective deterring means offering an efficient protection against copying and scanning of documents. In order to achieve maximum protecting effect, the documents belonging into this group should include several marks (e.g. some types of recently used checks carry up to 16 anti- criminal marks). Other often used modes of protection utilize various printing techniques such as multicolor prismatic printing, holographic printing, foil embossing, etc.
The second concept is based on the protection of the content of the documents (i.e. of the data incorporated into the given document). EP 0084441 A2 830727, for example, deals with the mode and technology used for the protection of computer software against unauthorized use. This class of protection methods is the most numerous one and more examples shall be given in the text below.
The protection of the "uniqueness" of the document, i.e. of the document the content and base of which cannot be duplicated, represents the most elaborate way of protection, and methods representing the combination of the preceding two concepts are available at the time being.
The area of the protection of documents and of their handling involves solutions ensuring certain partial aspects of the protection, such as:
Protection of the base of the document through different printing, graphic and paper production technology-related elements. Other systems may involve chemical, optical, electromagnetic and similar protective elements representing an effective barrier to the illegal production of the protected documents (bills, checks, bonds, securities, admission tickets, etc.).
Protection against duplication of documents, e.g. through creation of a special graphic mark(s) as an integral part of the document. Specially equipped copiers (available at specialized workplaces) shall recognize such mark(s) and shall thus refuse to copy the document (US Patent No. 5502575).
Protection supplemented with an active element making it possible to transport on the document a protective mark able to activate the appropriate equipment (copier, fax) which in turn will carry out the instruction (US Patent No. 5231663).
Elements carried either in the text of the document or in the document as such, providing for the automated handling of printed documents through marks representing either numbers or other types of information required for the appropriate classification of the document (name of the author, title, serial number, date, etc.). These marks may be in the form of bar codes or information included directly into the base of the document (US Patents Nos. 5490217 and 5486686, respectively).
Yet another group of relevant technologies is represented by techniques used for the inclusion of certain protective information into a document printed on paper;
Methods making it possible to print through various graphic combinations on certain places, designated for that purpose within the document, scannable data either in the form of double-value surface information (US Patent No. 5337362) or as more complex and intricate two-dimensional (2D) bar codes (e.g. US Patent No. 5243655), or by sophisticated optical cryptographic methods (US Patent No. 5488664) belonging into the group of the so called 'water-marks' (analogous to classical water-marks). Other methods include rather complex encrypting techniques (data embedding) and advanced methods based on hidden information included directly into the base of the document (watermarking) which are not visible and/or legible to the naked eye (e.g. US Patent No. 5629770). However, information included into the document in this way is rather limited (serial number of the document, copyright-related data, originator of the document [person or software], etc.).
The third group is represented by technologies protecting either a certain form of the contents of the document - e.g. its scanned/printed form (including fax) - or a part of a document which is in data form, with the aim to authenticate both the document and its consents. However, the protective mark does not allow for the determination of the data form of the document or of its part. This type of protection is represented by various authentication methods based on signature, and is used in the case of electronic form of documents (e.g. US Patents Nos. 5530755, 5255106, 5388158, 5157726).
The authentication of the document (of its scanned graphic version) will be carried out at the document inspection/use point, verifying thus the integrity/intactness of the content of the document. However, the document itself - in the data form - remains inactive.
A specific category of technologies is represented by techniques protecting through partially cryptographical methods the content of a document in its printed bitmap form. After encryption (also scrambling), a signature will be created and printed at the sending side. At the receiving side, the document will be decrypted (descrambled) and the correctness/authenticity of the signature will be checked. This category allows for direct protection of the contents of the document, regardless of its original data form (e.g. US Patents Nos. 5321749, 5491536).
However, the available literature does not describe any solution utilizing cryptographic tools for the creation of a broad system that would provide comprehensive protection of the document and, at the same time, of the activities associated with its handling, and that would be based on protected feed-back information from the critical points of the movement (and/or functions) of the document. However, such a solution represents the subject of the present invention.
Disclosure of the Invention
The method and the system of the protection of printed documents and operations related to their use are based on the generation of falsification-proof and non-alterable ways of information transfer within the variable environment of the system as a whole. Within this environment, the information which is in an electronic form is being transformed into a printed document (hard copy). Another important aspects of this invention are the exclusion of the human factor from all critical operations, and the introduction of an effective and falsification-proof feedback from the critical operations themselves as well as from the points where these critical operations are being effected (places of the creation and inspection of the document).
The subject of the invention is a system designated for the protection of physical documents against illegal and unauthorized modification or counterfeiting, and allowing for falsification-proof confirmation of the inspection of the document and minimizing of the influence of the human factor. The system consists of:
— at least one document generation block, creating from the data source and with the involvement of an authorized operator the physical form of the document, a crypto-mark carried by the document, and a shadow document database;
— at least one document inspection block, scanning and verifying the authenticity of the crypto mark carried by the document, displaying the critical parts of the document, generating the crypto stamp to be placed by an authorized operator or equipment onto the document, and creating the feedback document database;
— at least one key generation and distribution block;
— at least one document database comparison block;
— at least one document source block.
The document generation block consists of a processor, carrying out the data processing and containing the crypto keys, a document printing block, a crypto mark generation block, a safety block, a real time block, a displaying block, and a shadow document database generating block.
The document inspection block consists of a processor carrying out the data processing and containing the crypto keys, a document printing block, a crypto mark scanning block, a safety block, a real time block, displaying block, a shadow document database generating block, and a crypto stamp generation block.
The key generation and distribution block consists of a generating block, a key storage block, and a key distribution block.
The database comparison block consists of a comparison and evaluation block, a comparison conditions block, an alarm and warning generating block, and a statistical summaries block. The subject of the invention includes also the method of protection of physical document against their illegal and unauthorized modification and counterfeiting, and allowing for falsification-proof confirmation of the inspection of the document and minimizing of the influence of the human factor. The system consists of:
- cryptographic processing of the selected data which is carried out at the place of the generation of the document and which is the source of the data required for the printing of this physical printed document, as well as transforming of the data into a form representing the basis for the generation of the crypto mark;
- generating of the crypto mark by the equipment designated for that purpose, which takes place after the transformation of the data cryptographically processed for the purpose of the crypto mark generation; the crypto mark thus generated becomes unseparated part of the physical document which thus becomes its carrier transferring the crypto mark to the place(s) of the use of the document;
- scanning of the crypto mark at the document inspection verification point and its transformation into a data form;
- the use of cryptographic methods for the verification — based on the scanned crypto mark ~ of the integrity and validity of the data;
- approval by an authorized operator of the inspection of the document and of the associated activities, carried out after the completion of the inspection;
- generation and displaying of the crypto stamp linking unambiguously the controlled document to the place and exact time of the inspection carried out by an authorized operator;
- affixing of the crypto stamp onto the controlled document for the purpose of its further use by an authorized operator either in a manual way or with the use of an appropriate equipment.
The subject of the invention includes also the collecting at the point of the generation of the document of all document thus created, their equipment with electronic signature and dispatching either individually or in batches in the encrypted (protected) form as a shadow database into the database comparison block.
All documents that have passed the inspection step shall be gradually accumulated at the document inspection point where they shall be electronically signed and dispatched either individually or in batches in an encrypted (protected) form as a feedback database into the database comparison block.
The crypto mark thus generated, if it is in the form of an individual physical object (e.g. sticker, annex, supplement, etc.), shall be permanently attached to the document.
The crypto mark - if generated in the same way as the document - becomes unseparated part thereof printed (in the form of a bar code or a chain of OCR symbols) on the part of the surface of the carrier material (e.g. paper) designated for that purpose.
The crypto mark thus generated may be embedded either into the text of the document and/or into its graphical part (e.g. through watermarking, etc.) or into the printing background of the document. The DB comparison block performs the comparison of the database operations over the contents of the shadow DB and feedback DB.
Based on the data scanned from the crypto mark and data received from the point of the inspection of the document, the crypto stamp generation block located at the document inspection point will generate a crypto stamp, by cryptographic operation.
In the step that follows, the crypto stamp will be either placed, affixed onto or coupled with the document.
The key generation block will create the encryption and decryption keys which will be distributed by the key distribution block through safe channel(s) into the document generation and document control blocks.
The operator will then perform the operation related to the verification of his/her authorization to carry out the given set of activities, performed against the document generation block through the security block.
In the next step, the operator will then perform the operation related to the verification of his/her authorization to carry out the given set of activities, performed against the document inspection block through the safety block.
Finally, the operator will perform the verification of his/her identity and authorization to carry out certain activities involving the use of the document generation and inspection blocks.
The invention provides solution for the generation of a structure involving safe transfer channels between the document generation, document inspection, key generation and distribution, document database comparison, and document source blocks and determining the relationships of those blocks with the printed document and the crypto mark attached to it, and also with the crypto stamp. The invention introduces into one of the most critical activity, i.e. into the procedure of the inspection of the document, at least two operations contributing significantly to the enhancement of both the safety of that activity and the future auditing of the document. Those two operations are the machine-mediated transfer of the contents of the document, or of its most important parts, from the crypto mark, and the transfer of the scanned information into the computer. The computer verifies the authenticity and integrity of the document and generates its original/authentic and true form. As a further step, the computer generates a crypto stamp. The crypto stamp, that is being affixed (either printed or hand-written) onto the document, serves as an undeniable proof that the operator has carried out the required control activity.
Of great importance is also the fact that the document, together with the crypto stamp affixed to it, represents a communication channel characterized by a high degree of availability.
Another important aspect of the invention is the closure of a inspection feedback between the place(s) of generation and inspection of the document, which is effected in the DB comparison block, and which represents a cryptographic and safe closure of all activities directly associated with the cycle consisting of the generation, transport, and inspection of the document.
The security aspect of the invention is further enhanced by the activities effected within the security block which are aimed at safe determination of the authorization of a given operator to carry out activities associated with the generation/creation and inspection of the document.
Similarly, the key generation and distribution block carries out safety operations resulting in cryptographically safe generation of keys, their storage, and safe distribution to the points of their use.
Brief Description of Drawings
Figure 1 shows all of the above mentioned blocks which represent the principal components of the invention, and their mutual interconnection and/or functional relationships. Figure 2 shows the DB comparison block
Best Mode for Carrying Out the Invention
Example 1
The system as a whole represents a safe and functional environment enabling the creation of a critical document 300. The document is generated in the document source 200 which itself is located within the document generation block 100 The crypto mark 400 may be affixed onto a document either at the time of its generation or later.
Document 300 with the crypto mark 400 affixed to it is transferred to the document inspection point that is located within the document inspection block 500 Both blocks are connected through a safe and authenticated way with an operator 800 (and/or 801)
At the inspection point, which is located at the document inspection block 500, the operator 801 verifies his/her authorization to perform the inspection operations Having scanned the crypto mark 400 from the document 300, the document control block 500 carries out a cryptographic verification of the integrity of the document 300 and displays its electronic form. Operator 801 makes a decision regarding the conclusion of the document control and enters the corresponding command into block 500 The document control block 500 generates through a cryptological method a crypto stamp 900, which will be displayed and either manually attached or directly printed onto the document 400.
The generation of a document in the document generation block 100 is either accompanied or followed by the generation of a cryptographically protected shadow document database (DB) 101. The document is stored in the shadow DB KU and sent in an encrypted and protected form into the DB comparison block 600
In a similar way, upon inspecting the document 300 in the inspection block 500, the feedback DB block 503 creates a cryptographically protected database of inspected documents and the electronic form of the document is saved and sent in a protected and encrypted form into the DB comparison block 600 The key element of the document generation block 100 is the processor 102 integrating within the document generation block 100 the (program) functions of other blocks.
The crypto mark generation block 103 which may be realized either as an independent block or as a software function within the processor block 102 generates through its cryptographic function a crypto mark that will be subsequently printed onto the document 300.
The document itself will be created either independently from the crypto mark through the print function 105 or within a single united technological step.
The document generation block contains the document display block 106 displaying for the needs of the operator 800 the information contained in an electronic or any other form in the document source 200. The operator identifies and authenticates himself/herself through the security block 104.
The real time block 107 maintains the information on the real time required by the cryptographic operations needed for the generation of the crypto mark.
Another integral part of the document inspection block 500 is the crypto mark scanning block 501 which transforms the machine-readable crypto mark into the electronic form that is subsequently sent to the processor 502. The processor 502 carries out cryptographically the integrity verification and transmits the electronic form of the document 300 into the displaying block 506 where it will be made available to the operator 801 who has meanwhile authenticated himself/herself against the document inspection block 5CK) through the security block 505.
Based on the information collected from the electronic form of the document 300, on the data provided by the real time block 507, on the data regarding the location of the document control block 500. and on the data on operator 801 provided by the security block 505, the crypto stamp generation block 504 will generate a crypto stamp 900.
The operator 8CU will affix the crypto stamp 900 to the inspected document 300 either manually according to information displayed on the displaying block 504 or, alternatively, via an automated equipment (printer) connected to the crypto stamp generation block 504-
Key generation and distribution block 700 performs a cryptographically safe generation of keys used in the cryptographic operations carried out within items 100, 500, and 600.
The key storage block 702 located within the key generation and distribution block stores the keys that are used for the needs of blocks 100, 500, and 600.
The key distribution blocks 701A and 701B perform - through communication with blocks 100, 500, and 600 - the distribution of the keys and their updating.
The key generation block 703 generates the crythographically safe keys.
The DB comparison block 600, which is shown in more detail in Figure 2, performs the comparison of individual items from two databases, i.e. from shadow DB 0 and feedback DB 503 sent into block 600 from block 500.
The comparison and evaluation proceeds within the block 601 according the appropriate comparison and evaluation criteria available from block 603. The results are entered into the alarm and warning block 602.
The statistics summary block 604 creates databases for the needs of higher statistical operations. Example 2
One of the preferred applications of the presented invention is its use for the protection of both customs documents and operations involving those documents.
Customs documents are generated in an electronic form to be subsequently converted into their printed versions on internationally standardized forms. At the places of their creation, the appropriate customs officials affix to the documents thus created their traditional stamps and signatures. The document contains less than 200 characters which form the critical information.
The invention enables the documents to be marked by a sticker carrying a crypto mark containing, besides the electronic signature with the secret key of the customs house where the document has been created, also the entire critical information characterizing the document, which is in an encrypted form. The crypto mark may be, for example, in the form of a complex bar code printed by a laser printer on a paper base (the sticker).
One copy of the document remains at the place of its generation, while the other copy (provided with the same sticker) is transferred by the party involved in the customs transaction (e.g. the importer or exporter) to the document control point (e.g. the customs house at the border crossing).
All data regarding the document and the customs officer are entered in an encrypted form into a shadow database and sent to a point where they will undergo comparison.
At the document control point, the inspecting authority scans the crypto mark by a laser scanner connected to a computer and the information it contains will be displayed on the screen. The critical parts of the documents thus displayed shall be compared with their counterparts which are in the printed form of the same document. Having performed the remaining operations of the customs proceedings (inspection of the cargo and verification of its intactness), the customs officer concludes the proceeding by entering the appropriate command into the computer.
The data will be entered in an encrypted form into a shadow database, this procedure will be followed by the displaying of a set of numerals representing the crypto stamp which will be written by the customs officer (by hand) onto the document that is being inspected.
Every customs officer (the operator), whether at the place of the creation of the document or at the document inspection point, proves to the computer his/her authorization to perform the required customs-related operation by the use of a special token (e.g. a special form of a chip card). The identity of the customs officer will be recorded in both databases (i.e. the shadow DB located at the place of creation of the document and the feedback DB located at the document inspection point).
The electronic signature is performed by an asymmetric cryptographic method ensuring the minimization of the danger of the loss of the key (i.e. in the case when the computer at the document control point is a portable hand-held bar code scanner with a built-in micro processor, a small displaying unit and a keyboard capable of the full scale generation of the crypto stamp).
The Center carries out the complex process of the item-matching process which is based on data extracted from both databases (shadow and feedback) and generates the warning/alarm messages for the appropriate customs authorities.
The crypto mark and or crypto stamp may be used successfully also in the number of other applications, e.g. in customs warehouses, in the handling of documents associated with the flow of goods to and from warehouses, etc. The invention may be utilized also in the handling of the documentation and accompanying subsequent operations within large transport systems (cargo, air, rail, and road transport).
Industrial Applicability
A viability of the industrial applicability of the invention may by documented by its possible use in the areas of customs-related operations and logistical operations within large transportation system, as outlined in the above described examples.

Claims

Claims
1 A system designed for the protection of documents and for preventing their unwarranted and unauthorized alteration and counterfeiting, enabling a falsification-proof confirmation of inspection-related operations, and minimizing the effect of the human factor, characterised in that consist of.
ΓÇö at least one document generation block (300) generating on the basis of document data source (200) and with the participation of an authenticated operator (800) a physical form of a document, a crypto mark (400) to be affixed onto that document, and a shadow database (101) for the storage of such documents;
ΓÇö at least one document inspection block (500) performing the following functions scanning of the crypto mark (400) borne by the document, verification of the authenticity of that document, display of the critical parts of the document and generation of a crypto stamp (900) to be affixed by either an authenticated operator (800) and/or (801) or by an appropriate equipment to the document, and generation of a feedback document database (503),
ΓÇö at least one key generation and distribution block (700),
ΓÇö at least one document database comparison block (600),
ΓÇö at least one document source block (200)
2 A system as claimed in Claim 1, characterised in that the document generation block (101) consists of
ΓÇö a processor (102) performing the processing of data and storing of the crypto keys,
ΓÇö a document printing block (105),
ΓÇö a crypto mark generating block (400),
ΓÇö a security block (104),
ΓÇö a real time block (107),
ΓÇö a displaying block (106); and
ΓÇö a shadow document database generation block (101)
3 A system as claimed in Claim 1, characterised in that the document inspection block (500) consists of
ΓÇö a processor (502) performing data processing and storing of the crypto keys .
ΓÇö a block performing the scanning of the crypto mark (501),
ΓÇö a security block (505),
ΓÇö a real time block (507),
ΓÇö a displaying block (506),
ΓÇö feedback document database creating block (503), and
ΓÇö a crypto stamp generating block (504)
4. A system as claimed in Claim 1, characterised in that the key generation and distribution block (700) consists of:
ΓÇö a key generating block (703);
ΓÇö a key storing block (702), and
ΓÇö a key distribution block (701A) and/or (701B).
5. A system as claimed in Claim 1, characterised in that the database comparison block (600) consists of:
ΓÇö a comparison and evaluation block (601);
ΓÇö a comparison criteria block (603);
ΓÇö an alarm and warning generating block (603); and
ΓÇö a statistics summary block (604).
6. A method for the protection of documents and for preventing their unwarranted and unauthorized alteration and counterfeiting, enabling a falsification-proof confirmation of inspection-related operations, and minimizing the effect of the human factor, characterised in that consist of the following steps:
Cryptographic processing of selected data at the place of the generation of the document which serves as the source of data for the printout of that document, and conversion of the data into a form representing a basis for the generation of the crypto mark;
Generation of a crypto mark by the appropriate equipment after the transformation of the cryptographically pre-processed data; the crypto mark becomes unseparable component of the document that will thus become its carrier mediating its transfer to another location of use of the document;
Scanning of the crypto mark at the document inspection point and its transformation into a data format;
Verification through cryptographic methods of the integrity and authenticity of the data scanned from the crypto mark
Approval of the inspection of the document by an authenticated operator after the conclusion of the inspection and of all related operations;
Generation and displaying of a crypto stamp which links the inspected document unambiguously to the location of the document control point and to the authenticated operator;
Affixing of the crypto stamp to the inspected document for the purpose of its later processing either manually by the authenticated operator or by appropriate equipment.
7. A method as claimed in Claim 6, characterised in that the following operations carried out at the place of the document generation: accumulation of all documents that have been generated, affixing to a set of such documents of an electronic signature, and encrypting and transmitting of such documents either individually or as a shadow database into the database comparison block.
8. A method as claimed in Claim 6, characterised in that the following operations carried out at the document inspection point: accumulation of all documents that have undergone inspection, affixing to a set of such documents of their electronic signature, and encrypting and transmitting of such documents either individually or as a feedback database into the database comparison block.
9. A method as claimed in Claim 6, characterised in that the generated crypto mark ~ provided it is represented by an independent physical object e.g. a sticker, an appendix to a document, etc. - becomes permanently attached to the document.
10. A method as claimed in Claim 6, characterised in that the generation of the crypto mark represents an integral part of the generation of the document and where it is generated by the same method as the document itself on the part of the carrier of that document designated for that purpose.
11. A method as claimed in Claim 6, characterised in that the generation of the crypto mark is performed by its merging with either the text itself and/or with its graphic part or with the document print background.
12. A method as claimed in Claims 7 to 8, characterised in that the database operations which are being carried out in the DB comparison block involve the contents of both shadow and feedback databases.
13. A method as claimed in Claim 6, characterised in that the cryptographic generation of the crypto stamp in the document inspection block located at the document inspection point is carried out on the basis of data scanned from the crypto mark and data collected at the document inspection point itself.
14. A method as claimed in Claims 6 and 13, characterised in that the crypto stamp becomes affixed to the document and and/or becomes connected with the document.
15. A method as specified in item 6 where the key generation block performs the generation of the encryption and decryption keys and their transmitting by a protected channel through the key distribution block to the document generation and document inspection blocks.
16. A method as claimed in Claim 6, characterised in that the operator performs through the security block the operations required to confirm his/her authorization to perform activities involving the document generation block.
17. A method as claimed in Claim 6, characterised in that the operator performs through the security block the operations required to confirm his/her authorization to perform activities involving the document inspection block.
18. A method as claimed in Claims 16 and 17, characterised in that the operator performs activities required to confirm his/her identity and authorization to perform activities involving the document generation and/or document inspection blocks.
PCT/SK1998/000018 1997-11-24 1998-11-09 The system and method of protection and handling of documents WO1999027503A1 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
HU0100435A HUP0100435A3 (en) 1997-11-24 1998-11-09 The system and method of protection and handling of documents
AU11847/99A AU1184799A (en) 1997-11-24 1998-11-09 The system and method of protection and handling of documents

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
SKPV1584-97 1997-11-24
SK1584-97A SK158497A3 (en) 1997-11-24 1997-11-24 System and method for protecting documents and manipulating therewith

Publications (1)

Publication Number Publication Date
WO1999027503A1 true WO1999027503A1 (en) 1999-06-03

Family

ID=20434689

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/SK1998/000018 WO1999027503A1 (en) 1997-11-24 1998-11-09 The system and method of protection and handling of documents

Country Status (5)

Country Link
AU (1) AU1184799A (en)
HU (1) HUP0100435A3 (en)
PL (1) PL340639A1 (en)
SK (1) SK158497A3 (en)
WO (1) WO1999027503A1 (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE19944595C2 (en) * 1998-05-07 2003-08-14 Sc Info & Inno Gmbh & Co Procedure for verifying the integrity and authorship of texts
EP1744287A1 (en) * 2005-07-13 2007-01-17 Neopost S.A. Methods and systems for signing physical documents and for authenticating signatures on physical documents
US7367048B2 (en) 2003-07-10 2008-04-29 International Business Machines Corporation Apparatus and method for autonomic email access control

Citations (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0084441A2 (en) 1982-01-19 1983-07-27 Tabs Limited Method and apparatus for the protection of proprietary computer software
EP0547837A2 (en) * 1991-12-19 1993-06-23 Xerox Corporation Document copy authentication
US5231663A (en) 1991-03-18 1993-07-27 Earl Joseph G Image processing system
US5243655A (en) 1990-01-05 1993-09-07 Symbol Technologies Inc. System for encoding and decoding data in machine readable graphic form
US5321749A (en) * 1992-09-21 1994-06-14 Richard Virga Encryption device
US5337362A (en) 1993-04-15 1994-08-09 Ricoh Corporation Method and apparatus for placing data onto plain paper
US5388158A (en) * 1992-11-20 1995-02-07 Pitney Bowes Inc. Secure document and method and apparatus for producing and authenticating same
US5486686A (en) 1990-05-30 1996-01-23 Xerox Corporation Hardcopy lossless data storage and communications for electronic document processing systems
US5488664A (en) 1994-04-22 1996-01-30 Yeda Research And Development Co., Ltd. Method and apparatus for protecting visual information with printed cryptographic watermarks
US5490217A (en) 1993-03-05 1996-02-06 Metanetics Corporation Automatic document handling system
US5502575A (en) 1992-08-06 1996-03-26 Matsushita Electric Industrial Co., Ltd. Imaging apparatus having a counterfeiting prevention function
US5530755A (en) * 1993-08-18 1996-06-25 France Telecom Secured apparatus and process for securing the transmission of documents by fax and graphic code for the authentication of an image
EP0782114A2 (en) * 1995-12-29 1997-07-02 International Business Machines Corporation System and method for verifying signatures on documents

Patent Citations (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0084441A2 (en) 1982-01-19 1983-07-27 Tabs Limited Method and apparatus for the protection of proprietary computer software
US5243655A (en) 1990-01-05 1993-09-07 Symbol Technologies Inc. System for encoding and decoding data in machine readable graphic form
US5486686A (en) 1990-05-30 1996-01-23 Xerox Corporation Hardcopy lossless data storage and communications for electronic document processing systems
US5231663A (en) 1991-03-18 1993-07-27 Earl Joseph G Image processing system
EP0547837A2 (en) * 1991-12-19 1993-06-23 Xerox Corporation Document copy authentication
US5502575A (en) 1992-08-06 1996-03-26 Matsushita Electric Industrial Co., Ltd. Imaging apparatus having a counterfeiting prevention function
US5321749A (en) * 1992-09-21 1994-06-14 Richard Virga Encryption device
US5388158A (en) * 1992-11-20 1995-02-07 Pitney Bowes Inc. Secure document and method and apparatus for producing and authenticating same
US5490217A (en) 1993-03-05 1996-02-06 Metanetics Corporation Automatic document handling system
US5337362A (en) 1993-04-15 1994-08-09 Ricoh Corporation Method and apparatus for placing data onto plain paper
US5530755A (en) * 1993-08-18 1996-06-25 France Telecom Secured apparatus and process for securing the transmission of documents by fax and graphic code for the authentication of an image
US5488664A (en) 1994-04-22 1996-01-30 Yeda Research And Development Co., Ltd. Method and apparatus for protecting visual information with printed cryptographic watermarks
EP0782114A2 (en) * 1995-12-29 1997-07-02 International Business Machines Corporation System and method for verifying signatures on documents

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE19944595C2 (en) * 1998-05-07 2003-08-14 Sc Info & Inno Gmbh & Co Procedure for verifying the integrity and authorship of texts
US7367048B2 (en) 2003-07-10 2008-04-29 International Business Machines Corporation Apparatus and method for autonomic email access control
US7844998B2 (en) 2003-07-10 2010-11-30 International Business Machines Corporation Apparatus and method for autonomic email access control
EP1744287A1 (en) * 2005-07-13 2007-01-17 Neopost S.A. Methods and systems for signing physical documents and for authenticating signatures on physical documents

Also Published As

Publication number Publication date
HUP0100435A2 (en) 2001-05-28
HUP0100435A3 (en) 2002-12-28
SK158497A3 (en) 1999-07-12
PL340639A1 (en) 2001-02-12
AU1184799A (en) 1999-06-15

Similar Documents

Publication Publication Date Title
US11188898B2 (en) System and method for providing secure identification solutions
CA2242671C (en) Method of preventing counterfeiting of articles of manufacture
US8059858B2 (en) Identification document and related methods
US20060157559A1 (en) Systems and methods for document verification
US20030116630A1 (en) Encrypted biometric encoded security documents
US20050132194A1 (en) Protection of identification documents using open cryptography
US20030117262A1 (en) Encrypted biometric encoded security documents
US20050087604A1 (en) Licensing and identification devices having coded marks and methods of making and authenticating such licensing and identification devices
CN108122119A (en) Product certification method
WO2007072044A1 (en) Optical authentication
US20110038012A1 (en) Method and device against forgery
WO2007091057A1 (en) Authentication of cheques and the like
WO1999027503A1 (en) The system and method of protection and handling of documents
CN107534553A (en) The re-authentication of certificate
EA002518B1 (en) Method of confirmation of information authenticity
GB2358115A (en) Method and system for remote printing of duplication resistent documents
CZ20001907A3 (en) System and method of protecting documents
Wilson The “Security Printer” model for CA operations
EA007836B1 (en) Protection system of authenticity of printed information carrier
UA73244C2 (en) Method for protecting documents presented on paper data carriers (method "atlas-krystal")

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): AL AM AT AU AZ BG BR BY CA CH CN CU CZ DE DK EE ES FI GB GE HR HU ID IL JP KG KR KZ LT LV MD MK MN MX NO NZ PL PT RO RU SE SI TM TR UA US UZ VN YU

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE

121 Ep: the epo has been informed by wipo that ep was designated in this application
DFPE Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101)
NENP Non-entry into the national phase

Ref country code: KR

WWE Wipo information: entry into national phase

Ref document number: PV2000-1907

Country of ref document: CZ

REG Reference to national code

Ref country code: DE

Ref legal event code: 8642

WWP Wipo information: published in national office

Ref document number: PV2000-1907

Country of ref document: CZ

122 Ep: pct application non-entry in european phase
NENP Non-entry into the national phase

Ref country code: CA

WWR Wipo information: refused in national office

Ref document number: PV2000-1907

Country of ref document: CZ