[go: up one dir, main page]

CN118631475B - AI synthetic information traceability authentication method based on digital certificate - Google Patents

AI synthetic information traceability authentication method based on digital certificate Download PDF

Info

Publication number
CN118631475B
CN118631475B CN202411035218.0A CN202411035218A CN118631475B CN 118631475 B CN118631475 B CN 118631475B CN 202411035218 A CN202411035218 A CN 202411035218A CN 118631475 B CN118631475 B CN 118631475B
Authority
CN
China
Prior art keywords
information
user
entity
digital certificate
synthetic
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202411035218.0A
Other languages
Chinese (zh)
Other versions
CN118631475A (en
Inventor
刘亚
武志亮
宋瑞东
郑巍
高晋未
赵敏杰
贾珍珍
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanxi Digital Certificate Certification Center Co Ltd
Original Assignee
Shanxi Digital Certificate Certification Center Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanxi Digital Certificate Certification Center Co Ltd filed Critical Shanxi Digital Certificate Certification Center Co Ltd
Priority to CN202411035218.0A priority Critical patent/CN118631475B/en
Publication of CN118631475A publication Critical patent/CN118631475A/en
Application granted granted Critical
Publication of CN118631475B publication Critical patent/CN118631475B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0823Network architectures or network communication protocols for network security for authentication of entities using certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0884Network architectures or network communication protocols for network security for authentication of entities by delegation of authentication, e.g. a proxy authenticates an entity to be authenticated on behalf of this entity vis-à-vis an authentication entity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3263Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
    • H04L9/3268Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements using certificate validation, registration, distribution or revocation, e.g. certificate revocation list [CRL]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/40Network security protocols
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/72Signcrypting, i.e. digital signing and encrypting simultaneously
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2463/00Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
    • H04L2463/146Tracing the source of attacks

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention relates to the technical field of information security, in particular to an AI synthetic information traceability authentication method based on a digital certificate, which comprises an AI synthetic system, a user, an entity, a CA mechanism and a signature verification server, and comprises the following steps: when the user synthesizes information by using the AI synthesis system, the user communicates with the related entity to ensure the informed consent of the entity; the user, the entity and the AI synthesis system apply for the digital certificate to the CA mechanism respectively; binding a digital certificate of a user with an AI synthesis system account and logging in; the user uses an AI synthesis system to synthesize information, and adds a tracing certificate to the synthesized information; and the entity applies for and obtains the synthesized information traceability service from the AI synthesis system. The invention combines the digital certificate and the authentication technology to attach the tracing certificate to the AI synthetic information, and ensures the authenticity of entity identity related to the synthetic information, the integrity of the synthetic information and the non-repudiation of the synthetic content release by means of the tracing certificate.

Description

AI synthetic information traceability authentication method based on digital certificate
Technical Field
The invention relates to the technical field of information security, in particular to an AI synthetic information traceability authentication method based on a digital certificate.
Background
With the continuous perfection of the depth synthesis technology, people can apply the AI technology to realize the generation or editing of biological characteristics such as faces in images and videos, such as face generation, face replacement, face control, gesture control and the like. While the use of AI composition information offers many convenience and innovation possibilities, there are also potential technical abuse and safety hazards. The lawbreaker can easily forge the audio and video, implement frame, defacement, fraud, luxury and other illegal actions, and even confuse the national political VIP language to disturb the social and political order. With the continuous improvement of synthesis quality, the traditional identification mode based on biological characteristics is more and more difficult to play a role. Therefore, AI application security issues need to be addressed from the source.
The sixteenth rule of depth composition service provider of internet information service depth composition management rule for information contents generated or edited using its service should take technical measures to add an identification which does not affect the use of the user and save log information according to laws, administrative laws and regulations and country-related rules. All AI technologies and standards now rely on labeling, and the underlying sample is manually labeled with various information. In certain cases, the possibility of data tracing can be provided by the marking made, but the authenticity and validity of the tracing of the synthetic information cannot be ensured.
Disclosure of Invention
In order to solve the problems, the invention provides an AI synthetic information traceability authentication method based on a digital certificate, wherein a traceability certificate is added to the AI synthetic information by combining the digital certificate with an authentication technology, and the authenticity of entity identity related to the synthetic information, the integrity of the synthetic information and the non-repudiation of the release of synthetic content are ensured by means of the traceability certificate.
In order to achieve the above purpose, the technical scheme of the invention is as follows: the AI synthetic information traceability authentication method based on the digital certificate comprises an AI synthetic system, a user using the AI synthetic system to synthesize information, an entity involved in the synthetic information, a CA mechanism and a signature verification server, and comprises the following steps:
S1: when the user synthesizes information by using the AI synthesis system, the user communicates with the entity involved in the synthesis information to ensure the informed consent of the entity;
s2: the user, the entity and the AI synthesis system apply for the digital certificate to the CA mechanism respectively, and the CA mechanism calls the signature verification server to issue the digital certificate after verifying the identity so as to provide the signature verification service;
s3: binding a digital certificate of a user with an AI synthesis system account and logging in;
s4: the user uses an AI synthesis system to synthesize information, the AI synthesis system issues entity informed consent, the user and entity identity are verified through a signature verification server, and a tracing certificate is added to the synthesized information after signature and verification;
s5, performing S5; and the entity applies for and obtains the synthesized information traceability service from the AI synthesis system.
As a further aspect of the invention: the entity comprises a real person, an organization or a community involved in synthesizing information, and the CA organization manages the life cycle of the digital certificate.
As still further aspects of the invention: the binding process of the digital certificate of the user and the account of the AI synthesis system comprises the steps that the user registers and logs in the AI synthesis system, the AI synthesis system identifies whether the user owns the digital certificate, if the user does not have the digital certificate, the AI synthesis system prompts the user to transact the digital certificate, if the user owns the digital certificate, the AI synthesis system identifies whether the digital certificate of the user is valid, if the digital certificate of the user is invalid, the user applies the digital certificate to a CA (certificate authority) entity, the CA entity audits and issues the digital certificate of the user, and if the digital certificate of the user is valid, the digital certificate of the user is bound with the account of the AI synthesis system.
As still further aspects of the invention: when the user uses the AI synthesis system to synthesize information, the AI synthesis system judges whether the data elements used during synthesis contain portrait or voice information, if so, the AI system displays information to be downloaded by the user by using an informed consent form, and the user signs the synthesis information by using an effective digital certificate; because the sizes of the synthetic information are different, the CA mechanism and the AI synthesis system agree on a summary calculation and signature strategy of the synthetic information, the AI synthesis system provides unique codes for the synthetic information, the codes of the synthetic information, the names of the AI synthesis system and the summary of the synthetic information form unique labels of the synthetic information, and the AI synthesis system signs the labels of the synthetic information by using the valid digital certificates; and splicing and storing the synthesized information, the signature of the synthesized information by the user and the signature of the synthesized information tag by the AI synthesis system.
As still further aspects of the invention: the signing process of the entity informed consent comprises the steps that a user downloads the entity informed consent provided by an AI system and containing the unique code of the synthetic information, and the entity informed consent, the synthetic information and the signature of the user on the synthetic information are sent to related entities together; the related entity performs signature verification on the signature of the synthesized information, verifies the authenticity and the integrity of the synthesized information and the identity of the user, if the signature verification is passed, the related entity uses an electronic signature system to sign the informed consent form and sends the electronic file of the signed informed consent form to the user, and if the related entity does not recognize or verify the synthesized information, the entity can refuse to sign on the informed consent form; the user verifies the signature of the entity, and if the signature passes, the signed informed consent is uploaded to an AI synthesis system; if the verification signature does not pass, the signature of the relevant entity on the informed consent is invalid.
As still further aspects of the invention: the specific tracing voucher is added to the AI synthesis information, a tracing voucher data type TraceabilityData designed according to the application scene requirement of the actual AI synthesis information is adopted, wherein the ContentInfo content is TTSInfo type defined for information tracing and comprises user signature data, AI synthesis system signature data and related entity signature data, the content of the user signature data is an information original text or an information abstract synthesized by a user through the AI synthesis system, the content of the AI synthesis system signature data is a unique label generated by the AI synthesis system for the synthesis information, and the content of the entity signature data is entity informed consent.
As still further aspects of the invention: when the synthesized information needs to be traced, a verifier carries out tracing application according to an AI system identifier and an information unique code attached to the synthesized information, an AI synthesis system receives and processes the application, analyzes according to tracing credentials attached to the synthesized information, and provides an informed consent if the informed consent is available; and if the related entity knows that the consent is missing, providing the identity information of the composite information signature user.
Compared with the prior art, the invention has the beneficial effects that:
1. The invention can ensure the authenticity of the identity of the related entity involved in the AI synthetic information based on the digital certificate, thereby ensuring the knowledge of the entity to the AI synthetic information and promoting the correct use of the AI synthetic technique;
2. according to the invention, the digital certificate is combined with the authentication technology, the traceability certificate is added for the AI synthetic information, the traceability certificate can carry out traceability authentication on the AI synthetic information, the authenticity of entity identity related to the synthetic information, the integrity of the synthetic information and the undeniability of the release of the synthetic content are ensured by means of the traceability certificate, illegal abuse of the AI deep synthesis technology is effectively prevented, and the potential safety hazard caused by incapability of distinguishing the authenticity of the synthetic information is reduced.
Drawings
FIG. 1 is an overall block diagram of a participant of the present invention;
FIG. 2 is an overall flow chart of the present invention;
FIG. 3 is a flow chart of binding a user's digital certificate with an AI-synthesis system account in accordance with the invention;
FIG. 4 is a flow chart of the present invention when a user performs information synthesis using the AI synthesis system;
FIG. 5 is a flow chart of the entity informed consent signature of the present invention;
FIG. 6 is a flow chart of the invention for tracing the synthesized information.
Detailed Description
The following description of the embodiments of the present invention will be made clearly and completely with reference to the accompanying drawings, in which it is apparent that the embodiments described are only some embodiments of the present invention, but not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
Example 1
Referring to fig. 1 to 2, an AI composition information traceability authentication method based on a digital certificate includes an AI composition system, a user who uses the AI composition system to perform information composition, an entity involved in composition information, a CA mechanism and a signature verification server, including the steps of:
S1: when the user synthesizes information by using the AI synthesis system, the user communicates with the entity involved in the synthesis information to ensure the informed consent of the entity;
s2: the user, the entity and the AI synthesis system apply for the digital certificate to the CA mechanism respectively, and the CA mechanism calls the signature verification server to issue the digital certificate after verifying the identity so as to provide the signature verification service;
s3: binding a digital certificate of a user with an AI synthesis system account and logging in;
s4: the user uses an AI synthesis system to synthesize information, the AI synthesis system issues entity informed consent, the user and entity identity are verified through a signature verification server, and a tracing certificate is added to the synthesized information after signature and verification;
s5, performing S5; and the entity applies for and obtains the synthesized information traceability service from the AI synthesis system.
The entity includes a real person, organization or community involved in synthesizing information, and the CA organization manages the lifecycle of the digital certificates.
Referring to fig. 3, the process of binding the digital certificate of the user with the account of the AI synthesis system includes that the user registers and logs in the AI synthesis system, the AI synthesis system identifies whether the user owns the digital certificate, if the user does not have the digital certificate, the AI synthesis system prompts the user to transact the digital certificate, if the user owns the digital certificate, the AI synthesis system identifies whether the digital certificate of the user is valid, if the digital certificate of the user is invalid, the user applies the digital certificate to the CA mechanism, the CA mechanism audits and issues the digital certificate of the user, and if the digital certificate of the user is valid, the digital certificate of the user is bound with the account of the AI synthesis system.
Referring to fig. 4, when a user synthesizes information using an AI synthesis system, the AI synthesis system judges whether a data element used in the synthesis contains portrait or voice information, if so, the AI system displays information using an informed consent form for the user to download, and the user signs the synthesized information using an effective digital certificate; because the sizes of the synthetic information are different, the CA mechanism and the AI synthesis system agree on a summary calculation and signature strategy of the synthetic information, the AI synthesis system provides unique codes for the synthetic information, the codes of the synthetic information, the names of the AI synthesis system and the summary of the synthetic information form unique labels of the synthetic information, and the AI synthesis system signs the labels of the synthetic information by using the valid digital certificates; and splicing and storing the synthesized information, the signature of the synthesized information by the user and the signature of the synthesized information tag by the AI synthesis system.
Referring to fig. 5, the entity informed consent form signing process includes that a user downloads an entity informed consent form provided by an AI system and including a unique code of synthetic information, and sends the entity informed consent form, the synthetic information and a signature of the user on the synthetic information to a related entity; the related entity performs signature verification on the signature of the synthesized information, verifies the authenticity and the integrity of the synthesized information and the identity of the user, if the signature verification is passed, the related entity uses an electronic signature system to sign the informed consent form and sends the electronic file of the signed informed consent form to the user, and if the related entity does not recognize or verify the synthesized information, the entity can refuse to sign on the informed consent form; the user verifies the signature of the entity, and if the signature passes, the signed informed consent is uploaded to an AI synthesis system; if the verification signature does not pass, the signature of the relevant entity on the informed consent is invalid.
Referring to fig. 6, when the synthesized information needs to be traced, the verifier applies for tracing according to the unique code of the synthesized information, the AI synthesis system receives and processes the application, analyzes according to the tracing evidence attached to the synthesized information, and provides an informed consent if the informed consent of the related entity exists; and if the related entity knows that the consent is missing, providing the identity information of the composite information signature user.
Example 2
The specific data format is needed to be adopted for adding the tracing voucher to the AI synthetic information, and the embodiment designs the data type TraceabilityData of the tracing voucher of the AI synthetic information according to the application scene of the actual AI synthetic information.
The ASN.1 data structure is as follows:
TraceabilityData ::= SEQUENCE{
version Version,
signatureAlgorithm AlgorithmIdentifier,
contentInfo ContentInfo,
timestampToken TimeStampToken OPTIONAL
}
Wherein,
Version designates the syntax Version number, and the method sets a value of 1.
Version ::= INTEGER(1)
AlgorithmIdentifier is used to identify signature algorithm, specifically, national encryption algorithm based on SM2 algorithm and SM3 algorithm, its OID is 1.2.156.10197.1.501, and its parameter is NULL.
AlgorithmIdentifier ::= SEQUENCE{
Algorithm OBJECT IDENTIFIER,
parameters NULL
}
ContentInfo designates the content type, specifically AI composition information traceability certificate, and its OID is registered with the national OID registry. Content is TTSInfo type defined for trace (Trace To the Source) information, including user signature data, AI composition system signature data, and related entity signature data. The signature data type adopts SIGNEDDATA data type in national standard GB_T 35275-2017 information security technology SM2 cryptographic algorithm encryption signature message grammar Specification. Any type of data can be signed by any number of signers at the same time.
ContentInfo ::= SEQUENCE{
contentType ContentType,
content TTSInfo
}
ContentType ::= OBJECT IDENTIFIER
TTSInfo::= SET OF SignedData
}
SignedData ::= SEQUENCE{
versionVersion,
digestAlgorithms DigestAlgorithmIdentifiers,
contentInfo ContentInfo,
certificates[0] IMPLICIT ExtendedCertificatesAndCertificates OPTIONAL,
crl[1] IMPLICIT CertificateRevocationLists OPTIONAL,
signerInfos SignerInfos
}
DigestAlgorithmIdentifiers ::= SET OF DigestAlgorithmIdentifier
SignerInfos ::= SET OF SignerInfo
SignerInfo :: SEQUENCE{
versionVersion,
issuerAndSerialNumber IssuerAndSerialNumber,
digestAlgorithm DigestAlgorithmIdentifier,
authenticatedAttributes[0] IMPLICIT Attributes OPTIONAL,
digestEncryptionAlgorithm DigestEncryptionAlgorithmIdentifier,
encryptedDigest EncryptedDigest,
unauthenticatedAttributes[1] IMPLICIT Attributes OPTIONAL
}
EncryptedDigest ::=OCTET STRING
ENCRYPTEDDIGEST adopts the SM2Signature data format in national standard GB_T 35276-2017 information security technology SM2 cryptographic algorithm usage Specification.
SM2Signature ::= SEQUENCE{
R INTEGRER-first part of signature value
S INTEGRER, second part of signature value
}
The user signature data type is SIGNEDDATA, wherein the content of the contentffo is the information original text or information abstract synthesized by the user by using the AI synthesis system, and the specific content is determined by abstract calculation and signature strategy agreed by the CA and the AI synthesis system.
The AI composition system signature data type is SIGNEDDATA, where the content of contentffo is the unique tag that the AI composition system generates for the composition information.
The entity signature data type is SIGNEDDATA, wherein the content of the contentInfo is the entity informed consent.
TimeStampToken adopts the structure in the timestamp response message in the national standard GB_T 20520-2006 public key infrastructure timestamp Specification for information security technology. Wherein MESSAGEIMPRINT fields are hashed values of TTSInfo data.
Although embodiments of the present invention have been shown and described, it will be understood by those skilled in the art that various changes, modifications, substitutions and alterations can be made therein without departing from the principles and spirit of the invention, the scope of which is defined in the appended claims and their equivalents.

Claims (6)

1. The AI synthetic information traceability authentication method based on the digital certificate comprises an AI synthetic system, a user using the AI synthetic system to synthesize information, an entity involved in the synthetic information, a CA mechanism and a signature verification server, and is characterized in that: the method comprises the following steps:
S1: when the user synthesizes information by using the AI synthesis system, the user communicates with the entity involved in the synthesis information to ensure the informed consent of the entity;
s2: the user, the entity and the AI synthesis system apply for the digital certificate to the CA mechanism respectively, and the CA mechanism calls the signature verification server to issue the digital certificate after verifying the identity so as to provide the signature verification service;
s3: binding a digital certificate of a user with an AI synthesis system account and logging in;
s4: the user uses an AI synthesis system to synthesize information, the AI synthesis system issues entity informed consent, the user and entity identity are verified through a signature verification server, and a tracing certificate is added to the synthesized information after signature and verification;
When the user uses the AI synthesis system to synthesize information, the AI synthesis system judges whether the data elements used during synthesis contain portrait or voice information, if so, the AI system displays information to be downloaded by the user by using an informed consent form, and the user signs the synthesis information by using an effective digital certificate; because the sizes of the synthetic information are different, the CA mechanism and the AI synthesis system agree on a summary calculation and signature strategy of the synthetic information, the AI synthesis system provides unique codes for the synthetic information, the codes of the synthetic information, the names of the AI synthesis system and the summary of the synthetic information form unique labels of the synthetic information, and the AI synthesis system signs the labels of the synthetic information by using the valid digital certificates; the synthetic information, the signature of the user on the synthetic information and the signature of the synthetic information label are spliced and stored by an AI synthetic system;
The signing process of the entity informed consent comprises the steps that a user downloads the entity informed consent provided by an AI system and containing the unique code of the synthetic information, and the entity informed consent, the synthetic information and the signature of the user on the synthetic information are sent to related entities together; the related entity performs signature verification on the signature of the synthesized information, verifies the authenticity and the integrity of the synthesized information and the identity of the user, if the signature verification is passed, the related entity uses an electronic signature system to sign the informed consent form and sends the electronic file of the signed informed consent form to the user, and if the related entity does not recognize or verify the synthesized information, the entity can refuse to sign on the informed consent form; the user verifies the signature of the entity, and if the signature passes, the signed informed consent is uploaded to an AI synthesis system; if the verification signature does not pass, the signature of the related entity on the informed consent is invalid;
S5: and the entity applies for and obtains the synthesized information traceability service from the AI synthesis system.
2. The AI-synthesis-information-traceability-authentication method based on the digital certificate of claim 1, wherein the AI-synthesis-information-traceability-authentication method is characterized by: the entity comprises the actual person, institution or community involved in synthesizing the information.
3. The AI-synthesis-information-traceability-authentication method based on the digital certificate of claim 2, wherein the AI-synthesis-information-traceability-authentication method is characterized by: the CA institution manages the lifecycle of the digital certificate.
4. The AI-composition-information-traceability-authentication method based on digital certificates of claim 3, wherein: the binding process of the digital certificate of the user and the account of the AI synthesis system comprises the steps that the user registers and logs in the AI synthesis system, the AI synthesis system identifies whether the user owns the digital certificate, if the user does not have the digital certificate, the AI synthesis system prompts the user to transact the digital certificate, if the user owns the digital certificate, the AI synthesis system identifies whether the digital certificate of the user is valid, if the digital certificate of the user is invalid, the user applies the digital certificate to a CA (certificate authority) entity, the CA entity audits and issues the digital certificate of the user, and if the digital certificate of the user is valid, the digital certificate of the user is bound with the account of the AI synthesis system.
5. The digital certificate-based AI composition information traceability authentication method of claim 4, wherein: and the traceability certificate added for the signed and checked synthetic information adopts a specific synthetic information traceability certificate data format.
6. The digital certificate-based AI composition information traceability authentication method of claim 5, wherein: when the synthesized information needs to be traced, a verifier carries out tracing application according to an AI system identifier and an information unique code attached to the synthesized information, an AI synthesis system receives and processes the application, analyzes according to tracing credentials attached to the synthesized information, and provides an informed consent if the informed consent is available; and if the related entity knows that the consent is missing, providing the identity information of the composite information signature user.
CN202411035218.0A 2024-07-31 2024-07-31 AI synthetic information traceability authentication method based on digital certificate Active CN118631475B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202411035218.0A CN118631475B (en) 2024-07-31 2024-07-31 AI synthetic information traceability authentication method based on digital certificate

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202411035218.0A CN118631475B (en) 2024-07-31 2024-07-31 AI synthetic information traceability authentication method based on digital certificate

Publications (2)

Publication Number Publication Date
CN118631475A CN118631475A (en) 2024-09-10
CN118631475B true CN118631475B (en) 2024-11-22

Family

ID=92599692

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202411035218.0A Active CN118631475B (en) 2024-07-31 2024-07-31 AI synthetic information traceability authentication method based on digital certificate

Country Status (1)

Country Link
CN (1) CN118631475B (en)

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105681035A (en) * 2016-03-04 2016-06-15 河北腾翔软件科技有限公司 Security authorization method which solves problem that certificate private key is reused by multiple users
CN111277417A (en) * 2020-01-15 2020-06-12 浙江华云信息科技有限公司 Electronic signature implementation method based on national network security technology architecture

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7607008B2 (en) * 2004-04-01 2009-10-20 Microsoft Corporation Authentication broker service
US11096059B1 (en) * 2019-08-04 2021-08-17 Acceptto Corporation System and method for secure touchless authentication of user paired device, behavior and identity
CN113935073A (en) * 2021-10-15 2022-01-14 杭州电子科技大学 Seal generation and verification method supporting main body and content authentication
AT525728B1 (en) * 2022-02-04 2023-07-15 Primesign Gmbh Method and device for creating electronic signatures
CN118214586A (en) * 2024-03-04 2024-06-18 浙江大华技术股份有限公司 Identity authentication method, system, equipment and storage medium

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105681035A (en) * 2016-03-04 2016-06-15 河北腾翔软件科技有限公司 Security authorization method which solves problem that certificate private key is reused by multiple users
CN111277417A (en) * 2020-01-15 2020-06-12 浙江华云信息科技有限公司 Electronic signature implementation method based on national network security technology architecture

Also Published As

Publication number Publication date
CN118631475A (en) 2024-09-10

Similar Documents

Publication Publication Date Title
US12015718B2 (en) Method and system for signing and authenticating electronic documents via a signature authority which may act in concert with software controlled by the signer
US11212117B2 (en) Tamper-resistant software development lifecycle provenance
CN107959568B (en) A method and system for intelligently generating an electronic certificate for metrological verification and calibration
CN112199721A (en) Authentication information processing method, device, equipment and storage medium
Baldi et al. Security analysis of a blockchain-based protocol for the certification of academic credentials
US20020038290A1 (en) Digital notary system and method
CN112364385B (en) OFD format real estate electronic certificate file signature method and system
US8782397B2 (en) Compact attribute for cryptographically protected messages
CA2428665A1 (en) Web-based method and system for applying a legally enforceable signature on an electronic document
CN111224788A (en) A blockchain-based electronic contract management method, device and system
CN111461917B (en) Power system material contract management system based on block chain
CN103795546A (en) Generating method and authentication method of data label and system of generating method and authentication method
CN105825446A (en) Internet jury system
CN112561746B (en) Electronic signing method, device, terminal and storage medium
EP2262165B1 (en) User generated content registering method, apparatus and system
CN116226824A (en) Electronic contract signing method and system based on blockchain and CA certificate
CN117390693A (en) Platform and method for mutual recognition of electronic signatures
CN110677259A (en) Full-link real-time notarization system and method for electronic contract
CN104168117B (en) A kind of speech digit endorsement method
CN118631475B (en) AI synthetic information traceability authentication method based on digital certificate
KR101355077B1 (en) System for creating and certifying the original of digital contents and method thereof
CN114900302B (en) Anonymous certificate issuing method
CN101552903B (en) Television program distribution method and system
KR100568081B1 (en) Digital Contents Authentication and Control System Using Certificate
CN114638009B (en) An electronic signature system applicable to public key cryptography technology and supporting commercial cryptographic algorithms

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant