CN118631475B - AI synthetic information traceability authentication method based on digital certificate - Google Patents
AI synthetic information traceability authentication method based on digital certificate Download PDFInfo
- Publication number
- CN118631475B CN118631475B CN202411035218.0A CN202411035218A CN118631475B CN 118631475 B CN118631475 B CN 118631475B CN 202411035218 A CN202411035218 A CN 202411035218A CN 118631475 B CN118631475 B CN 118631475B
- Authority
- CN
- China
- Prior art keywords
- information
- user
- entity
- digital certificate
- synthetic
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0823—Network architectures or network communication protocols for network security for authentication of entities using certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0884—Network architectures or network communication protocols for network security for authentication of entities by delegation of authentication, e.g. a proxy authenticates an entity to be authenticated on behalf of this entity vis-à-vis an authentication entity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3263—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
- H04L9/3268—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements using certificate validation, registration, distribution or revocation, e.g. certificate revocation list [CRL]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/40—Network security protocols
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/72—Signcrypting, i.e. digital signing and encrypting simultaneously
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2463/00—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
- H04L2463/146—Tracing the source of attacks
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The invention relates to the technical field of information security, in particular to an AI synthetic information traceability authentication method based on a digital certificate, which comprises an AI synthetic system, a user, an entity, a CA mechanism and a signature verification server, and comprises the following steps: when the user synthesizes information by using the AI synthesis system, the user communicates with the related entity to ensure the informed consent of the entity; the user, the entity and the AI synthesis system apply for the digital certificate to the CA mechanism respectively; binding a digital certificate of a user with an AI synthesis system account and logging in; the user uses an AI synthesis system to synthesize information, and adds a tracing certificate to the synthesized information; and the entity applies for and obtains the synthesized information traceability service from the AI synthesis system. The invention combines the digital certificate and the authentication technology to attach the tracing certificate to the AI synthetic information, and ensures the authenticity of entity identity related to the synthetic information, the integrity of the synthetic information and the non-repudiation of the synthetic content release by means of the tracing certificate.
Description
Technical Field
The invention relates to the technical field of information security, in particular to an AI synthetic information traceability authentication method based on a digital certificate.
Background
With the continuous perfection of the depth synthesis technology, people can apply the AI technology to realize the generation or editing of biological characteristics such as faces in images and videos, such as face generation, face replacement, face control, gesture control and the like. While the use of AI composition information offers many convenience and innovation possibilities, there are also potential technical abuse and safety hazards. The lawbreaker can easily forge the audio and video, implement frame, defacement, fraud, luxury and other illegal actions, and even confuse the national political VIP language to disturb the social and political order. With the continuous improvement of synthesis quality, the traditional identification mode based on biological characteristics is more and more difficult to play a role. Therefore, AI application security issues need to be addressed from the source.
The sixteenth rule of depth composition service provider of internet information service depth composition management rule for information contents generated or edited using its service should take technical measures to add an identification which does not affect the use of the user and save log information according to laws, administrative laws and regulations and country-related rules. All AI technologies and standards now rely on labeling, and the underlying sample is manually labeled with various information. In certain cases, the possibility of data tracing can be provided by the marking made, but the authenticity and validity of the tracing of the synthetic information cannot be ensured.
Disclosure of Invention
In order to solve the problems, the invention provides an AI synthetic information traceability authentication method based on a digital certificate, wherein a traceability certificate is added to the AI synthetic information by combining the digital certificate with an authentication technology, and the authenticity of entity identity related to the synthetic information, the integrity of the synthetic information and the non-repudiation of the release of synthetic content are ensured by means of the traceability certificate.
In order to achieve the above purpose, the technical scheme of the invention is as follows: the AI synthetic information traceability authentication method based on the digital certificate comprises an AI synthetic system, a user using the AI synthetic system to synthesize information, an entity involved in the synthetic information, a CA mechanism and a signature verification server, and comprises the following steps:
S1: when the user synthesizes information by using the AI synthesis system, the user communicates with the entity involved in the synthesis information to ensure the informed consent of the entity;
s2: the user, the entity and the AI synthesis system apply for the digital certificate to the CA mechanism respectively, and the CA mechanism calls the signature verification server to issue the digital certificate after verifying the identity so as to provide the signature verification service;
s3: binding a digital certificate of a user with an AI synthesis system account and logging in;
s4: the user uses an AI synthesis system to synthesize information, the AI synthesis system issues entity informed consent, the user and entity identity are verified through a signature verification server, and a tracing certificate is added to the synthesized information after signature and verification;
s5, performing S5; and the entity applies for and obtains the synthesized information traceability service from the AI synthesis system.
As a further aspect of the invention: the entity comprises a real person, an organization or a community involved in synthesizing information, and the CA organization manages the life cycle of the digital certificate.
As still further aspects of the invention: the binding process of the digital certificate of the user and the account of the AI synthesis system comprises the steps that the user registers and logs in the AI synthesis system, the AI synthesis system identifies whether the user owns the digital certificate, if the user does not have the digital certificate, the AI synthesis system prompts the user to transact the digital certificate, if the user owns the digital certificate, the AI synthesis system identifies whether the digital certificate of the user is valid, if the digital certificate of the user is invalid, the user applies the digital certificate to a CA (certificate authority) entity, the CA entity audits and issues the digital certificate of the user, and if the digital certificate of the user is valid, the digital certificate of the user is bound with the account of the AI synthesis system.
As still further aspects of the invention: when the user uses the AI synthesis system to synthesize information, the AI synthesis system judges whether the data elements used during synthesis contain portrait or voice information, if so, the AI system displays information to be downloaded by the user by using an informed consent form, and the user signs the synthesis information by using an effective digital certificate; because the sizes of the synthetic information are different, the CA mechanism and the AI synthesis system agree on a summary calculation and signature strategy of the synthetic information, the AI synthesis system provides unique codes for the synthetic information, the codes of the synthetic information, the names of the AI synthesis system and the summary of the synthetic information form unique labels of the synthetic information, and the AI synthesis system signs the labels of the synthetic information by using the valid digital certificates; and splicing and storing the synthesized information, the signature of the synthesized information by the user and the signature of the synthesized information tag by the AI synthesis system.
As still further aspects of the invention: the signing process of the entity informed consent comprises the steps that a user downloads the entity informed consent provided by an AI system and containing the unique code of the synthetic information, and the entity informed consent, the synthetic information and the signature of the user on the synthetic information are sent to related entities together; the related entity performs signature verification on the signature of the synthesized information, verifies the authenticity and the integrity of the synthesized information and the identity of the user, if the signature verification is passed, the related entity uses an electronic signature system to sign the informed consent form and sends the electronic file of the signed informed consent form to the user, and if the related entity does not recognize or verify the synthesized information, the entity can refuse to sign on the informed consent form; the user verifies the signature of the entity, and if the signature passes, the signed informed consent is uploaded to an AI synthesis system; if the verification signature does not pass, the signature of the relevant entity on the informed consent is invalid.
As still further aspects of the invention: the specific tracing voucher is added to the AI synthesis information, a tracing voucher data type TraceabilityData designed according to the application scene requirement of the actual AI synthesis information is adopted, wherein the ContentInfo content is TTSInfo type defined for information tracing and comprises user signature data, AI synthesis system signature data and related entity signature data, the content of the user signature data is an information original text or an information abstract synthesized by a user through the AI synthesis system, the content of the AI synthesis system signature data is a unique label generated by the AI synthesis system for the synthesis information, and the content of the entity signature data is entity informed consent.
As still further aspects of the invention: when the synthesized information needs to be traced, a verifier carries out tracing application according to an AI system identifier and an information unique code attached to the synthesized information, an AI synthesis system receives and processes the application, analyzes according to tracing credentials attached to the synthesized information, and provides an informed consent if the informed consent is available; and if the related entity knows that the consent is missing, providing the identity information of the composite information signature user.
Compared with the prior art, the invention has the beneficial effects that:
1. The invention can ensure the authenticity of the identity of the related entity involved in the AI synthetic information based on the digital certificate, thereby ensuring the knowledge of the entity to the AI synthetic information and promoting the correct use of the AI synthetic technique;
2. according to the invention, the digital certificate is combined with the authentication technology, the traceability certificate is added for the AI synthetic information, the traceability certificate can carry out traceability authentication on the AI synthetic information, the authenticity of entity identity related to the synthetic information, the integrity of the synthetic information and the undeniability of the release of the synthetic content are ensured by means of the traceability certificate, illegal abuse of the AI deep synthesis technology is effectively prevented, and the potential safety hazard caused by incapability of distinguishing the authenticity of the synthetic information is reduced.
Drawings
FIG. 1 is an overall block diagram of a participant of the present invention;
FIG. 2 is an overall flow chart of the present invention;
FIG. 3 is a flow chart of binding a user's digital certificate with an AI-synthesis system account in accordance with the invention;
FIG. 4 is a flow chart of the present invention when a user performs information synthesis using the AI synthesis system;
FIG. 5 is a flow chart of the entity informed consent signature of the present invention;
FIG. 6 is a flow chart of the invention for tracing the synthesized information.
Detailed Description
The following description of the embodiments of the present invention will be made clearly and completely with reference to the accompanying drawings, in which it is apparent that the embodiments described are only some embodiments of the present invention, but not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
Example 1
Referring to fig. 1 to 2, an AI composition information traceability authentication method based on a digital certificate includes an AI composition system, a user who uses the AI composition system to perform information composition, an entity involved in composition information, a CA mechanism and a signature verification server, including the steps of:
S1: when the user synthesizes information by using the AI synthesis system, the user communicates with the entity involved in the synthesis information to ensure the informed consent of the entity;
s2: the user, the entity and the AI synthesis system apply for the digital certificate to the CA mechanism respectively, and the CA mechanism calls the signature verification server to issue the digital certificate after verifying the identity so as to provide the signature verification service;
s3: binding a digital certificate of a user with an AI synthesis system account and logging in;
s4: the user uses an AI synthesis system to synthesize information, the AI synthesis system issues entity informed consent, the user and entity identity are verified through a signature verification server, and a tracing certificate is added to the synthesized information after signature and verification;
s5, performing S5; and the entity applies for and obtains the synthesized information traceability service from the AI synthesis system.
The entity includes a real person, organization or community involved in synthesizing information, and the CA organization manages the lifecycle of the digital certificates.
Referring to fig. 3, the process of binding the digital certificate of the user with the account of the AI synthesis system includes that the user registers and logs in the AI synthesis system, the AI synthesis system identifies whether the user owns the digital certificate, if the user does not have the digital certificate, the AI synthesis system prompts the user to transact the digital certificate, if the user owns the digital certificate, the AI synthesis system identifies whether the digital certificate of the user is valid, if the digital certificate of the user is invalid, the user applies the digital certificate to the CA mechanism, the CA mechanism audits and issues the digital certificate of the user, and if the digital certificate of the user is valid, the digital certificate of the user is bound with the account of the AI synthesis system.
Referring to fig. 4, when a user synthesizes information using an AI synthesis system, the AI synthesis system judges whether a data element used in the synthesis contains portrait or voice information, if so, the AI system displays information using an informed consent form for the user to download, and the user signs the synthesized information using an effective digital certificate; because the sizes of the synthetic information are different, the CA mechanism and the AI synthesis system agree on a summary calculation and signature strategy of the synthetic information, the AI synthesis system provides unique codes for the synthetic information, the codes of the synthetic information, the names of the AI synthesis system and the summary of the synthetic information form unique labels of the synthetic information, and the AI synthesis system signs the labels of the synthetic information by using the valid digital certificates; and splicing and storing the synthesized information, the signature of the synthesized information by the user and the signature of the synthesized information tag by the AI synthesis system.
Referring to fig. 5, the entity informed consent form signing process includes that a user downloads an entity informed consent form provided by an AI system and including a unique code of synthetic information, and sends the entity informed consent form, the synthetic information and a signature of the user on the synthetic information to a related entity; the related entity performs signature verification on the signature of the synthesized information, verifies the authenticity and the integrity of the synthesized information and the identity of the user, if the signature verification is passed, the related entity uses an electronic signature system to sign the informed consent form and sends the electronic file of the signed informed consent form to the user, and if the related entity does not recognize or verify the synthesized information, the entity can refuse to sign on the informed consent form; the user verifies the signature of the entity, and if the signature passes, the signed informed consent is uploaded to an AI synthesis system; if the verification signature does not pass, the signature of the relevant entity on the informed consent is invalid.
Referring to fig. 6, when the synthesized information needs to be traced, the verifier applies for tracing according to the unique code of the synthesized information, the AI synthesis system receives and processes the application, analyzes according to the tracing evidence attached to the synthesized information, and provides an informed consent if the informed consent of the related entity exists; and if the related entity knows that the consent is missing, providing the identity information of the composite information signature user.
Example 2
The specific data format is needed to be adopted for adding the tracing voucher to the AI synthetic information, and the embodiment designs the data type TraceabilityData of the tracing voucher of the AI synthetic information according to the application scene of the actual AI synthetic information.
The ASN.1 data structure is as follows:
TraceabilityData ::= SEQUENCE{
version Version,
signatureAlgorithm AlgorithmIdentifier,
contentInfo ContentInfo,
timestampToken TimeStampToken OPTIONAL
}
Wherein,
Version designates the syntax Version number, and the method sets a value of 1.
Version ::= INTEGER(1)
AlgorithmIdentifier is used to identify signature algorithm, specifically, national encryption algorithm based on SM2 algorithm and SM3 algorithm, its OID is 1.2.156.10197.1.501, and its parameter is NULL.
AlgorithmIdentifier ::= SEQUENCE{
Algorithm OBJECT IDENTIFIER,
parameters NULL
}
ContentInfo designates the content type, specifically AI composition information traceability certificate, and its OID is registered with the national OID registry. Content is TTSInfo type defined for trace (Trace To the Source) information, including user signature data, AI composition system signature data, and related entity signature data. The signature data type adopts SIGNEDDATA data type in national standard GB_T 35275-2017 information security technology SM2 cryptographic algorithm encryption signature message grammar Specification. Any type of data can be signed by any number of signers at the same time.
ContentInfo ::= SEQUENCE{
contentType ContentType,
content TTSInfo
}
ContentType ::= OBJECT IDENTIFIER
TTSInfo::= SET OF SignedData
}
SignedData ::= SEQUENCE{
versionVersion,
digestAlgorithms DigestAlgorithmIdentifiers,
contentInfo ContentInfo,
certificates[0] IMPLICIT ExtendedCertificatesAndCertificates OPTIONAL,
crl[1] IMPLICIT CertificateRevocationLists OPTIONAL,
signerInfos SignerInfos
}
DigestAlgorithmIdentifiers ::= SET OF DigestAlgorithmIdentifier
SignerInfos ::= SET OF SignerInfo
SignerInfo :: SEQUENCE{
versionVersion,
issuerAndSerialNumber IssuerAndSerialNumber,
digestAlgorithm DigestAlgorithmIdentifier,
authenticatedAttributes[0] IMPLICIT Attributes OPTIONAL,
digestEncryptionAlgorithm DigestEncryptionAlgorithmIdentifier,
encryptedDigest EncryptedDigest,
unauthenticatedAttributes[1] IMPLICIT Attributes OPTIONAL
}
EncryptedDigest ::=OCTET STRING
ENCRYPTEDDIGEST adopts the SM2Signature data format in national standard GB_T 35276-2017 information security technology SM2 cryptographic algorithm usage Specification.
SM2Signature ::= SEQUENCE{
R INTEGRER-first part of signature value
S INTEGRER, second part of signature value
}
The user signature data type is SIGNEDDATA, wherein the content of the contentffo is the information original text or information abstract synthesized by the user by using the AI synthesis system, and the specific content is determined by abstract calculation and signature strategy agreed by the CA and the AI synthesis system.
The AI composition system signature data type is SIGNEDDATA, where the content of contentffo is the unique tag that the AI composition system generates for the composition information.
The entity signature data type is SIGNEDDATA, wherein the content of the contentInfo is the entity informed consent.
TimeStampToken adopts the structure in the timestamp response message in the national standard GB_T 20520-2006 public key infrastructure timestamp Specification for information security technology. Wherein MESSAGEIMPRINT fields are hashed values of TTSInfo data.
Although embodiments of the present invention have been shown and described, it will be understood by those skilled in the art that various changes, modifications, substitutions and alterations can be made therein without departing from the principles and spirit of the invention, the scope of which is defined in the appended claims and their equivalents.
Claims (6)
1. The AI synthetic information traceability authentication method based on the digital certificate comprises an AI synthetic system, a user using the AI synthetic system to synthesize information, an entity involved in the synthetic information, a CA mechanism and a signature verification server, and is characterized in that: the method comprises the following steps:
S1: when the user synthesizes information by using the AI synthesis system, the user communicates with the entity involved in the synthesis information to ensure the informed consent of the entity;
s2: the user, the entity and the AI synthesis system apply for the digital certificate to the CA mechanism respectively, and the CA mechanism calls the signature verification server to issue the digital certificate after verifying the identity so as to provide the signature verification service;
s3: binding a digital certificate of a user with an AI synthesis system account and logging in;
s4: the user uses an AI synthesis system to synthesize information, the AI synthesis system issues entity informed consent, the user and entity identity are verified through a signature verification server, and a tracing certificate is added to the synthesized information after signature and verification;
When the user uses the AI synthesis system to synthesize information, the AI synthesis system judges whether the data elements used during synthesis contain portrait or voice information, if so, the AI system displays information to be downloaded by the user by using an informed consent form, and the user signs the synthesis information by using an effective digital certificate; because the sizes of the synthetic information are different, the CA mechanism and the AI synthesis system agree on a summary calculation and signature strategy of the synthetic information, the AI synthesis system provides unique codes for the synthetic information, the codes of the synthetic information, the names of the AI synthesis system and the summary of the synthetic information form unique labels of the synthetic information, and the AI synthesis system signs the labels of the synthetic information by using the valid digital certificates; the synthetic information, the signature of the user on the synthetic information and the signature of the synthetic information label are spliced and stored by an AI synthetic system;
The signing process of the entity informed consent comprises the steps that a user downloads the entity informed consent provided by an AI system and containing the unique code of the synthetic information, and the entity informed consent, the synthetic information and the signature of the user on the synthetic information are sent to related entities together; the related entity performs signature verification on the signature of the synthesized information, verifies the authenticity and the integrity of the synthesized information and the identity of the user, if the signature verification is passed, the related entity uses an electronic signature system to sign the informed consent form and sends the electronic file of the signed informed consent form to the user, and if the related entity does not recognize or verify the synthesized information, the entity can refuse to sign on the informed consent form; the user verifies the signature of the entity, and if the signature passes, the signed informed consent is uploaded to an AI synthesis system; if the verification signature does not pass, the signature of the related entity on the informed consent is invalid;
S5: and the entity applies for and obtains the synthesized information traceability service from the AI synthesis system.
2. The AI-synthesis-information-traceability-authentication method based on the digital certificate of claim 1, wherein the AI-synthesis-information-traceability-authentication method is characterized by: the entity comprises the actual person, institution or community involved in synthesizing the information.
3. The AI-synthesis-information-traceability-authentication method based on the digital certificate of claim 2, wherein the AI-synthesis-information-traceability-authentication method is characterized by: the CA institution manages the lifecycle of the digital certificate.
4. The AI-composition-information-traceability-authentication method based on digital certificates of claim 3, wherein: the binding process of the digital certificate of the user and the account of the AI synthesis system comprises the steps that the user registers and logs in the AI synthesis system, the AI synthesis system identifies whether the user owns the digital certificate, if the user does not have the digital certificate, the AI synthesis system prompts the user to transact the digital certificate, if the user owns the digital certificate, the AI synthesis system identifies whether the digital certificate of the user is valid, if the digital certificate of the user is invalid, the user applies the digital certificate to a CA (certificate authority) entity, the CA entity audits and issues the digital certificate of the user, and if the digital certificate of the user is valid, the digital certificate of the user is bound with the account of the AI synthesis system.
5. The digital certificate-based AI composition information traceability authentication method of claim 4, wherein: and the traceability certificate added for the signed and checked synthetic information adopts a specific synthetic information traceability certificate data format.
6. The digital certificate-based AI composition information traceability authentication method of claim 5, wherein: when the synthesized information needs to be traced, a verifier carries out tracing application according to an AI system identifier and an information unique code attached to the synthesized information, an AI synthesis system receives and processes the application, analyzes according to tracing credentials attached to the synthesized information, and provides an informed consent if the informed consent is available; and if the related entity knows that the consent is missing, providing the identity information of the composite information signature user.
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN202411035218.0A CN118631475B (en) | 2024-07-31 | 2024-07-31 | AI synthetic information traceability authentication method based on digital certificate |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN202411035218.0A CN118631475B (en) | 2024-07-31 | 2024-07-31 | AI synthetic information traceability authentication method based on digital certificate |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| CN118631475A CN118631475A (en) | 2024-09-10 |
| CN118631475B true CN118631475B (en) | 2024-11-22 |
Family
ID=92599692
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CN202411035218.0A Active CN118631475B (en) | 2024-07-31 | 2024-07-31 | AI synthetic information traceability authentication method based on digital certificate |
Country Status (1)
| Country | Link |
|---|---|
| CN (1) | CN118631475B (en) |
Citations (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN105681035A (en) * | 2016-03-04 | 2016-06-15 | 河北腾翔软件科技有限公司 | Security authorization method which solves problem that certificate private key is reused by multiple users |
| CN111277417A (en) * | 2020-01-15 | 2020-06-12 | 浙江华云信息科技有限公司 | Electronic signature implementation method based on national network security technology architecture |
Family Cites Families (5)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US7607008B2 (en) * | 2004-04-01 | 2009-10-20 | Microsoft Corporation | Authentication broker service |
| US11096059B1 (en) * | 2019-08-04 | 2021-08-17 | Acceptto Corporation | System and method for secure touchless authentication of user paired device, behavior and identity |
| CN113935073A (en) * | 2021-10-15 | 2022-01-14 | 杭州电子科技大学 | Seal generation and verification method supporting main body and content authentication |
| AT525728B1 (en) * | 2022-02-04 | 2023-07-15 | Primesign Gmbh | Method and device for creating electronic signatures |
| CN118214586A (en) * | 2024-03-04 | 2024-06-18 | 浙江大华技术股份有限公司 | Identity authentication method, system, equipment and storage medium |
-
2024
- 2024-07-31 CN CN202411035218.0A patent/CN118631475B/en active Active
Patent Citations (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN105681035A (en) * | 2016-03-04 | 2016-06-15 | 河北腾翔软件科技有限公司 | Security authorization method which solves problem that certificate private key is reused by multiple users |
| CN111277417A (en) * | 2020-01-15 | 2020-06-12 | 浙江华云信息科技有限公司 | Electronic signature implementation method based on national network security technology architecture |
Also Published As
| Publication number | Publication date |
|---|---|
| CN118631475A (en) | 2024-09-10 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US12015718B2 (en) | Method and system for signing and authenticating electronic documents via a signature authority which may act in concert with software controlled by the signer | |
| US11212117B2 (en) | Tamper-resistant software development lifecycle provenance | |
| CN107959568B (en) | A method and system for intelligently generating an electronic certificate for metrological verification and calibration | |
| CN112199721A (en) | Authentication information processing method, device, equipment and storage medium | |
| Baldi et al. | Security analysis of a blockchain-based protocol for the certification of academic credentials | |
| US20020038290A1 (en) | Digital notary system and method | |
| CN112364385B (en) | OFD format real estate electronic certificate file signature method and system | |
| US8782397B2 (en) | Compact attribute for cryptographically protected messages | |
| CA2428665A1 (en) | Web-based method and system for applying a legally enforceable signature on an electronic document | |
| CN111224788A (en) | A blockchain-based electronic contract management method, device and system | |
| CN111461917B (en) | Power system material contract management system based on block chain | |
| CN103795546A (en) | Generating method and authentication method of data label and system of generating method and authentication method | |
| CN105825446A (en) | Internet jury system | |
| CN112561746B (en) | Electronic signing method, device, terminal and storage medium | |
| EP2262165B1 (en) | User generated content registering method, apparatus and system | |
| CN116226824A (en) | Electronic contract signing method and system based on blockchain and CA certificate | |
| CN117390693A (en) | Platform and method for mutual recognition of electronic signatures | |
| CN110677259A (en) | Full-link real-time notarization system and method for electronic contract | |
| CN104168117B (en) | A kind of speech digit endorsement method | |
| CN118631475B (en) | AI synthetic information traceability authentication method based on digital certificate | |
| KR101355077B1 (en) | System for creating and certifying the original of digital contents and method thereof | |
| CN114900302B (en) | Anonymous certificate issuing method | |
| CN101552903B (en) | Television program distribution method and system | |
| KR100568081B1 (en) | Digital Contents Authentication and Control System Using Certificate | |
| CN114638009B (en) | An electronic signature system applicable to public key cryptography technology and supporting commercial cryptographic algorithms |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| PB01 | Publication | ||
| PB01 | Publication | ||
| SE01 | Entry into force of request for substantive examination | ||
| SE01 | Entry into force of request for substantive examination | ||
| GR01 | Patent grant | ||
| GR01 | Patent grant |