Biometric technology helps electronic signature technology

<

To understand what is an electronic signature, you need to start with a traditional manual signature or seal. In traditional business activities, in order to ensure the security and authenticity of transactions, a written contract or official document must be signed or sealed by the parties or their responsible persons so that the parties to the transaction can identify who signed the contract and guarantee the person who signed or stamped the contract. It is only legally possible to recognize the content of the contract as valid for the contract. In the virtual world of electronic commerce, contracts or documents are presented and transmitted in the form of electronic documents.

On electronic documents, traditional handwritten signatures and stamps cannot be carried out. This must be replaced by technical means. It is able to identify the true identity of both traders in electronic documents, guarantee the security and authenticity of transactions as well as non-repudiation. It is an electronic technology means of signatures that are equivalent to handwritten signatures or seals. It is called an electronic signature. Legally speaking, signatures have two functions: the identity signer and the signer’s recognition of the contents of the document. The electronic signature is defined in the UNCTAD Electronic Signatures Model Law as follows: “Data that is contained in, attached to, or logically associated with a data message in a data message. It can be used for authentication and data. The signatory associated with the message indicates that the signatory has acknowledged the information contained in the data message;" in the EU's Common Framework for Electronic Signatures, it states: "Data that is attached to or logically related to other electronic data in electronic form A method of discrimination "is called an electronic signature. The definition of electronic signature in China's "Electronic Signature Law": "refers to the data contained in the electronic message in the data message and attached to identify the identity of the signer and indicate that the signer has accepted the content."

First, there are many kinds of technical means for implementing electronic signatures. However, at present relatively mature, electronic signature technologies commonly used in advanced countries in the world are still "digital signatures".

Since maintaining technology neutrality is a basic principle for formulating laws, there is currently no reason why the public key cryptography theory is the only technology for making signatures. Therefore, it is necessary to specify a more general concept to adapt to future technological developments. However, the signatures mentioned in the current electronic signature method generally refer to "digital signatures." The so-called "digital signature" is to generate a series of symbols and codes through a certain cryptographic operation to compose an electronic password for signature instead of writing a signature or a seal. The electronic signature can also be technically verified, and its verification accuracy is general. The manual signature and seal verification are incomparable. "Digital signature" is an e-signature method with the most common application, most mature technology, and strongest operability in e-commerce and e-government. It uses standardized procedures and scientific methods to identify the identity of the signer and the recognition of an electronic data content. It can also verify whether the original text of the file has changed during the transmission process and ensure the integrity, authenticity, and non-repudiation of the transmitted electronic file.

Second, the realization of electronic signatures

At present, there are many technical means for implementing electronic signatures. The premise is that after confirming that the signer’s exact identity is authenticated, the electronic signature recognizes that people can sign an electronic record in many different ways. These methods include: digital signature based on PKI-based public-key cryptography; or using a unique biometric-based identification, such as pattern recognition of handwritten signatures and stamped electronic images; fingerprints, sound imprints, or retinal scans Identification; a PIN code, password, or personal identification number that allows the recipient to identify the sender; computers based on quantum mechanics, etc. However, the more mature, easy to use and operable, electronic signature technology commonly used in the world's advanced countries and China is based on PKI (Public Key Infrastructino) digital signature technology.

1. Pattern recognition of handwritten signatures or stamps

A handwritten signature or seal is to be used as an image, scanned with light, photoelectrically converted and stored in a database. When the person's handwritten signature or stamp is verified, the input is scanned with light, and the corresponding image in the original database is called up. Using the mathematical method of pattern recognition, compare the two to confirm the authenticity of the signature or seal. This method was used at the bank accounting desk, but it proved infeasible due to the need for large-capacity database storage and the difference between each handwritten signature and stamping. This method is also not suitable for transmission over the Internet.

2. Biometric technology

Biometrics technology is a technology that uses human biometrics for identity authentication. Biometrics are unique representations of a person and others, which can be measured, automatically identified, and verified. The biometric system samples biological features, extracts their unique features, digitizes them, converts them into digital codes, and further stores these code constituent feature templates in a database. When people interact with the recognition system to perform identity authentication, the recognition system acquires them. The features are compared with the feature templates in the database to determine if they match and thus decide to confirm or deny the person. Biometric technologies mainly include the following types:

(1) Fingerprint identification technology. Each person's fingerprint skin pattern is unique and does not change for life. With this uniqueness and stability, one can associate a person with his fingerprint by using his fingerprint and the fingerprint stored in the database in advance. The fingerprint identification algorithm performs comparisons to verify his true identity. Under the premise of identification, a paper document or data message can be signed by handprint or signed in the IC card. However, such signatures need to be supported by a large-capacity database, which is suitable for local face-to-face processing and is not suitable for online transmission.

(2) Retina recognition technology. The retina recognition technology uses a laser to illuminate the back of the eyeball and scans and captures the feature points of several hundred retinas. After digital processing, a memory template is formed and stored in a database for later comparison verification. The retina is an extremely stable biometric, and identity authentication is a highly accurate identification technique. However, difficulties in use do not apply to direct digital signatures and network transmissions.

(3) Voice recognition technology. Voice recognition technology is a kind of behavior recognition technology. It uses sound recording equipment to repeatedly measure and record sound waveforms and changes, and performs spectrum analysis. After being digitized, it is made into a sound template and stored. When used, the sound collected at the scene is accurately matched with the registered sound template to identify the person's identity. This technique is less accurate and difficult to use and does not apply to direct digital signatures and network transmissions.

Aluminum Sliding Door

Aluminum Sliding Door

Xingqiu Aluminum Co., Ltd. , http://www.fsdoorsprofile.com